did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780137513444

Certified Ethical Hacker (CEH) Exam Cram

by
  • ISBN13:

    9780137513444

  • ISBN10:

    0137513445

  • Edition: 1st
  • Format: Package
  • Copyright: 2022-02-15
  • Publisher: Pearson IT Certification

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $44.99 Save up to $14.62
  • Rent Book $30.37
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE

    7-Day eTextbook Access 7-Day eTextbook Access

    USUALLY SHIPS IN 2-3 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

CEH Certified Ethical Hacker Exam Cram is the perfect study guide to help you pass the updated CEH exam. Dr. Chuck Easttom’s expert real-world approach reflects both his expertise as one of the world’s leading cybersecurity practitioners and instructors, as well as test-taking insights he has gained from teaching CEH preparation courses worldwide, including courses taught directly for EC-Council. Easttom assumes no prior knowledge: his expert coverage of every exam topic can help readers with little ethical hacking experience to obtain the knowledge they need to succeed.


Covers the critical information you’ll need to score higher on your CEH exam!


  • Review the core principles and concepts of ethical hacking
  • Perform key pre-attack tasks, including reconnaissance and footprinting
  • Master enumeration, vulnerability scanning, and vulnerability analysis
  • Learn system hacking methodologies, how to cover your tracks, and more
  • Utilize modern malware threats, including ransomware and financial malware
  • Exploit packet sniffing and social engineering
  • Master denial of service and session hacking attacks, tools, and countermeasures
  • Evade security measures, including IDS, firewalls, and honeypots
  • Hack web servers and applications, and perform SQL injection attacks
  • Compromise wireless and mobile systems, from wireless encryption to recent Android exploits
  • Hack Internet of Things (IoT) and Operational Technology (OT) devices and systems
  • Attack cloud computing systems, misconfigurations, and containers
  • Use cryptanalysis tools and attack cryptographic systems

Author Biography

Dr. Chuck Easttom is the author of 34 books, including several on computer security, forensics, and cryptography. He holds a doctor of science degree in cybersecurity, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master’s degrees (one in applied computer science, one in education, and one in systems engineering). He is also an inventor with 23 patents. He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for University of Dallas.

Table of Contents

    Introduction. . . . . . . . . . . . . . . . . . . . . . . xx

CHAPTER 1:

    Reconnaissance and Scanning.. . . . . . . . . . . . . . . . . 1

    Reconnaissance Types.. . . . . . . . . . . . . . . . . . 1

    Active Reconnaissance Techniques. . . . . . . . . . . . . . 22

    What Next?.. . . . . . . . . . . . . . . . . . . . . 32

CHAPTER 2:

    Enumeration and Vulnerability Scanning.. . . . . . . . . . . . . 33

    Scanning.. . . . . . . . . . . . . . . . . . . . . . 33

    Scanning Process.. . . . . . . . . . . . . . . . . . . 43

    Network Packet Capture.. . . . . . . . . . . . . . . . . 52

    Vulnerability Scanning. . . . . . . . . . . . . . . . . . 57

    What Next?.. . . . . . . . . . . . . . . . . . . . . 63

CHAPTER 3:

    System Hacking. . . . . . . . . . . . . . . . . . . . . . 65

    CEH Methodology.. . . . . . . . . . . . . . . . . . . 65

    Pass the Hash.. . . . . . . . . . . . . . . . . . . . . 73

    Spyware. . . . . . . . . . . . . . . . . . . . . . . 79

    What Next?.. . . . . . . . . . . . . . . . . . . . . 92

CHAPTER 4:

    Malware.. . . . . . . . . . . . . . . . . . . . . . . . 93

    Malware Types.. . . . . . . . . . . . . . . . . . . . 94

    Viruses. . . . . . . . . . . . . . . . . . . . . . . 108

    Protecting Against Malware.. . . . . . . . . . . . . . . . 115

    What Next?.. . . . . . . . . . . . . . . . . . . . . 122

CHAPTER 5:

    Packet Sniffing and Social Engineering.. . . . . . . . . . . . . 123

    Social Engineering.. . . . . . . . . . . . . . . . . . . 123

    Packet Sniffing.. . . . . . . . . . . . . . . . . . . . 138

    What Next?.. . . . . . . . . . . . . . . . . . . . . 150

CHAPTER 6:

    Denial of Service and Session Hijacking.. . . . . . . . . . . . . 151

    Denial of Service. . . . . . . . . . . . . . . . . . . . 151

    Session Hijacking.. . . . . . . . . . . . . . . . . . . 165

    What Next?.. . . . . . . . . . . . . . . . . . . . . 172

CHAPTER 7:

    Evading Security Measures. . . . . . . . . . . . . . . . . . 173

    Intrusion Detection Systems. . . . . . . . . . . . . . . . 173

    Firewalls and Honeypots.. . . . . . . . . . . . . . . . . 183

    Virtual Private Networks.. . . . . . . . . . . . . . . . . 189

    IDS Evasion Techniques.. . . . . . . . . . . . . . . . . 192

    Firewall Evasion Techniques. . . . . . . . . . . . . . . . 198

    What Next?.. . . . . . . . . . . . . . . . . . . . . 204

CHAPTER 8:

    Hacking Web Servers and Web Applications.. . . . . . . . . . . 205

    Web Servers.. . . . . . . . . . . . . . . . . . . . . 205

    Web Applications.. . . . . . . . . . . . . . . . . . . 214

    What Next?.. . . . . . . . . . . . . . . . . . . . . 232

CHAPTER 9:

    Hacking Wireless.. . . . . . . . . . . . . . . . . . . . . 233

    Wireless Technology.. . . . . . . . . . . . . . . . . . 233

    Hacking Wireless.. . . . . . . . . . . . . . . . . . . 245

    What Next?.. . . . . . . . . . . . . . . . . . . . . 258

CHAPTER 10:

    Hacking Mobile.. . . . . . . . . . . . . . . . . . . . . . 259

    Mobile Technologies.. . . . . . . . . . . . . . . . . . 259

    Mobile Threats. . . . . . . . . . . . . . . . . . . . 274

    What Next?.. . . . . . . . . . . . . . . . . . . . . 282

CHAPTER 11:

    IOT and OT Hacking. . . . . . . . . . . . . . . . . . . . 283

    IoT Fundamentals. . . . . . . . . . . . . . . . . . . 283

    What Next?.. . . . . . . . . . . . . . . . . . . . . 308

CHAPTER 12:

    Cloud Computing and Hacking.. . . . . . . . . . . . . . . . 309

    Cloud Fundamentals.. . . . . . . . . . . . . . . . . . 309

    What Next?.. . . . . . . . . . . . . . . . . . . . . 331

CHAPTER 13:

    Cryptography. . . . . . . . . . . . . . . . . . . . . . . 333

    Cryptography Concepts.. . . . . . . . . . . . . . . . . 333

    PKI. . . . . . . . . . . . . . . . . . . . . . . . 349

    Cryptographic Attacks.. . . . . . . . . . . . . . . . . . 357

    What Next?.. . . . . . . . . . . . . . . . . . . . . 365

Glossary.. . . . . . . . . . . . . . . . . . . . . . . . 367

Index. . . . . . . . . . . . . . . . . . . . . . . . . . 391





12/7/2021, TOC, 978137513444


Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program