O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition

Book Description

In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors' concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

 

Every feature of this book supports both efficient exam preparation and long-term mastery:

· Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives

· Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success

· Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career

· Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology

 

This study guide helps you master all the topics on the latest CEH exam, including

· Ethical hacking basics

· Technical foundations of hacking

· Footprinting and scanning

· Enumeration and system hacking

· Social engineering, malware threats, and vulnerability analysis

· Sniffers, session hijacking, and denial of service

· Web server hacking, web applications, and database attacks

· Wireless technologies, mobile security, and mobile attacks

· IDS, firewalls, and honeypots

· Cryptographic attacks and defenses

· Cloud computing, IoT, and botnets

Table of Contents

  1. Cover Page
  2. About This E-Book
  3. Title Page
  4. Copyright Page
  5. Contents at a Glance
  6. Table of Contents
  7. About the Authors
  8. Dedications
  9. Acknowledgments
  10. We Want to Hear from You!
  11. Reader Services
  12. Introduction
    1. How to Use This Book
    2. Companion Website
    3. Pearson Test Prep Practice Test Software
    4. Goals and Methods
    5. Who Should Read This Book?
    6. Strategies for Exam Preparation
    7. How This Book Is Organized
  13. Credit
  14. Chapter 1. An Introduction to Ethical Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Security Fundamentals
    4. Security Testing
    5. Hacker and Cracker Descriptions
    6. Ethical Hackers
    7. Test Plans—Keeping It Legal
    8. Ethics and Legality
    9. Summary
    10. Exam Preparation Tasks
    11. Review All Key Topics
    12. Define Key Terms
    13. Exercises
    14. Review Questions
    15. Suggested Reading and Resources
  15. Chapter 2. The Technical Foundations of Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. The Hacking Process
    4. The Ethical Hacker’s Process
    5. Information Security Systems and the Stack
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercises
    11. Review Questions
    12. Suggested Reading and Resources
  16. Chapter 3. Footprinting and Scanning
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Overview of the Seven-Step Information-Gathering Process
    4. Information Gathering
    5. Determining the Network Range
    6. Identifying Active Machines
    7. Finding Open Ports and Access Points
    8. OS Fingerprinting
    9. Fingerprinting Services
    10. Mapping the Network Attack Surface
    11. Summary
    12. Exam Preparation Tasks
    13. Review All Key Topics
    14. Define Key Terms
    15. Exercises
    16. Review Questions
    17. Suggested Reading and Resources
  17. Chapter 4. Enumeration and System Hacking
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Enumeration
    4. System Hacking
    5. Summary
    6. Exam Preparation Tasks
    7. Review All Key Topics
    8. Define Key Terms
    9. Exercise
    10. Review Questions
    11. Suggested Reading and Resources
  18. Chapter 5. Social Engineering, Malware Threats, and Vulnerability Analysis
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Social Engineering
    4. Malware Threats
    5. Vulnerability Analysis
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Command Reference to Check Your Memory
    11. Exercises
    12. Review Questions
    13. Suggested Reading and Resources
  19. Chapter 6. Sniffers, Session Hijacking, and Denial of Service
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Sniffers
    4. Session Hijacking
    5. Denial of Service and Distributed Denial of Service
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercises
    11. Review Questions
    12. Suggested Reading and Resources
  20. Chapter 7. Web Server Hacking, Web Applications, and Database Attacks
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Web Server Hacking
    4. Web Application Hacking
    5. Database Hacking
    6. SQL Injection Hacking Tools
    7. Summary
    8. Exam Preparation Tasks
    9. Review All Key Topics
    10. Exercise
    11. Review Questions
    12. Suggested Reading and Resources
  21. Chapter 8. Wireless Technologies, Mobile Security, and Attacks
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Wireless Technologies
    4. Mobile Device Operation and Security
    5. Wireless LANs
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
    11. Suggested Reading and Resources
  22. Chapter 9. IDS, Firewalls, And Honeypots
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Intrusion Detection and Prevention Systems
    4. Firewalls
    5. Honeypots
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
    11. Suggested Reading and Resources
  23. Chapter 10. Cryptographic Attacks and Defenses
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Functions of Cryptography
    4. History of Cryptography
    5. Algorithms
    6. Public Key Infrastructure
    7. Protocols, Applications, and Attacks
    8. Summary
    9. Exam Preparation Tasks
    10. Review All Key Topics
    11. Define Key Terms
    12. Exercises
    13. Review Questions
    14. Suggested Reading and Resources
  24. Chapter 11. Cloud Computing, IoT, And Botnets
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Cloud Computing
    4. IoT
    5. Botnets
    6. Summary
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Exercise
    11. Review Questions
    12. Suggested Reading and Resources
  25. Chapter 12. Final Preparation
    1. Hands-on Activities
    2. Suggested Plan for Final Review and Study
    3. Summary
  26. Glossary
  27. Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions
  28. Index
  29. Where are the companion content files? - Login
  30. Where are the companion content files? - Register
  31. Code Snippets