CEH [5 of 5] Ethical Hacking and Countermeasures: Secure Network Infrastructures

Secure Network Infrastructures discusses hacking wireless networks; physical security, how to evade IDS and Firewalls; how to detect honey pots; and an introduction to cryptography.


Chapter 1, Hacking Wireless Networks, discusses wireless networking and the different wireless standards and provides information on SSID, wireless access points, how to crack WEP and much more. 

Chapter 2, Physical Security, focuses on the need to be aware of physical security; challenges in ensuring physical security; and ways to physically secure networks. 

Chapter 3, Evading IDS, Firewalls and Detecting Honeypots, discusses various security features that administrators deploy to protect their networks. 

Chapter 4, Cryptography, explains what cryptography is and discusses the various cryptography attacks and introduces various cracking tools.