𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Certified ethical hacker exam prep (Exam Prep 2): Includes index

✍ Scribed by Gregg, Michael (Michael C.)


Publisher
Pearson IT Certification; Que
Year
2006
Tongue
English
Leaves
696
Series
Que Publishing
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Certified Ethical Hacker Exam Prep 2 The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes 3 hours and contains 125 questions. This book provides coverage needed to score higher on the exam. It contains end-of-chapter reviews, practice questions, Exam Alerts, Fast Facts, and an entire practice exam. It features MeasureUp's testing software. Full description

✦ Table of Contents


Cover......Page 1
Contents......Page 7
How This Book Helps You......Page 22
Hardware and Software Requirements......Page 25
Advice on Taking the Exam......Page 26
Learning Styles......Page 28
Study Strategies......Page 29
Pretesting Yourself......Page 30
Exam Prep Tips......Page 31
Exam Format......Page 32
More Exam-Preparation Tips......Page 33
Final Considerations......Page 35
Part I: Exam Preparation......Page 36
Chapter 1: The Business Aspects of Penetration Testing......Page 38
Security Fundamentals......Page 41
Security Testing......Page 45
Hacker and Cracker Descriptions......Page 48
Ethical Hackers......Page 51
Test Plansβ€”Keeping It Legal......Page 55
Ethics and Legality......Page 60
Key Terms......Page 64
Apply Your Knowledge......Page 65
Chapter 2: The Technical Foundations of Hacking......Page 72
The Attacker’s Process......Page 75
The Ethical Hacker’s Process......Page 79
Security and the Stack......Page 81
Apply Your Knowledge......Page 98
Chapter 3: Footprinting and Scanning......Page 110
The Seven-Step Information Gathering Process......Page 113
Key Terms......Page 151
Apply Your Knowledge......Page 152
Chapter 4: Enumeration and System Hacking......Page 160
The Architecture of Windows Computers......Page 163
Enumeration......Page 166
Windows Hacking......Page 174
Apply Your Knowledge......Page 188
Chapter 5: Linux and Automated Security Assessment Tools......Page 196
Linux......Page 199
Automated Assessment Tools......Page 218
Picking the Right Platform......Page 226
Key Terms......Page 227
Apply Your Knowledge......Page 228
Chapter 6: Trojans and Backdoors......Page 236
An Overview of Trojansβ€”The History of Trojans......Page 239
Covert Communications......Page 252
Trojan and Backdoor Countermeasures......Page 263
Key Terms......Page 265
Apply Your Knowledge......Page 266
Chapter 7: Sniffers, Session Hijacking, and Denial of Service......Page 276
Sniffers......Page 279
Session Hijacking......Page 287
Denial of Service......Page 292
Key Terms......Page 305
Apply Your Knowledge......Page 306
Chapter 8: Web Server Hacking, Web Applications, and Database Attacks......Page 314
Web Server Hacking......Page 317
Web Application Hacking......Page 330
Database Overview......Page 339
Apply Your Knowledge......Page 343
Chapter 9: Wireless Technologies, Security, and Attacks......Page 352
Wireless Technologiesβ€”A Brief History......Page 355
Wireless LANs......Page 360
Wireless Hacking Tools......Page 369
Securing Wireless Networks......Page 373
Key Terms......Page 378
Apply Your Knowledge......Page 379
Chapter 10: IDS, Firewalls, and Honeypots......Page 386
Intrusion Detection Systems......Page 389
Firewalls......Page 398
Honeypots......Page 409
Key Terms......Page 413
Apply Your Knowledge......Page 414
Chapter 11: Buffer Overflows, Viruses, and Worms......Page 424
Buffer Overflows......Page 427
Viruses and Worms......Page 436
Key Terms......Page 451
Apply Your Knowledge......Page 452
Chapter 12: Cryptographic Attacks and Defenses......Page 460
Functions of Cryptography......Page 463
History of Cryptography......Page 464
Algorithms......Page 466
Hashing......Page 473
Digital Signatures......Page 475
Steganography......Page 476
Digital Certificates......Page 480
Public Key Infrastructure......Page 481
Protocols, Standards, and Applications......Page 484
Encryption Cracking and Tools......Page 487
Key Terms......Page 492
Apply Your Knowledge......Page 493
Chapter 13: Physical Security and Social Engineering......Page 502
Physical Security......Page 505
Social Engineering......Page 518
Key Terms......Page 525
Apply Your Knowledge......Page 526
Part II: Final Review......Page 534
Ethics and Legality......Page 536
Scanning......Page 538
System Hacking......Page 540
Trojans and Backdoors......Page 541
Sniffers......Page 542
Denial of Service......Page 543
Social Engineering......Page 544
Hacking Web Servers......Page 545
Web-Based Password Cracking Techniques......Page 546
Hacking Wireless Networks......Page 547
Virus and Worms......Page 548
Physical Security......Page 549
Linux Hacking......Page 550
Buffer Overflows......Page 551
Penetration Testing......Page 552
Practice Exam and Answers......Page 554
Practice Exam Questions......Page 555
Answers to Practice Exam Questions......Page 580
A......Page 592
B......Page 593
C......Page 595
D......Page 597
E......Page 598
G......Page 599
I......Page 600
K......Page 601
M......Page 602
O......Page 603
P......Page 604
R......Page 605
S......Page 606
T......Page 609
W-Z......Page 610
Part III: Appendixes......Page 612
Exam Simulation......Page 614
Study Tools......Page 615
How ExamGear Special Edition Works......Page 616
Installing ExamGear Special Edition......Page 617
Using ExamGear Special Edition......Page 618
Contacting Que Certification......Page 640
Title......Page 641
Limited Warranty and Disclaimer......Page 642
Miscellaneous......Page 643
U.S. Government Restricted Rights......Page 644
Appendix B: Preparing Your System for Knoppix-std......Page 646
A......Page 648
B......Page 653
C......Page 655
D......Page 657
E......Page 660
F......Page 663
G......Page 664
H......Page 665
I......Page 666
L......Page 669
M......Page 671
N......Page 672
O......Page 673
P......Page 674
Q-R......Page 680
S......Page 681
T......Page 687
V......Page 691
W......Page 692
X-Y-Z......Page 696

✦ Subjects


Computer Science;Technical


πŸ“œ SIMILAR VOLUMES


Certified Ethical Hacker Exam Prep
✍ Michael Gregg πŸ“‚ Library πŸ“… 2006 πŸ› Pearson IT Certification 🌐 English

<P style="MARGIN: 0px">The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The <I>CEH Exam Prep </I>is the perfect solution for this challenge, giving you the s

Certified Ethical Hacker Exam Prep
✍ Michael Gregg πŸ“‚ Library πŸ“… 2006 πŸ› Que 🌐 English

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll