CEH Certified Ethical Hacker Study Guide [SucaX]

seeders: 4
leechers: 1
Added on April 28, 2013 by sucaxin Books > Ebooks
Torrent verified.



CEH Certified Ethical Hacker Study Guide [SucaX] (Size: 9.27 MB)
 CEH Certified Ethical Hacker Study Guide [Sucax].pdf9.27 MB
 More information about book.vbs3.33 KB


Description

image
CEH Certified Ethical Hacker Study Guide by Kimberly Graves
English | April 26, 2010 | ISBN-10: 0470525207 | ISBN-13: 978-0470525203 | Edition: 1 | PDF | 439 Pages | 9.26 MB


Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.

What's Inside:

Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf

BOOK DESCRIPTION

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.

What’s Inside:

Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf
From the Back Cover

Prepare for CEH certification with this comprehensive guide Learn how to identify security risks to networks and computers as you prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide thoroughly covers all exam objectives and topics, while showing you how Black Hat hackers think, helping you spot vulnerabilities in systems, and preparing you to beat the bad guys at their own game. Inside,you’ll find:

Full coverage of all exam objectives in a systematic approach, so you can be confident you’re getting the instruction you need for the exam
Practical hands-on exercises to reinforce critical skills
Real-world scenarios that put what you’ve learned in the context of actual job roles
Challenging review questions in each chapter to prepare you for exam day
Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective Look inside for complete coverage of all exam objectives
Look inside for complete coverage of all exam objectives.

Table of Contents:

1. Introduction to Ethical Hacking, Ethics, and Legality
2. Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering Chapter
3. Gathering Network and Host Information: Scanning and Enumeration Chapter
4. System Hacking: Password Cracking, Escalating Privileges, and Hiding Files Chapter
5. Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms Chapter
6. Gathering Data from Networks: Sniffers Chapter
7. Denial of Service and Session Hijacking Chapter
8. Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques Chapter
9. Attacking Applications: SQL Injection and Buffer Overflows Chapter
10. Wireless Network Hacking Chapter
11. Physical Site Security Chapter
12. Hacking Linux Systems Chapter
13. Bypassing Network Security: Evading IDS, Honeypots, and Firewalls Chapter
14. Understanding Cryptography Chapter
15. Performing a Penetration Test


Uploaded by: SucaX


Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
9.27 MB
seeders:4
leechers:1
CEH Certified Ethical Hacker Study Guide [SucaX]

All Comments

Thank you.
THXXXXXXXXXXXXXXXXXXX so mutch ;)
Tnx mate
God upload. Thank you.
ı m seeding.
THANK YOU THANK YOU THANK YOUU!!!will seed for a week!!!!
very good,thanx