CEH Official Certified Ethical Hacker Review Guide Exam 312 50 1st Edition by Kimberly Graves – Ebook PDF Instant Download/Delivery. 0782144373, 9780470142356
Full download CEH Official Certified Ethical Hacker Review Guide Exam 312 50 1st Edition after payment
Product details:
ISBN 10: 0782144373
ISBN 13: 9780470142356
Author: Kimberly Graves
Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
CEH Official Certified Ethical Hacker Review Guide Exam 312 50 1st Table of contents:
1. Introduction to Ethical Hacking
- Overview of Ethical Hacking
- Legal and Ethical Considerations
- The CEH Certification and Exam Overview
- Types of Hackers and Hacking Methodologies
2. Information Gathering and Footprinting
- Footprinting Techniques
- Tools for Information Gathering (e.g., Whois, DNS, Google Hacking)
- Social Engineering Techniques
- Countermeasures for Footprinting
3. Scanning and Enumeration
- Network Scanning Techniques
- Enumeration Tools and Techniques
- Vulnerability Scanning
- Identifying Open Ports and Services
- Countermeasures for Scanning and Enumeration
4. System Hacking
- Gaining Access to Systems
- Privilege Escalation
- Maintaining Access
- Covering Tracks
- Tools for System Hacking
- Countermeasures for System Hacking
5. Malware Threats
- Types of Malware (Viruses, Worms, Trojans, etc.)
- Methods of Malware Delivery
- Malware Analysis Techniques
- Countermeasures for Malware
6. Sniffing and Evasion Techniques
- Network Sniffing and Packet Capture
- Tools for Sniffing (e.g., Wireshark)
- Evasion Techniques to Bypass IDS/IPS
- Countermeasures for Sniffing and Evasion
7. Social Engineering and Phishing
- Social Engineering Attacks
- Phishing and Spear Phishing
- Techniques to Bypass Security Awareness
- Countermeasures for Social Engineering
8. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
- DoS and DDoS Attack Techniques
- Tools for DoS and DDoS Attacks
- Mitigating DoS and DDoS Attacks
- Countermeasures for Denial of Service
9. Web Application Hacking
- Web Application Architecture
- Web Application Vulnerabilities (SQL Injection, XSS, CSRF, etc.)
- Web Application Attack Techniques
- Tools for Web Application Testing
- Countermeasures for Web Application Vulnerabilities
10. Wireless Network Hacking
- Wireless Network Security and Encryption (WEP, WPA, WPA2)
- Attacking Wireless Networks
- Tools for Cracking Wireless Encryption
- Countermeasures for Wireless Networks
11. Cloud and Mobile Security
- Cloud Computing and Security Risks
- Securing Mobile Devices and Applications
- Mobile Malware and Attacks
- Countermeasures for Cloud and Mobile Security
12. Cryptography
- Cryptographic Principles and Algorithms
- Symmetric and Asymmetric Encryption
- Digital Signatures and Certificates
- Cryptographic Attacks
- Countermeasures for Cryptographic Threats
13. Penetration Testing
- Phases of Penetration Testing
- Tools for Penetration Testing (e.g., Kali Linux, Metasploit)
- Writing Penetration Test Reports
- Best Practices for Penetration Testing
14. Incident Response and Handling
- Incident Response Procedures
- Forensics and Evidence Gathering
- Tools for Incident Response
- Countermeasures for Incident Handling
15. Ethics and Legal Considerations
- Ethical Hacking and the Law
- CEH Code of Ethics
- Legal Issues in Penetration Testing and Hacking
- Risk Management and Compliance
16. CEH Exam Preparation and Review
- CEH Exam Blueprint and Domains
- Study Tips and Strategies for Passing the Exam
- Sample Review Questions and Answers
- Final Exam Review
People also search for CEH Official Certified Ethical Hacker Review Guide Exam 312 50 1st:
ceh: official certified ethical hacker review
ceh official certified ethical hacker review guide pdf
ceh official certified ethical hacker review guide
what is certified ethical hacker (ceh)
certified ethical hacker (ceh) price