Certified Ethical Hacker Exam Prep


book cover
Certified Ethical Hacker Exam Prep
By Michael Gregg
...............................................
Publisher: Que
Pub Date: April 07, 2006
Print ISBN-10: 0-7897-3531-8
Print ISBN-13: 978-0-7897-3531-7
Pages: 696
 



Table of Contents  | Index
overview

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.

Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.



book cover
Certified Ethical Hacker Exam Prep
By Michael Gregg
...............................................
Publisher: Que
Pub Date: April 07, 2006
Print ISBN-10: 0-7897-3531-8
Print ISBN-13: 978-0-7897-3531-7
Pages: 696
 



Table of Contents  | Index

   Copyright
   CEH Objectives Quick Reference
   About the Author
   Acknowledgments
   We Want to Hear from You!
   Introduction
   Study and Exam Prep Tips
    Part I:  Exam Preparation
      Chapter 1.  The Business Aspects of Penetration Testing
      Outline
      Study Strategies
      Introduction
      Security Fundamentals
      Security Testing
      Hacker and Cracker Descriptions
      Ethical Hackers
      Test PlansKeeping It Legal
      Ethics and Legality
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 2.  The Technical Foundations of Hacking
      Outline
      Study Strategies
      Introduction
      The Attacker's Process
      The Ethical Hacker's Process
      Security and the Stack
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 3.  Footprinting and Scanning
      Outline
      Study Strategies
      Introduction
      Determining Assessment Scope
      The Seven-Step Information Gathering Process
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 4.  Enumeration and System Hacking
      Outline
      Study Strategies
      Introduction
      The Architecture of Windows Computers
      Enumeration
      Windows Hacking
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 5.  Linux and Automated Security Assessment Tools
      Outline
      Study Strategies
      Introduction
      Linux
      Automated Assessment Tools
      Picking the Right Platform
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 6.  Trojans and Backdoors
      Outline
      Study Strategies
      Introduction
      An Overview of TrojansThe History of Trojans
      Covert Communications
      Trojan and Backdoor Countermeasures
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 7.  Sniffers, Session Hijacking, and Denial of Service
      Outline
      Study Strategies
      Introduction
      Sniffers
      Session Hijacking
      Denial of Service
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 8.  Web Server Hacking, Web Applications, and Database Attacks
      Outline
      Study Strategies
      Introduction
      Web Server Hacking
      Web Application Hacking
      Database Overview
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 9.  Wireless Technologies, Security, and Attacks
      Outline
      Study Strategies
      Introduction
      Wireless TechnologiesA Brief History
      Wireless LANs
      Wireless Hacking Tools
      Securing Wireless Networks
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 10.  IDS, Firewalls, and Honeypots
      Outline
      Study Strategies
      Introduction
      Intrusion Detection Systems
      Firewalls
      Honeypots
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 11.  Buffer Overflows, Viruses, and Worms
      Outline
      Study Strategies
      Introduction
      Buffer Overflows
      Viruses and Worms
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 12.  Cryptographic Attacks and Defenses
      Outline
      Study Strategies
      Introduction
      Functions of Cryptography
      History of Cryptography
      Algorithms
      Hashing
      Digital Signatures
      Steganography
      Digital Certificates
      Public Key Infrastructure
      Protocols, Standards, and Applications
      Encryption Cracking and Tools
      Summary
      Key Terms
      Apply Your Knowledge
      Chapter 13.  Physical Security and Social Engineering
      Outline
      Study Strategies
      Introduction
      Physical Security
      Social Engineering
      Summary
      Key Terms
      Apply Your Knowledge
    Part II:  Final Review
      Fast Facts
      Ethics and Legality
      Footprinting
      Scanning
      Enumeration
      System Hacking
      Trojans and Backdoors
      Sniffers
      Denial of Service
      Social Engineering
      Session Hijacking
      Hacking Web Servers
      Web Application Vulnerabilities
      Web-Based Password Cracking Techniques
      SQL Injection
      Hacking Wireless Networks
      Virus and Worms
      Physical Security
      Linux Hacking
      Evading Firewalls, IDS, and Honeypots
      Buffer Overflows
      Cryptography
      Penetration Testing
      Practice Exam and Answers
      Certified Ethical Hacker
      Practice Exam Questions
      Answers to Practice Exam Questions
      Glossary
      A
      B
      C
      D
      E
      F
      G
      H
      I
      K
      L
      M
      N
      O
      P
      Q
      R
      S
      T
      U
      V
      W-Z
    Part III:  Appendixes
      Appendix A.  Using the ExamGear Special Edition Software
      Exam Simulation
      Study Tools
      How ExamGear Special Edition Works
      Installing ExamGear Special Edition
      Using ExamGear Special Edition
      Contacting Que Certification
      License Agreement
      License
      Software and Documentation
      License Term and Charges
      Title
      Updates
      Limited Warranty and Disclaimer
      Limitation of Liability
      Miscellaneous
      U.S. Government Restricted Rights
      Appendix B.  Preparing Your System for Knoppix-std
   Index