Atnaujinkite slapukų nuostatas

El. knyga: CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition

3.98/5 (295 ratings by Goodreads)
  • Formatas: 608 pages
  • Išleidimo metai: 05-Nov-2021
  • Leidėjas: McGraw-Hill Education
  • Kalba: eng
  • ISBN-13: 9781264269952
Kitos knygos pagal šią temą:
  • Formatas: 608 pages
  • Išleidimo metai: 05-Nov-2021
  • Leidėjas: McGraw-Hill Education
  • Kalba: eng
  • ISBN-13: 9781264269952
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Up-to-date coverage of every topic on the CEH v11 exam

Thoroughly updated for CEH v11 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.

Covers all exam topics, including:

  • Ethical hacking fundamentals
  • Reconnaissance and footprinting
  • Scanning and enumeration
  • Sniffing and evasion
  • Attacking a system
  • Hacking web servers and applications
  • Wireless network hacking
  • Mobile, IoT, and OT
  • Security in cloud computing
  • Trojans and other attacks, including malware analysis
  • Cryptography
  • Social engineering and physical security
  • Penetration testing

Online content includes:

  • 300 practice exam questions
  • Test engine that provides full-length practice exams and customized quizzes by chapter or exam domain

Acknowledgments xv
Introduction xvii
Chapter 1 Getting Started: Essential Knowledge 1(50)
Security 101
2(23)
Essentials
2(13)
Security Basics
15(10)
Introduction to Ethical Hacking
25(17)
Hacking Terminology
26(8)
The Ethical Hacker
34(8)
Review
42(3)
Questions
45(3)
Answers
48(3)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker 51(38)
Footprinting
52(5)
Passive Footprinting
54(2)
Active Footprinting
56(1)
Footprinting Methods and Tools
57(26)
Search Engines
57(9)
Website and E-mail Footprinting
66(1)
DNS Footprinting
67(12)
Network Footprinting
79(2)
Other Tools
81(2)
Review
83(2)
Questions
85(2)
Answers
87(2)
Chapter 3 Scanning and Enumeration 89(54)
Fundamentals
90(12)
TCP/IP Networking
90(8)
Subnetting
98(4)
Scanning Methodology
102(19)
Identifying Targets
103(3)
Port Scanning
106(10)
Evasion
116(3)
Vulnerability Scanning
119(2)
Enumeration
121(10)
Windows System Basics
121(2)
Unix/Linux System Basics
123(1)
Enumeration Techniques
124(7)
Review
131(6)
Questions
137(3)
Answers
140(3)
Chapter 4 Sniffing and Evasion 143(46)
Essentials
144(13)
Network Knowledge for Sniffing
144(12)
Active and Passive Sniffing
156(1)
Sniffing Tools and Techniques
157(8)
Techniques
157(5)
Tools
162(3)
Evasion
165(15)
Devices Aligned Against You
166(8)
Evasion Techniques
174(6)
Review
180(4)
Questions
184(3)
Answers
187(2)
Chapter 5 Attacking a System 189(46)
Getting Started
190(16)
Windows Security Architecture
190(8)
Linux Security Architecture
198(5)
Methodology
203(3)
Hacking Steps
206(20)
Authentication and Passwords
207(9)
Privilege Escalation and Executing Applications
216(3)
Hiding Files and Covering Tracks
219(7)
Review
226(4)
Questions
230(2)
Answers
232(3)
Chapter 6 Web-Based Hacking: Servers and Applications 235(44)
Web Servers
236(20)
Nonprofit Organizations Promoting Web Security
236(5)
Attack Methodology
241(1)
Web Server Architecture
242(8)
Web Server Attacks
250(6)
Attacking Web Applications
256(14)
Application Attacks
257(12)
Countermeasures
269(1)
Review
270(4)
Questions
274(3)
Answers
277(2)
Chapter 7 Wireless Network Hacking 279(26)
Wireless Networking
280(18)
Wireless Terminology, Architecture, and Standards
280(9)
Wireless Hacking
289(9)
Review
298(3)
Questions
301(2)
Answers
303(2)
Chapter 8 Mobile Communications and the IoT 305(38)
The Mobile World
306(11)
Mobile Vulnerabilities and Risks
307(4)
Mobile Platforms and Attacks
311(6)
IoT
317(14)
IoT Architecture
318(2)
IoT Vulnerabilities and Attacks
320(7)
IoT Hacking Methodology
327(4)
OT Hacking
331(4)
Definition and Concepts
332(2)
Security Concerns
334(1)
Review
335(4)
Questions
339(3)
Answers
342(1)
Chapter 9 Security in Cloud Computing 343(28)
Cloud Computing
344(8)
Cloud Computing Service Types
346(3)
Cloud Deployment Models
349(3)
Cloud Security
352(11)
Cloud Threats
354(5)
Cloud Attacks and Mitigations
359(1)
Cloud Hacking
360(3)
Review
363(3)
Questions
366(2)
Answers
368(3)
Chapter 10 Trojans and Other Attacks 371(38)
The "Malware" Attacks
372(19)
Trojans
375(4)
Viruses and Worms
379(6)
Fileless Malware
385(2)
Malware Analysis
387(2)
Malware Countermeasures
389(2)
Remaining Attacks
391(8)
Denial of Service
391(4)
Session Hijacking
395(4)
Review
399(5)
Questions
404(2)
Answers
406(3)
Chapter 11 Cryptography 101 409(44)
Cryptography and Encryption Overview
410(14)
Terminology
410(1)
Encryption Algorithms and Techniques
411(13)
PKI the Digital Certificate, and Digital Signatures
424(9)
The PM System
425(3)
Digital Certificates
428(4)
Digital Signatures
432(1)
To Sum Up
433(1)
Encrypted Communication and Cryptography Attacks
433(10)
Encrypted Communication
436(5)
Cryptography Attacks
441(2)
Review
443(4)
Questions
447(3)
Answers
450(3)
Chapter 12 Low Tech: Social Engineering and Physical Security 453(32)
Social Engineering
454(18)
Human-Based Social Engineering Attacks
456(6)
Computer-Based Attacks
462(6)
Mobile-Based Attacks
468(1)
Preventing Social Engineering Attacks
469(3)
Physical Security
472(7)
Physical Security 101
472(6)
Testing Physical Security
478(1)
Review
479(2)
Questions
481(3)
Answers
484(1)
Chapter 13 The Pen Test: Putting It All Together 485(18)
Methodology and Steps
486(10)
Security Assessments
487(7)
Security Assessment Deliverables
494(2)
Guidelines
496(1)
More Terminology
496(2)
Review
498(2)
Questions
500(2)
Answers
502(1)
Appendix A Tool, Sites, and References 503(24)
Vulnerability Research Sites
503(1)
Footprinting Tools
504(3)
Scanning and Enumeration Tools
507(3)
System Hacking Tools
510(5)
Cryptography and Encryption
515(1)
Sniffing
516(1)
Wireless
517(1)
Mobile and IoT
518(3)
Trojans and Malware
521(2)
Web Attacks
523(1)
Miscellaneous
524(1)
Tools, Sites, and References Disclaimer
525(2)
Appendix B About the Online Content 527(4)
System Requirements
527(1)
Your Total Seminars Training Hub Account
527(1)
Privacy Notice
527(1)
Single User License Terms and Conditions
527(2)
TotalTester Online
529(1)
Technical Support
529(2)
Glossary 531(32)
Index 563
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).