Cover image for CEH Prep Guide : The Comprehensive Guide to Certified Ethical Hacking.
CEH Prep Guide : The Comprehensive Guide to Certified Ethical Hacking.
Title:
CEH Prep Guide : The Comprehensive Guide to Certified Ethical Hacking.
Author:
Krutz, Ronald L.
ISBN:
9780470231388
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (770 pages)
Contents:
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking -- About the Authors -- Credits -- Contents -- Foreword -- Acknowledgments -- Introduction -- Exam Eligibility -- Part I: The Business and Legal Issues of Ethical Hacking -- Chapter 1: Introduction to Ethical Hacking -- Terminology -- Hacking History -- Ethical Hacking Objectives and Motivations -- Steps in Malicious Hacking -- Hacker and Ethical Hacker Characteristics and Operations -- Related Types of Computer Crime -- Assessment Questions -- Chapter 2: Legality and Ethics -- Law and Legal Systems -- Computer Crime Penalties -- Ethics -- Assessment Questions -- Chapter 3: Penetration Testing for Business -- Penetration Testing from a Business Perspective -- Justification of Penetration Testing through Risk Analysis -- Management Responsibilities in Risk Analysis Relating to Penetration Testing -- Assessment Questions -- Part II: The Pre-Attack Phases -- Chapter 4: Footprinting -- Gathering Information -- Locating the Network Range -- Assessment Questions -- Chapter 5: Scanning -- Identifying Active Machines -- Identifying Open Ports and Available Services -- War Dialing -- War Driving and War Walking -- Fingerprinting -- Mapping the Network -- Assessment Questions -- Chapter 6: Enumerating -- Protection Rings -- Windows Architecture -- Windows Security Elements -- Enumerating Techniques for Windows -- Countermeasures -- Assessment Questions -- Part III: Attack Techniques and Tools -- Chapter 7 System Hacking Techniques -- Password Guessing -- Privilege Escalation -- Password Cracking -- Covering Tracks -- Countermeasures -- Assessment Questions -- Chapter 8: Trojans, Backdoors, and Sniffers -- Trojans and Backdoors -- Sniffers -- Assessment Questions -- Chapter 9: Denial of Service Attacks and Session Hijacking -- Denial of Service/Distributed Denial of Service (DoS/DDoS).

Session Hijacking -- Assessment Questions -- Chapter 10: Penetration Testing Steps -- Penetration Testing Overview -- Legal and Ethical Implications -- The Three Pretest Phases -- Penetration Testing Tools and Techniques -- Wireless Network Penetration Testing -- Social Engineering -- Intrusion Detection System (IDS) -- Assessment Questions -- Chapter 11: Linux Hacking Tools -- Linux History -- Scanning Networks with Linux Tools -- Linux Hacking Tools -- Linux Rootkits -- Linux Security Tools -- Assessment Questions -- Chapter 12: Social Engineering and Physical Security -- Social Engineering -- Physical Security -- Assessment Questions -- Part IV: Web Server and Database Attacks -- Chapter 13: Web Server Hacking and Web Application Vulnerabilities -- Web Server Hacking -- Web Application Vulnerabilities -- Countermeasures -- Assessment Questions -- Chapter 14:SQL Injection Vulnerabilities -- SQL Injection Testing and Attacks -- SQL Injection Prevention and Remediation -- Automated SQL Injection Tools -- Assessment Questions -- Chapter 15: Cryptography -- Symmetric Key Cryptography -- Public Key Cryptosystems -- Public Key Certificates -- Cryptanalysis -- Managing Encryption Keys -- Email Security -- Electronic Transaction Security -- Wireless Security -- Disk Encryption -- Hacking Tools -- Assessment Questions -- Chapter 16: Cracking Web Passwords -- Authentication -- Password Considerations and Issues -- Assessment Questions -- Part V: Advanced Topics -- Chapter 17: Wireless Network Attacks and Countermeasures -- Wireless Technology -- The IEEE 802.11 Family -- WLAN Operational Modes -- The Wireless Application Protocol (WAP) -- Wired Equivalent Privacy (WEP) -- WPA and WPA2 -- 802.1x and EAP -- WLAN Threats -- Wireless Hacking Tools -- Securing WLANs -- Assessment Questions -- Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots.

Firewalls -- Intrusion Detection and Response -- Incident Handling -- Honeypots -- Assessment Questions -- Chapter 19: Viruses, Worms, and Buffer Overflows -- Viruses -- Worms -- Virus and Worm Examples -- Buffer Overflows -- Preventing Malicious Code and Buffer Overflows -- Assessment Questions -- Appendix A: Answers to Assessment Questions -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Chapter 16 -- Chapter 17 -- Chapter 18 -- Chapter 19 -- Appendix B: Glossary of Terms and Acronyms -- Appendix C: What's on the CD -- System Requirements -- Using the CD -- What's on the CD -- Troubleshooting -- Customer Care -- Index.
Abstract:
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: