10%
69.60
CHF62.65
Auslieferung erfolgt in der Regel innert 2 bis 4 Werktagen.
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions
Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry.
In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you'll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide.
The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You'll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides:
Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms
The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.
Autorentext
ABOUT THE AUTHOR RIC MESSIER, CEH, GCIH, GSEC, CISSP, CCSP, is a consultant, educator, and author of numerous books on information security and digital forensics. With decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor and he is currently a Principal Consultant with Mandiant.
Klappentext
Your complete Guide to Preparing for the Certified Ethical Hacker version 12 Certification exam CEH(TM) v12 Certified Ethical Hacker Study Guide provides you with a hands-on resource for preparing for a challenging and coveted credential. This Sybex Study Guide covers every single domain and subject tested on the CEH certification exam in an easy-to-follow and intuitive format. The chapters-organized by exam objective and with sections mapped to each objective-make it simple to track your progress. This v12 edition is upgraded with more chapter review questions than ever before, the always enlightening Exam Essentials, and in total you'll get 750 test practice questions all designed to help you pass this critical exam on your first try. From common attack practices to intrusion detection and DoS attacks, you'll find everything you need to know in this comprehensive guide. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for:
Cryptography ABOUT THE CERTIFIED ETHICAL HACKER PROGRAM The Certified Ethical Hacker v12 credential demonstrates your expertise with the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals, as well as your commitment to the ethical deployment of those tools. Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to:
Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared
Inhalt
Introduction xvii
Assessment Test xxv
Chapter 1 Ethical Hacking 1
Overview of Ethics 2
Overview of Ethical Hacking 5
Attack Modeling 6
Cyber Kill Chain 7
Attack Lifecycle 8
MITRE ATT&CK Framework 10
Methodology of Ethical Hacking 12
Reconnaissance and Footprinting 12
Scanning and Enumeration 12
Gaining Access 13
Maintaining Access 14
Covering Tracks 14
Summary 15
Chapter 2 Networking Foundations 17
Communications Models 19
Open Systems Interconnection 20
TCP/IP Architecture 23
Topologies 24
Bus Network 24
Star Network 25
Ring Network 26
Mesh Network 27
Hybrid 28
Physical Networking 29
Addressing 29
Switching 30
IP 31
Headers 32
Addressing 34
Subnets 35
TCP 37
UDP 40
Internet Control Message Protocol 41
Network Architectures 42
Network Types 43
Isolation 44
Remote Access 45
Cloud Computing 46
Storage as a Service 47
Infrastructure as a Service 48
Platform as a Service 49
Software as a Service 51
Internet of Things 53
Summary 54
Review Questions 56
Chapter 3 Security Foundations 59
The Triad 61
Confidentiality 61
Integrity 63
Availability 64
Parkerian Hexad 65
Information Assurance and Risk 66
Policies, Standards, and Procedures 69
Security Policies 69
Security Standards 70
Procedures 71
Guidelines 72
Organizing Your Protections 72
Security Technology 75
Firewalls 76
Intrusion Detection Systems 80
Intrusion Prevention Systems 83
Endpoint Detection and Response 84
Security Information and Event Management 86
Being Prepared 87
Defense in Depth 87
Defense in Breadth 89
Defensible Network Architecture 90
Logging 91
Auditing 93
Summary 95
Review Questions 96
Chapter 4 Footprinting and Reconnaissance 101
Open Source Intelligence 103
Companies 103
People 112
Social Networking 115
Domain Name System 129
Name Lookups 130
Zone Transfers 136
Passive DNS 138
Passive Reconnaissance 142
Website Intelligence 145
Technology Intelligence 150
Google Hacking 150
Internet of Things (IoT) 152
Summary 154
Review Questions 157
Chapter 5 Scanning Networks 161
Ping Sweeps 163
Using fping 163
Using MegaPing 165
Port Scanning 167
nmap 168
masscan 184
MegaPing 186
Metasploit 188
Vulnerability Scanning 190
OpenVAS 192
Nessus 203
Looking for Vulnerabilities with Metasploit 209
Packet Crafting and Manipulation 210
hping 211
packETH 214
fragroute 217
Evasion Techniques 218
Evasion with nmap 221
Protecting and Detecting 223
Summary 224
Review Questions 226
Chapter 6 Enumeration 231
Service Enumeration 233
Countermeasures 236
Remote Procedure Calls 236
SunRPC 237
Remote Method Invocation 239
Server Message Block 242
Built- in Utilities 243
nmap Scripts 247
NetBIOS Enumerator 249
Metasploit 250
Other Utilities 254
Countermeasures 257
Simple Network Management Protocol …