As protecting information continues to be a growing concern for todayās businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certif
CEH v11 Certified Ethical Hacker Study Guide
ā Scribed by Ric Messier
- Publisher
- Sybex
- Year
- 2021
- Tongue
- English
- Leaves
- 704
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
⦠Table of Contents
Cover
Title Page
Copyright Page
About theĀ Author
Contents at a Glance
Contents
Introduction
What Is a CEH?
The Subject Matter
About theĀ Exam
Who Is Eligible
Exam Cost
About EC-Council
Using This Book
Objective Map
Letās Get Started!
Assessment Test
Answers toĀ Assessment Test
Assessment Test
Answers to Assessment Test
Chapter 1 Ethical Hacking
Overview ofĀ Ethics
Overview ofĀ Ethical Hacking
Methodologies
Cyber Kill Chain
Attack Lifecycle
Methodology ofĀ Ethical Hacking
Reconnaissance andĀ Footprinting
Scanning andĀ Enumeration
Gaining Access
Maintaining Access
Covering Tracks
Summary
Chapter 2 Networking Foundations
Communications Models
Open Systems Interconnection
TCP/IP Architecture
Topologies
Bus Network
Star Network
Ring Network
Mesh Network
Hybrid
Physical Networking
Addressing
Switching
IP
Headers
Addressing
Subnets
TCP
UDP
Internet Control Message Protocol
Network Architectures
Network Types
Isolation
Remote Access
Cloud Computing
Storage asĀ a Service
Infrastructure asĀ a Service
Platform asĀ a Service
Software asĀ a Service
Internet ofĀ Things
Summary
Review Questions
Chapter 3 Security Foundations
The Triad
Confidentiality
Integrity
Availability
Parkerian Hexad
Risk
Policies, Standards, andĀ Procedures
Security Policies
Security Standards
Procedures
Guidelines
Organizing Your Protections
Security Technology
Firewalls
Intrusion Detection Systems
Intrusion Prevention Systems
Endpoint Detection andĀ Response
Security Information andĀ Event Management
Being Prepared
Defense inĀ Depth
Defense inĀ Breadth
Defensible Network Architecture
Logging
Auditing
Summary
Review Questions
Chapter 4 Footprinting andĀ Reconnaissance
Open Source Intelligence
Companies
People
Social Networking
Domain Name System
Name Lookups
Zone Transfers
Passive DNS
Passive Reconnaissance
Website Intelligence
Technology Intelligence
Google Hacking
Internet of Things (IoT)
Summary
Review Questions
Chapter 5 Scanning Networks
Ping Sweeps
Using fping
Using MegaPing
Port Scanning
Nmap
masscan
MegaPing
Metasploit
Vulnerability Scanning
OpenVAS
Nessus
Looking forĀ Vulnerabilities withĀ Metasploit
Packet Crafting andĀ Manipulation
hping
packETH
fragroute
Evasion Techniques
Protecting andĀ Detecting
Summary
Review Questions
Chapter 6 Enumeration
Service Enumeration
Remote Procedure Calls
SunRPC
Remote Method Invocation
Server Message Block
Built-in Utilities
nmap Scripts
NetBIOS Enumerator
Metasploit
Other Utilities
Simple Network Management Protocol
Simple Mail Transfer Protocol
Web-Based Enumeration
Summary
Review Questions
Chapter 7 System Hacking
Searching forĀ Exploits
System Compromise
Metasploit Modules
Exploit-DB
Gathering Passwords
Password Cracking
John theĀ Ripper
Rainbow Tables
Kerberoasting
Client-Side Vulnerabilities
Living Off theĀ Land
Fuzzing
Post Exploitation
Evasion
Privilege Escalation
Pivoting
Persistence
Covering Tracks
Summary
Review Questions
Chapter 8 Malware
Malware Types
Virus
Worm
Trojan
Botnet
Ransomware
Dropper
Malware Analysis
Static Analysis
Dynamic Analysis
Creating Malware
Writing Your Own
Using Metasploit
Obfuscating
Malware Infrastructure
Antivirus Solutions
Persistence
Summary
Review Questions
Chapter 9 Sniffing
Packet Capture
tcpdump
tshark
Wireshark
