The book will cover the following areas, which are the main topics of the examination, as well as key knowledge areas for working security professionals: Ethics and Legality, Footprinting, Scanning, Enumeration, System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web Based Password Cracking Techniques, SQL Injection, Wireless Hacking, Virus and Worms, Physical Security, Linux Hacking, Evading IDS, Honeypots and Firewalls, Buffer Overflows, Cryptography, Penetration Testing Methodologies Each chapter will include questions at the end of the chapter, and the book will include relevant appendices, such as answers to the questions, glossary, and other information. The book will include an extensive Test Prep CD with the questions and answers. CISSP/CEH Comparison Like the CISSP program, the CEH is vendor-neutral, but there are important differences. The CEH program is based on hacking skills rather than defense and security skills. The CISSP program focuses on general security knowledge based on the ISC2 published security domains. This makes the CISSP program non-technical while the CEH program is very technical. CEH is complementary to CISSP, since it is designed for the IT practitioner responsible for ensuring security principles are applied in the context of their daily job scope. But CISSP is a non-technical certification suited for IT practitioners at a managerial level while CEH is a highly technical subject and targeted towards Security Administrators.
Additional ISBNs: 9780470135921, 0470135921, 9780470231388, 0470231386