CEH Certified Ethical Hacker Cert Guide, 4th Edition

Book description

In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. The authors’ concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

Related Content

Video: Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition
Live Course: Ethical Hacking, Pen Testing, Red Teaming and Bug Hunting Deep Dive

Every feature of this book supports both efficient exam preparation and long-term mastery:

* Opening topics lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives

* Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success

* Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career

* Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology This study guide helps you master all the topics on the latest CEH exam, including

* Ethical hacking basics

* Technical foundations of hacking

* Footprinting and scanning

* Enumeration and system hacking

* Social engineering, malware threats, and vulnerability analysis

* Sniffers, session hijacking, and denial of service

* Web server hacking, web applications, and database attacks

* Wireless technologies, mobile security, and mobile attacks

* IDS, firewalls, and honeypots

* Cryptographic attacks and defenses

* Cloud computing, IoT, and botnets

.

Table of contents

  1. Cover Page
  2. About This eBook
  3. Title Page
  4. Copyright Page
  5. Pearson’s Commitment to Diversity, Equity, and Inclusion
  6. Contents at a Glance
  7. Table of Contents
  8. About the Authors
  9. Dedications
  10. Acknowledgments
  11. About the Technical Reviewer
  12. We Want to Hear from You!
  13. Reader Services
  14. Introduction
    1. How to Use This Book
    2. Companion Website
    3. Pearson Test Prep Practice Test Software
    4. Goals and Methods
    5. Who Should Read This Book?
    6. Strategies for Exam Preparation
    7. How This Book Is Organized
  15. Figure Credits
  16. Chapter 1. An Introduction to Ethical Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Security Fundamentals
    4. Security Testing
    5. Cyber Kill Chain
    6. Hacker and Cracker Descriptions
    7. Ethical Hackers
    8. Test Plans—Keeping It Legal
    9. Ethics and Legality
    10. Summary
    11. Exam Preparation Tasks
    12. Review All Key Topics
    13. Define Key Terms
    14. Exercises
    15. Review Questions
    16. Suggested Reading and Resources
  17. Chapter 2. The Technical Foundations of Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. The Hacking Process
    4. The Ethical Hacker’s Process
    5. Information Security Systems and the Stack
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercises
    11. Review Questions
    12. Suggested Reading and Resources
  18. Chapter 3. Footprinting, Reconnaissance, and Scanning
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Footprinting
    4. Scanning
    5. Summary
    6. Exam Preparation Tasks
    7. Review All Key Topics
    8. Define Key Terms
    9. Exercises
    10. Review Questions
    11. Suggested Reading and Resources
  19. Chapter 4. Enumeration and System Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Enumeration
    4. System Hacking
    5. Summary
    6. Exam Preparation Tasks
    7. Review All Key Topics
    8. Define Key Terms
    9. Exercise
    10. Review Questions
    11. Suggested Reading and Resources
  20. Chapter 5. Social Engineering, Malware Threats, and Vulnerability Analysis
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Social Engineering
    4. Malware Threats
    5. Vulnerability Analysis
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Command Reference to Check Your Memory
    11. Exercises
    12. Review Questions
    13. Suggested Reading and Resources
  21. Chapter 6. Sniffers, Session Hijacking, and Denial of Service
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Sniffers
    4. Session Hijacking
    5. Denial of Service and Distributed Denial of Service
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercises
    11. Review Questions
    12. Suggested Reading and Resources
  22. Chapter 7. Web Server Hacking, Web Applications, and Database Attacks
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Web Server Hacking
    4. Web Application Hacking
    5. Database Hacking
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Exercise
    10. Review Questions
    11. Suggested Reading and Resources
  23. Chapter 8. Wireless Technologies, Mobile Security, and Attacks
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Wireless and Mobile Device Technologies
    4. Wi-Fi
    5. Summary
    6. Exam Preparation Tasks
    7. Review All Key Topics
    8. Define Key Terms
    9. Review Questions
    10. Suggested Reading and Resources
  24. Chapter 9. Evading IDS, Firewalls, and Honeypots
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Intrusion Detection and Prevention Systems
    4. Firewalls
    5. Honeypots
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
    11. Suggested Reading and Resources
  25. Chapter 10. Cryptographic Attacks and Defenses
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Cryptography History and Concepts
    4. Encryption Algorithms
    5. Public Key Infrastructure
    6. Email and Disk Encryption
    7. Cryptoanalysis and Attacks
    8. Security Protocols and Countermeasures
    9. Summary
    10. Exam Preparation Tasks
    11. Review All Key Topics
    12. Define Key Terms
    13. Exercises
    14. Review Questions
    15. Suggested Reading and Resources
  26. Chapter 11. Cloud Computing, IoT, and Botnets
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Cloud Computing
    4. IoT
    5. Botnets
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
    11. Suggested Reading and Resources
  27. Chapter 12. Final Preparation
    1. Hands-on Activities
    2. Suggested Plan for Final Review and Study
    3. Summary
  28. Glossary of Key Terms
  29. Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions
  30. Appendix B. CEH Certified Ethical Hacker Cert Guide Exam Updates
    1. Always Get the Latest at the Book’s Product Page
    2. Technical Content
  31. Index
  32. Appendix C. Study Planner
  33. Where are the companion content files? - Register
  34. Inside Front Cover
  35. Inside Back Cover
  36. Code Snippets

Product information

  • Title: CEH Certified Ethical Hacker Cert Guide, 4th Edition
  • Author(s): Michael Gregg, Omar Santos
  • Release date: February 2022
  • Publisher(s): Pearson IT Certification
  • ISBN: 9780137489930