CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition
Up-to-date coverage of every topic on the CEH v11 exam

Thoroughly updated for CEH v11 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.

Covers all exam topics, including:

  • Ethical hacking fundamentals
  • Reconnaissance and footprinting
  • Scanning and enumeration
  • Sniffing and evasion
  • Attacking a system
  • Hacking web servers and applications
  • Wireless network hacking
  • Mobile, IoT, and OT
  • Security in cloud computing
  • Trojans and other attacks, including malware analysis
  • Cryptography
  • Social engineering and physical security
  • Penetration testing

Online content includes:

  • 300 practice exam questions
  • Test engine that provides full-length practice exams and customized quizzes by chapter or exam domain

1139270831
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition
Up-to-date coverage of every topic on the CEH v11 exam

Thoroughly updated for CEH v11 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.

Covers all exam topics, including:

  • Ethical hacking fundamentals
  • Reconnaissance and footprinting
  • Scanning and enumeration
  • Sniffing and evasion
  • Attacking a system
  • Hacking web servers and applications
  • Wireless network hacking
  • Mobile, IoT, and OT
  • Security in cloud computing
  • Trojans and other attacks, including malware analysis
  • Cryptography
  • Social engineering and physical security
  • Penetration testing

Online content includes:

  • 300 practice exam questions
  • Test engine that provides full-length practice exams and customized quizzes by chapter or exam domain

55.0 In Stock
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition

CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition

by Matt Walker
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition

CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition

by Matt Walker

Paperback(5th ed.)

$55.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Up-to-date coverage of every topic on the CEH v11 exam

Thoroughly updated for CEH v11 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.

Covers all exam topics, including:

  • Ethical hacking fundamentals
  • Reconnaissance and footprinting
  • Scanning and enumeration
  • Sniffing and evasion
  • Attacking a system
  • Hacking web servers and applications
  • Wireless network hacking
  • Mobile, IoT, and OT
  • Security in cloud computing
  • Trojans and other attacks, including malware analysis
  • Cryptography
  • Social engineering and physical security
  • Penetration testing

Online content includes:

  • 300 practice exam questions
  • Test engine that provides full-length practice exams and customized quizzes by chapter or exam domain


Product Details

ISBN-13: 9781264269945
Publisher: McGraw Hill LLC
Publication date: 11/11/2021
Edition description: 5th ed.
Pages: 608
Product dimensions: 7.20(w) x 9.00(h) x 1.30(d)

About the Author

Matt Walker, CEH, is a cybersecurity consultant and has held several cybersecurity positions throughout his career. An IT security and education professional for more than 20 years, he has served as the director of the Network Training Center for Cisco Networking Academy on Ramstein AB, Germany, and as a network engineer for NASA’s Secure Network Systems (NSS). He continues to train and write certification and college-level IT and IA security courses.

