Official Certified Ethical Hacker Review Guide :For Version 7.1 ( CTE )

Publication subTitle :For Version 7.1

Publication series :CTE

Author: Steven DeFino;Larry Greenblatt  

Publisher: Cengage‎

Publication year: 2013

E-ISBN: 9781285021775

P-ISBN(Paperback): 9781133282914

Subject: TP309 安全保密

Keyword: 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

The only Certified Ethical Hacker (CEH) exam review guide officially endorsed by the EC-Council, this proven resource focuses on the core concepts covered on the newest certification course (version 7.1), as well as a wide array of useful learning tools to help students pursue the most recognized, respected hacking certification in the world.本书还有配套的教学资源,目前仅能提供给老师。获取方式如下: 1. 邮箱获取:将教辅需求发邮件至asia.infochina@cengage.com 2. 电话获取:010-83435111 3. 微信获取:关注我们的公众号,会由客服人员答疑解惑 公众号名称:圣智教育服务中心 微信号:Cengage_Learning 4. QQ获取:加入我们的QQ群 群名称:圣智教育服务中心 群号:658668275

Chapter

Chapter One IntroductIon to EthIcal hackIng

Know the Definition of Ethical Hacking

Know the Concepts of Threat Modeling

Know the Five Phases of an Attack

Know the Concepts of Vulnerability Research and Testing

Know the Legal Issues of Ethical Hacking

Know the Important Legal Statutes

Chapter two Footprinting and reconnaissance

Know the Information Gathering Methodology

Know Several Different Passive Information-Gathering Techniques

Know How to Use DNS and the Regional Internet Registrars

Know What the Google Toolset Offers

Chapter three Scanning networkS

Know the Scanning Methodology

Know How ICMP Works

Know the TCP Handshake

Know the Types of Scans

Chapter Four EnumEration

Know the Value of the Enumeration Step

Know How to Create a NULL Session

Know the File Sharing Ports

Know What the“RestrictAnonymous”Key Is

Know How to Recognize Windows SIDs

Know How to Use the Netstat and NBTstat Tools

Know How to Enumerate a Linux Host

Know How to Use SNMP for Enumeration

Know How to Use LDAP for Enumeration

Chapter Five SyStem Hacking

Know Password Cracking Techniques

Know Eavesdropping and Privilege Escalation

Know the Techniques of Steganography

Chapter Six Trojans and Backdoors

Know What Trojan Applications Can Do

Know the Infection Vectors

Know How to Build a Trojan Horse

Know How to Detect an Infection

Chapter Seven Viruses and Worms

Know the History and Evolution of Viruses and Worms

Know the Types of Viruses and Worms

Know about Virus Detection and Removal

Chapter eight SnifferS and SeSSion Hijacking

Know How Sniffing Works

Know How to Use Packet Capture Tools

Know How to Exploit Vulnerable Protocols

Know How Session Hijacking Works

Chapter NiNe Social EnginEEring

Know about Social Engineering

Know about Phishing Scams

Know about Hacking E-mail Accounts

Know about Social Networks

Chapter ten Denial of Service

Know the Types of DoS Attacks

Know How DDoS Attacks Work

Know How Botnets Work

Chapter eleven Web ServerS and applicationS

Know How Web Servers Work

Know How Web Applications Work

Know the Attacks and Risks of Web Applications

Chapter twelve Hacking Wireless netWorks

Know the Basics of Designing a Wireless Network

Know How WEP and WPA Work

Know the Important Security Risks of WiFi Networks

Know the Basics of Bluetooth

Chapter thirteen IDS,FIrewallS,anD HoneypotS

Know the Classes of Firewalls

Know the Classes of Intrusion Detection Systems

Know How to Deploy Honeypots

Know the Testing and Evasion Techniques

Chapter Fourteen Buffer OverflOws

Know the Theory Behind Buffer Overflows

Know How to Work with Overflow Exploits

Know the Tools for Performing Exploits

Chapter FiFteen Cryptography

Know the Basic Concepts of Cryptography

Know How Symmetric Encryption Works

Know How Asymmetric Encryption Works

Know How Hashing Algorithms Work

Know about Cryptosystems and Key Management

Know Advanced Attacks Against Cryptography

Chapter Sixteen Penetration testing

Know General Penetration Testing Methodologies

Know the Basic Requirements of an Engagement

Know How to Write an Effective Report

Know How to Stay Current with Information

Practice Exam Questions

Practice Exam Answers

Index

The users who browse this book also browse