CEH Ethical Hacking and Countermeasures v11 1st Edition by Mohd Sohaib – Ebook PDF Instant Download/Delivery. 9789391392161
Full download CEH Ethical Hacking and Countermeasures v11 1st Edition after payment
Product details:
ISBN 10:
ISBN 13: 9789391392161
Author: Mohd Sohaib
“CEH Ethical Hacking and Countermeasures v11 1st Edition” by Mohd Sohaibi is a comprehensive guide aimed at preparing individuals for the Certified Ethical Hacker (CEH) exam. The CEH certification is one of the most recognized certifications in the field of ethical hacking, focusing on identifying and countering potential vulnerabilities and threats in information systems.
CEH Ethical Hacking and Countermeasures v11 1st Table of contents:
-
Footprinting and Reconnaissance
- Information Gathering
- Footprinting Tools and Techniques
- DNS Interrogation and Whois Lookup
- Social Engineering
- Countermeasures for Footprinting
-
Scanning Networks
- Types of Scanning
- Network Mapping and Enumeration
- Vulnerability Scanning
- Firewall and IDS Evasion
- Countermeasures for Scanning
-
Enumeration
- Techniques for Enumeration
- SNMP Enumeration
- NetBIOS Enumeration
- LDAP Enumeration
- Countermeasures for Enumeration
-
System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Covering Tracks
- Countermeasures for System Hacking
-
Malware Threats
- Types of Malware (Viruses, Worms, Trojans, etc.)
- Malware Analysis
- Backdoor and Rootkits
- Countermeasures for Malware
-
Sniffing
- Network Sniffing Techniques
- Packet Analysis Tools (Wireshark, tcpdump, etc.)
- Password Sniffing and Countermeasures
- Sniffing Attacks and Prevention
-
Social Engineering
- Techniques of Social Engineering
- Phishing, Spear Phishing, and Vishing
- Impersonation Attacks
- Countermeasures for Social Engineering
-
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
- Types of DoS and DDoS Attacks
- Tools for Launching DoS/DDoS Attacks
- DDoS Prevention and Mitigation
- Countermeasures for DoS/DDoS
-
Web Application Hacking
- Web Application Architecture
- Web Vulnerabilities (SQL Injection, XSS, CSRF, etc.)
- Exploiting Web Applications
- Web Application Countermeasures
-
Wireless Network Hacking
- Wireless Network Security (WEP, WPA, WPA2)
- Cracking Wireless Encryption
- Wireless Sniffing and Attacks
- Countermeasures for Wireless Networks
-
Hacking Mobile Platforms
- Mobile OS (Android, iOS) Security
- Mobile Application Testing
- Exploiting Mobile Devices
- Countermeasures for Mobile Platforms
-
Cloud Security
- Cloud Computing Models and Security Risks
- Cloud Vulnerabilities and Attacks
- Securing Cloud Environments
- Countermeasures for Cloud Security
-
Cryptography
- Overview of Cryptography
- Types of Cryptography (Symmetric, Asymmetric, Hashing)
- Cryptographic Attacks and Countermeasures
-
Penetration Testing and Reporting
- Phases of Penetration Testing
- Tools for Penetration Testing
- Writing Penetration Test Reports
- Post-Engagement Activities and Best Practices
-
Ethical Hacking Countermeasures and Defenses
- Security Policy Development
- Incident Response and Forensics
- Creating a Security Awareness Program
People also search for CEH Ethical Hacking and Countermeasures v11 1st:
ceh ethical hacking and countermeasures v11 1st
certified ethical hacker v11 study guide pdf
ceh – ethical hacking and countermeasures v11 (ceh v11)
ceh – ethical hacking and countermeasures v11
ceh study guide v11 pdf