Berkeley Packet Filter
Port Mirroring/Spanning
Packet Analysis
Spoofing Attacks
ARP Spoofing
DNS Spoofing
sslstrip
Spoofing Detection
Summary
Review Questions
Chapter 10 Social Engineering
Social Engineering
Pretexting
Social Engineering Vectors
Physical Social Engineering
Badge Access
Man Traps
Biometrics
Phone Calls
Baiting
Phishing Attacks
Website Attacks
Cloning
Rogue Attacks
Wireless Social Engineering
Automating Social Engineering
Summary
Review Questions
Chapter 11 Wireless Security
Wi-Fi
Wi-Fi Network Types
Wi-Fi Authentication
Wi-Fi Encryption
Bring Your Own Device
Wi-Fi Attacks
Bluetooth
Scanning
Bluejacking
Bluesnarfing
Bluebugging
Mobile Devices
Mobile Device Attacks
Summary
Review Questions
Chapter 12 Attack andĀ Defense
Web Application Attacks
XML External Entity Processing
Cross-Site Scripting
SQL Injection
Command Injection
File Traversal
Web Application Protections
Denial-of-Service Attacks
Bandwidth Attacks
Slow Attacks
Legacy
Application Exploitation
Buffer Overflow
Heap Spraying
Application Protections andĀ Evasions
Lateral Movement
Defense inĀ Depth/Defense inĀ Breadth
Defensible Network Architecture
Summary
Review Questions
Chapter 13 Cryptography
Basic Encryption
Substitution Ciphers
Diffie-Hellman
Symmetric Key Cryptography
Data Encryption Standard
Advanced Encryption Standard
Asymmetric Key Cryptography
Hybrid Cryptosystem
Nonrepudiation
Elliptic Curve Cryptography
Certificate Authorities andĀ KeyĀ Management
Certificate Authority
Trusted Third Party
Self-Signed Certificates
Cryptographic Hashing
PGP and S/MIME
Disk andĀ File Encryption
Summary
Review Questions
Chapter 14 Security Architecture andĀ Design
Data Classification
Security Models
State Machine
Biba
Bell-LaPadula
Clark-Wilson Integrity Model
Application Architecture
n-tier Application Design
Service-Oriented Architecture
Cloud-Based Applications
Database Considerations
Security Architecture
Summary
Review Questions
Chapter 15 Cloud Computing andĀ the Internet ofĀ Things
Cloud Computing Overview
Cloud Services
Shared Responsibility Model
Public vs. Private Cloud
Cloud Architectures andĀ Deployment
Responsive Design
Cloud-Native Design
Deployment
Dealing with REST
Common Cloud Threats
Access Management
Data Breach
Web Application Compromise
Credential Compromise
Insider Threat
Internet ofĀ Things
Operational Technology
Summary
Review Questions
Appendix Answers to Review Questions
ChapterĀ 2: Networking Foundations
ChapterĀ 3: Security Foundations
ChapterĀ 4: Footprinting andĀ Reconnaissance
ChapterĀ 5: Scanning Networks
ChapterĀ 6: Enumeration
ChapterĀ 7: System Hacking
ChapterĀ 8: Malware
ChapterĀ 9: Sniffing
ChapterĀ 10: Social Engineering
ChapterĀ 11: Wireless Security
ChapterĀ 12: Attack andĀ Defense
ChapterĀ 13: Cryptography
ChapterĀ 14: Security Architecture andĀ Design
ChapterĀ 15: Cloud Computing andĀ the Internet ofĀ Things
Index
Comprehensive Online Learning Environment
Register and Access the Online Test Bank
EULA
š SIMILAR VOLUMES
<p><span>As protecting informationĀ continues to beĀ a growing concern for todayās businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The </spa
As protecting information becomes a rapidly growing concern for todayās businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certif
As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certif
<div> This book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. </div> <div> <br></div> <div> <br></div> <div> Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11
āThis book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The