Atjaunināt sīkdatņu piekrišanu

E-grāmata: CEH v10 Certified Ethical Hacker Study Guide [Wiley Online]

  • Formāts: 592 pages
  • Izdošanas datums: 19-Jul-2019
  • Izdevniecība: Sybex Inc.,U.S.
  • ISBN-10: 1119533244
  • ISBN-13: 9781119533245
  • Wiley Online
  • Cena: 50,93 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Formāts: 592 pages
  • Izdošanas datums: 19-Jul-2019
  • Izdevniecība: Sybex Inc.,U.S.
  • ISBN-10: 1119533244
  • ISBN-13: 9781119533245
As protecting information becomes a rapidly growing concern for todays businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more.

This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what youve learned into the context of actual job roles.





Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defenses 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms

Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
Introduction xvii
Assessment Test xxiv
Chapter 1 Ethical Hacking
1(8)
Overview of Ethics
2(2)
Overview of Ethical Hacking
4(1)
Methodology of Ethical Hacking
5(3)
Reconnaissance and Footprinting
6(1)
Scanning and Enumeration
6(1)
Gaining Access
7(1)
Maintaining Access
7(1)
Covering Tracks
8(1)
Summary
8(1)
Chapter 2 Networking Foundations
9(40)
Communications Models
11(5)
Open Systems Interconnection
12(3)
TCP/IP Architecture
15(1)
Topologies
16(5)
Bus Network
16(1)
Star Network
17(1)
Ring Network
18(1)
Mesh Network
19(1)
Hybrid
20(1)
Physical Networking
21(2)
Addressing
21(1)
Switching
22(1)
IP
23(5)
Headers
23(2)
Addressing
25(1)
Subnets
26(2)
TCP
28(3)
UDP
31(1)
Internet Control Message Protocol
32(1)
Network Architectures
33(3)
Network Types
34(1)
Isolation
35(1)
Remote Access
36(1)
Cloud Computing
36(8)
Storage as a Service
37(2)
Infrastructure as a Service
39(1)
Platform as a Service
40(2)
Software as a Service
42(1)
Internet of Things
43(1)
Summary
44(2)
Review Questions
46(3)
Chapter 3 Security Foundations
49(34)
The Triad
51(5)
Confidentiality
51(2)
Integrity
53(1)
Availability
54(1)
Parkerian Hexad
55(1)
Risk
56(2)
Policies, Standards, and Procedures
58(3)
Security Policies
58(1)
Security Standards
59(1)
Procedures
60(1)
Guidelines
60(1)
Security Technology
61(9)
Firewalls
61(4)
Intrusion Detection Systems
65(3)
Intrusion Prevention Systems
68(1)
Security Information and Event Management
69(1)
Being Prepared
70(8)
Defense in Depth
71(2)
Defense in Breadth
73(1)
Logging
74(2)
Auditing
76(2)
Summary
78(1)
Review Questions
79(4)
Chapter 4 Footprinting and Reconnaissance
83(52)
Open-Source Intelligence
85(23)
Companies
85(8)
People
93(4)
Social Networking
97(11)
Domain Name System
108(9)
Name Lookups
109(6)
Zone Transfers
115(2)
Passive Reconnaissance
117(3)
Website Intelligence
120(4)
Technology Intelligence
124(4)
Google Hacking
125(1)
Internet of Things (IoT)
126(2)
Summary
128(2)
Review Questions
130(5)
Chapter 5 Scanning Networks
135(58)
Ping Sweeps
137(4)
Using fping
137(2)
Using MegaPing
139(2)
Port Scanning
141(18)
Nmap
142(13)
masscan
155(2)
MegaPing
157(2)
Vulnerability Scanning
159(18)
Open VAS
160(11)
Nessus
171(6)
Packet Crafting and Manipulation
177(8)
hping
178(2)
packETH
180(3)
fragroute
183(2)
Evasion Techniques
185(2)
Summary
187(2)
Review Questions
189(4)
Chapter 6 Enumeration
193(40)
Service Enumeration
195(3)
Remote Procedure Calls
198(6)
SunRPC
198(2)
Remote Method Invocation
200(4)
Server Message Block
204(11)
Built-in Utilities
205(2)
Nmap Scripts
207(2)
Metasploit
209(3)
Other Utilities
212(3)
Simple Network Management Protocol
215(2)
Simple Mail Transfer Protocol
217(3)
Web-Based Enumeration
220(6)
Summary
226(2)
Review Questions
228(5)
Chapter 7 System Hacking
233(46)
Searching for Exploits
234(5)
System Compromise
239(6)
Metasploit Modules
239(4)
Exploit-DB
243(2)
Gathering Passwords
245(3)
Password Cracking
248(5)
John the Ripper
248(2)
Rainbow Tables
250(3)
Client-Side Vulnerabilities
