Online Book Reader

Home Category

CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [100]

By Root 376 0
that may be in conflict herewith. If any one or more provisions contained in this Agreement are held by any court or tribunal to be invalid, illegal, or otherwise unenforceable, each and every other provision shall remain in full force and effect.

Table of Contents

Introduction

Introduction to Ethical Hacking, Ethics, and Legality 1

Understanding Ethical Hacking Terminology

Identifying Different Types of Hacking Technologies

Understanding the Different Phases Involved in Ethical Hacking and Listing the Five Stages of Ethica

Phase 1: Passive and Active Reconnaissance

Phase 4: Maintaining Access

Ethical Hackers and Crackers-Who Are They?

What Do Ethical Hackers Do?

Security, Functionality, and Ease of Use Triangle

Defining the Skills Required to Become an Ethical Hacker

Describing the Ways to Conduct Ethical Hacking

Types of Ethical Hacks

Ethical Hacking Report

Understanding 18 U.S.C. 5 1029 and 1030 U.S. Federal Law

Review Questions

Answers to Review Questions

Footprinting and Social Engineering

Footprinting

Describe the Information Gathering Methodology

Describe Competitive Intelligence

Understand DNS Enumeration

Understand Whois and ARIN Lookups

Identify Different Types of DNS Records

Understand How Traceroute Is Used in Footprinting

Understand How E-Mail Tracking Works

Social Engineering

What Are the Common Types Of Attacks?

Understand Insider Attacks

Describe Phishing Attacks

Understand URL Obfuscation

Scanning and Enumeration

Scanning

Understand the CEH Scanning Methodology

Understand Ping Sweep Techniques

Understand Nmap Command Switches

Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN Scans

List TCP Communication Flag Types

Understand War-Dialing Techniques

Understand Banner Grabbing and OS Fingerprinting Techniques

Understand How Proxy Servers Are Used in Launching an Attack

Understand HTTP Tunneling Techniques

Enumeration

What Is Enumeration?

What Is SNMP Enumeration?

Windows 2000 DNS Zone Transfer

What Are the Steps Involved in Performing Enumeration?

System Hacking

Understanding Password-Cracking Techniques

Understanding the LanManager Hash

Return Main Page Previous Page

®Online Book Reader