Flylib.com
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Part I: Exam Preparation
The Business Aspects of Penetration Testing
The Business Aspects of Penetration Testing
Study Strategies
Security Fundamentals
Security Testing
Hacker and Cracker Descriptions
Ethical Hackers
Test PlansKeeping It Legal
Ethics and Legality
Summary
Key Terms
Apply Your Knowledge
The Technical Foundations of Hacking
The Technical Foundations of Hacking
Study Strategies
The Attackers Process
The Ethical Hackers Process
Security and the Stack
Summary
Key Terms
Apply Your Knowledge
Footprinting and Scanning
Footprinting and Scanning
Study Strategies
Determining Assessment Scope
The Seven-Step Information Gathering Process
Summary
Key Terms
Apply Your Knowledge
Enumeration and System Hacking
Enumeration and System Hacking
Study Strategies
The Architecture of Windows Computers
Enumeration
Windows Hacking
Summary
Key Terms
Apply Your Knowledge
Linux and Automated Security Assessment Tools
Linux and Automated Security Assessment Tools
Study Strategies
Linux
Automated Assessment Tools
Picking the Right Platform
Summary
Key Terms
Apply Your Knowledge
Trojans and Backdoors
Trojans and Backdoors
Study Strategies
An Overview of TrojansThe History of Trojans
Covert Communications
Trojan and Backdoor Countermeasures
Summary
Key Terms
Apply Your Knowledge
Sniffers, Session Hijacking, and Denial of Service
Sniffers, Session Hijacking, and Denial of Service
Study Strategies
Sniffers
Session Hijacking
Denial of Service
Summary
Key Terms
Apply Your Knowledge
Web Server Hacking, Web Applications, and Database Attacks
Web Server Hacking, Web Applications, and Database Attacks
Study Strategies
Web Server Hacking
Web Application Hacking
Database Overview
Summary
Key Terms
Apply Your Knowledge
Wireless Technologies, Security, and Attacks
Wireless Technologies, Security, and Attacks
Study Strategies
Wireless TechnologiesA Brief History
Wireless LANs
Wireless Hacking Tools
Securing Wireless Networks
Summary
Key Terms
Apply Your Knowledge
IDS, Firewalls, and Honeypots
IDS, Firewalls, and Honeypots
Study Strategies
Intrusion Detection Systems
Firewalls
Honeypots
Summary
Key Terms
Apply Your Knowledge
Buffer Overflows, Viruses, and Worms
Buffer Overflows, Viruses, and Worms
Study Strategies
Buffer Overflows
Viruses and Worms
Summary
Key Terms
Apply Your Knowledge
Cryptographic Attacks and Defenses
Cryptographic Attacks and Defenses
Study Strategies
Functions of Cryptography
History of Cryptography
Algorithms
Hashing
Digital Signatures
Steganography
Digital Certificates
Public Key Infrastructure
Protocols, Standards, and Applications
Encryption Cracking and Tools
Summary
Key Terms
Apply Your Knowledge
Physical Security and Social Engineering
Physical Security and Social Engineering
Study Strategies
Physical Security
Social Engineering
Summary
Key Terms
Apply Your Knowledge
Part II: Final Review
Fast Facts
Ethics and Legality
Footprinting
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web-Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Virus and Worms
Physical Security
Linux Hacking
Evading Firewalls, IDS, and Honeypots
Buffer Overflows
Cryptography
Penetration Testing
Certified Ethical Hacker
Practice Exam Questions
Answers to Practice Exam Questions
Glossary
Part III: Appendixes
Appendix B. Preparing Your System for Knoppix-std
Appendix A. Using the ExamGear Special Edition Software
Appendix A. Using the ExamGear Special Edition Software
Exam Simulation
Study Tools
How ExamGear Special Edition Works
Installing ExamGear Special Edition
Using ExamGear Special Edition
Contacting Que Certification
License
Software and Documentation
License Term and Charges
Title
Updates
Limited Warranty and Disclaimer
Limitation of Liability
Miscellaneous
U.S. Government Restricted Rights
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Schedule Risk
Managing Activity Risks
Quantifying and Analyzing Project Risk
Monitoring and Controlling Risky Projects
Conclusion
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Creating Indexes for Fast Data Retrieval
Working with Functions, Parameters, and Data Types
Working with SQL JOIN Statements and Other Multiple-table Queries
Working with Ms-sql Server Information Schema View
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Basic SWT Widgets
Text Controls
Dialogs
Other Important SWT Components
JFace Windows and Dialogs
Competency-Based Human Resource Management
An Overview of Competency-Based HR Management Practices
A Need for Implementing Competency-Based HR Management
Competency-Based Employee Training
Competency-Based Employee Development
Appendix D Employee Development and Succession Management
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Methods in Project Contracts
Python Standard Library (Nutshell Handbooks) with
The popen2 Module
The gdbm Module
The keyword Module
The parser Module
The dircache Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies