Chapter 1. Ethical Hacking Basics Chapter 2. Cryptography 101 Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker Chapter 4. Scanning and Enumeration Chapter 5. Sniffers and Evasion Chapter 6. Attacking a System Chapter 7. Social Engineering and Physical Security Chapter 8. Web-Based Hacking: Servers and Applications Chapter 9. Wireless Network Hacking Chapter 10. Trojans and Other Attacks Chapter 11. The Pen Test: Putting It All Together
Matt Walker, CEH, CPTS, is an IT security architect working for Hewlett-Packard. He has held a variety of networking and IT security positions, including most recently the IT security manager position at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).