Skip to Content
CEH Certified Ethical Hacker Cert Guide, 5th Edition
book

CEH Certified Ethical Hacker Cert Guide, 5th Edition

by Omar Santos, Michael Gregg
August 2025
Intermediate to advanced
917 pages
19h 41m
English
Pearson IT Certification
Content preview from CEH Certified Ethical Hacker Cert Guide, 5th Edition

Chapter 5

Social Engineering, Malware Threats, and Vulnerability Analysis

This chapter covers the following topics:

  • Social Engineering: Social engineering will continue to be a real threat because it targets humans (which are considered the weakest link in cybersecurity).

  • Malware Threats: Adversaries use malware such as ransomware, viruses, worms, Trojans, root kits, keystroke loggers (keyloggers), and spyware to attack numerous organizations and individuals.

  • Vulnerability Analysis: Numerous methodologies are used to find and analyze security vulnerabilities and decrease the threat of malware.

This chapter covers the most common types of attacks and exploits. It starts by describing attacks against the weakest link, which is typically the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CEH Certified Ethical Hacker Cert Guide, 4th Edition

CEH Certified Ethical Hacker Cert Guide, 4th Edition

Michael Gregg, Omar Santos
CISSP Cert Guide, 5th Edition

CISSP Cert Guide, 5th Edition

Robin Abernathy, Darren R. Hayes

Publisher Resources

ISBN: 9780135485774