Search for a title

Tel: 0121 702 2828

Already registered? Login here  
Global Knowledge Home | Books Home | Browse | Account | Basket | Delivery | Contact |
 
  Online Learning for
Microsoft Exams
  Books for
Microsoft Courses
  Books for
Microsoft Exams
  Books for
Cisco Exams
  Books for Other Certifications

 

 CEH Certified Ethical Hacker Study Guide Book/CD Package

 

CEH Certified Ethical Hacker Study Guide Book/CD Package

Published by: Sybex
Author: Graves, Kimberly
Group: CEH: Certified Ethical Hacker
ISBN: 0470525207
ISBN 13: 9780470525203
Number of pages: 392
User level: Intermediate/Advance
Objective: Reference Date Published: May 2010
 RRP 33.99 Save 30%
 Online Price 23.79

$stockdesc

 Book Information


Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350
Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.
What's Inside:
* Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
* Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
* Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf

1 Introduction to Ethical Hacking, Ethics, and Legality.
2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
3 Gathering Network and Host Information: Scanning and Enumeration.
4 System Hacking: Password Cracking, Escalating Privileges, and Hiding Files.
5 Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms.
6 Gathering Data from Networks: Sniffers.
7 Denial of Service and Session Hijacking.
8 Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
9 Attacking Applications: SQL Injection and Buffer Overflows.
10 Wireless Network Hacking.
11 Physical Site Security.
12 Hacking Linux Systems.
13 Bypassing Network Security: Evading IDS, Honeypots, and Firewalls.
14 Understanding Cryptography.
15 Performing a Penetration Test.

 

 
Quick Search
Training Type (e.g. Books)
Keywords (e.g. SharePoint)
Course Code Search

Enter code (e.g. M2274)

Microsoft Online Learning
ITIL
Microsoft Training 365
All copyright Computer Bookshops Ltd 2009. All Rights Reserved