O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 1

Getting Started: Essential Knowledge

In this chapter you will

•  Identify components of TCP/IP computer networking

•  Understand basic elements of information security

•  Understand incident management steps

•  Identify fundamentals of security policies

•  Identify essential terminology associated with ethical hacking

•  Define ethical hacker and classifications of hackers

•  Describe the five stages of ethical hacking

•  Define the types of system attacks

•  Identify laws, acts, and standards affecting IT security

A few weeks ago my ISP point-of-presence router, comfortably nestled in the comm-closet-like area I’d lovingly built just for such items of IT interest, decided it had had enough of serving the humans and went rogue on ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required