Flylib.com
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Part I: Exam Preparation
The Business Aspects of Penetration Testing
The Business Aspects of Penetration Testing
Study Strategies
Security Fundamentals
Security Testing
Hacker and Cracker Descriptions
Ethical Hackers
Test PlansKeeping It Legal
Ethics and Legality
Summary
Key Terms
Apply Your Knowledge
The Technical Foundations of Hacking
The Technical Foundations of Hacking
Study Strategies
The Attackers Process
The Ethical Hackers Process
Security and the Stack
Summary
Key Terms
Apply Your Knowledge
Footprinting and Scanning
Footprinting and Scanning
Study Strategies
Determining Assessment Scope
The Seven-Step Information Gathering Process
Summary
Key Terms
Apply Your Knowledge
Enumeration and System Hacking
Enumeration and System Hacking
Study Strategies
The Architecture of Windows Computers
Enumeration
Windows Hacking
Summary
Key Terms
Apply Your Knowledge
Linux and Automated Security Assessment Tools
Linux and Automated Security Assessment Tools
Study Strategies
Linux
Automated Assessment Tools
Picking the Right Platform
Summary
Key Terms
Apply Your Knowledge
Trojans and Backdoors
Trojans and Backdoors
Study Strategies
An Overview of TrojansThe History of Trojans
Covert Communications
Trojan and Backdoor Countermeasures
Summary
Key Terms
Apply Your Knowledge
Sniffers, Session Hijacking, and Denial of Service
Sniffers, Session Hijacking, and Denial of Service
Study Strategies
Sniffers
Session Hijacking
Denial of Service
Summary
Key Terms
Apply Your Knowledge
Web Server Hacking, Web Applications, and Database Attacks
Web Server Hacking, Web Applications, and Database Attacks
Study Strategies
Web Server Hacking
Web Application Hacking
Database Overview
Summary
Key Terms
Apply Your Knowledge
Wireless Technologies, Security, and Attacks
Wireless Technologies, Security, and Attacks
Study Strategies
Wireless TechnologiesA Brief History
Wireless LANs
Wireless Hacking Tools
Securing Wireless Networks
Summary
Key Terms
Apply Your Knowledge
IDS, Firewalls, and Honeypots
IDS, Firewalls, and Honeypots
Study Strategies
Intrusion Detection Systems
Firewalls
Honeypots
Summary
Key Terms
Apply Your Knowledge
Buffer Overflows, Viruses, and Worms
Buffer Overflows, Viruses, and Worms
Study Strategies
Buffer Overflows
Viruses and Worms
Summary
Key Terms
Apply Your Knowledge
Cryptographic Attacks and Defenses
Cryptographic Attacks and Defenses
Study Strategies
Functions of Cryptography
History of Cryptography
Algorithms
Hashing
Digital Signatures
Steganography
Digital Certificates
Public Key Infrastructure
Protocols, Standards, and Applications
Encryption Cracking and Tools
Summary
Key Terms
Apply Your Knowledge
Physical Security and Social Engineering
Physical Security and Social Engineering
Study Strategies
Physical Security
Social Engineering
Summary
Key Terms
Apply Your Knowledge
Part II: Final Review
Fast Facts
Ethics and Legality
Footprinting
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web-Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Virus and Worms
Physical Security
Linux Hacking
Evading Firewalls, IDS, and Honeypots
Buffer Overflows
Cryptography
Penetration Testing
Certified Ethical Hacker
Practice Exam Questions
Answers to Practice Exam Questions
Glossary
Part III: Appendixes
Appendix B. Preparing Your System for Knoppix-std
Appendix A. Using the ExamGear Special Edition Software
Appendix A. Using the ExamGear Special Edition Software
Exam Simulation
Study Tools
How ExamGear Special Edition Works
Installing ExamGear Special Edition
Using ExamGear Special Edition
Contacting Que Certification
License
Software and Documentation
License Term and Charges
Title
Updates
Limited Warranty and Disclaimer
Limitation of Liability
Miscellaneous
U.S. Government Restricted Rights
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Key and Certificate Management Using Keystores
SSL and TLS
Appendix A Solutions to Exercises
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Presenting InfoPath 2003 SP-1
Adding Basic Controls and Lists
Formatting Forms
Working with Advanced Form Elements
Writing Advanced Event Handlers
High-Speed Signal Propagation[c] Advanced Black Magic
Concentric-Ring Skin-Effect Model
Pcb Configurations
Laying Cables in an Uncooled Attic Space
150- W STP-A Connectors
Coaxial Cable Connectors
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Developing a Kanban Design
Initial Startup and Common Pitfalls
Appendix A MRP vs. Kanban
Appendix B Kanban Supermarkets
Documenting Software Architectures: Views and Beyond
Summary Checklist
Beyond Structure
Discussion Questions
ECS System Overview
ECS Software Architecture View Template
InDesign Type: Professional Typography with Adobe InDesign CS2
A Blank Sheet: Typing on Your Page
Stylin with Paragraph and Character Styles
Break Characters
Vertical (Stacked) Alignment
Shaping Text Frames
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies