9780789756916

Certified Ethical Hacker (CEH) Version 9 Cert Guide

  • ISBN13:

    9780789756916

  • ISBN10:

    0789756919

  • Edition: 2nd
  • Format: Hardcover
  • Copyright: 4/18/2017
  • Publisher: Pearson IT Certification

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99 Save up to $15.00
  • Rent Book $44.99
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.


·         Every feature of this book supports both efficient exam preparation and long-term mastery:

·         Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives

·         Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success

·         Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career

·         Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology


This study guide helps you master all the topics on the latest CEH exam, including

·         Ethical hacking basics

·         Technical foundations of hacking

·         Footprinting and scanning

·         Enumeration and system hacking

·         Linux distro’s, such as Kali and automated assessment tools

·         Trojans and backdoors

·         Sniffers, session hijacking, and denial of service

·         Web server hacking, web applications, and database attacks

·         Wireless technologies, mobile security, and mobile attacks

·         IDS, firewalls, and honeypots

·         Buffer overflows, viruses, and worms

·         Cryptographic attacks and defenses

·         Cloud security and social engineering

 

Author Biography

Michael Gregg (CISSP, SSCP, CISA, MCSE, MCT, CTT+, A+, N+, Security+, CCNA, CASP, CISA, CISM, CEH, CHFI, and GSEC) is the founder and president of Superior Solutions, Inc., a Houston, Texas-based IT security consulting firm. Superior Solutions performs security assessments and penetration testing for Fortune 1000 firms. The company has performed security assessments for private, public, and governmental agencies. Its Houston-based team travels the country to assess, audit, and provide training services.


Michael is responsible for working with organizations to develop cost-effective and innovative technology solutions to security issues and for evaluating emerging technologies. He has more than 20 years of experience in the IT field and holds two associate’s degrees, a bachelor’s degree, and a master’s degree. In addition to coauthoring the first, second, and third editions of Security Administrator Street Smarts, Michael has written or co-authored 14 other books, including Build Your Own Security Lab: A Field Guide for Network Testing (Wiley, 2008); Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network (Syngress, 2006); Certified Ethical Hacker Exam Prep 2 (Que, 2006); and Inside Network Security Assessment: Guarding Your IT Infrastructure (Sams, 2005).


Michael has been quoted in newspapers such as the New York Times and featured on various television and radio shows, including NPR, ABC, CBS, Fox News, and others, discussing cyber security and ethical hacking. He has created more than a dozen IT security training classes. He has created and performed video instruction on many security topics, such as cyber security, CISSP, CISA, Security+, and others.


When not consulting, teaching, or writing, Michael enjoys 1960s muscle cars and has a slot in his garage for a new project car.


You can reach Michael by email at MikeG@thesolutionfirm.com.


Table of Contents

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning and Enumeration
4. System Hacking
5. Malware Threats
6. Sniffing and Session Hijacking

6. Social Engineering and Physical Protection

7. Hacking Webservers and Web Applications

8. SQL Injection, DoS, and Botnets

9. Hacking Wireless Networks and Mobile Devices
10. Evading IDS, Firewalls, and Honeypots
11. Cloud Computing and Assessing Risk

12. Cryptographic Controls
13. Practice Exams and Answers

14. Glossary

Rewards Program

Write a Review