Muutke küpsiste eelistusi

CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition 4th edition [Pehme köide]

  • Formaat: Paperback / softback, 576 pages, kaal: 832 g, 80 Illustrations
  • Ilmumisaeg: 29-Mar-2019
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 126045455X
  • ISBN-13: 9781260454550
Teised raamatud teemal:
  • Pehme köide
  • Hind: 62,64 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 576 pages, kaal: 832 g, 80 Illustrations
  • Ilmumisaeg: 29-Mar-2019
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 126045455X
  • ISBN-13: 9781260454550
Teised raamatud teemal:
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Up-to-date coverage of every topic on the CEH v10 exam

Thoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.

Covers all exam topics, including:

Ethical hacking fundamentals
Reconnaissance and footprinting
Scanning and enumeration
Sniffing and evasion
Attacking a system
Hacking web servers and applications
Wireless network hacking
Security in cloud computing
Trojans and other attacks
Cryptography
Social engineering and physical security
Penetration testing

Digital content includes:

300 practice exam questions
Test engine that provides full-length practice exams and customized quizzes by chapter





Acknowledgments xi
Introduction xiii
Chapter 1 Getting Started: Essential Knowledge
1(46)
Security 101
2(22)
Essentials
2(12)
Security Basics
14(10)
Introduction to Ethical Hacking
24(14)
Hacking Terminology
24(6)
The Ethical Hacker
30(8)
Chapter Review
38(9)
Questions
42(3)
Answers
45(2)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
47(36)
Footprinting
48(5)
Passive Footprinting
50(2)
Active Footprinting
52(1)
Footprinting Methods and Tools
53(24)
Search Engines
53(7)
Website and E-mail Footprinting
60(2)
DNS Footprinting
62(10)
Network Footprinting
72(3)
Other Tools
75(2)
Chapter Review
77(6)
Questions
79(3)
Answers
82(1)
Chapter 3 Scanning and Enumeration
83(54)
Fundamentals
84(12)
TCP/IP Networking
84(8)
Subnetting
92(4)
Scanning Methodology
96(21)
Identifying Targets
97(4)
Port Scanning
101(10)
Evasion
111(4)
Vulnerability Scanning
115(2)
Enumeration
117(8)
Windows System Basics
117(3)
Enumeration Techniques
120(5)
Chapter Review
125(12)
Questions
131(3)
Answers
134(3)
Chapter 4 Sniffing and Evasion
137(46)
Essentials
138(13)
Network Knowledge for Sniffing
138(12)
Active and Passive Sniffing
150(1)
Sniffing Tools and Techniques
151(8)
Techniques
151(5)
Tools
156(3)
Evasion
159(14)
Devices Aligned Against You
159(8)
Evasion Techniques
167(6)
Chapter Review
173(10)
Questions
177(3)
Answers
180(3)
Chapter 5 Attacking a System
183(44)
Getting Started
184(15)
Windows Security Architecture
184(9)
Linux Security Architecture
193(4)
Methodology
197(2)
Hacking Steps
199(19)
Authentication and Passwords
199(9)
Privilege Escalation and Executing Applications
208(3)
Hiding Files and Covering Tracks
211(7)
Chapter Review
218(9)
Questions
222(2)
Answers
224(3)
Chapter 6 Web-Based Hacking: Servers and Applications
227(44)
Web Servers
228(19)
Web Organizations
228(5)
Attack Methodology
233(2)
Web Server Architecture
235(6)
Web Server Attacks
241(6)
Attacking Web Applications
247(15)
Application Attacks
249(12)
Countermeasures
261(1)
Chapter Review
262(9)
Questions
266(3)
Answers
269(2)
Chapter 7 Wireless Network Hacking
271(26)
Wireless Networking
272(18)
Wireless Terminology, Architecture, and Standards
272(8)
Wireless Hacking
280(10)
Chapter Review
290(7)
Questions
293(2)
Answers
295(2)
Chapter 8 Mobile Communications and the IoT
297(32)
The Mobile World
298(11)
Mobile Vulnerabilities and Risks
299(4)
Mobile Platforms and Attacks
303(6)
IoT
309(11)
IoT Architecture
310(3)
IoT Vulnerabilities and Attacks
313(4)
IoT Hacking Methodology
317(3)
Chapter Review
320(9)
Questions
325(2)
Answers
327(2)
Chapter 9 Security in Cloud Computing
329(20)
Cloud Computing
330(5)
Cloud Security
335(4)
Threats and Attacks
339(3)
Chapter Review
342(7)
Questions
345(2)
Answers
347(2)
Chapter 10 Trojans and Other Attacks
349(36)
The "Malware" Attacks
350(14)
Trojans
352(5)
Viruses and Worms
357(7)
Remaining Attacks
364(10)
Denial of Service
365(4)
Session Hijacking
369(5)
Chapter Review
374(11)
Questions
380(2)
Answers
382(3)
Chapter 11 Cryptography 101
385(40)
Cryptography and Encryption Overview
386(13)
Encryption Algorithms and Techniques
387(12)
PKI, the Digital Certificate, and Digital Signatures
399(8)
The PKI System
399(3)
Digital Certificates
402(4)
Digital Signatures
406(1)
Encrypted Communication and Cryptography Attacks
407(10)
Encrypted Communication
410(5)
Cryptography Attacks
415(2)
Chapter Review
417(8)
Questions
421(3)
Answers
424(1)
Chapter 12 Low Tech: Social Engineering and Physical Security
425(32)
Social Engineering
426(17)
Human-Based Attacks
427(7)
Computer-Based Attacks
434(7)
Mobile-Based Attacks
441(2)
Physical Security
443(7)
Physical Security 101
443(7)
Chapter Review
450(7)
Questions
452(2)
Answers
454(3)
Chapter 13 The Pen Test: Putting It All Together
457(20)
Methodology and Steps
458(14)
The Security Assessments
459(9)
Security Assessment Deliverables
468(1)
Guidelines
469(1)
More Terminology
470(2)
Chapter Review
472(5)
Questions
473(2)
Answers
475(2)
Appendix A Tool, Sites, and References
477(22)
Vulnerability Research Sites
477(1)
Footprinting Tools
478(3)
Scanning and Enumeration Tools
481(4)
System Hacking Tools
485(3)
Cryptography and Encryption
488(2)
Sniffing
490(1)
Wireless
491(1)
Mobile and IoT
492(2)
Trojans and Malware
494(2)
Web Attacks
496(1)
Miscellaneous
496(2)
Tools, Sites, and References Disclaimer
498(1)
Appendix B About the Online Content
499(4)
System Requirements
499(1)
Your Total Seminars Training Hub Account
499(1)
Single User License Terms and Conditions
499(2)
TotalTester Online
501(1)
Technical Support
501(2)
Glossary 503(32)
Index 535
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).