Table of Contents
Preface
Section 1: Where Every Hacker Starts
Chapter 1: Understanding Ethical Hacking
The benefits of the CEH certification
Is the CEH certification right for you?
The requirements and the skills you need to become a CEH
Ethical hacking
What is information security?
An overview of information security
The CIA triad
Types of cyberattacks
The technology triangle
Types of hackers
Hacking phases
The purpose/goal of cyberattacks
The Cyber Kill Chain – understanding attackers and their methods
Tactics, techniques, and procedures
Adversary behavior identification
Indicators of compromise
Information security controls
Enter ethical hacking
The importance of ethical hacking
Understanding defense-in-depth strategies
Information security ...
Get Certified Ethical Hacker (CEH) v12 312-50 Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.