CEH v11 Certified Ethical Hacker Study Guide
- Length: 704 pages
- Edition: 1
- Language: English
- Publisher: Sybex
- Publication Date: 2021-08-03
- ISBN-10: 1119800285
- ISBN-13: 9781119800286
- Sales Rank: #27980 (See Top 100 Books)
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more.
This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles.
- Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated
- Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions
- Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security
- Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms
Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
Cover Table of Contents Title Page Copyright Dedication About the Author About the Technical Editor Introduction What Is a CEH? About EC-Council Using This Book Objective Map Let's Get Started! Assessment Test Answers to Assessment Test Chapter 1: Ethical Hacking Overview of Ethics Overview of Ethical Hacking Methodologies Methodology of Ethical Hacking Summary Chapter 2: Networking Foundations Communications Models Topologies Physical Networking IP TCP UDP Internet Control Message Protocol Network Architectures Cloud Computing Summary Chapter 3: Security Foundations The Triad Risk Policies, Standards, and Procedures Organizing Your Protections Security Technology Being Prepared Summary Review Questions Chapter 4: Footprinting and Reconnaissance Open Source Intelligence Domain Name System Passive Reconnaissance Website Intelligence Technology Intelligence Summary Chapter 5: Scanning Networks Ping Sweeps Port Scanning Vulnerability Scanning Packet Crafting and Manipulation Evasion Techniques Protecting and Detecting Summary Review Questions Chapter 6: Enumeration Service Enumeration Remote Procedure Calls Server Message Block Simple Network Management Protocol Simple Mail Transfer Protocol Web-Based Enumeration Summary Chapter 7: System Hacking Searching for Exploits System Compromise Gathering Passwords Password Cracking Client-Side Vulnerabilities Living Off the Land Fuzzing Post Exploitation Summary Review Questions Chapter 8: Malware Malware Types Malware Analysis Creating Malware Malware Infrastructure Antivirus Solutions Persistence Summary Review Questions Chapter 9: Sniffing Packet Capture Packet Analysis Spoofing Attacks Summary Review Questions Chapter 10: Social Engineering Social Engineering Physical Social Engineering Phishing Attacks Website Attacks Wireless Social Engineering Automating Social Engineering Summary Chapter 11: Wireless Security Wi-Fi Bluetooth Mobile Devices Summary Chapter 12: Attack and Defense Web Application Attacks Denial-of-Service Attacks Application Exploitation Lateral Movement Defense in Depth/Defense in Breadth Defensible Network Architecture Summary Chapter 13: Cryptography Basic Encryption Symmetric Key Cryptography Asymmetric Key Cryptography Certificate Authorities and Key Management Cryptographic Hashing PGP and S/MIME Disk and File Encryption Summary Chapter 14: Security Architecture and Design Data Classification Security Models Application Architecture Security Architecture Summary Chapter 15: Cloud Computing and the Internet of Things Cloud Computing Overview Cloud Architectures and Deployment Common Cloud Threats Internet of Things Operational Technology Summary Appendix: Answers to Review Questions Chapter 2: Networking Foundations Chapter 3: Security Foundations Chapter 4: Footprinting and Reconnaissance Chapter 5: Scanning Networks Chapter 6: Enumeration Chapter 7: System Hacking Chapter 8: Malware Chapter 9: Sniffing Chapter 10: Social Engineering Chapter 11: Wireless Security Chapter 12: Attack and Defense Chapter 13: Cryptography Chapter 14: Security Architecture and Design Chapter 15: Cloud Computing and the Internet of Things Index Comprehensive Online Learning Environment End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.