Register your product to gain access to bonus material or receive a coupon.
CEH Certified Ethical Hacker Exam Cram is the perfect study guide to help you pass the updated CEH exam. Dr. Chuck Easttom's expert real-world approach reflects both his expertise as one of the world's leading cybersecurity practitioners and instructors, as well as test-taking insights he has gained from teaching CEH preparation courses worldwide, including courses taught directly for EC-Council. Easttom assumes no prior knowledge: his expert coverage of every exam topic can help readers with little ethical hacking experience to obtain the knowledge they need to succeed.
Covers the critical information you'll need to score higher on your CEH exam!
Certified Ethical Hacker (CEH) Exam Cram, Premium Edition eBook and Practice Test
The exciting new Certified Ethical Hacker (CEH) Exam Cram, Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with an enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:
Download the sample pages (includes Chapter 6)
Introduction. . . . . . . . . . . . . . . . . . . . . . . xx
CHAPTER 1:
Reconnaissance and Scanning.. . . . . . . . . . . . . . . . . 1
Reconnaissance Types.. . . . . . . . . . . . . . . . . . 1
Active Reconnaissance Techniques. . . . . . . . . . . . . . 22
What Next?.. . . . . . . . . . . . . . . . . . . . . 32
CHAPTER 2:
Enumeration and Vulnerability Scanning.. . . . . . . . . . . . . 33
Scanning.. . . . . . . . . . . . . . . . . . . . . . 33
Scanning Process.. . . . . . . . . . . . . . . . . . . 43
Network Packet Capture.. . . . . . . . . . . . . . . . . 52
Vulnerability Scanning. . . . . . . . . . . . . . . . . . 57
What Next?.. . . . . . . . . . . . . . . . . . . . . 63
CHAPTER 3:
System Hacking. . . . . . . . . . . . . . . . . . . . . . 65
CEH Methodology.. . . . . . . . . . . . . . . . . . . 65
Pass the Hash.. . . . . . . . . . . . . . . . . . . . . 73
Spyware. . . . . . . . . . . . . . . . . . . . . . . 79
What Next?.. . . . . . . . . . . . . . . . . . . . . 92
CHAPTER 4:
Malware.. . . . . . . . . . . . . . . . . . . . . . . . 93
Malware Types.. . . . . . . . . . . . . . . . . . . . 94
Viruses. . . . . . . . . . . . . . . . . . . . . . . 108
Protecting Against Malware.. . . . . . . . . . . . . . . . 115
What Next?.. . . . . . . . . . . . . . . . . . . . . 122
CHAPTER 5:
Packet Sniffing and Social Engineering.. . . . . . . . . . . . . 123
Social Engineering.. . . . . . . . . . . . . . . . . . . 123
Packet Sniffing.. . . . . . . . . . . . . . . . . . . . 138
What Next?.. . . . . . . . . . . . . . . . . . . . . 150
CHAPTER 6:
Denial of Service and Session Hijacking.. . . . . . . . . . . . . 151
Denial of Service. . . . . . . . . . . . . . . . . . . . 151
Session Hijacking.. . . . . . . . . . . . . . . . . . . 165
What Next?.. . . . . . . . . . . . . . . . . . . . . 172
CHAPTER 7:
Evading Security Measures. . . . . . . . . . . . . . . . . . 173
Intrusion Detection Systems. . . . . . . . . . . . . . . . 173
Firewalls and Honeypots.. . . . . . . . . . . . . . . . . 183
Virtual Private Networks.. . . . . . . . . . . . . . . . . 189
IDS Evasion Techniques.. . . . . . . . . . . . . . . . . 192
Firewall Evasion Techniques. . . . . . . . . . . . . . . . 198
What Next?.. . . . . . . . . . . . . . . . . . . . . 204
CHAPTER 8:
Hacking Web Servers and Web Applications.. . . . . . . . . . . 205
Web Servers.. . . . . . . . . . . . . . . . . . . . . 205
Web Applications.. . . . . . . . . . . . . . . . . . . 214
What Next?.. . . . . . . . . . . . . . . . . . . . . 232
CHAPTER 9:
Hacking Wireless.. . . . . . . . . . . . . . . . . . . . . 233
Wireless Technology.. . . . . . . . . . . . . . . . . . 233
Hacking Wireless.. . . . . . . . . . . . . . . . . . . 245
What Next?.. . . . . . . . . . . . . . . . . . . . . 258
CHAPTER 10:
Hacking Mobile.. . . . . . . . . . . . . . . . . . . . . . 259
Mobile Technologies.. . . . . . . . . . . . . . . . . . 259
Mobile Threats. . . . . . . . . . . . . . . . . . . . 274
What Next?.. . . . . . . . . . . . . . . . . . . . . 282
CHAPTER 11:
IOT and OT Hacking. . . . . . . . . . . . . . . . . . . . 283
IoT Fundamentals. . . . . . . . . . . . . . . . . . . 283
What Next?.. . . . . . . . . . . . . . . . . . . . . 308
CHAPTER 12:
Cloud Computing and Hacking.. . . . . . . . . . . . . . . . 309
Cloud Fundamentals.. . . . . . . . . . . . . . . . . . 309
What Next?.. . . . . . . . . . . . . . . . . . . . . 331
CHAPTER 13:
Cryptography. . . . . . . . . . . . . . . . . . . . . . . 333
Cryptography Concepts.. . . . . . . . . . . . . . . . . 333
PKI. . . . . . . . . . . . . . . . . . . . . . . . 349
Cryptographic Attacks.. . . . . . . . . . . . . . . . . . 357
What Next?.. . . . . . . . . . . . . . . . . . . . . 365
Glossary.. . . . . . . . . . . . . . . . . . . . . . . . 367
Index. . . . . . . . . . . . . . . . . . . . . . . . . . 391
12/7/2021, TOC, 978137513444