Part IExam Preparation
Chapter 1 The Business Aspects of Penetration Testing
Chapter 2 The Technical Foundations of Hacking
Chapter 3 Footprinting and Scanning
Chapter 4 Enumeration and System Hacking
Chapter 5 Linux and Automated Security Assessment Tools
Chapter 6 Trojans and Backdoors
Chapter 7 Sniffers, Session Hijacking, and Denial of Service
Chapter 8 Web Server Hacking, Web Application, and Database Attacks
Chapter 9 Wireless Technologies, Security, and Attacks
Chapter 10 IDS, Honeypots, and Firewalls
Chapter 11 Buffer Overflows, Viruses, and Worms
Chapter 12 Cryptographic Attacks and Defenses
Chapter 13 Physical Security and Social Engineering
Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.