CEH Certified Ethical Hacker
All-in-One Exam Guide, 4E
Read Chapter 5: “Attacking a System”
This chapter discusses basic attacks along with Linux and Windows
network operating system architectures. In addition, the chapter notes
the security features of each, such as authentication and password
protection concepts. Finally, the reading highlights the Linux/Unix file
system basics and command structures.
Topic 2 Overview: Covering Tracks
What are some ways that an actual black hat hacker would try to cover his tracks once he has hacked an organization?
E-Book URL:
https://purdueuniversityglobal.vitalsource.com/reader/books/9781307603200/pageid/0