0%

This book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam.

Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The authors concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

Every feature of this book supports both efficient exam preparation and long-term mastery:

  • Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Councils official exam objectives

  • Key Topics figures, tables, and lists call attention to the information that is most crucial for exam success

  • Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questionsgoing beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career

  • Key Terms are listed in each chapter and defined in a complete glossary, explaining essential terminology within the field

This study guide helps you master all the topics on the latest CEH exam, including:

  • Ethical hacking basics

  • Technical foundations of hacking

  • Footprinting and scanning

  • Enumeration and system hacking

  • Social engineering, malware threats, and vulnerability analysis

  • Sniffers, session hijacking, and denial of service

  • Web server hacking, web applications, and database attacks

  • Wireless technologies, mobile security, and mobile attacks

  • IDS, firewalls, and honeypots

  • Cryptographic attacks and defenses

  • Cloud computing, IoT, and botnets

Table of Contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Table of Contents
  6. About the Authors
  7. Dedication
  8. Acknowledgments
  9. We Want to Hear from You!
  10. Reader Services
  11. Introduction
    1. How to Use This Book
    2. Companion Website
    3. Pearson Test Prep Practice Test Software
    4. Goals and Methods
    5. Who Should Read This Book?
    6. Strategies for Exam Preparation
    7. How This Book Is Organized
  12. Chapter 1. An Introduction to Ethical Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Security Fundamentals
    4. Security Testing
    5. Cyber Kill Chain
    6. Hacker and Cracker Descriptions
    7. Ethical Hackers
    8. Test Plans—Keeping It Legal
    9. Ethics and Legality
    10. Summary
    11. Exam Preparation Tasks
    12. Review All Key Topics
    13. Define Key Terms
    14. Exercises
    15. Review Questions
    16. Suggested Reading and Resources
  13. Chapter 2. The Technical Foundations of Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. The Hacking Process
    4. The Ethical Hacker’s Process
    5. Information Security Systems and the Stack
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercises
    11. Review Questions
    12. Suggested Reading and Resources
  14. Chapter 3. Footprinting, Reconnaissance, and Scanning
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Footprinting
    4. Scanning
    5. Summary
    6. Exam Preparation Tasks
    7. Define Key Terms
    8. Exercises
    9. Review Questions
    10. Suggested Reading and Resources
  15. Chapter 4. Enumeration and System Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Enumeration
    4. System Hacking
    5. Summary
    6. Exam Preparation Tasks
    7. Review All Key Topics
    8. Define Key Terms
    9. Exercise
    10. Review Questions
    11. Suggested Reading and Resources
  16. Chapter 5. Social Engineering, Malware Threats, and Vulnerability Analysis
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Social Engineering
    4. Malware Threats
    5. Vulnerability Analysis
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Command Reference to Check Your Memory
    11. Exercises
    12. Review Questions
    13. Suggested Reading and Resources
  17. Chapter 6. Sniffers, Session Hijacking, and Denial of Service
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Sniffers
    4. Session Hijacking
    5. Denial of Service and Distributed Denial of Service
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercises
    11. Review Questions
    12. Suggested Reading and Resources
  18. Chapter 7. Web Server Hacking, Web Applications, and Database Attacks
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Web Server Hacking
    4. Web Application Hacking
    5. Database Hacking
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Exercise
    10. Review Questions
    11. Suggested Reading and Resources
  19. Chapter 8. Wireless Technologies, Mobile Security, and Attacks
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Wireless Technologies
    4. Mobile Device Operation and Security
    5. Wireless LANs
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
    11. Suggested Reading and Resources
  20. Chapter 9. Evading IDS, Firewalls, and Honeypots
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Intrusion Detection and Prevention Systems
    4. Firewalls
    5. Honeypots
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
    11. Suggested Reading and Resources
  21. Chapter 10. Cryptographic Attacks and Defenses
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Cryptography History and Concepts
    4. Encryption Algorithms
    5. Public Key Infrastructure (PKI)
    6. Email and Disk Encryption
    7. Cryptoanalysis and Attacks
    8. Security Protocols and Countermeasures
    9. Summary
    10. Exam Preparation Tasks
    11. Review All Key Topics
    12. Define Key Terms
    13. Exercises
    14. Review Questions
    15. Suggested Reading and Resources
  22. Chapter 11. Cloud Computing, IoT, and Botnets
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Cloud Computing
    4. IoT
    5. Botnets
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercise
    11. Review Questions
    12. Suggested Reading and Resources
  23. Chapter 12. Final Preparation
    1. Hands-on Activities
    2. Suggested Plan for Final Review and Study
    3. Summary
  24. Glossary
  25. Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions [This content is currently in development.]
  26. Appendix B. CEH Certified Ethical Hacker Cert Guide Exam Updates
    1. Always Get the Latest at the Book’s Product Page
    2. Technical Content
  27. Appendix C. Study Planner [This content is currently in development.]
18.220.106.241