O'Reilly logo

Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition by Omar Santos, Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Credit

Cover image © Chainarong06/Shutterstock.

Chapter opener images © Charlie Edwards/Photodisc/Getty Images.

Chapter 1, quote from the Electronic Communication Privacy Act from U.S. Code Sections 2510 and 2701.

Chapter 1, section “Payment Card Industry Data Security Standard (PCI-DSS),” list of PCI-DSS requirements from PCI-DSS.

Chapter 2, section “NIST SP 800-15,” four stages of security assessment, from “Technical Guide to Information Security Testing and Assessment,” https://www.nist.gov/publications/technical-guide-information-security-testing-and-assessment.

Chapter 2, section “Open Source Security Testing Methodology Manual,” OSSTMM list of key points from OSSTMM.org.

Figure 2-3, screenshot of Wireshark © Wireshark Foundation.

Figure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required