Table of Contents

Acknowledgments xv

Introduction xvii

Chapter 1 Getting Started: Essential Knowledge 1

Security 101 2

Essentials 2

Security Basics 15

Introduction to Ethical Hacking 25

Hacking Terminology 26

The Ethical Hacker 34

Chapter Review 42

Questions 45

Answers 48

Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker 51

Footprinting 52

Passive Footprinting 54

Active Footprinting 56

Footprinting Methods and Tools 57

Search Engines 57

Website and E-mail Footprinting 66

DNS Footprinting 67

Network Footprinting 79

Other Tools 81

Chapter Review 83

Questions 85

Answers 87

Chapter 3 Scanning and Enumeration 89

Fundamentals 90

TCP/IP Networking 90

Subnetting 98

Scanning Methodology 102

Identifying Targets 103

Port Scanning 106

Evasion 116

Vulnerability Scanning 119

Enumeration 121

Windows System Basics 121

Unix/Linux System Basics 123

Enumeration Techniques 124

Chapter Review 131

Questions 137

Answers 140

Chapter 4 Sniffing and Evasion 143

Essentials 144

Network Knowledge for Sniffing 144

Active and Passive Sniffing 156

Sniffing Tools and Techniques 157

Techniques 157

Tools 162

Evasion 165

Devices Aligned Against You 166

Evasion Techniques 174

Chapter Review 180

Questions 184

Answers 187

Chapter 5 Attacking a System 189

Getting Started 190

Windows Security Architecture 190

Linux Security Architecture 198

Methodology 203

Hacking Steps 206

Authentication and Passwords 207

Privilege Escalation and Executing Applications 216

Hiding Files and Covering Tracks 219

Chapter Review 226

Questions 230

Answers 232

Chapter 6 Web-Based Hacking: Servers and Applications 235

Web Servers 236

Nonprofit Organizations Promoting Web Security 236

Attack Methodology 241

Web Server Architecture 242

Web Server Attacks 250

Attacking Web Applications 256

Application Attacks 257

Countermeasures 269

Chapter Review 270

Questions 274

Answers 277

Chapter 7 Wireless Network Hacking 279

Wireless Networking 280

Wireless Terminology, Architecture, and Standards 280

Wireless Hacking 289

Chapter Review 298

Questions 301

Answers 303

Chapter 8 Mobile Communications and the IoT 305

The Mobile World 306

Mobile Vulnerabilities and Risks 307

Mobile Platforms and Attacks 311

IoT 317

IoT Architecture 318

IoT Vulnerabilities and Attacks 320

IoT Hacking Methodology 327

OT Hacking 331

Definition and Concepts 332

Security Concerns 334

Chapter Review 335

Questions 339

Answers 342

Chapter 9 Security in Cloud Computing 343

Cloud Computing 344

Cloud Computing Service Types 346

Cloud Deployment Models 349

Cloud Security 352

Cloud Threats 354

Cloud Attacks and Mitigations 359

Cloud Hacking 360

Chapter Review 363

Questions 366

Answers 368

Chapter 10 Trojans and Other Attacks 371

The "Malware" Attacks 372

Trojans 375

Viruses and Worms 379

Fileless Malware 385

Malware Analysis 387

Malware Countermeasures 389

Remaining Attacks 391

Denial of Service 391

Session Hijacking 395

Chapter Review 399

Questions 404

Answers 406

Chapter 11 Cryptography 101 409

Cryptography and Encryption Overview 410

Terminology 410

Encryption Algorithms and Techniques 411

PKI, the Digital Certificate, and Digital Signatures 424

The PKI System 425

Digital Certificates 428

Digital Signatures 432

To Sum Up 433

Encrypted Communication and Cryptography Attacks 433

Encrypted Communication 436

Cryptography Attacks 441

Chapter Review 443

Questions 447

Answers 450

Chapter 12 Low Tech: Social Engineering and Physical Security 453

Social Engineering 454

Human-Based Social Engineering Attacks 456

Computer-Based Attacks 462

Mobile-Based Attacks 468

Preventing Social Engineering Attacks 469

Physical Security 472

Physical Security 101 472

Testing Physical Security 478

Chapter Review 479

Questions 481

Answers 484

Chapter 13 The Pen Test: Putting It All Together 485

Methodology and Steps 486

Security Assessments 487

Security Assessment Deliverables 494

Guidelines 496

More Terminology 496

Chapter Review 498

Questions 500

Answers 502

Appendix A A Tool, Sites, and References 503

Vulnerability Research Sites 503

Footprinting Tools 504

Scanning and Enumeration Tools 507

System Hacking Tools 510

Cryptography and Encryption 515

Sniffing 516

Wireless 517

Mobile and IoT 518

Trojans and Malware 521

Web Attacks 523

Miscellaneous 524

Tools, Sites, and References Disclaimer 525

Appendix B About the Online Content 527

System Requirements 527

Your Total Seminars Training Hub Account 527

Privacy Notice 527

Single User License Terms and Conditions 527

TotalTester Online 529

Technical Support 529

Glossary 531

Index 563

From the B&N Reads Blog

Customer Reviews