Cover image for CEH Certified Ethical Hacker Study Guide : Certified Ethical Hacker Study Guide.
CEH Certified Ethical Hacker Study Guide : Certified Ethical Hacker Study Guide.
Title:
CEH Certified Ethical Hacker Study Guide : Certified Ethical Hacker Study Guide.
Author:
Graves, Kimberly.
ISBN:
9780470642863
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (439 pages)
Contents:
CEH: Certified Ethical Hacker Study Guide -- Acknowledgments -- About the Author -- Contents at a Glance -- Contents -- Table of Exercises -- Introduction -- Assessment Test -- Answers to Assessment Test -- Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality -- Defining Ethical Hacking -- How to Be Ethical -- Keeping It Legal -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering -- Reconnaissance -- Information-Gathering Methodology -- Social Engineering -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 3: Gathering Network and Host Information: Scanning and Enumeration -- Scanning -- Enumeration -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files -- The Simplest Way to Get a Password -- Types of Passwords -- Cracking a Password -- Understanding Keyloggers and Other Spyware Technologies -- Escalating Privileges -- Understanding Rootkits -- Hiding Files -- Understanding Steganography Technologies -- Covering Your Tracks and Erasing Evidence -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 5: Trojans, Backdoors, Viruses, and Worms -- Trojans and Backdoors -- Viruses and Worms -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 6: Gathering Data from Networks: Sniffers -- Understanding Host-to-Host Communication -- How a Sniffer Works -- Sniffing Countermeasures -- Bypassing the Limitations of Switches -- Wireshark Filters -- Understanding MAC Flooding and DNS Spoofing -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions.

Chapter 7: Denial of Service and Session Hijacking -- Denial of Service -- Session Hijacking -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques -- How Web Servers Work -- Types of Web Server Vulnerabilities -- Web Application Vulnerabilities -- Web-Based Password-Cracking Techniques -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows -- SQL Injection -- Buffer Overflows -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 10: Wireless Network Hacking -- Wi-Fi and Ethernet -- Authentication and Cracking Techniques -- Using Wireless Sniffers to Locate SSIDs -- MAC Filters and MAC Spoofing -- Rogue Access Points -- Wireless Hacking Techniques -- Securing Wireless Networks -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 11: Physical Site Security -- Components of Physical Security -- Understanding Physical Security -- Physical Site Security Countermeasures -- What to Do After a Security Breach Occurs -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 12: Hacking Linux Systems -- Linux Basics -- Compiling a Linux Kernel -- GCC Compilation Commands -- Installing Linux Kernel Modules -- Linux Hardening Methods -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls -- Types of IDSs and Evasion Techniques -- Firewall Types and Honeypot Evasion Techniques -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 14: Cryptography.

Cryptography and Encryption Techniques -- Generating Public and Private Keys -- Cryptography Algorithms -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 15: Performing a Penetration Test -- Defining Security Assessments -- Penetration Testing -- Pen Test Deliverables -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Appendix: About the Companion CD -- Glossary -- Index.
Abstract:
Full Coverage of All Exam Objectives for the CEH Exams 312-50and EC0-350 Thoroughly prepare for the challenging CEH Certified EthicalHackers exam with this comprehensive study guide. The book providesfull coverage of exam topics, real-world examples,and includes a CD with chapter review questions, twofull-length practice exams, electronic flashcards, a glossary ofkey terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning,enumeration, system hacking, trojans and backdoors, sniffers,denial of service, social engineering, session hijacking, hackingWeb servers, Web application vulnerabilities, and moreWalks you through exam topics and includes plenty of real-worldscenarios to help reinforce conceptsIncludes a CD with an assessment test, review questions,practice exams, electronic flashcards, and the entire book in asearchable pdf.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: