July 2022
Intermediate to advanced
352 pages
9h 12m
English
This chapter includes questions from the following topics:
• Describe the CEH hacking methodology and system hacking steps
• Describe methods used to gain access to systems
• Describe methods used to escalate privileges
• Describe methods used to maintain access to systems
• Describe methods of evidence erasure
• Identify rootkit function and types
• Identify basics of Windows and Linux file structure, directories, and commands
Did you know there’s a science to hand-to-hand combat? Pugilism (pygmachia in Greek, made into an Olympic sport in 688 BC) is the hand-to-hand combat sport better known as boxing. Despite the circus it has become in modern times, boxing was a well-respected and carefully studied ...
Read now
Unlock full access