CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [2]
Overview of WEP, WPA Authentication Mechanisms, and Cracking Techniques 160
Overview of Wireless Sniffers and Locating SSIDs, MAC Spoofing 162
Understand Rogue Access Points 163
Understand Wireless Hacking Techniques 163
Describe the Methods Used to Secure Wireless Networks 164
Exam Essentials 164
Review Questions 165
Answers to Review Questions 167
Chapter 11 Physical Security 169
Physical Security Breach Incidents 170
Understanding Physical Security 171
What Is the Need for Physical Security? 171
Who Is Accountable for Physical Security? 172
Factors Affecting Physical Security 172
Exam Essentials 172
Review Questions 174
Answers to Review Questions 176
Chapter 12 Linux Hacking 177
Linux Basics 178
Understand How to Compile a Linux Kernel 179
Understand GCC Compilation Commands 180
Understand How to Install Linux Kernel Modules 180
Understand Linux Hardening Methods 181
Exam Essentials 182
Review Questions 183
Answers to Review Questions 185
Chapter 13 Evading IDSs, Honeypots, and Firewalls 187
List the Types of Intrusion Detection Systems and Evasion Techniques 188
List the Firewall Types and Honeypot Evasion Techniques 189
Exam Essentials 191
Review Questions 192
Answers to Review Questions 194
Chapter 14 Cryptography 195
Overview of Cryptography and Encryption Techniques 196
Describe How Public and Private Keys Are Generated 197
Overview of the MDS, SHA, RC4, RCS, and Blowfish Algorithms 197
Exam Essentials 198
Review Questions 199
Answers to Review Questions 201
Chapter 15 Penetration Testing Methodologies 203
Defining Security Assessments 204
Overview of Penetration Testing Methodologies 204
List the Penetration Testing Steps 205
Overview of the Pen-Test Legal Framework 206
List the Automated Penetration Testing Tools 207
Overview of the Pen-Test Deliverables 208
Exam Essentials 208
Review Questions 209
Answers to Review Questions 211
Glossary 213
Index 225
Introduction
The Certified Ethical Hacker (CEH) exam was developed by the International Council of E-Commerce Consultants (EC-Council) to provide an industry-wide means of certifying the competency of security professionals. The CEH certification is granted to those who have attained the level of knowledge and troubleshooting skills needed to provide capable support in the field of computer and network security.
The CEH exam is periodically updated to keep the certification applicable to the most recent hardware and software. This is necessary because a CEH must be able to work on the latest equipment. The most recent revisions to the objectives-and to the whole programwere enacted in 2006 and are reflected in this book.
What Is CEH Certification?
The CEH certification was created to offer a wide-ranging certification, in the sense that it's intended to certify competence with many different makers/vendors. This certification is designed for security officers, auditors, security professionals, site administrators, and anyone who deals with the security of the network infrastructure on a day-to-day basis.
The goal of ethical hackers is to help organizations take preemptive measures against malicious attacks by attacking systems themselves, all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief by thinking like a thief. As technology advances organizations increasingly depend on technology, and information assets have evolved into critical components of survival.
You need to pass only a single exam to become a CEH. But obtaining this certification doesn't mean you can provide services to a company-this is just the first step. By obtaining your CEH certification, you'll be able to obtain more experience, build on your interest in networks, and subsequently pursue more complex and in-depth network knowledge and certifications.
For the latest exam pricing and updates to the registration procedures, call either Thomson Prometric at (866) 776-6387 or (800) 776-4276, or Pearson VUE at (877) 680-3926. You can also go to either