
CEH Certified Ethical Hacker Study Guide
by Graves, Kimberly-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.
Table of Contents
2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
3 Gathering Network and Host Information: Scanning and Enumeration.
4 System Hacking: Password Cracking, Escalating Privileges, and Hiding Files.
5 Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms.
6 Gathering Data from Networks: Sniffers.
7 Denial of Service and Session Hijacking.
8 Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
9 Attacking Applications: SQL Injection and Buffer Overflows.
10 Wireless Network Hacking.
11 Physical Site Security.
12 Hacking Linux Systems.
13 Bypassing Network Security: Evading IDS, Honeypots, and Firewalls.
14 Understanding Cryptography.
15 Performing a Penetration Test.
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.