0%

Book Description

As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more.

This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles.

  • Gain a unique certification that allows you to understand the mind of a hacker
  • Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions
  • Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security
  • Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms

Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.

Table of Contents

  1. Cover
  2. About the Author
  3. Introduction
  4. Assessment Test
  5. Answers to Assessment Test
  6. Chapter 1 Ethical Hacking
    1. Overview of Ethics
    2. Overview of Ethical Hacking
    3. Methodology of Ethical Hacking
    4. Summary
  7. Chapter 2 Networking Foundations
    1. Communications Models
    2. Topologies
    3. Physical Networking
    4. IP
    5. TCP
    6. UDP
    7. Internet Control Message Protocol
    8. Network Architectures
    9. Cloud Computing
    10. Summary
    11. Review Questions
  8. Chapter 3 Security Foundations
    1. The Triad
    2. Risk
    3. Policies, Standards, and Procedures
    4. Security Technology
    5. Being Prepared
    6. Summary
    7. Review Questions
  9. Chapter 4 Footprinting and Reconnaissance
    1. Open-Source Intelligence
    2. Domain Name System
    3. Passive Reconnaissance
    4. Website Intelligence
    5. Technology Intelligence
    6. Summary
    7. Review Questions
  10. Chapter 5 Scanning Networks
    1. Ping Sweeps
    2. Port Scanning
    3. Vulnerability Scanning
    4. Packet Crafting and Manipulation
    5. Evasion Techniques
    6. Summary
    7. Review Questions
  11. Chapter 6 Enumeration
    1. Service Enumeration
    2. Remote Procedure Calls
    3. Server Message Block
    4. Simple Network Management Protocol
    5. Simple Mail Transfer Protocol
    6. Web-Based Enumeration
    7. Summary
    8. Review Questions
  12. Chapter 7 System Hacking
    1. Searching for Exploits
    2. System Compromise
    3. Gathering Passwords
    4. Password Cracking
    5. Client-Side Vulnerabilities
    6. Post Exploitation
    7. Summary
    8. Review Questions
  13. Chapter 8 Malware
    1. Malware Types
    2. Malware Analysis
    3. Creating Malware
    4. Malware Infrastructure
    5. Antivirus Solutions
    6. Summary
    7. Review Questions
  14. Chapter 9 Sniffing
    1. Packet Capture
    2. Packet Analysis
    3. Spoofing Attacks
    4. Summary
    5. Review Questions
  15. Chapter 10 Social Engineering
    1. Social Engineering
    2. Physical Social Engineering
    3. Phishing Attacks
    4. Website Attacks
    5. Wireless Social Engineering
    6. Automating Social Engineering
    7. Summary
    8. Review Questions
  16. Chapter 11 Wireless Security
    1. Wi-Fi
    2. Bluetooth
    3. Mobile Devices
    4. Summary
    5. Review Questions
  17. Chapter 12 Attack and Defense
    1. Web Application Attacks
    2. Denial of Service Attacks
    3. Application Exploitation
    4. Lateral Movement
    5. Defense in Depth/Defense in Breadth
    6. Defensible Network Architecture
    7. Summary
    8. Review Questions
  18. Chapter 13 Cryptography
    1. Basic Encryption
    2. Symmetric Key Cryptography
    3. Asymmetric Key Cryptography
    4. Certificate Authorities and Key Management
    5. Cryptographic Hashing
    6. PGP and S/MIME
    7. Summary
    8. Review Questions
  19. Chapter 14 Security Architecture and Design
    1. Data Classification
    2. Security Models
    3. Application Architecture
    4. Security Architecture
    5. Summary
    6. Review Questions
  20. Appendix Answers to Review Questions
    1. Chapter 2: Networking Foundations
    2. Chapter 3: Security Foundations
    3. Chapter 4: Footprinting and Reconnaissance
    4. Chapter 5: Scanning Networks
    5. Chapter 6: Enumeration
    6. Chapter 7: System Hacking
    7. Chapter 8: Malware
    8. Chapter 9: Sniffing
    9. Chapter 10: Social Engineering
    10. Chapter 11: Wireless Security
    11. Chapter 12: Attack and Defense
    12. Chapter 13: Cryptography
    13. Chapter 14: Security Architecture and Design
  21. Index
  22. Comprehensive Online Learning Environment
  23. End User License Agreement
3.144.93.73