0%

As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. 

This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. 

  • Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated 
  • Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions 
  • Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security 
  • Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms 

Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker. 

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. About the Author
    1. About the Technical Editor
  6. Introduction
    1. What Is a CEH?
    2. About EC-Council
    3. Using This Book
    4. Objective Map
    5. Let's Get Started!
    6. Assessment Test
    7. Answers to Assessment Test
  7. Chapter 1: Ethical Hacking
    1. Overview of Ethics
    2. Overview of Ethical Hacking
    3. Methodologies
    4. Methodology of Ethical Hacking
    5. Summary
  8. Chapter 2: Networking Foundations
    1. Communications Models
    2. Topologies
    3. Physical Networking
    4. IP
    5. TCP
    6. UDP
    7. Internet Control Message Protocol
    8. Network Architectures
    9. Cloud Computing
    10. Summary
  9. Chapter 3: Security Foundations
    1. The Triad
    2. Risk
    3. Policies, Standards, and Procedures
    4. Organizing Your Protections
    5. Security Technology
    6. Being Prepared
    7. Summary
    8. Review Questions
  10. Chapter 4: Footprinting and Reconnaissance
    1. Open Source Intelligence
    2. Domain Name System
    3. Passive Reconnaissance
    4. Website Intelligence
    5. Technology Intelligence
    6. Summary
  11. Chapter 5: Scanning Networks
    1. Ping Sweeps
    2. Port Scanning
    3. Vulnerability Scanning
    4. Packet Crafting and Manipulation
    5. Evasion Techniques
    6. Protecting and Detecting
    7. Summary
    8. Review Questions
  12. Chapter 6: Enumeration
    1. Service Enumeration
    2. Remote Procedure Calls
    3. Server Message Block
    4. Simple Network Management Protocol
    5. Simple Mail Transfer Protocol
    6. Web-Based Enumeration
    7. Summary
  13. Chapter 7: System Hacking
    1. Searching for Exploits
    2. System Compromise
    3. Gathering Passwords
    4. Password Cracking
    5. Client-Side Vulnerabilities
    6. Living Off the Land
    7. Fuzzing
    8. Post Exploitation
    9. Summary
    10. Review Questions
  14. Chapter 8: Malware
    1. Malware Types
    2. Malware Analysis
    3. Creating Malware
    4. Malware Infrastructure
    5. Antivirus Solutions
    6. Persistence
    7. Summary
    8. Review Questions
  15. Chapter 9: Sniffing
    1. Packet Capture
    2. Packet Analysis
    3. Spoofing Attacks
    4. Summary
    5. Review Questions
  16. Chapter 10: Social Engineering
    1. Social Engineering
    2. Physical Social Engineering
    3. Phishing Attacks
    4. Website Attacks
    5. Wireless Social Engineering
    6. Automating Social Engineering
    7. Summary
  17. Chapter 11: Wireless Security
    1. Wi-Fi
    2. Bluetooth
    3. Mobile Devices
    4. Summary
  18. Chapter 12: Attack and Defense
    1. Web Application Attacks
    2. Denial-of-Service Attacks
    3. Application Exploitation
    4. Lateral Movement
    5. Defense in Depth/Defense in Breadth
    6. Defensible Network Architecture
    7. Summary
  19. Chapter 13: Cryptography
    1. Basic Encryption
    2. Symmetric Key Cryptography
    3. Asymmetric Key Cryptography
    4. Certificate Authorities and Key Management
    5. Cryptographic Hashing
    6. PGP and S/MIME
    7. Disk and File Encryption
    8. Summary
  20. Chapter 14: Security Architecture and Design
    1. Data Classification
    2. Security Models
    3. Application Architecture
    4. Security Architecture
    5. Summary
  21. Chapter 15: Cloud Computing and the Internet of Things
    1. Cloud Computing Overview
    2. Cloud Architectures and Deployment
    3. Common Cloud Threats
    4. Internet of Things
    5. Operational Technology
    6. Summary
  22. Appendix: Answers to Review Questions
    1. Chapter 2: Networking Foundations
    2. Chapter 3: Security Foundations
    3. Chapter 4: Footprinting and Reconnaissance
    4. Chapter 5: Scanning Networks
    5. Chapter 6: Enumeration
    6. Chapter 7: System Hacking
    7. Chapter 8: Malware
    8. Chapter 9: Sniffing
    9. Chapter 10: Social Engineering
    10. Chapter 11: Wireless Security
    11. Chapter 12: Attack and Defense
    12. Chapter 13: Cryptography
    13. Chapter 14: Security Architecture and Design
    14. Chapter 15: Cloud Computing and the Internet of Things
  23. Index
  24. End User License Agreement
18.191.108.168