February 2022
Intermediate to advanced
752 pages
19h 37m
English
CHAPTER 1 An Introduction to Ethical Hacking
CHAPTER 2 The Technical Foundations of Hacking
CHAPTER 3 Footprinting, Reconnaissance, and Scanning
CHAPTER 4 Enumeration and System Hacking
CHAPTER 5 Social Engineering, Malware Threats, and Vulnerability Analysis
CHAPTER 6 Sniffers, Session Hijacking, and Denial of Service
CHAPTER 7 Web Server Hacking, Web Applications, and Database Attacks
CHAPTER 8 Wireless Technologies, Mobile Security, and Attacks
CHAPTER 9 Evading IDS, Firewalls, and Honeypots
CHAPTER 10 Cryptographic Attacks and Defenses
CHAPTER 11 Cloud Computing, IoT and Botnets
Glossary of Key Terms
Appendix A Answers to the “Do I Know This Already?”Quizzes and Review Questions ...