This chapter provides review basics and sample questions covering the topics of Enumeration and System Hacking to help you prepare for the Certified Ethical Hacker exam.
This article provides an overview of various types of cyber crime, including cyber extortion, botnets, morphing malware, and online fraud.
Many of the examples and exercises detailed in preparation for the CEH exam involve, and most times recommend, the use of Back Track as your ethical hacking platform of choice. In this article, Will Schmied outlines how to go about getting Back Track 4 R2 setup using two different methods to help you prepare for the CEH exam.
In this article, Will Schmied profiles the EC-Council 312-50 Certified Ethical Hacker (v6.1) exam. Find out what you can expect to see on the exam and how you can better prepare for it.