Official Certified Ethical Hacker Review Guide: For Version 7.1

Front Cover
Cengage Learning, Feb 17, 2012 - Computers - 416 pages
1 Review
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource for anyone interested in pursuing the most recognized, respected hacking certification in the world. As experienced instructors of the International Council of Electronic Commerce Consultants (EC-Council), the authors draw on firsthand experience training top-caliber information security professionals for success on EC-Council's Certified Ethical Hacker (CEH) exam. The only exam review guide officially endorsed by the EC-Council, this proven resource focuses on the core concepts that are covered on the newest certification course (version 7.1), as well as a wide array of useful learning tools, including chapter objectives, step-by-step tutorials, Try it Out exercises and challenges, , group discussion topics, short lab examples, and practice exam questions and answers with explanations. This official CEH Exam review guide can be used to either preview and prepare for this comprehensive course or review afterwards to prepare for the challenging exam. It is the perfect compliment that gives any student a real advantage toward success with this certification.
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
  

What people are saying - Write a review

User Review - Flag as inappropriate

Nice one ...

Review: Official Certified Ethical Hacker Review Guide

User Review  - Jeffaskew - Goodreads

I look forward to reading this book. I just finished a CEH Certification Class run by Training Camp. The author, Steven DeFino was the professor and did a fantastic job with the material. Read full review

Contents

Introduction to Ethical Hacking
1
Footprinting and Reconnaissance
17
Scanning Networks
33
Enumeration
49
System Hacking
61
Trojans and Backdoors
79
Viruses and Worms
95
Sniffers and Session Hijacking
111
Web Servers and Applications
149
Hacking Wireless Networks
167
IDS Firewalls and Honeypots
181
Buffer Overflows
201
Cryptography
213
Penetration Testing
235
Practice Exams Questions
251
Practice Exams Answers
298

Social Engineering
125
Denial of Service
137

Common terms and phrases

About the author (2012)

Steven DeFino travels the United States as the Director of Information Security and Networking for Training Camp. DeFino has been teaching technical and management classes since 1998 covering topics such as Cisco, Linux, Web Application Design and project management, drawing on firsthand experience from his 25-year career in the field. His success as an information security educator includes recognition as EC-Council "Instructor of the Year" for 2006 and 2009 and EC-Council "Certificate of Excellence" winner in 2008 and 2010. He has authored or maintained curricula for over 30 courses and is a frequent contributor to blogs and other professional resources.

Larry Greenblatt has been in the information technology industry for nearly 30 years as a consultant and instructor. In addition to being a respected information security educator, Larry is an accomplished martial artist with five black belts. He drew on this experience to create the Cyber Kung Fu training program, which has earned him over a dozen challenge coins from a number of U.S. agencies, including all major branches of the U.S. Military.

Bibliographic information