Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.
Also available in other formats.
This is the Rough Cut version of the printed book.
Learn, prepare, and practice for CEH version 9 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification.
Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
You'll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.
The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers students a wealth of customization options and reporting features, laying out a complete assessment of their knowledge to help them focus their study where it is needed most. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps students master the concepts and techniques that will enable them to succeed on the exam the first time.
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning and Enumeration
4. System Hacking
5. Malware Threats
6. Sniffing and Session Hijacking
6. Social Engineering and Physical Protection
7. Hacking Webservers and Web Applications
8. SQL Injection, DoS, and Botnets
9. Hacking Wireless Networks and Mobile Devices
10. Evading IDS, Firewalls, and Honeypots
11. Cloud Computing and Assessing Risk
12. Cryptographic Controls
13. Practice Exams and Answers