WELCOME TO THE SITE A2Z APPS DOWNLOADS




By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.


If you are reading this courseware, it is quite possible that you realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one, and what you can gain from this course.


You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single courseware that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover it at one go.


This doesn’t mean that this course is inadequate in any way.


We have tried to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time; as well as gain insight into the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom, supplemented with tools that the reader can readily access and obtain a hands-on experience. The emphasis is on gaining the know-how, and this explains the leaning towards free and accessible tools. You will read about some of the most widespread attacks seen; the popular tools used by attackers and how attacks have been carried out from ordinary resources.


You may also want to know “After this course, what?” This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no ONE template that will meet all your needs. Your testing strategy will vary with client, basic information enumeration, firewall penetration or other domains, you will find something in this courseware that you can definitely use.


Finally, this is not the end! This courseware is to be considered as a ‘work-in-progress’, because we will be adding value to this courseware over time. You may find some aspects detailed, while others may find it brief. The yardstick that we have used in this respect is simple - “does the content help explain the point at hand?” This doesn’t mean that we would not love to hear from you regarding your viewpoints and suggestions. Do send us your feedback so that we can make this course a more useful one.


TABLE OF CONTENT:

Module 01 - Introduction to Ethical Hacking

Module 02 - Footprinting

Module 03 - Scanning

Module 04 - Enumeration

Module 05 - System Hacking

Module 06 - Trojans and Backdoors

Module 07 - Sniffers

Module 08 - Denial of Service

Module 09 - Social Engineering

Module 10 - Session Hijacking

Module 11 - Hacking Web Servers

Module 12 - Web Application Vulnerabilities

Module 13 - Web Based Password Cracking Techniques

Module 14 - SQL Injection

Module 15 - Hacking Wireless Networks

Module 16 - Viruses

Module 17 - Novell Hacking

Module 18 - Linux Hacking

Module 19 - Evading IDS, Firewalls and Honeypots

Module 20 - Buffer Overflows

Module 21 - Cryptography



http://rapidshare.com/files/193381867/Ethical_Hacking_and_Countermeas

0 comments:

Post a Comment