did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470525203

CEH Certified Ethical Hacker Study Guide

by
  • ISBN13:

    9780470525203

  • ISBN10:

    0470525207

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-04-26
  • Publisher: Sybex
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99

Summary

Prepare for the new version of CEH certification with this advanced guideOnce you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study toolsThis is the ideal guide to prepare you for the new CEH certification exam.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Author Biography

Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.

Table of Contents

1 Introduction to Ethical Hacking, Ethics, and Legality.

2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.

3 Gathering Network and Host Information: Scanning and Enumeration.

4 System Hacking: Password Cracking, Escalating Privileges, and Hiding Files.

5 Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms.

6 Gathering Data from Networks: Sniffers.

7 Denial of Service and Session Hijacking.

8 Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.

9 Attacking Applications: SQL Injection and Buffer Overflows.

10 Wireless Network Hacking.

11 Physical Site Security.

12 Hacking Linux Systems.

13 Bypassing Network Security: Evading IDS, Honeypots, and Firewalls.

14 Understanding Cryptography.

15 Performing a Penetration Test.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program