Chapter 2System Fundamentals

  1. image I. Background
    1. A. Networking technologies
    2. C. System technologies
    3. D. Transport protocols
    4. G. Telecommunications technologies
    5. H. Backup and restore
  2. image III. Security
    1. A. Systems security controls
    2. B. Application/fileserver
    3. C. Firewalls
    4. E. Network security
    5. O. Trusted networks
    6. P. Vulnerabilities
  3. image IV. Tools/Systems/Programs
    1. G. Boundary protection appliances
    2. H. Network topologies ...

Get CEH: Certified Ethical Hacker Version 8 Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.