Thứ Hai, 15 tháng 4, 2013

CEH Certified Ethical Hacker Study Guide

https://ebooks-imgs.eb.sonynei.com/product/400/000/000/000/000/264/823/400000000000000264823_s4.jpg

Learn how to identify security risks to networks and computers as you prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide thoroughly covers all exam objectives and topics, while showing you how Black Hat hackers think, helping you spot vulnerabilities in systems, and preparing you to beat the bad guys at their own game. Inside, you'll find:
  • Full coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need for the exam
  • Practical hands-on exercises to reinforce critical skills
  • Real-world scenarios that put what you've learned in the context of actual job roles
  • Challenging review questions in each chapter to prepare you for exam day
  • Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
  • A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective

     Download

Learn how to identify security risks to networks and computers as you prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide thoroughly covers all exam objectives and topics, while showing you how Black Hat hackers think, helping you spot vulnerabilities in systems, and preparing you to beat the bad guys at their own game. Inside, you’ll find: Full coverage of all exam objectives in a systematic approach, so you can be confident you’re getting the instruction you need for the exam Practical hands-on exercises to reinforce critical skills Real-world scenarios that put what you’ve learned in the context of actual job roles Challenging review questions in each chapter to prepare you for exam day Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective Look inside for complete coverage of all exam objectives. Table of Contents Chapter 1. Introduction to Ethical Hacking, Ethics, and Legality Chapter 2. Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering Chapter 3. Gathering Network and Host Information: Scanning and Enumeration Chapter 4. System Hacking: Password Cracking, Escalating Privileges, and Hiding Files Chapter 5. Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms Chapter 6. Gathering Data from Networks: Sniffers Chapter 7. Denial of Service and Session Hijacking Chapter 8. Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques Chapter 9. Attacking Applications: SQL Injection and Buffer Overflows Chapter 10. Wireless Network Hacking Chapter 11. Physical Site Security Chapter 12. Hacking Linux Systems Chapter 13. Bypassing Network Security: Evading IDS, Honeypots, and Firewalls Chapter 14. Understanding Cryptography Chapter 15. Performing a Penetration Test

Read more at: http://www.wowebook.com/book/ceh-certified-ethical-hacker-study-guide/
Prepare for CEH certification with this comprehensive guide Learn how to identify security risks to networks and computers as you prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide thoroughly covers all exam objectives and topics, while showing you how Black Hat hackers think, helping you spot vulnerabilities in systems, and preparing you to beat the bad guys at their own game. Inside, you’ll find: Full coverage of all exam objectives in a systematic approach, so you can be confident you’re getting the instruction you need for the exam Practical hands-on exercises to reinforce critical skills Real-world scenarios that put what you’ve learned in the context of actual job roles Challenging review questions in each chapter to prepare you for exam day Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective Look inside for complete coverage of all exam objectives. Table of Contents Chapter 1. Introduction to Ethical Hacking, Ethics, and Legality Chapter 2. Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering Chapter 3. Gathering Network and Host Information: Scanning and Enumeration Chapter 4. System Hacking: Password Cracking, Escalating Privileges, and Hiding Files Chapter 5. Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms Chapter 6. Gathering Data from Networks: Sniffers Chapter 7. Denial of Service and Session Hijacking Chapter 8. Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques Chapter 9. Attacking Applications: SQL Injection and Buffer Overflows Chapter 10. Wireless Network Hacking Chapter 11. Physical Site Security Chapter 12. Hacking Linux Systems Chapter 13. Bypassing Network Security: Evading IDS, Honeypots, and Firewalls Chapter 14. Understanding Cryptography Chapter 15. Performing a Penetration Test

Read more at: http://www.wowebook.com/book/ceh-certified-ethical-hacker-study-guide/

Không có nhận xét nào:

Đăng nhận xét

Ads 468x60px

Social Icons

Featured Posts