Jump to ratings and reviews
Rate this book

Ethical Hacking and Countermeasures: Attack Phases

Rate this book
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.

352 pages, Paperback

First published September 1, 2009

6 people are currently reading
111 people want to read

About the author

EC-Council

111 books11 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
17 (48%)
4 stars
11 (31%)
3 stars
5 (14%)
2 stars
1 (2%)
1 star
1 (2%)
Displaying 1 - 2 of 2 reviews
Profile Image for Dan.
158 reviews5 followers
December 17, 2012
The whole series is the curriculum for the Certified Ethical Hacker (CEH) curriculum. It does a great job preparing you for this exam. I was surprised how many of the tools in the curriculum are out of date or less than optimal compared to some better COTS tools out there. Granted, F/OSS should be covered extensively, but not to the exclusion of good COTS solutions.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.