Atnaujinkite slapukų nuostatas

El. knyga: CEH Certified Ethical Hacker Bundle, Fifth Edition

  • Formatas: PDF+DRM
  • Išleidimo metai: 05-Aug-2022
  • Leidėjas: McGraw-Hill Education
  • Kalba: eng
  • ISBN-13: 9781264274772
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Išleidimo metai: 05-Aug-2022
  • Leidėjas: McGraw-Hill Education
  • Kalba: eng
  • ISBN-13: 9781264274772
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.

This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they’ve learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams.

This edition features up-to-date coverage of all nine domains of the CEH v11 exam and the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaingin  access and clearing tracks.

  • In all, the bundle includes more than 900 accurate questions with detailed answer explanations
  • Online content includes test engine that provides full-length practice exams and customizable quizzes by chapter or exam domain
  • This bundle is 33% cheaper than buying the two books separately

CEH™ Certified Ethical Hacker
EXAM GUIDE
Acknowledgments xv
Introduction xvii
Chapter 1 Getting Started: Essential Knowledge
1(50)
Security 101
2(1)
Essentials
2(13)
Security Basics
15(10)
Introduction to Ethical Hacking
25(1)
Hacking Terminology
26(8)
The Ethical Hacker
34(8)
Chapter Review
42(3)
Questions
45(3)
Answers
48(3)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
51(38)
Footprinting
52(2)
Passive Footprinting
54(2)
Active Footprinting
56(1)
Footprinting Methods and Tools
57(1)
Search Engines
57(9)
Website and E-mail Footprinting
66(1)
DNS Footprinting
67(12)
Network Footprinting
79(2)
Other Tools
81(2)
Chapter Review
83(2)
Questions
85(2)
Answers
87(2)
Chapter 3 Scanning and Enumeration
89(54)
Fundamentals
90(1)
TCP/IP Networking
90(8)
Subnetting
98(4)
Scanning Methodology
102(1)
Identifying Targets
103(3)
Port Scanning
106(10)
Evasion
116(3)
Vulnerability Scanning
119(2)
Enumeration
121(1)
Windows System Basics
121(2)
Unix/Linux System Basics
123(1)
Enumeration Techniques
124(7)
Chapter Review
131(6)
Questions
137(3)
Answers
140(3)
Chapter 4 Sniffing and Evasion
143(46)
Essentials
144(1)
Network Knowledge for Sniffing
144(12)
Active and Passive Sniffing
156(1)
Sniffing Tools and Techniques
157(1)
Techniques
157(5)
Tools
162(3)
Evasion
165(1)
Devices Aligned Against You
166(8)
Evasion Techniques
174(6)
Chapter Review
180(4)
Questions
184(3)
Answers
187(2)
Chapter 5 Attacking a System
189(46)
Getting Started
190(1)
Windows Security Architecture
190(8)
Linux Security Architecture
198(5)
Methodology
203(3)
Hacking Steps
206(1)
Authentication and Passwords
207(9)
Privilege Escalation and Executing Applications
216(3)
Hiding Files and Covering Tracks
219(7)
Chapter Review
226(4)
Questions
230(2)
Answers
232(3)
Chapter 6 Web-Based Hacking: Servers and Applications
235(44)
Web Servers
236(1)
Nonprofit Organizations Promoting Web Security
236(5)
Attack Methodology
241(1)
Web Server Architecture
242(8)
Web Server Attacks
250(6)
Attacking Web Applications
256(1)
Application Attacks
257(12)
Countermeasures
269(1)
Chapter Review
270(4)
Questions
274(3)
Answers
277(2)
Chapter 7 Wireless Network Hacking
279(26)
Wireless Networking
280(1)
Wireless Terminology, Architecture, and Standards
280(9)
Wireless Hacking
289(9)
Chapter Review
298(3)
Questions
301(2)
Answers
303(2)
Chapter 8 Mobile Communications and the loT
305(38)
The Mobile World
306(1)
Mobile Vulnerabilities and Risks
307(4)
Mobile Platforms and Attacks
311(6)
IoT
317(1)
IoT Architecture
318(2)
IoT Vulnerabilities and Attacks
320(7)
IoT Hacking Methodology
327(4)
OT Hacking
331(1)
Definition and Concepts
332(2)
Security Concerns
334(1)
Chapter Review
335(4)
Questions
339(3)
Answers
342(1)
Chapter 9 Security in Cloud Computing
343(28)
Cloud Computing
344(2)
Cloud Computing Service Types
346(3)
Cloud Deployment Models
349(3)
Cloud Security
352(2)
