CEH v10 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Appendix: Answers to Review Questions

Index

CEH v11 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Chapter 15: Cloud Computing and the Internet of Things

Appendix: Answers to Review Questions

Index

Certified Ethical Hacker (CEH) Preparation Guide

فهرست مطالب:

About the Author

About the Technical Reviewer

Introduction

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Footprinting and Reconnaissance/Scanning Networks

Chapter 3: Enumeration

Chapter 4: System Hacking

Chapter 5: Trojans, Backdoors, Viruses, and Worms

Chapter 6: Sniffers and Social Engineering

Chapter 7: Denial of Service

Chapter 8: Session Hijacking

Chapter 9: Hacking Webservers

Chapter 10: Hacking Web Applications

Chapter 11: SQL Injections

CHAPTER 12: Hacking Wireless Networks

CHAPTER 13: Evading Intrusion Detection Systems, Firewalls, and Honeypots

CHAPTER 14: Buffer Overflow

CHAPTER 15: Cryptography

CHAPTER 16: Penetration Testing

Index

CompTIA PenTest+ Certification For Dummies

فهرست مطالب:

Introduction

Part 1: Planning and Information Gathering

Part 2: Attacks and Exploits

Part 3: Post-Exploitation and Reporting

Part 4: Appendixes

Index

CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

Appendix A: Mapping Course Content to CompTIA Certification+ (PT0-002)

Solutions

Glossary

Index

CompTIA PenTest+ Study Guide (Exam PT0-001)

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Penetration Testing

Chapter 2 Planning and Scoping Penetration Tests

Chapter 3 Information Gathering

Chapter 4 Vulnerability Scanning

Chapter 5 Analyzing Vulnerability Scans

Chapter 6 Exploit and Pivot

Chapter 7 Exploiting Network Vulnerabilities

Chapter 8 Exploiting Physical and Social Vulnerabilities

Chapter 9 Exploiting Application Vulnerabilities

Chapter 10 Exploiting Host Vulnerabilities

Chapter 11 Scripting for Penetration Testing

Chapter 12 Reporting and Communication

Appendix Answers to Review Questions

Index

CompTIA PenTest+ Study Guide Exam PT0-001

فهرست مطالب

Introduction

Assessment Test

Chapter 1: Penetration Testing

Chapter 2: Planning and Scoping Penetration Tests

Chapter 3: Information Gathering

Chapter 4: Vulnerability Scanning

Chapter 5: Analyzing Vulnerability Scans

Chapter 6: Exploit and Pivot

Chapter 7: Exploiting Network Vulnerabilities

Chapter 8: Exploiting Physical and Social Vulnerabilities

Chapter 9: Exploiting Application Vulnerabilities

Chapter 10: Exploiting Host Vulnerabilities

Chapter 11: Scripting for Penetration Testing

Chapter 12: Reporting and Communication

Appendix: Answers to Review Questions

Index

CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)

فهرست مطالب:

Part I Threats, Attacks, and Vulnerabilities

Part II Technologies and Tools

Part III Architecture and Design

Part IV Identity and Access Management

Part V Risk Management

Part VI Cryptography and Public Key Infrastructure

Part VII Appendixes and Glossary

Appendix A OSI Model and Internet Protocols

Appendix B About the Download

CompTIA Security+ Review Guide SY0-501

فهرست مطالب:

Introduction

Chapter 1: Threats, Attacks, and Vulnerabilities

Chapter 2: Technologies and Tools

Chapter 3: Architecture and Design

Chapter 4: Identity and Access Management

Chapter 5: Risk Management

Chapter 6: Cryptography and PKI

Appendix: Answers to Review Questions

Index

CompTIA Security+ Study Guide Exam SY0‑701

فهرست مطالب:

Table of Contents

Title Page

Copyright

Dedication

Acknowledgments

About the Authors

About the Technical Editor

About the Technical Proofreader

Introduction

Chapter 1: Today’s Security Professional

Chapter 2: Cybersecurity Threat Landscape

Chapter 3: Malicious Code

Chapter 4: Social Engineering and Password Attacks

Chapter 5: Security Assessment and Testing

Chapter 6: Application Security

Chapter 7: Cryptography and the PKI

Chapter 8: Identity and Access Management

Chapter 9: Resilience and Physical Security

Chapter 10: Cloud and Virtualization Security

Chapter 11: Endpoint Security

Chapter 12: Network Security

Chapter 13: Wireless and Mobile Security

Chapter 14: Monitoring and Incident Response

Chapter 15: Digital Forensics

Chapter 16: Security Governance and Compliance

Chapter 17: Risk Management and Privacy

Index

WILEY END USER LICENSE AGREEMENT

CompTIA Security+ Study Guide: Exam SY0-610

فهرست مطالب:

Section 1: Security Aims and Objectives

Section 2: Monitoring the Security Infrastructure

Section 3: Protecting the Security Environment

Section 4: Mock Tests

Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)

فهرست مطالب:

Part One: Background

Part Two: Symmetric Ciphers

Part Three: Asymmetric Ciphers

Part Four: Cryptographic Data Integrity Algorithms

Part Five: Mutual Trust

Part Six: Network and Internet Security