O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition

Book Description

Learn, prepare, and practice for CEH version 9 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification.

  • Master CEH exam topics

  • Assess your knowledge with chapter-ending quizzes

  • Review key concepts with exam preparation tasks

  • Practice with realistic exam questions with the powerful Pearson IT Certification Practice Test engine

  • Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

    You'll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.

    The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers students a wealth of customization options and reporting features, laying out a complete assessment of their knowledge to help them focus their study where it is needed most.  Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps students master the concepts and techniques that will enable them to succeed on the exam the first time.

    Table of Contents

    1. About This E-Book
    2. Title Page
    3. Copyright Page
    4. Contents at a Glance
    5. Contents
    6. About the Author
    7. Dedication
    8. Acknowledgments
    9. We Want to Hear from You!
    10. Reader Services
    11. Introduction
      1. How to Use This Book
      2. Companion Website
      3. Pearson Test Prep Practice Test Software
        1. Accessing the Pearson Test Prep Software Online
        2. Accessing the Pearson Test Prep Software Offline
        3. Customizing Your Exams
        4. Updating Your Exams
        5. Premium Edition eBook and Practice Tests
        6. End-of-Chapter Review Tools
      4. Goals and Methods
      5. Who Should Read This Book?
      6. Strategies for Exam Preparation
      7. How This Book Is Organized
    12. Chapter 1. An Introduction to Ethical Hacking
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Security Fundamentals
        2. Security Testing
        3. Hacker and Cracker Descriptions
        4. Ethical Hackers
        5. Test Plans—Keeping It Legal
        6. Ethics and Legality
        7. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Hands-On Labs
        4. Review Questions
        5. Suggested Reading and Resources
    13. Chapter 2. The Technical Foundations of Hacking
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. The Attacker’s Process
        2. The Ethical Hacker’s Process
        3. Security and the Stack
        4. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Complete the Tables from Memory
        3. Define Key Terms
        4. Exercises
        5. Review Questions
        6. Suggested Reading and Resources
    14. Chapter 3. Footprinting and Scanning
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Overview of the Seven-Step Information-Gathering Process
        2. Information Gathering
        3. Determining the Network Range
        4. Identifying Active Machines
        5. Finding Open Ports and Access Points
        6. OS Fingerprinting
        7. Fingerprinting Services
        8. Mapping the Network Attack Surface
        9. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Complete the Tables from Memory
        4. Command Reference to Check Your Memory
        5. Exercises
        6. Review Questions
        7. Suggested Reading and Resources
    15. Chapter 4. Enumeration and System Hacking
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Enumeration
        2. System Hacking
        3. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Complete the Tables from Memory
        4. Command Reference to Check Your Memory
        5. Exercise
        6. Review Questions
        7. Suggested Reading and Resources
    16. Chapter 5. Malware Threats
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Viruses and Worms
        2. Trojans
        3. Covert Communication
        4. Keystroke Logging and Spyware
        5. Malware Countermeasures
        6. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Command Reference to Check Your Memory
        4. Exercises
        5. Review Questions
        6. Suggested Reading and Resources
    17. Chapter 6. Sniffers, Session Hijacking, and Denial of Service
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Sniffers
        2. Session Hijacking
        3. Denial of Service and Distributed Denial of Service
        4. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Exercises
        4. Review Questions
        5. Suggested Reading and Resources
    18. Chapter 7. Web Server Hacking, Web Applications, and Database Attacks
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Web Server Hacking
        2. Web Application Hacking
        3. Database Hacking
        4. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Exercise
        3. Review Questions
        4. Suggested Reading and Resources
    19. Chapter 8. Wireless Technologies, Mobile Security, and Attacks
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Wireless Technologies
        2. Mobile Device Operation and Security
        3. Wireless LANs
        4. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Review Questions
        4. Suggested Reading and Resources
    20. Chapter 9. IDS, Firewalls, and Honeypots
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Intrusion Detection Systems
        2. Firewalls
        3. Honeypots
        4. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Review Questions
        4. Suggested Reading and Resources
    21. Chapter 10. Physical Security and Social Engineering
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Physical Security
        2. Social Engineering
        3. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Exercise
        4. Review Questions
        5. Suggested Reading and Resources
    22. Chapter 11. Cryptographic Attacks and Defenses
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Functions of Cryptography
        2. History of Cryptography
        3. Algorithms
        4. Public Key Infrastructure
        5. Protocols, Applications, and Attacks
        6. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Exercises
        4. Review Questions
        5. Suggested Reading and Resources
    23. Chapter 12. Cloud Computing and Botnets
      1. “Do I Know This Already?” Quiz
      2. Foundation Topics
        1. Cloud Computing
        2. Botnets
        3. Summary
      3. Exam Preparation Tasks
        1. Review All Key Topics
        2. Define Key Terms
        3. Exercise
        4. Review Questions
        5. Suggested Reading and Resources
    24. Chapter 13. Final Preparation
      1. Hands-on Activities
      2. Suggested Plan for Final Review and Study
      3. Summary
    25. Glossary
    26. Index
    27. Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions
      1. Chapter 1
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      2. Chapter 2
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      3. Chapter 3
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      4. Chapter 4
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      5. Chapter 5
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      6. Chapter 6
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      7. Chapter 7
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      8. Chapter 8
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      9. Chapter 9
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      10. Chapter 10
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      11. Chapter 11
        1. “Do I Know This Already?” Quiz
        2. Review Questions
      12. Chapter 12
        1. “Do I Know This Already?” Quiz
        2. Review Questions
    28. Appendix B. Memory Tables
      1. Chapter 2
      2. Chapter 3
      3. Chapter 4
      4. Chapter 5
    29. Appendix C. Memory Tables Answer Key
      1. Chapter 2
      2. Chapter 3
      3. Chapter 4
      4. Chapter 5
    30. Inside Front Cover
    31. Inside Back Cover
    32. Access Card
    33. Where are the companion content files?
    34. Code Snippets