Certified Ethical Hacker (CEH) preparation guide lesson-based review of ethical hacking and penetration testing

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam -- a qualification that tests the cybersecurity professional's baseline knowledge of security threats, risks, an...

Full description

Bibliographic Details
Main Author: Sheikh, Ahmed
Format: eBook
Language:English
Published: Berkeley, CA Apress L.P. 2021
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Chapter 1. Introduction to Ethical Hacking
  • Chapter 2. Footprinting and Reconnaissance/Scanning Networks
  • Chapter 3. Enumeration
  • Chapter 4. System Hacking
  • Chapter 5. Trojans and Backdoor/Viruses and Worms
  • Chapter 6. Sniffers and Social Engineering
  • Chapter 7. Denial of Service
  • Chapter 8. Session Hijacking
  • Chapter 9. Hacking Webservers
  • Chapter 10. Hacking Web Applications
  • Chapter 11. SQL Injection
  • Chapter 12. Hacking Wireless Networks
  • Chapter 13. Evading Intrusion Detection Systems, Firewalls, and Honeypots
  • Chapter 14. Buffer Overflow
  • Chapter 15. Cryptography
  • Chapter 16. Penetration Testing