CEH Official Certified Ethical Hacker Review Guide 1st Edition by Kimberly Graves – Ebook PDF Instant Download/Delivery: 0782144373, 978-0782144376
Full dowload CEH Official Certified Ethical Hacker Review Guide 1st Edition after payment
Product details:
ISBN 10: 0782144373
ISBN 13: 978-0782144376
Author: Kimberly Graves
CEH Official Certified Ethical Hacker Review Guide 1st Table of contents:
Chapter 1: Ethics and Legality
-
Ethical Hacking Terminology: Understand key terms such as ethical hacker, penetration testing, and hacking tools.
-
Job Role of an Ethical Hacker: Responsibilities include testing, securing, and improving systems by identifying vulnerabilities.
-
Phases in Ethical Hacking: Five stages: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Clearing Tracks.
-
Hacktivism: Hacking for political or social activism.
-
Types of Hackers: White hat, black hat, grey hat, and others based on intentions.
-
Skills Required: Knowledge of networks, programming, security protocols, and ethical hacking tools.
-
Legal Implications: Ethical hackers must understand laws like 18 U.S.C. § 1030 (U.S. Federal Law) to avoid illegal actions.
Chapter 2: Footprinting and Social Engineering
-
Footprinting: Gathering information about a target system (e.g., using Whois, ARIN lookups, DNS enumeration).
-
Social Engineering: Manipulating people into revealing confidential information (e.g., phishing, dumpster diving).
-
Countermeasures: Training employees, using secure practices.
Chapter 3: Scanning and Enumeration
-
Scanning: Includes port, network, and vulnerability scanning (e.g., using tools like Nmap).
-
Enumeration: Gathering more detailed information after scanning (e.g., SNMP, null sessions).
-
Techniques: Includes SYN, Stealth, and FIN scanning, along with proxy servers and anonymizers.
Chapter 4: System Hacking
-
Password Cracking: Techniques and tools used to break into accounts.
-
Privilege Escalation: Methods for gaining higher access levels in systems.
-
Keyloggers/Spyware: Tools to monitor user activity secretly.
-
Rootkits/Steganography: Hiding malicious activity and data.
Chapter 5: Trojans, Backdoors, Viruses, and Worms
-
Trojans: Malicious software that looks benign but performs harmful actions (e.g., Netcat Trojan).
-
Viruses and Worms: How they spread and methods for detection and evasion.
-
Countermeasures: Techniques to prevent and detect Trojans, viruses, and worms.
Chapter 6: Sniffers
-
Sniffing: Intercepting network traffic (active and passive sniffing).
-
Countermeasures: Encryption, VPNs, and other secure methods to protect data.
Chapter 7: Denial of Service and Session Hijacking
-
DoS and DDoS: Types of attacks that overwhelm a system’s resources (e.g., SYN flooding, Smurf attack).
-
Session Hijacking: Taking over a valid user session; includes prevention strategies.
Chapter 8: Hacking Web Servers, Web Application Vulnerabilities
-
Web Server Attacks: Exploiting vulnerabilities in web servers (e.g., IIS exploits).
-
Web Application Hacking: Attacking weaknesses in web applications (e.g., SQL injection, cross-site scripting).
-
Password Cracking: Techniques for bypassing authentication.
Chapter 9: SQL Injection and Buffer Overflows
-
SQL Injection: Exploiting vulnerabilities in database queries to gain unauthorized access.
-
Buffer Overflows: Techniques to manipulate memory handling in software.
Chapter 10: Wireless Hacking
-
WEP/WPA: Cracking wireless encryption standards and understanding rogue access points.
-
Securing Wireless Networks: Methods to protect wireless communications from attack.
Chapter 11: Physical Security
-
Physical Security Breaches: Understanding the importance of physical access controls and security.
-
Factors Affecting Physical Security: Access controls, surveillance, and environmental factors.
Chapter 12: Linux Hacking
-
Linux Kernel Compilation: Techniques for modifying and securing Linux systems.
-
Hardening Methods: Steps to improve security on Linux systems.
Chapter 13: Evading IDS, Honeypots, and Firewalls
-
IDS Evasion: Methods to avoid detection by Intrusion Detection Systems.
-
Firewall and Honeypot Techniques: Bypassing firewalls and exploiting honeypots for attack.
Chapter 14: Cryptography
-
Encryption Techniques: Methods like MD5, SHA, Blowfish for securing data.
-
Key Management: Public and private key cryptography and their uses.
Chapter 15: Penetration Testing Methodologies
-
Pen-Testing Methodology: Steps followed during a penetration test (e.g., Reconnaissance, Gaining Access).
-
Pen-Test Legal Framework: Understanding legal constraints when performing pen tests.
-
Automated Tools: Tools that assist in penetration testing (e.g., Metasploit, Nessus).
People also search for CEH Official Certified Ethical Hacker Review Guide 1st:
what is certified ethical hacker (ceh)
certified ethical hacker review
does certified ethical hacker expire
ceh v10 certified ethical hacker study guide pdf free download
Reviews
There are no reviews yet.