
Learn how to identify security risks to networks and computers as you prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide thoroughly covers all exam objectives and topics, while showing you how Black Hat hackers think, helping you spot vulnerabilities in systems, and preparing you to beat the bad guys at their own game. Inside, you'll find:
- Full
coverage of all exam objectives in a systematic approach, so you can be
confident you're getting the instruction you need for the exam
- Practical hands-on exercises to reinforce critical skills
- Real-world scenarios that put what you've learned in the context of actual job roles
- Challenging review questions in each chapter to prepare you for exam day
- Exam
Essentials, a key feature in each chapter that identifies critical
areas you must become proficient in before taking the exam
- A
handy tear card that maps every official exam objective to the
corresponding chapter in the book, so you can track your exam prep
objective by objective
Download
Learn how to identify
security risks to networks and computers as you prepare for the
Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide
thoroughly covers all exam objectives and topics, while showing you how
Black Hat hackers think, helping you spot vulnerabilities in systems,
and preparing you to beat the bad guys at their own game. Inside, you’ll
find:
Full coverage of all exam objectives in a systematic approach, so
you can be confident you’re getting the instruction you need for the
exam
Practical hands-on exercises to reinforce critical skills
Real-world scenarios that put what you’ve learned in the context of
actual job roles
Challenging review questions in each chapter to prepare you for exam
day
Exam Essentials, a key feature in each chapter that identifies
critical areas you must become proficient in before taking the exam
A handy tear card that maps every official exam objective to the
corresponding chapter in the book, so you can track your exam prep
objective by objective
Look inside for complete coverage of all exam objectives.
Table of Contents
Chapter 1. Introduction to Ethical Hacking, Ethics, and Legality
Chapter 2. Gathering Target Information: Reconnaissance, Footprinting,
and Social Engineering
Chapter 3. Gathering Network and Host Information: Scanning and
Enumeration
Chapter 4. System Hacking: Password Cracking, Escalating Privileges, and
Hiding Files
Chapter 5. Installing Software on Target Systems: Spyware, Trojans,
Backdoors, Viruses, and Worms
Chapter 6. Gathering Data from Networks: Sniffers
Chapter 7. Denial of Service and Session Hijacking
Chapter 8. Web Hacking: Google, Web Servers, Web Application
Vulnerabilities, and Web-Based Password Cracking Techniques
Chapter 9. Attacking Applications: SQL Injection and Buffer Overflows
Chapter 10. Wireless Network Hacking
Chapter 11. Physical Site Security
Chapter 12. Hacking Linux Systems
Chapter 13. Bypassing Network Security: Evading IDS, Honeypots, and
Firewalls
Chapter 14. Understanding Cryptography
Chapter 15. Performing a Penetration Test
Read more at: http://www.wowebook.com/book/ceh-certified-ethical-hacker-study-guide/
Read more at: http://www.wowebook.com/book/ceh-certified-ethical-hacker-study-guide/
Prepare for CEH
certification with this comprehensive guide
Learn how to identify security risks to networks and computers as you
prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This
in-depth guide thoroughly covers all exam objectives and topics, while
showing you how Black Hat hackers think, helping you spot
vulnerabilities in systems, and preparing you to beat the bad guys at
their own game. Inside, you’ll find:
Full coverage of all exam objectives in a systematic approach, so
you can be confident you’re getting the instruction you need for the
exam
Practical hands-on exercises to reinforce critical skills
Real-world scenarios that put what you’ve learned in the context of
actual job roles
Challenging review questions in each chapter to prepare you for exam
day
Exam Essentials, a key feature in each chapter that identifies
critical areas you must become proficient in before taking the exam
A handy tear card that maps every official exam objective to the
corresponding chapter in the book, so you can track your exam prep
objective by objective
Look inside for complete coverage of all exam objectives.
Table of Contents
Chapter 1. Introduction to Ethical Hacking, Ethics, and Legality
Chapter 2. Gathering Target Information: Reconnaissance, Footprinting,
and Social Engineering
Chapter 3. Gathering Network and Host Information: Scanning and
Enumeration
Chapter 4. System Hacking: Password Cracking, Escalating Privileges, and
Hiding Files
Chapter 5. Installing Software on Target Systems: Spyware, Trojans,
Backdoors, Viruses, and Worms
Chapter 6. Gathering Data from Networks: Sniffers
Chapter 7. Denial of Service and Session Hijacking
Chapter 8. Web Hacking: Google, Web Servers, Web Application
Vulnerabilities, and Web-Based Password Cracking Techniques
Chapter 9. Attacking Applications: SQL Injection and Buffer Overflows
Chapter 10. Wireless Network Hacking
Chapter 11. Physical Site Security
Chapter 12. Hacking Linux Systems
Chapter 13. Bypassing Network Security: Evading IDS, Honeypots, and
Firewalls
Chapter 14. Understanding Cryptography
Chapter 15. Performing a Penetration Test
Read more at: http://www.wowebook.com/book/ceh-certified-ethical-hacker-study-guide/
Read more at: http://www.wowebook.com/book/ceh-certified-ethical-hacker-study-guide/
Không có nhận xét nào:
Đăng nhận xét