![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVtG7ZG2icnwwAXu4HhDIyukfsw264-Tyo3kvWYVI-7cprNCFfdRTjSfyX1hPZnBnVDlqSzCQBwc7YSAj3Dy2c93X6izKJudJNx0rlTd8E636__18rtr24bLnkdMItaqw1DpmY1M29LPHy/s320/CEH+2.jpg)
Chapter 1, Trojans and Backdoors, covers different aspects of Trojans, including their nature, functions, types, methods of propagation, and indications and the tools used to send them across a network.
Chapter 2, Viruses and Worms, examines the working, functions, classifications and impact of malicious programs including detail on countermeasures available to protect against the damage caused by these programs.
Chapter 3, Sniffers, explains the fundamental concepts of sniffing and their use in hacking activity and discusses tools and techniques used to secure a network from anomalous traffic.
Chapter 4, Social Engineering, explains the fundamentals of social engineering and how to implement countermeasures for identity theft.
Chapter 5, Phishing, provides an understanding of methods and process of phishing along with a discussion of the main anti-phishing tools.
Chapter 6, Denial of Service, defines and identifies the types of denial of service attacks and discusses appropriate countermeasures.
Chapter 7, Buffer Overflows, focuses on buffer overflow vulnerabilities and how to locate these vulnerabilities and deploy countermeasures.