Get ready for the latest Certified Ethical Hacker exam with the only book authorized by the creators of the certification, EC-Council! This book covers all of the various areas of the very challenging Certified Ethical Hacker exam, and includes hundreds of review questions in addition to refresher coverage of the information needed to successfully become a Certified Ethical Hacker. Including helpful at-a-glance quick reference boxes and tables, Exam Essentials summaries, review questions and answers, tutorial information and more, this resource is at once succinct and comprehensive. Not just an exam preparation tool, this book helps prepare future Certified Ethical Hackers to proactively protect their organization's systems from malicious hackers. It strengthens readers' knowledge that will help them successfully assess and analyze computer system weaknesses and vulnerabilities - so they can most effectively safeguard the organization's information and assets. This is the ideal resource for anyone looking to refresh their skills in this area, learn more about ethical hacking, or successfully pass the certification exam and become a Certified Ethical Hacker.
"synopsis" may belong to another edition of this title.
About the Author:
Steven DeFino travels the United States as the Director of Information Security and Networking for Training Camp. DeFino has been teaching technical and management classes since 1998 covering topics such as Cisco, Linux, Web Application Design and project management, drawing on firsthand experience from his 25-year career in the field. His success as an information security educator includes recognition as EC-Council "Instructor of the Year" for 2006 and 2009 and EC-Council "Certificate of Excellence" winner in 2008 and 2010. He has authored or maintained curricula for over 30 courses and is a frequent contributor to blogs and other professional resources.
Review:
1. Ethical Hacking. 2. Hacking Laws. 3. Footprinting. 4. Google Hacking. 5. Scanning. 6. Enumeration. 7. System Hacking. 8. Trojans and Backdoors. 9. Viruses and Worms. 10. Sniffers. 11. Social Engineering. 12. Denial of Service. 13. Buffer Overflows. 14. Web Servers and Applications. 15. Hacking Wireless Networks. 16. Cryptography. 17. Hacking with Linux. 18. IDS, Firewalls, Honeypots. 19. Summary of Optional Modules. 20. Penetration Testing. Appendix A: CEH Cheatsheets. Appendix B: Practice Exam Answers.
"About this title" may belong to another edition of this title.
- PublisherDelmar Cengage Learning
- Publication date2009
- ISBN 10 1435488539
- ISBN 13 9781435488533
- BindingPaperback
- Edition number1
- Number of pages384
-
Rating