Official Certified Ethical Hacker Review Guide: For Version 7.1
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource for anyone interested in pursuing the most recognized, respected hacking certification in the world. As experienced instructors of the International Council of Electronic Commerce Consultants (EC-Council), the authors draw on firsthand experience training top-caliber information security professionals for success on EC-Council's Certified Ethical Hacker (CEH) exam. The only exam review guide officially endorsed by the EC-Council, this proven resource focuses on the core concepts that are covered on the newest certification course (version 7.1), as well as a wide array of useful learning tools, including chapter objectives, step-by-step tutorials, Try it Out exercises and challenges, , group discussion topics, short lab examples, and practice exam questions and answers with explanations. This official CEH Exam review guide can be used to either preview and prepare for this comprehensive course or review afterwards to prepare for the challenging exam. It is the perfect compliment that gives any student a real advantage toward success with this certification.
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Trojans and Backdoors
Viruses and Worms
Sniffers and Session Hijacking
Web Servers and Applications
Hacking Wireless Networks
IDS Firewalls and Honeypots
Practice Exams Questions
Practice Exams Answers
Other editions - View all
2012 Cengage Learning algorithms Alice application attack authentication basic botnets browser buffer overflow bytes CEH exam chapter cipher client configuration copied Copyright 2012 Cengage create database denial of service detection domain Due to electronic duplicated e-mail eBook and/or eChapter(s EC-Council electronic rights encryption example exploit filters firewall Google hacker hacking hash honeypot host ICMP illicit server installed Internet involve IP address IPTables layer Linux login look machine malicious code malware nmap ofthe operating system packet password payload penetration test phishing protocol public key Rights Reserved risk rootkit scanned scanner scripts session hijacking sniffer sniffing social engineering spoofing string suppressed symmetric target techniques third party content traffic Trojan victim virus viruses vulnerability wants whole Windows wireless networks Wireshark worm