Part IExam Preparation

Chapter 1 The Business Aspects of Penetration Testing

Chapter 2 The Technical Foundations of Hacking

Chapter 3 Footprinting and Scanning

Chapter 4 Enumeration and System Hacking

Chapter 5 Linux and Automated Security Assessment Tools

Chapter 6 Trojans and Backdoors

Chapter 7 Sniffers, Session Hijacking, and Denial of Service

Chapter 8 Web Server Hacking, Web Application, and Database Attacks

Chapter 9 Wireless Technologies, Security, and Attacks

Chapter 10 IDS, Honeypots, and Firewalls

Chapter 11 Buffer Overflows, Viruses, and Worms

Chapter 12 Cryptographic Attacks and Defenses

Chapter 13 Physical Security and Social Engineering

Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.