253(2)
Post Exploitation
255(17)
Privilege Escalation
255(5)
Pivoting
260(2)
Persistence
262(3)
Covering Tracks
265(7)
Summary
272(2)
Review Questions
274(5)
Chapter 8 Malware
279(42)
Malware Types
281(6)
Virus
281(1)
Worm
282(2)
Trojan
284(1)
Botnet
284(1)
Ransomware
285(1)
Dropper
286(1)
Malware Analysis
287(18)
Static Analysis
288(8)
Dynamic Analysis
296(9)
Creating Malware
305(6)
Writing Your Own
305(3)
Using Metasploit
308(3)
Malware Infrastructure
311(3)
Antivirus Solutions
314(1)
Summary
314(2)
Review Questions
316(5)
Chapter 9 Sniffing
321(36)
Packet Capture
322(15)
tcpdump
323(6)
tshark
329(2)
Wireshark
331(4)
Berkeley Packet Filter (BPF)
335(1)
Port Mirroring/Spanning
336(1)
Packet Analysis
337(5)
Spoofing Attacks
342(8)
ARP Spoofing
342(4)
DNS Spoofing
346(2)
sslstrip
348(2)
Summary
350(2)
Review Questions
352(5)
Chapter 10 Social Engineering
357(30)
Social Engineering
358(4)
Pretexting
360(2)
Social Engineering Vectors
362(1)
Physical Social Engineering
362(6)
Badge Access
363(1)
Man Traps
364(1)
Biometrics
365(1)
Phone Calls
366(1)
Baiting
367(1)
Phishing Attacks
368(3)
Website Attacks
371(4)
Cloning
371(3)
Rogue Attacks
374(1)
Wireless Social Engineering
375(4)
Automating Social Engineering
379(2)
Summary
381(2)
Review Questions
383(4)
Chapter 11 Wireless Security
387(32)
Wi-Fi
388(19)
Wi-Fi Network Types
390(2)
Wi-Fi Authentication
392(1)
Wi-Fi Encryption
393(4)
Bring Your Own Device (BYOD)
397(1)
Wi-Fi Attacks
398(9)
Bluetooth
407(4)
Scanning
408(1)
Bluejacking
409(1)
Bluesnarfing
410(1)
Bluebugging
410(1)
Mobile Devices
411(3)
Mobile Device Attacks
412(2)
Summary
414(2)
Review Questions
416(3)
Chapter 12 Attack and Defense
419(28)
Web Application Attacks
420(8)
XML External Entity Processing
422(1)
Cross-Site Scripting (XSS)
423(2)
SQL Injection
425(2)
Command Injection
427(1)
Denial of Service Attacks
428(5)
Bandwidth Attacks
428(3)
Slow Attacks
431(1)
Legacy
432(1)
Application Exploitation
433(3)
Buffer Overflow
433(3)
Heap Spraying
436(1)
Lateral Movement
436(2)
Defense in Depth/Defense in Breadth
438(2)
Defensible Network Architecture
440(1)
Summary
441(2)
Review Questions
443(4)
Chapter 13 Cryptography
447(28)
Basic Encryption
449(4)
Substitution Ciphers
449(3)
Diffie-Hellman
452(1)
Symmetric Key Cryptography
453(3)
Data Encryption Standard (DES)
453(1)
Advanced Encryption Standard (AES)
454(2)
Asymmetric Key Cryptography
456(3)
Hybrid Cryptosystem
456(1)
Non-Repudiation
457(1)
Elliptic Curve Cryptography
457(2)
Certificate Authorities and Key Management
459(6)
Certificate Authority
459(3)
Trusted Third Party
462(1)
Self-Signed Certificates
463(2)
Cryptographic Hashing
465(2)
PGP and S/MIME
467(2)
Summary
469(2)
Review Questions
471(4)
Chapter 14 Security Architecture and Design
475(26)
Data Classification
476(2)
Security Models
478(3)
State Machine
478(1)
Biba
479(1)
Bell-LaPadula
480(1)
Clark-Wilson Integrity Model
480(1)
Application Architecture
481(11)
n-tier Application Design
482(3)
Service-Oriented Architecture
485(2)
Cloud-Based Applications
487(2)
Database Considerations
489(3)
Security Architecture
492(3)
Summary
495(2)
Review Questions
497(4)
Appendix Answers to Review Questions
501(30)
Chapter 2 Networking Foundations
502(1)
Chapter 3 Security Foundations
503(3)
Chapter 4 Footprinting and Reconnaissance
506(2)
Chapter 5 Scanning Networks
508(3)
Chapter 6 Enumeration
511(2)
Chapter 7 System Hacking
513(2)
Chapter 8 Malware
515(3)
Chapter 9 Sniffing
518(1)
Chapter 10 Social Engineering
519(3)
Chapter 11 Wireless Security
522(2)
Chapter 12 Attack and Defense
524(2)
Chapter 13 Cryptography
526(2)
Chapter 14 Security Architecture and Design
528(3)
Index 531
Ric Messier, CEH, GCIH, GSEC, CISSP is a consultant, educator, and author of many books on information security and digital forensics. With decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor.