The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
- The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
- Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
- Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
- Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
Part I: The Business and Legal Issues of Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Legality and Ethics.
Chapter 3: Penetration Testing for Business.
Part II: The Pre-Attack Phases.
Chapter 4: Footprinting.
Chapter 5: Scanning.
Chapter 6: Enumerating.
Part III: Attack Techniques and Tools.
Chapter 7: System Hacking Techniques.
Chapter 8: Trojans, Backdoors, and Sniffers.
Chapter 9: Denial of Service Attacks and Session Hijacking.
Chapter 10: Penetration Testing Steps.
Chapter 11: Linux Hacking Tools.
Chapter 12: Social Engineering and Physical Security.
Part IV: Web Server and Database Attacks.
Chapter 13: Web Server Hacking and Web Application Vulnerabilities.
Chapter 14: SQL Injection Vulnerabilities.
Chapter 15: Cryptography.
Chapter 16: Cracking Web Passwords.
Part V: Advanced Topics.
Chapter 17: Wireless Network Attacks and Countermeasures.
Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots.
Chapter 19: Viruses, Worms, and Buffer Overflows.
Appendix A: Answers to Assessment Questions.
Appendix B: Glossary of Terms and Acronyms.
Appendix C: What’s on the CD.
RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE, MCNE, is Chief Security Advisor for Gotham Technology Group, LLC. He is the author or coauthor of numerous bestselling information system security publications, and is a consulting editor for John Wiley and Sons for its information security book series.