CEH Certified Ethical Hacker All-in-One Exam Guide, 5th Edition
- Length: 608 pages
- Edition: 5
- Language: English
- Publisher: McGraw-Hill Education
- Publication Date: 2021-11-15
- ISBN-10: 1264269943
- ISBN-13: 9781264269945
- Sales Rank: #92778 (See Top 100 Books)
Up-to-date coverage of every topic on the CEH v11 exam
Thoroughly updated for CEH v11 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.
Covers all exam topics, including:
- Ethical hacking fundamentals
- Reconnaissance and footprinting
- Scanning and enumeration
- Sniffing and evasion
- Attacking a system
- Hacking web servers and applications
- Wireless network hacking
- Mobile, IoT, and OT
- Security in cloud computing
- Trojans and other attacks, including malware analysis
- Cryptography
- Social engineering and physical security
- Penetration testing
Online content includes:
- 300 practice exam questions
- Test engine that provides full-length practice exams and customized quizzes by chapter or exam domain
Cover About the Author Title Page Copyright Page Dedication Contents at a Glance Contents Acknowledgments Introduction Chapter 1 Getting Started: Essential Knowledge Security 101 Essentials Security Basics Introduction to Ethical Hacking Hacking Terminology The Ethical Hacker Chapter Review Questions Answers Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker Footprinting Passive Footprinting Active Footprinting Footprinting Methods and Tools Search Engines Website and E-mail Footprinting DNS Footprinting Network Footprinting Other Tools Chapter Review Questions Answers Chapter 3 Scanning and Enumeration Fundamentals TCP/IP Networking Subnetting Scanning Methodology Identifying Targets Port Scanning Evasion Vulnerability Scanning Enumeration Windows System Basics Unix/Linux System Basics Enumeration Techniques Chapter Review Questions Answers Chapter 4 Sniffing and Evasion Essentials Network Knowledge for Sniffing Active and Passive Sniffing Sniffing Tools and Techniques Techniques Tools Evasion Devices Aligned Against You Evasion Techniques Chapter Review Questions Answers Chapter 5 Attacking a System Getting Started Windows Security Architecture Linux Security Architecture Methodology Hacking Steps Authentication and Passwords Privilege Escalation and Executing Applications Hiding Files and Covering Tracks Chapter Review Questions Answers Chapter 6 Web-Based Hacking: Servers and Applications Web Servers Nonprofit Organizations Promoting Web Security Attack Methodology Web Server Architecture Web Server Attacks Attacking Web Applications Application Attacks Countermeasures Chapter Review Questions Answers Chapter 7 Wireless Network Hacking Wireless Networking Wireless Terminology, Architecture, and Standards Wireless Hacking Chapter Review Questions Answers Chapter 8 Mobile Communications and the IoT The Mobile World Mobile Vulnerabilities and Risks Mobile Platforms and Attacks IoT IoT Architecture IoT Vulnerabilities and Attacks IoT Hacking Methodology OT Hacking Definition and Concepts Security Concerns Chapter Review Questions Answers Chapter 9 Security in Cloud Computing Cloud Computing Cloud Computing Service Types Cloud Deployment Models Cloud Security Cloud Threats Cloud Attacks and Mitigations Cloud Hacking Chapter Review Questions Answers Chapter 10 Trojans and Other Attacks The “Malware” Attacks Trojans Viruses and Worms Fileless Malware Malware Analysis Malware Countermeasures Remaining Attacks Denial of Service Session Hijacking Chapter Review Questions Answers Chapter 11 Cryptography 101 Cryptography and Encryption Overview Terminology Encryption Algorithms and Techniques PKI, the Digital Certificate, and Digital Signatures The PKI System Digital Certificates Digital Signatures To Sum Up Encrypted Communication and Cryptography Attacks Encrypted Communication Cryptography Attacks Chapter Review Questions Answers Chapter 12 Low Tech: Social Engineering and Physical Security Social Engineering Human-Based Social Engineering Attacks Computer-Based Attacks Mobile-Based Attacks Preventing Social Engineering Attacks Physical Security Physical Security 101 Testing Physical Security Chapter Review Questions Answers Chapter 13 The Pen Test: Putting It All Together Methodology and Steps Security Assessments Security Assessment Deliverables Guidelines More Terminology Chapter Review Questions Answers Appendix A Tool, Sites, and References Vulnerability Research Sites Footprinting Tools Scanning and Enumeration Tools System Hacking Tools Cryptography and Encryption Sniffing Wireless Mobile and IoT Trojans and Malware Web Attacks Miscellaneous Tools, Sites, and References Disclaimer Appendix B About the Online Content System Requirements Your Total Seminars Training Hub Account Privacy Notice Single User License Terms and Conditions TotalTester Online Technical Support Glossary Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.