x

Our Privacy Policy has changed. By using this site, you agree to the Privacy Policy.

Certified Ethical Hacker Exam 312-50

ISBN-10: 0789735318
ISBN-13: 9780789735317
Edition: 2006
Authors: Michael Gregg
List price: $54.99
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: The CEH Exam Prep is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Exam Prep method of study. The CEH certification shows knowledge of network penetration testing skills. The CEH exam  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Medical Terminology Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $54.99
Copyright year: 2006
Publisher: Que
Publication date: 4/7/2006
Binding: Mixed Media
Pages: 696
Size: 7.00" wide x 9.00" long x 1.50" tall
Weight: 2.640
Language: English

The CEH Exam Prep is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Exam Prep method of study. The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving readers the solid, in-depth coverage they'll need to score higher on the exam. Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, helping readers drill and practice their way to higher scores.

Michael Gregg is the President of Superior Solutions, Inc. and has more than 20 years' experience in the IT field. He holds two associate's degrees, a bachelor's degree, and a master's degree and is certified as CISSP, MCSE, MCT, CTT+, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and TICSA. Michael's primary duty is to serve as project lead for security assessments, helping businesses and state agencies secure their IT resources and assets. Michael has authored four books, including Inside Network Security Assessment, CISSP Prep Questions, CISSP Exam Cram2, and Certified Ethical Hacker Exam Prep2. He has developed four high-level security classes, including Global Knowledge's Advanced Security Boot Camp, Intense School's Professional Hacking Lab Guide, ASPE's Network Security Essentials, and Assessing Network Vulnerabilities. He has written over 50 articles featured in magazines and Web sites, including Certification Magazine, GoCertify, The El Paso Times, and SearchSecurity. Michael is also a faculty member of Villanova University and creator of Villanova's college-level security classes, including Essentials of IS Security, Mastering IS Security, and Advanced Security Management. He also serves as a site expert for four TechTarget sites, including SearchNetworking, SearchSecurity, SearchMobileNetworking, and SearchSmallBiz. He is a member of the TechTarget Editorial Board.

Introduction
How This Book Helps You
Hardware and Software Requirements
Advice on Taking the Exam
Study and Exam Prep Tips
Learning Styles
Study Tips
Study Strategies
Pretesting Yourself
Exam Prep Tips
Exam Format
Question Types
More Exam-Preparation Tips
Final Considerations
Exam Preparation
The Business Aspects of Penetration Testing
Introduction
Security Fundamentals
Security Testing
Hacker and Cracker Descriptions
Ethical Hackers
Test Plans-Keeping It Legal
Ethics and Legality
Summary
Key Terms
Apply Your Knowledge
The Technical Foundations of Hacking
Introduction
The Attacker's Process
The Ethical Hacker's Process
Security and the Stack
Summary
Key Terms
Apply Your Knowledge
Footprinting and Scanning
Introduction
Determining Assessment Scope
The Seven-Step Information Gathering Process
Summary
Key Terms
Apply Your Knowledge
Enumeration and System Hacking
Introduction
The Architecture of Windows Computers
Enumeration
Windows Hacking
Summary
Key Terms
Apply Your Knowledge
Linux and Automated Security Assessment Tools
Introduction
Linux
Automated Assessment Tools
Picking the Right Platform
Summary
Key Terms
Apply Your Knowledge
Trojans and Backdoors
Introduction
An Overview of Trojans-The History of Trojans
Covert Communications
Trojan and Backdoor Countermeasures
Summary
Key Terms
Apply Your Knowledge
Sniffers, Session Hijacking, and Denial of Service
Introduction
Sniffers
Session Hijacking
Denial of Service
Summary
Key Terms
Apply Your Knowledge
Web Server Hacking, Web Applications, and Database Attacks
Introduction
Web Server Hacking
Web Application Hacking
Database Overview
Summary
Key Terms
Apply Your Knowledge
Wireless Technologies, Security, and Attacks
Introduction
Wireless Technologies-A Brief History
Wireless LANs
Wireless Hacking Tools
Securing Wireless Networks
Summary
Key Terms
Apply Your Knowledge
IDS, Firewalls, and Honeypots
Introduction
Intrusion Detection Systems
Firewalls
Honeypots
Summary
Key Terms
Apply Your Knowledge
Buffer Overflows, Viruses, and Worms
Introduction
Buffer Overflows
Viruses and Worms
Summary
Key Terms
Apply Your Knowledge
Cryptographic Attacks and Defenses
Introduction
Functions of Cryptography
History of Cryptography
Algorithms
Hashing
Digital Signatures
Steganography
Digital Certificates
Public Key Infrastructure
Protocols, Standards, and Applications
Encryption Cracking and Tools
Summary
Key Terms
Apply Your Knowledge
Physical Security and Social Engineering
Introduction
Physical Security
Social Engineering
Summary
Key Terms
Apply Your Knowledge
Final Review
Fast Facts
Ethics and Legality
Footprinting
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web-Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Virus and Worms
Physical Security
Linux Hacking
Evading Firewalls, IDS, and Honeypots
Buffer Overflows
Cryptography
Penetration Testing
Practice Exam and Answers
Practice Exam Questions
Answers to Practice Exam Questions
Glossary
Appendixes
Using the ExamGear Special Edition Software
Exam Simulation
Study Tools
How ExamGear Special Edition Works
Installing ExamGear Special Edition
Using ExamGear Special Edition
Contacting Que Certification
License Agreement
License
Software and Documentation
License Term and Charges
Title
Updates
Limited Warranty and Disclaimer
Limitation of Liability
Miscellaneous
U.S. Government Restricted Rights
Preparing Your System for Knoppix-std
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×