1. Ethical Hacking. 2. Hacking Laws. 3. Footprinting. 4. Google Hacking. 5. Scanning. 6. Enumeration. 7. System Hacking. 8. Trojans and Backdoors. 9. Viruses and Worms. 10. Sniffers. 11. Social Engineering. 12. Denial of Service. 13. Buffer Overflows. 14. Web Servers and Applications. 15. Hacking Wireless Networks. 16. Cryptography. 17. Hacking with Linux. 18. IDS, Firewalls, Honeypots. 19. Summary of Optional Modules. 20. Penetration Testing. Appendix A: CEH Cheatsheets. Appendix B: Practice Exam Answers.
About the Author
Steven DeFino travels the United States as the Director of Information Security and Networking for Training Camp. DeFino has been teaching technical and management classes since 1998 covering topics such as Cisco, Linux, Web Application Design and project management, drawing on firsthand experience from his 25-year career in the field. His success as an information security educator includes recognition as EC-Council "Instructor of the Year" for 2006 and 2009 and EC-Council "Certificate of Excellence" winner in 2008 and 2010. He has authored or maintained curricula for over 30 courses and is a frequent contributor to blogs and other professional resources.