14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking Wireless Networks<br />

• Overview of WEP, WPA authentication systems and cracking techniques<br />

• Overview of wireless Sniffers and SSID, MAC Spoofi ng<br />

• Understand Rogue Access Points<br />

• Understand Wireless hacking techniques<br />

• Describe the methods in securing wireless networks<br />

Physical Security<br />

• Physical security breach incidents<br />

• Understanding physical security<br />

• What is the need for physical security?<br />

• Who is accountable for physical security?<br />

• Factors affecting physical security<br />

Linux Hacking<br />

• Understand how to compile a Linux Kernel<br />

• Understand GCC compilation commands<br />

• Understand how to install LKM modules<br />

• Understand Linux hardening methods<br />

Evading IDS, Firewalls and Detecting Honey Pots<br />

• List the types of Intrusion Detection Systems and evasion techniques<br />

• List fi rewall and honeypot evasion techniques<br />

http://www.eccouncil.org<br />

EC-Council<br />

Page 199

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!