Flylib.com
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Part I: Exam Preparation
The Business Aspects of Penetration Testing
The Business Aspects of Penetration Testing
Study Strategies
Security Fundamentals
Security Testing
Hacker and Cracker Descriptions
Ethical Hackers
Test PlansKeeping It Legal
Ethics and Legality
Summary
Key Terms
Apply Your Knowledge
The Technical Foundations of Hacking
The Technical Foundations of Hacking
Study Strategies
The Attackers Process
The Ethical Hackers Process
Security and the Stack
Summary
Key Terms
Apply Your Knowledge
Footprinting and Scanning
Footprinting and Scanning
Study Strategies
Determining Assessment Scope
The Seven-Step Information Gathering Process
Summary
Key Terms
Apply Your Knowledge
Enumeration and System Hacking
Enumeration and System Hacking
Study Strategies
The Architecture of Windows Computers
Enumeration
Windows Hacking
Summary
Key Terms
Apply Your Knowledge
Linux and Automated Security Assessment Tools
Linux and Automated Security Assessment Tools
Study Strategies
Linux
Automated Assessment Tools
Picking the Right Platform
Summary
Key Terms
Apply Your Knowledge
Trojans and Backdoors
Trojans and Backdoors
Study Strategies
An Overview of TrojansThe History of Trojans
Covert Communications
Trojan and Backdoor Countermeasures
Summary
Key Terms
Apply Your Knowledge
Sniffers, Session Hijacking, and Denial of Service
Sniffers, Session Hijacking, and Denial of Service
Study Strategies
Sniffers
Session Hijacking
Denial of Service
Summary
Key Terms
Apply Your Knowledge
Web Server Hacking, Web Applications, and Database Attacks
Web Server Hacking, Web Applications, and Database Attacks
Study Strategies
Web Server Hacking
Web Application Hacking
Database Overview
Summary
Key Terms
Apply Your Knowledge
Wireless Technologies, Security, and Attacks
Wireless Technologies, Security, and Attacks
Study Strategies
Wireless TechnologiesA Brief History
Wireless LANs
Wireless Hacking Tools
Securing Wireless Networks
Summary
Key Terms
Apply Your Knowledge
IDS, Firewalls, and Honeypots
IDS, Firewalls, and Honeypots
Study Strategies
Intrusion Detection Systems
Firewalls
Honeypots
Summary
Key Terms
Apply Your Knowledge
Buffer Overflows, Viruses, and Worms
Buffer Overflows, Viruses, and Worms
Study Strategies
Buffer Overflows
Viruses and Worms
Summary
Key Terms
Apply Your Knowledge
Cryptographic Attacks and Defenses
Cryptographic Attacks and Defenses
Study Strategies
Functions of Cryptography
History of Cryptography
Algorithms
Hashing
Digital Signatures
Steganography
Digital Certificates
Public Key Infrastructure
Protocols, Standards, and Applications
Encryption Cracking and Tools
Summary
Key Terms
Apply Your Knowledge
Physical Security and Social Engineering
Physical Security and Social Engineering
Study Strategies
Physical Security
Social Engineering
Summary
Key Terms
Apply Your Knowledge
Part II: Final Review
Fast Facts
Ethics and Legality
Footprinting
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web-Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Virus and Worms
Physical Security
Linux Hacking
Evading Firewalls, IDS, and Honeypots
Buffer Overflows
Cryptography
Penetration Testing
Certified Ethical Hacker
Practice Exam Questions
Answers to Practice Exam Questions
Glossary
Part III: Appendixes
Appendix B. Preparing Your System for Knoppix-std
Appendix A. Using the ExamGear Special Edition Software
Appendix A. Using the ExamGear Special Edition Software
Exam Simulation
Study Tools
How ExamGear Special Edition Works
Installing ExamGear Special Edition
Using ExamGear Special Edition
Contacting Que Certification
License
Software and Documentation
License Term and Charges
Title
Updates
Limited Warranty and Disclaimer
Limitation of Liability
Miscellaneous
U.S. Government Restricted Rights
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Fundamentals of Measurement Theory
The Rayleigh Model
How Do You Know Your Product Is Good Enough to Ship?
Lines of Code
Design and Complexity Metrics
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Internet Protocol (IP) Addressing
Internet Protocol (IP) Routing
User Datagram Protocol
Domain Name System (DNS)
An Introduction to Design Patterns in C++ with Qt 4
const Member Functions
Iteration and the Visitor Pattern
Images and Resources
Resource Sharing
Section C.4. Qt Assistant and Designer
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
DNS & BIND Cookbook
Finding More Information About DNS and BIND
Introduction
Flushing (Clearing) a Name Servers Cache
Dynamically Updating a Zone
Sending Dynamic Updates to a Particular Name Server
MPLS Configuration on Cisco IOS Software
MPLS Control and Data Plane Components
MPLS Operation
PE-CE Routing Protocol-Static and RIP
Case Study 1: Implementing Multicast Support for MPLS VPNs
Case Study 6: Implementing Class-Based Tunnel Selection with MPLS Traffic Engineering
flylib.com © 2008-2017.
If you may any questions please contact us:
[email protected]
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies
Otomatik - 179.43.157.53
CloudFlare DNS
Türk Telekom DNS
Google DNS
Open DNS
OSZAR »