Home > Store

Certified Ethical Hacker (CEH) Cert Guide, Rough Cuts

Rough Cuts

  • Available to Safari Subscribers
  • About Rough Cuts
  • Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.

Not for Sale

Description

  • Copyright 2014
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 704
  • Edition: 1st
  • Rough Cuts
  • ISBN-10: 0-13-341306-3
  • ISBN-13: 978-0-13-341306-9

This is the Rough Cut version of the printed book.

Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification.

  • Master CEH exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions on the CD

Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

You'll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.

The companion CD contains the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most, so you can succeed on the exam the first time.

This study guide helps you master all the topics on the CEH v8 (312-50) exam, including

  • Ethical hacking basics
  • Technical foundations of hacking
  • Footprinting and scanning
  • Enumeration and system hacking
  • Linux distros and automated assessment tools
  • Trojans and backdoors
  • Sniffers, session hijacking, and denial of service
  • Web server hacking, web applications, and database attacks
  • Wireless technologies, mobile security, and mobile attacks
  • IDS, firewalls, and honeypots
  • Buffer overflows, viruses, and worms
  • Cryptographic attacks and defenses
  • Physical security and social engineering

Companion CD

The CD contains two free, complete practice exams, plus memory tables and answers to help you study more efficiently and effectively.

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512MB RAM; 650MB disc space plus 50MB for each downloaded practice exam; access to the Internet to register and download exam databases

Sample Content

Table of Contents

Introduction xxiii

Chapter 1 Ethical Hacking Basics 3

“Do I Know This Already?” Quiz 3

Foundation Topics 6

Security Fundamentals 6

    Goals of Security 7

    Risk, Assets, Threats, and Vulnerabilities 8

    Defining an Exploit 10

Security Testing 10

    No-Knowledge Tests (Black Box) 11

    Full-Knowledge Testing (White Box) 11

    Partial-Knowledge Testing (Gray Box) 11

    Types of Security Tests 12

Hacker and Cracker Descriptions 13

    Who Attackers Are 15

    Hacker and Cracker History 16

Ethical Hackers 17

    Required Skills of an Ethical Hacker 18

    Modes of Ethical Hacking 19

Test Plans–Keeping It Legal 21

    Test Phases 23

    Establishing Goals 24

    Getting Approval 25

    Ethical Hacking Report 25

    Vulnerability Research–Keeping Up with Changes 26

Ethics and Legality 27

    Overview of U.S. Federal Laws 28

    Compliance Regulations 30

Chapter Summary 31

Exam Preparation Tasks 32

Review All Key Topics 32

Hands-On Labs 32

    Lab 1-1 Examining Security Policies 32

Review Questions 33

Define Key Terms 36

View Recommended Resources 36

Chapter 2 The Technical Foundations of Hacking 39

“Do I Know This Already?” Quiz 39

Foundation Topics 42

The Attacker’s Process 42

    Performing Reconnaissance and Footprinting 42

    Scanning and Enumeration 43

    Gaining Access 44

    Escalation of Privilege 45

    Maintaining Access 45

    Covering Tracks and Planting Backdoors 45

The Ethical Hacker’s Process 46

    National Institute of Standards and Technology 47

    Operational Critical Threat, Asset, and Vulnerability Evaluation 47

    Open Source Security Testing Methodology Manual 48

Security and the Stack 48

    The OSI Model 48

    Anatomy of TCP/IP Protocols 51

        The Application Layer 53

        The Transport Layer 57

        The Internet Layer 60

Updates

Submit Errata

More Information