Chapter
Chapter One IntroductIon to EthIcal hackIng
Know the Definition of Ethical Hacking
Know the Concepts of Threat Modeling
Know the Five Phases of an Attack
Know the Concepts of Vulnerability Research and Testing
Know the Legal Issues of Ethical Hacking
Know the Important Legal Statutes
Chapter two Footprinting and reconnaissance
Know the Information Gathering Methodology
Know Several Different Passive Information-Gathering Techniques
Know How to Use DNS and the Regional Internet Registrars
Know What the Google Toolset Offers
Chapter three Scanning networkS
Know the Scanning Methodology
Know the Value of the Enumeration Step
Know How to Create a NULL Session
Know the File Sharing Ports
Know What the“RestrictAnonymous”Key Is
Know How to Recognize Windows SIDs
Know How to Use the Netstat and NBTstat Tools
Know How to Enumerate a Linux Host
Know How to Use SNMP for Enumeration
Know How to Use LDAP for Enumeration
Chapter Five SyStem Hacking
Know Password Cracking Techniques
Know Eavesdropping and Privilege Escalation
Know the Techniques of Steganography
Chapter Six Trojans and Backdoors
Know What Trojan Applications Can Do
Know the Infection Vectors
Know How to Build a Trojan Horse
Know How to Detect an Infection
Chapter Seven Viruses and Worms
Know the History and Evolution of Viruses and Worms
Know the Types of Viruses and Worms
Know about Virus Detection and Removal
Chapter eight SnifferS and SeSSion Hijacking
Know How to Use Packet Capture Tools
Know How to Exploit Vulnerable Protocols
Know How Session Hijacking Works
Chapter NiNe Social EnginEEring
Know about Social Engineering
Know about Phishing Scams
Know about Hacking E-mail Accounts
Know about Social Networks
Chapter ten Denial of Service
Know the Types of DoS Attacks
Know How DDoS Attacks Work
Chapter eleven Web ServerS and applicationS
Know How Web Servers Work
Know How Web Applications Work
Know the Attacks and Risks of Web Applications
Chapter twelve Hacking Wireless netWorks
Know the Basics of Designing a Wireless Network
Know How WEP and WPA Work
Know the Important Security Risks of WiFi Networks
Know the Basics of Bluetooth
Chapter thirteen IDS,FIrewallS,anD HoneypotS
Know the Classes of Firewalls
Know the Classes of Intrusion Detection Systems
Know How to Deploy Honeypots
Know the Testing and Evasion Techniques
Chapter Fourteen Buffer OverflOws
Know the Theory Behind Buffer Overflows
Know How to Work with Overflow Exploits
Know the Tools for Performing Exploits
Chapter FiFteen Cryptography
Know the Basic Concepts of Cryptography
Know How Symmetric Encryption Works
Know How Asymmetric Encryption Works
Know How Hashing Algorithms Work
Know about Cryptosystems and Key Management
Know Advanced Attacks Against Cryptography
Chapter Sixteen Penetration testing
Know General Penetration Testing Methodologies
Know the Basic Requirements of an Engagement
Know How to Write an Effective Report
Know How to Stay Current with Information