Flylib.com
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Part I: Exam Preparation
The Business Aspects of Penetration Testing
The Business Aspects of Penetration Testing
Study Strategies
Security Fundamentals
Security Testing
Hacker and Cracker Descriptions
Ethical Hackers
Test PlansKeeping It Legal
Ethics and Legality
Summary
Key Terms
Apply Your Knowledge
The Technical Foundations of Hacking
The Technical Foundations of Hacking
Study Strategies
The Attackers Process
The Ethical Hackers Process
Security and the Stack
Summary
Key Terms
Apply Your Knowledge
Footprinting and Scanning
Footprinting and Scanning
Study Strategies
Determining Assessment Scope
The Seven-Step Information Gathering Process
Summary
Key Terms
Apply Your Knowledge
Enumeration and System Hacking
Enumeration and System Hacking
Study Strategies
The Architecture of Windows Computers
Enumeration
Windows Hacking
Summary
Key Terms
Apply Your Knowledge
Linux and Automated Security Assessment Tools
Linux and Automated Security Assessment Tools
Study Strategies
Linux
Automated Assessment Tools
Picking the Right Platform
Summary
Key Terms
Apply Your Knowledge
Trojans and Backdoors
Trojans and Backdoors
Study Strategies
An Overview of TrojansThe History of Trojans
Covert Communications
Trojan and Backdoor Countermeasures
Summary
Key Terms
Apply Your Knowledge
Sniffers, Session Hijacking, and Denial of Service
Sniffers, Session Hijacking, and Denial of Service
Study Strategies
Sniffers
Session Hijacking
Denial of Service
Summary
Key Terms
Apply Your Knowledge
Web Server Hacking, Web Applications, and Database Attacks
Web Server Hacking, Web Applications, and Database Attacks
Study Strategies
Web Server Hacking
Web Application Hacking
Database Overview
Summary
Key Terms
Apply Your Knowledge
Wireless Technologies, Security, and Attacks
Wireless Technologies, Security, and Attacks
Study Strategies
Wireless TechnologiesA Brief History
Wireless LANs
Wireless Hacking Tools
Securing Wireless Networks
Summary
Key Terms
Apply Your Knowledge
IDS, Firewalls, and Honeypots
IDS, Firewalls, and Honeypots
Study Strategies
Intrusion Detection Systems
Firewalls
Honeypots
Summary
Key Terms
Apply Your Knowledge
Buffer Overflows, Viruses, and Worms
Buffer Overflows, Viruses, and Worms
Study Strategies
Buffer Overflows
Viruses and Worms
Summary
Key Terms
Apply Your Knowledge
Cryptographic Attacks and Defenses
Cryptographic Attacks and Defenses
Study Strategies
Functions of Cryptography
History of Cryptography
Algorithms
Hashing
Digital Signatures
Steganography
Digital Certificates
Public Key Infrastructure
Protocols, Standards, and Applications
Encryption Cracking and Tools
Summary
Key Terms
Apply Your Knowledge
Physical Security and Social Engineering
Physical Security and Social Engineering
Study Strategies
Physical Security
Social Engineering
Summary
Key Terms
Apply Your Knowledge
Part II: Final Review
Fast Facts
Ethics and Legality
Footprinting
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web-Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Virus and Worms
Physical Security
Linux Hacking
Evading Firewalls, IDS, and Honeypots
Buffer Overflows
Cryptography
Penetration Testing
Certified Ethical Hacker
Practice Exam Questions
Answers to Practice Exam Questions
Glossary
Part III: Appendixes
Appendix B. Preparing Your System for Knoppix-std
Appendix A. Using the ExamGear Special Edition Software
Appendix A. Using the ExamGear Special Edition Software
Exam Simulation
Study Tools
How ExamGear Special Edition Works
Installing ExamGear Special Edition
Using ExamGear Special Edition
Contacting Que Certification
License
Software and Documentation
License Term and Charges
Title
Updates
Limited Warranty and Disclaimer
Limitation of Liability
Miscellaneous
U.S. Government Restricted Rights
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Visual C# 2005 How to Program (2nd Edition)
Introduction
Simple-Type structs, Boxing and Unboxing
C.6. Wrap-Up
Terminology
J.10. Class BalanceInquiry
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Team change
Organizational change
Leading change
Mergers and acquisitions
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
An SOA timeline (from XML to Web services to SOA)
Reliable messaging
Part III: SOA and Service-Orientation
The top-down strategy
Service modeling guidelines
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Answers and Explanations
Project PlanningCore Processes
Exam Prep Questions
Project PlanningFacilitating Processes
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Quantitative Time Management
Understanding Digital Signal Processing (2nd Edition)
ANALYZING LINEAR TIME-INVARIANT SYSTEMS
REMEZ EXCHANGE FIR FILTER DESIGN METHOD
REFERENCES
Chapter Eight. Quadrature Signals
FLOATING-POINT BINARY FORMATS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies