Official certified ethical hacker review guide : for version 7.1
Material type: TextPublication details: Boston : Cengage Learning, 2013Description: xxi, 329 p. : ilISBN:- 9781133282914
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Libros | Biblioteca Fac.Informática | K.6.5 DEF (Browse shelf(Opens below)) | Available | DIF-04832 |
Incluye índice.
INTRODUCTION -- CHAPTER ONE Introduction to Ethical Hacking -- Know the Definition of Ethical Hacking -- Know the Concepts of Threat Modeling -- Know the Five Phases of an Attack -- Know the Concepts of Vulnerability Research and Testing -- Know the Legal Issues of Ethical Hacking -- Know the Important Legal Statutes -- CHAPTER TWO Footprinting and Reconnaissance -- Know the Information Gathering Methodology -- Know Several Different Passive Information-Gathering Techniques -- Know How to Use DNS and the Regional Internet Registrars -- Know What the Google Toolset Offers -- CHAPTER THREE Scanning Networks -- Know the Scanning Methodology -- Know How ICMP Works -- Know the TCP Handshake -- Know the Types of Scans -- Know about Scanning Tools -- CHAPTER FOUR Enumeration -- Know the Value of the Enumeration Step -- Know How to Create a NULL Session -- Know the File Sharing Ports -- Know What the “RestrictAnonymous” Key Is -- Know How to Recognize Windows SIDs -- Know How to Use the Netstat and NBTstat Tools -- Know How to Enumerate a Linux Host -- Know How to Use SNMP for Enumeration -- Know How to Use LDAP for Enumeration -- CHAPTER FIVE System Hacking -- Know Password Cracking Techniques -- Know Eavesdropping and Privilege Escalation -- Know the Techniques of Steganography -- CHAPTER SIX Trojans and Backdoors -- Know What Trojan Applications Can Do -- Know the Infection Vectors -- Know How to Build a Trojan Horse -- Know How to Detect an Infection -- CHAPTER SEVEN Viruses and Worms -- Know the History and Evolution of Viruses and Worms -- Know the Types of Viruses and Worms -- Know about Virus Detection and Removal -- CHAPTER EIGHT Sniffers and Session Hijacking -- Know How Sniffing Works -- Know How to Use Packet Capture Tools -- Know How to Exploit Vulnerable Protocols -- Know How Session Hijacking Works -- CHAPTER NINE Social Engineering -- Know about Social Engineering -- Know about Phishing Scams -- Know about Hacking E-mail Accounts -- Know about Social Networks -- CHAPTER TEN Denial of Service -- Know the Types of DoS Attacks -- Know How DDoS Attacks Work -- Know How Botnets Work -- CHAPTER ELEVEN Web Servers and Applications -- Know How Web Servers Work -- Know How Web Applications Work -- Know the Attacks and Risks of Web Applications -- CHAPTER TWELVE Hacking Wireless Networks -- Know the Basics of Designing a Wireless Network -- Know How WEP and WPA Work -- Know the Important Security Risks of WiFi Networks Know the Basics of Bluetooth -- CHAPTER THIRTEEN IDS, Firewalls, and Honeypots -- Know the Classes of Firewalls -- Know the Classes of Intrusion Detection Systems -- Know How to Deploy Honeypots -- Know the Testing and Evasion Techniques -- CHAPTER FOURTEEN Buffer Overflows -- Know the Theory Behind Buffer Overflows -- Know How to Work with Overflow Exploits -- Know the Tools for Performing Exploits -- CHAPTER FIFTEEN Cryptography -- Know the Basic Concepts of Cryptography -- Know How Symmetric Encryption Works -- Know How Asymmetric Encryption Works -- Know How Hashing Algorithms Work -- Know about Cryptosystems and Key Management -- Know Advanced Attacks Against Cryptography -- CHAPTER SIXTEEN Penetration Testing -- Know General Penetration Testing Methodologies -- Know the Basic Requirements of an Engagement -- Know How to Write an Effective Report Know How to Stay Current with Information -- PRACTICE EXAMS QUESTIONS -- PRACTICE EXAMS ANSWERS -- INDEX
There are no comments on this title.