Fr. 69.00

Ceh V12 Certified Ethical Hacker Study Guide With 750 Practice Test - Question

English · Paperback / Softback

Shipping usually within 4 to 7 working days

Description

Read more

The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test QuestionsInformation security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry.In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you'll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide.The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You'll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy....

List of contents

Introduction xvii
 
Assessment Test xxv
 
Chapter 1 Ethical Hacking 1
 
Overview of Ethics 2
 
Overview of Ethical Hacking 5
 
Attack Modeling 6
 
Cyber Kill Chain 7
 
Attack Lifecycle 8
 
MITRE ATT&CK Framework 10
 
Methodology of Ethical Hacking 12
 
Reconnaissance and Footprinting 12
 
Scanning and Enumeration 12
 
Gaining Access 13
 
Maintaining Access 14
 
Covering Tracks 14
 
Summary 15
 
Chapter 2 Networking Foundations 17
 
Communications Models 19
 
Open Systems Interconnection 20
 
TCP/IP Architecture 23
 
Topologies 24
 
Bus Network 24
 
Star Network 25
 
Ring Network 26
 
Mesh Network 27
 
Hybrid 28
 
Physical Networking 29
 
Addressing 29
 
Switching 30
 
IP 31
 
Headers 32
 
Addressing 34
 
Subnets 35
 
TCP 37
 
UDP 40
 
Internet Control Message Protocol 41
 
Network Architectures 42
 
Network Types 43
 
Isolation 44
 
Remote Access 45
 
Cloud Computing 46
 
Storage as a Service 47
 
Infrastructure as a Service 48
 
Platform as a Service 49
 
Software as a Service 51
 
Internet of Things 53
 
Summary 54
 
Review Questions 56
 
Chapter 3 Security Foundations 59
 
The Triad 61
 
Confidentiality 61
 
Integrity 63
 
Availability 64
 
Parkerian Hexad 65
 
Information Assurance and Risk 66
 
Policies, Standards, and Procedures 69
 
Security Policies 69
 
Security Standards 70
 
Procedures 71
 
Guidelines 72
 
Organizing Your Protections 72
 
Security Technology 75
 
Firewalls 76
 
Intrusion Detection Systems 80
 
Intrusion Prevention Systems 83
 
Endpoint Detection and Response 84
 
Security Information and Event Management 86
 
Being Prepared 87
 
Defense in Depth 87
 
Defense in Breadth 89
 
Defensible Network Architecture 90
 
Logging 91
 
Auditing 93
 
Summary 95
 
Review Questions 96
 
Chapter 4 Footprinting and Reconnaissance 101
 
Open Source Intelligence 103
 
Companies 103
 
People 112
 
Social Networking 115
 
Domain Name System 129
 
Name Lookups 130
 
Zone Transfers 136
 
Passive DNS 138
 
Passive Reconnaissance 142
 
Website Intelligence 145
 
Technology Intelligence 150
 
Google Hacking 150
 
Internet of Things (IoT) 152
 
Summary 154
 
Review Questions 157
 
Chapter 5 Scanning Networks 161
 
Ping Sweeps 163
 
Using fping 163
 
Using MegaPing 165
 
Port Scanning 167
 
nmap 168
 
masscan 184
 
MegaPing 186
 
Metasploit 188
 
Vulnerability Scanning 190
 
OpenVAS 192
 
Nessus 203
 
Looking for Vulnerabilities with Metasploit 209
 
Packet Crafting and Manipulation 210
 
hping 211
 
packETH 214
 
fragroute 217
 
Evasion Techniques 218
 
Evasion with nmap 221
 
Protecting and Detecting 223
 
Summary 224
 
Review Questions 226
 
Chapter 6 Enumeration 231
 
Service Enumeration 233
 
Countermeasures 236
 
Remote Procedure Calls 236
 
SunRPC 237
&nbs

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.