buy now
$0.00
Course Outline:
Chapter 1. Ethical Hacking Basics
Chapter 2. The Technical Foundations of Hacking
Chapter 3. Footprinting and Scanning
Chapter 4. Enumeration and System Hacking
Chapter 5. Linux and Automated Assessment Tools
Chapter 6. Trojans and Backdoors
Chapter 7. Sniffers, Session Hijacking, and Denial of Service
Chapter 8. Web Server Hacking, Web Applications, and Database Attacks
Chapter 9. Wireless Technologies, Mobile Security, and Attacks
Chapter 10. IDS, Firewalls, and Honeypots
Chapter 11. Buffer Overflows, Viruses, and Worms
Chapter 12. Cryptographic Attacks and Defenses
Chapter 13. Physical Security and Social Engineering
linux tutorial
Copyright © 2012
This feed is for personal, non-commercial use only.
The use of this feed on other websites breaches copyright. If this content is not in your news reader, it makes the page you are viewing an infringement of the copyright. (Digital Fingerprint:
)
The post Certified Ethical Hacker Exam Prep appeared first on Malaysia Wordpress, Tutorial, Security & Linux Tips.