Cloud Threats
354(5)
Cloud Attacks and Mitigations
359(1)
Cloud Hacking
360(3)
Chapter Review
363(3)
Questions
366(2)
Answers
368(3)
Chapter 10 Trojans and Other Attacks
371(38)
The "Malware" Attacks
372(3)
Trojans
375(4)
Viruses and Worms
379(6)
Fileless Malware
385(2)
Malware Analysis
387(2)
Malware Countermeasures
389(2)
Remaining Attacks
391(1)
Denial of Service
391(4)
Session Hijacking
395(4)
Chapter Review
399(5)
Questions
404(2)
Answers
406(3)
Chapter 11 Cryptography 101
409(44)
Cryptography and Encryption Overview
410(1)
Terminology
410(1)
Encryption Algorithms and Techniques
411(13)
PKI, the Digital Certificate, and Digital Signatures
424(1)
The PKI System
425(3)
Digital Certificates
428(4)
Digital Signatures
432(1)
To Sum Up
433(1)
Encrypted Communication and Cryptography Attacks
433(3)
Encrypted Communication
436(5)
Cryptography Attacks
441(2)
Chapter Review
443(4)
Questions
447(3)
Answers
450(3)
Chapter 12 Low Tech: Social Engineering and Physical Security
453(32)
Social Engineering
454(2)
Human-Based Social Engineering Attacks
456(6)
Computer-Based Attacks
462(6)
Mobile-Based Attacks
468(1)
Preventing Social Engineering Attacks
469(3)
Physical Security
472(1)
Physical Security 101
472(6)
Testing Physical Security
478(1)
Chapter Review
479(2)
Questions
481(3)
Answers
484(1)
Chapter 13 The Pen Test: Putting It All Together
485(18)
Methodology and Steps
486(1)
Security Assessments
487(7)
Security Assessment Deliverables
494(2)
Guidelines
496(1)
More Terminology
496(2)
Chapter Review
498(2)
Questions
500(2)
Answers
502(1)
Appendix A Tool, Sites, and References
503(24)
Vulnerability Research Sites
503(1)
Footprinting Tools
504(3)
Scanning and Enumeration Tools
507(3)
System Hacking Tools
510(5)
Cryptography and Encryption
515(1)
Sniffing
516(1)
Wireless
517(1)
Mobile and IoT
518(3)
Trojans and Malware
521(2)
Web Attacks
523(1)
Miscellaneous
524(1)
Tools, Sites, and References Disclaimer
525(2)
Appendix B About the Online Content
527
System Requirements
527(1)
Your Total Seminars Training Hub Account
527(1)
Privacy Notice
527(1)
Single User License Terms and Conditions
527(2)
TotalTester Online
529(1)
Technical Support
529
Glossary 531(32)
Index 563
CEH™ Certified Ethical Hacker Practice Exams
Acknowledgments xi
Introduction xiii
Chapter 1 Getting Started: Essential Knowledge
1(28)
Questions
3(5)
Quick Answer Key
8(1)
Answers
9(20)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
29(28)
Questions
31(7)
Quick Answer Key
38(1)
Answers
39(18)
Chapter 3 Scanning and Enumeration
57(28)
Questions
59(7)
Quick Answer Key
66(1)
Answers
67(18)
Chapter 4 Sniffing and Evasion
85(26)
Questions
87(6)
Quick Answer Key
93(1)
Answers
94(17)
Chapter 5 Attacking a System
111(26)
Questions
113(7)
Quick Answer Key
120(1)
Answers
121(16)
Chapter 6 Web-Based Hacking: Servers and Applications
137(28)
Questions
139(6)
Quick Answer Key
145(1)
Answers
146(19)
Chapter 7 Wireless Network Hacking
165(22)
Questions
167(5)
Quick Answer Key
172(1)
Answers
173(14)
Chapter 8 Mobile Communications and the IoT
187(20)
Questions
190(4)
Quick Answer Key
194(1)
Answers
195(12)
Chapter 9 Security in Cloud Computing
207(20)
Questions
209(4)
Quick Answer Key
213(1)
Answers
214(13)
Chapter 10 Trojans and Other Attacks
227(26)
Questions
229(6)
Quick Answer Key
235(1)
Answers
236(17)
Chapter 11 Cryptography 101
253(26)
Questions
255(6)
Quick Answer Key
261(1)
Answers
262(17)
Chapter 12 Low Tech: Social Engineering and Physical Security
279(26)
Questions
281(6)
Quick Answer Key
287(1)
Answers
288(17)
Chapter 13 The Pen Test: Putting It All Together
305(26)
Questions
307(5)
Quick Answer Key
312(1)
Answers
313(18)
Appendix About the Online Content 331(1)
System Requirements 331(1)
Your Total Seminars Training Hub Account 331(1)
Single User License Terms and Conditions 331(2)
TotalTester Online 333(1)
Technical Support 333
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).