CEH v10 Certified Ethical Hacker Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1: Ethical Hacking
Chapter 2: Networking Foundations
Chapter 3: Security Foundations
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration
Chapter 7: System Hacking
Chapter 8: Malware
Chapter 9: Sniffing
Chapter 10: Social Engineering
Chapter 11: Wireless Security
Chapter 12: Attack and Defense
Chapter 13: Cryptography
Chapter 14: Security Architecture and Design
Appendix: Answers to Review Questions
Index
CEH v11 Certified Ethical Hacker Study Guide
فهرست مطالب:
Introduction
Assessment Test
Chapter 1: Ethical Hacking
Chapter 2: Networking Foundations
Chapter 3: Security Foundations
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration
Chapter 7: System Hacking
Chapter 8: Malware
Chapter 9: Sniffing
Chapter 10: Social Engineering
Chapter 11: Wireless Security
Chapter 12: Attack and Defense
Chapter 13: Cryptography
Chapter 14: Security Architecture and Design
Chapter 15: Cloud Computing and the Internet of Things
Appendix: Answers to Review Questions
Index
Certified Ethical Hacker (CEH) Preparation Guide
فهرست مطالب:
About the Author
About the Technical Reviewer
Introduction
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Footprinting and Reconnaissance/Scanning Networks
Chapter 3: Enumeration
Chapter 4: System Hacking
Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Sniffers and Social Engineering
Chapter 7: Denial of Service
Chapter 8: Session Hijacking
Chapter 9: Hacking Webservers
Chapter 10: Hacking Web Applications
Chapter 11: SQL Injections
CHAPTER 12: Hacking Wireless Networks
CHAPTER 13: Evading Intrusion Detection Systems, Firewalls, and Honeypots
CHAPTER 14: Buffer Overflow
CHAPTER 15: Cryptography
CHAPTER 16: Penetration Testing
Index
CompTIA PenTest+ Certification For Dummies
فهرست مطالب:
Introduction
Part 1: Planning and Information Gathering
Part 2: Attacks and Exploits
Part 3: Post-Exploitation and Reporting
Part 4: Appendixes
Index
CompTIA PenTest+ Student Guide (Exam PT0-002)
فهرست مطالب:
Lesson 1: Scoping Organizational/Customer Requirements
Lesson 2: Defining the Rules of Engagement
Lesson 3: Footprinting and Gathering Intelligence
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 5: Preparing the Vulnerability Scan
Lesson 6: Scanning Logical Vulnerabilities
Lesson 7: Analyzing Scanning Results
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 9: Exploiting the LAN and Cloud
Lesson 10: Testing Wireless Networks
Lesson 11: Targeting Mobile Devices
Lesson 12: Attacking Specialized Systems
Lesson 13: Web Application-Based Attacks
Lesson 14: Performing System Hacking
Lesson 15: Scripting and Software Development
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 17: Communicating During the PenTesting Process
Lesson 18: Summarizing Report Components
Lesson 19: Recommending Remediation
Lesson 20: Performing Post-Report Delivery Activities
Appendix A: Mapping Course Content to CompTIA Certification+ (PT0-002)
Solutions
Glossary
Index
CompTIA PenTest+ Study Guide (Exam PT0-001)
فهرست مطالب:
Introduction
Assessment Test
Chapter 1 Penetration Testing
Chapter 2 Planning and Scoping Penetration Tests
Chapter 3 Information Gathering
Chapter 4 Vulnerability Scanning
Chapter 5 Analyzing Vulnerability Scans
Chapter 6 Exploit and Pivot
Chapter 7 Exploiting Network Vulnerabilities
Chapter 8 Exploiting Physical and Social Vulnerabilities
Chapter 9 Exploiting Application Vulnerabilities
Chapter 10 Exploiting Host Vulnerabilities
Chapter 11 Scripting for Penetration Testing
Chapter 12 Reporting and Communication
Appendix Answers to Review Questions
Index
CompTIA PenTest+ Study Guide Exam PT0-001
فهرست مطالب
Introduction
Assessment Test
Chapter 1: Penetration Testing
Chapter 2: Planning and Scoping Penetration Tests
Chapter 3: Information Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: Analyzing Vulnerability Scans
Chapter 6: Exploit and Pivot
Chapter 7: Exploiting Network Vulnerabilities
Chapter 8: Exploiting Physical and Social Vulnerabilities
Chapter 9: Exploiting Application Vulnerabilities
Chapter 10: Exploiting Host Vulnerabilities
Chapter 11: Scripting for Penetration Testing
Chapter 12: Reporting and Communication
Appendix: Answers to Review Questions
Index
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)
فهرست مطالب:
Part I Threats, Attacks, and Vulnerabilities
Part II Technologies and Tools
Part III Architecture and Design
Part IV Identity and Access Management
Part V Risk Management
Part VI Cryptography and Public Key Infrastructure
Part VII Appendixes and Glossary
Appendix A OSI Model and Internet Protocols
Appendix B About the Download
CompTIA Security+ Review Guide SY0-501
فهرست مطالب:
Introduction
Chapter 1: Threats, Attacks, and Vulnerabilities
Chapter 2: Technologies and Tools
Chapter 3: Architecture and Design
Chapter 4: Identity and Access Management
Chapter 5: Risk Management
Chapter 6: Cryptography and PKI
Appendix: Answers to Review Questions
Index
CompTIA Security+ Study Guide Exam SY0‑701
فهرست مطالب:
Table of Contents
Title Page
Copyright
Dedication
Acknowledgments
About the Authors
About the Technical Editor
About the Technical Proofreader
Introduction
Chapter 1: Today’s Security Professional
Chapter 2: Cybersecurity Threat Landscape
Chapter 3: Malicious Code
Chapter 4: Social Engineering and Password Attacks
Chapter 5: Security Assessment and Testing
Chapter 6: Application Security
Chapter 7: Cryptography and the PKI
Chapter 8: Identity and Access Management
Chapter 9: Resilience and Physical Security
Chapter 10: Cloud and Virtualization Security
Chapter 11: Endpoint Security
Chapter 12: Network Security
Chapter 13: Wireless and Mobile Security
Chapter 14: Monitoring and Incident Response
Chapter 15: Digital Forensics
Chapter 16: Security Governance and Compliance
Chapter 17: Risk Management and Privacy
Index
WILEY END USER LICENSE AGREEMENT
CompTIA Security+ Study Guide: Exam SY0-610
فهرست مطالب:
Section 1: Security Aims and Objectives
Section 2: Monitoring the Security Infrastructure
Section 3: Protecting the Security Environment
Section 4: Mock Tests
Cryptography and Network Security: Principles and Practice – Eighth Edition (Global Edition)
فهرست مطالب:
Part One: Background
Part Two: Symmetric Ciphers
Part Three: Asymmetric Ciphers
Part Four: Cryptographic Data Integrity Algorithms
Part Five: Mutual Trust
Part Six: Network and Internet Security