CONTENTS

                        Acknowledgments

                        Introduction

     Chapter 1       Getting Started: Essential Knowledge

     Chapter 2       Reconnaissance: Information Gathering for the Ethical Hacker

     Chapter 3       Scanning and Enumeration

     Chapter 4       Sniffing and Evasion

     Chapter 5       Attacking a System

     Chapter 6       Web-Based Hacking: Servers and Applications

     Chapter 7       Wireless Network Hacking

     Chapter 8       Security in Cloud Computing

     Chapter 9       Trojans and Other Attacks

     Chapter 10     Cryptography 101

     Chapter 11     Low Tech: Social Engineering and Physical Security

     Chapter 12     The Pen Test: Putting It All Together

     Appendix A    Pre-assessment Test

     Appendix B    About the Download