11-22-2010, 04:14 AM
Publisher: Specialized Solutions | ISBN: 798745949X | Edition: 2009 (latest) | Format: PDF | Pages: 578 | Size: 25.8 mb
Certified Ethical Hacker Certification from Specialized Solutions enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.
• Ethics and Legal Issues
• Footprinting Techniques
• Scanning
• Enumeration
• System Hacking
• Trojans and Backdoors
• Sniffers
• Denial of Service
• Social Engineering
• Session Hijacking
• CEH Hacking Web Servers
• Web Application Vulnerabilities
• Web Based Password Cracking
• SQL Injection
• Hacking Wireless Networks
• Virus and Worms
• Hacking Novell
• Hacking Linux
• IDS, Firewalls and Honeypots
• Buffer Overflows
• Cryptography
• Penetration Testing Methodologies
Course Details:
Module 00 – CEH Introduction
Module 01 – Introduction to Ethical Hacking
Module 02 – Footprinting
Module 03 – Scanning
Module 04 – Enumeration
Module 05 – System Hacking
Module 06 – Trojans and Backdoors
Module 07 – Sniffers
Module 08 – Denial of Service
Module 09 – Social Engineering
Module 10 – Session Hijacking
Module 11 – Hacking Web Servers
Module 12 – Web Application Vulnerabilities
Module 13 – Web-based Password Cracking Techniques
Module 14 – SQL Injection
Module 15 – Hacking Wireless Networks
Module 16 – Virus and Worms
Module 17 – Physical Security
Module 18 – Linux Hacking
Module 19 – Evading, IDS, Firewalls, and Honeypots
Module 20 – Buffer Overflows
Module 21 – Cryptography
Module 22 – Penetration Testing
Self Study Module 23 – Exploit Writing
Self Study Module 24 – Covert Hacking
Self Study Module 25 – Writing Virus Codes
Self Study Module 26 – Advanced Module of Reverse Engineering
Course Review
Download: http://www.mediafire.com/?i1i1vg7hnyazewe
This book has helped my alot; and its a book that you will start reading a year from now again; I hope it also helps you alot. I hope I posted this in the right section
You may also enjoy
WarDriving and Wireless Penetration Testing