CHF32.70
Download est disponible immédiatement
As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more.
This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles.
Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated
Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions
Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security
Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms
Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
Auteur
RIC MESSIER, CEH, GCIH, GSEC, CISSP, CCSP is a consultant, educator, and author of many books on information security and digital forensics. With decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor.
Texte du rabat
Your complete guide to preparing for the Certified Ethical Hacker version 11 Certification exam CEH v11 Certified Ethical Hacker Study Guide gives you a hands-on resource for preparing for the challenging body of knowledge covered in the exam. This Sybex Study Guide covers 100% of the 2020 CEH certification requirements presented in an easy-to-follow approach. To keep track of your progress, chapters are organized by exam objective, with a section that maps each objective to its corresponding chapter. The text provides coverage of all topics, with chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT), cloud vulnerabilities, and more. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for:
Cryptography Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain a year of FREE access to:
Résumé
As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more.
This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles.
Contenu
Introduction xix
Assessment Test xxvi
Chapter 1 Ethical Hacking 1
Overview of Ethics 2
Overview of Ethical Hacking 5
Methodologies 6
Cyber Kill Chain 6
Attack Lifecycle 8
Methodology of Ethical Hacking 10
Reconnaissance and Footprinting 10
Scanning and Enumeration 11
Gaining Access 11
Maintaining Access 12
Covering Tracks 12
Summary 13
Chapter 2 Networking Foundations 15
Communications Models 17
Open Systems Interconnection 18
TCP/IP Architecture 21
Topologies 22
Bus Network 22
Star Network 23
Ring Network 24
Mesh Network 25
Hybrid 26
Physical Networking 27
Addressing 27
Switching 28
IP 29
Headers 29
Addressing 31
Subnets 33
TCP 34
UDP 38
Internet Control Message Protocol 39
Network Architectures 40
Network Types 40
Isolation 41
Remote Access 43
Cloud Computing 44
Storage as a Service 45
Infrastructure as a Service 46
Platform as a Service 48
Software as a Service 49
Internet of Things 51
Summary 52
Review Questions 54
Chapter 3 Security Foundations 57
The Triad 59
Confidentiality 59
Integrity 61
Availability 62
Parkerian Hexad 63
Risk 64
Policies, Standards, and Procedures 66
Security Policies 66
Security Standards 67
Procedures 68
Guidelines 68
Organizing Your Protections 69
Security Technology 72
Firewalls 72
Intrusion Detection Systems 77
Intrusion Prevention Systems 80
Endpoint Detection and Response 81
Security I…