Ethical Hacking and Countermeasures [Exam 312-50]
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker.
A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors,
security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses
and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.
A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors,
security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses
and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.
Table of Contents:
Module 1 - Introduction to Ethical Hacking
Module 2 - Footprinting
Module 3 - Scanning
Module 4 - Enumeration
Module 5 - System Hacking
Module 6 - Trojans and Backdoors
Module 7 - Sniffers
Module 8 - Denial of Service
Module 9 - Social Engineering
Module 10 - Session Hijacking
Module 11 - Hacking Web Servers
Module 12 - Web Application Vulnerabilities
Module 13 - Web Based Password Cracking Techniques
Module 14 - SQL Injection
Module 15 - Hacking Wireless Networks
Module 16 - Viruses
Module 17 - Novell Hacking
Module 18 - Linux Hacking
Module 19 - Evading IDS, Firewalls and Honeypots
Module 20 - Buffer Overflows
Module 21 - Cryptography
0 Comments:
Post a Comment