Hands On Ethical Hacking and Network Defense 1st Edition by Kent Backman – Ebook PDF Instant Download/Delivery: 1133935885, 9781133935889
Full download Hands On Ethical Hacking and Network Defense 1st Edition after payment

Product details:
ISBN 10: 1133935885
ISBN 13: 9781133935889
Author: Kent Backman
Hands On Ethical Hacking and Network Defense 1st Table of contents:
Chapter 1: Ethical Hacking Overview
-
Introduction to Ethical Hacking
-
What You Can Do Legally
-
What You Cannot Do Legally
-
Chapter Summary
Chapter 2: TCP/IP Concepts Review
-
Overview of TCP/IP
-
IP Addressing
-
Overview of Numbering Systems
-
Chapter Summary
Chapter 3: Network and Computer Attacks
-
Malicious Software (Malware)
-
Protecting Against Malware Attacks
-
Intruder Attacks on Networks and Computers
-
Addressing Physical Security
-
Chapter Summary
Chapter 4: Footprinting and Social Engineering
-
Using Web Tools for Footprinting
-
Conducting Competitive Intelligence
-
Using Domain Name System Zone Transfers
-
Introduction to Social Engineering
-
Chapter Summary
Chapter 5: Port Scanning
-
Introduction to Port Scanning
-
Using Port-Scanning Tools
-
Conducting Ping Sweeps
-
Understanding Scripting
-
Chapter Summary
Chapter 6: Enumeration
-
Introduction to Enumeration
-
Enumerating Windows Operating Systems
-
Enumerating the NetWare Operating System
-
Enumerating the *nix Operating System
-
Chapter Summary
Chapter 7: Programming for Security Professionals
-
Introduction to Computer Programming
-
Learning the C Language
-
Understanding HTML Basics
-
Understanding Perl
-
Understanding Object-Oriented Programming Concepts
-
Chapter Summary
Chapter 8: Desktop and Server OS Vulnerabilities
-
Windows OS Vulnerabilities
-
Tools for Identifying Vulnerabilities in Windows
-
Best Practices for Hardening Windows Systems
-
Linux OS Vulnerabilities
-
Chapter Summary
Chapter 9: Embedded Operating Systems: The Hidden Threat
-
Introduction to Embedded Operating Systems
-
Windows and Other Embedded Operating Systems
-
Vulnerabilities of Embedded OSs
-
Chapter Summary
Chapter 10: Hacking Web Servers
-
Understanding Web Applications
-
Understanding Web Application Vulnerabilities
-
Tools for Web Attackers and Security Testers
-
Chapter Summary
Chapter 11: Hacking Wireless Networks
-
Understanding Wireless Technology
-
Understanding Wireless Network Standards
-
Understanding Authentication
-
Understanding Wardriving
-
Understanding Wireless Hacking
-
Chapter Summary
Chapter 12: Cryptography
-
Understanding Cryptography Basics
-
Understanding Symmetric and Asymmetric Algorithms
-
Understanding Public Key Infrastructure
-
Understanding Cryptography Attacks
-
Chapter Summary
Chapter 13: Network Protection Systems
-
Understanding Routers
-
Understanding Firewalls
-
Understanding Intrusion Detection and Prevention Systems
-
Understanding Honeypots
-
Chapter Summary
People also search for Hands On Ethical Hacking and Network Defense 1st:
hands on ethical hacking and network defense 4th ed
hands on ethical hacking and network defense book
hands on ethical hacking and network defense post assessment
what jobs can you get with ethical hacking
concept of ethical hacking
Tags: Kent Backman, Ethical, Network


