Description

Book Synopsis
Intermediate user level

Table of Contents
Chapter 1. Introduction to Ethical Hacking

Identify the five phase of ethical hacking.

Identify the different types of hacker attacks.

Chapter 2. Footprinting and Reconnaissance & Scanning Networks

Identify the specific concepts associated with Footprinting.

Describe information gathering tools and methodology.

Explain DNS enumeration.

Perform active and passive reconnaissance.

Recognize the differences between port scanning, network scanning and vulnerability scanning.

Identify TCP flag types.

Identify types of port scans.

Identify scanning countermeasures

Chapter 3. Enumeration

Explain enumeration techniques.

Recognize how to establish sessions.

Identify enumeration countermeasures.

Perform active and passive enumeration.

Chapter 4. System Hacking

Identify different types of password attacks.

Use a password cracking tool.

Identify various password cracking countermeasures.

Identify different ways to hide files.

Recognize how to detect a rootkit.

Identify tools that can be used to cover attacker tracks.

Chapter 5. Trojans and Backdoor Viruses and Worms

Explain how a Trojan infects a system.

Identify ports used by Trojans and Trojan countermeasures.

Identify the symptoms of a virus.

Describe how a virus works.

Identify virus types, virus detection methods, and virus countermeasures.

Chapter 6. Sniffers and Social Engineering

Identify types of sniffing, and protocols vulnerable to sniffing.

Recognize types of sniffing attacks.

Identify methods for detecting sniffing.

Identify countermeasures for sniffing.

Identify different types of social engineering, and social engineering countermeasures.

Chapter 7. Denial of Service

Identify characteristics of a DoS attack.

Analyze symptoms of a DoS attack.

Recognize DoS attack techniques.

Identify detection techniques, and countermeasure strategies.

Chapter 8. Session Hijacking

Identify the proper order of steps used to conduct a session hijacking attack.

Recognize different types of session hijacking.

Identify TCP/IP hijacking.

Describe countermeasures to protect against session hijacking.

Chapter 9. Hacking Webservers

Define Web Server architecture.

Explain Web server vulnerabilities.

Explore various Web Server attacks.

Chapter 10. Hacking Web Applications

Identify Web application components.

Describe Web application attacks.

Identify countermeasures.

Chapter 11. SQL Injection

Examine SQL Injection Attacks.

Identify defensive strategies against SQL injection attacks.

Chapter 12. Hacking Wireless Networks

Identify various types of wireless networks.

Identify authentication methods, and types of wireless encryption.

Explain the methodology of wireless hacking.

Apply wireless commands and tools.

Examine plain text wireless traffic, wired equivalent privacy (WEP)

Chapter 13. Evading IDs, Firewalls, and Honeypots

Identify intrusion detection systems, and techniques.

Identify the classes of firewalls.

Define a honeypot.

Analyze internal and external network traffic using an intrusion detection system.

Chapter 14. Buffer Overflow

Define a buffer overflow.

Identify a buffer overflow.

Identify buffer overflow countermeasures.

Chapter 15. Cryptography

Recognize public key cryptography.

Identify a digital signature.

Define a message digest.

Define secure sockets layer (SSL).

Analyze encrypted email.

Chapter 16. Penetration Testing

Identify types of security assessments.

Identify steps of penetration testing.

Examine risk management.

Identify various penetration testing tools.

Certified Ethical Hacker CEH Preparation Guide

Product form

£41.24

Includes FREE delivery

RRP £54.99 – you save £13.75 (25%)

Order before 4pm today for delivery by Wed 17 Dec 2025.

A Paperback / softback by Ahmed Sheikh

Out of stock


    View other formats and editions of Certified Ethical Hacker CEH Preparation Guide by Ahmed Sheikh

    Publisher: APress
    Publication Date: 28/08/2021
    ISBN13: 9781484272572, 978-1484272572
    ISBN10: 1484272579

    Description

    Book Synopsis
    Intermediate user level

    Table of Contents
    Chapter 1. Introduction to Ethical Hacking

    Identify the five phase of ethical hacking.

    Identify the different types of hacker attacks.

    Chapter 2. Footprinting and Reconnaissance & Scanning Networks

    Identify the specific concepts associated with Footprinting.

    Describe information gathering tools and methodology.

    Explain DNS enumeration.

    Perform active and passive reconnaissance.

    Recognize the differences between port scanning, network scanning and vulnerability scanning.

    Identify TCP flag types.

    Identify types of port scans.

    Identify scanning countermeasures

    Chapter 3. Enumeration

    Explain enumeration techniques.

    Recognize how to establish sessions.

    Identify enumeration countermeasures.

    Perform active and passive enumeration.

    Chapter 4. System Hacking

    Identify different types of password attacks.

    Use a password cracking tool.

    Identify various password cracking countermeasures.

    Identify different ways to hide files.

    Recognize how to detect a rootkit.

    Identify tools that can be used to cover attacker tracks.

    Chapter 5. Trojans and Backdoor Viruses and Worms

    Explain how a Trojan infects a system.

    Identify ports used by Trojans and Trojan countermeasures.

    Identify the symptoms of a virus.

    Describe how a virus works.

    Identify virus types, virus detection methods, and virus countermeasures.

    Chapter 6. Sniffers and Social Engineering

    Identify types of sniffing, and protocols vulnerable to sniffing.

    Recognize types of sniffing attacks.

    Identify methods for detecting sniffing.

    Identify countermeasures for sniffing.

    Identify different types of social engineering, and social engineering countermeasures.

    Chapter 7. Denial of Service

    Identify characteristics of a DoS attack.

    Analyze symptoms of a DoS attack.

    Recognize DoS attack techniques.

    Identify detection techniques, and countermeasure strategies.

    Chapter 8. Session Hijacking

    Identify the proper order of steps used to conduct a session hijacking attack.

    Recognize different types of session hijacking.

    Identify TCP/IP hijacking.

    Describe countermeasures to protect against session hijacking.

    Chapter 9. Hacking Webservers

    Define Web Server architecture.

    Explain Web server vulnerabilities.

    Explore various Web Server attacks.

    Chapter 10. Hacking Web Applications

    Identify Web application components.

    Describe Web application attacks.

    Identify countermeasures.

    Chapter 11. SQL Injection

    Examine SQL Injection Attacks.

    Identify defensive strategies against SQL injection attacks.

    Chapter 12. Hacking Wireless Networks

    Identify various types of wireless networks.

    Identify authentication methods, and types of wireless encryption.

    Explain the methodology of wireless hacking.

    Apply wireless commands and tools.

    Examine plain text wireless traffic, wired equivalent privacy (WEP)

    Chapter 13. Evading IDs, Firewalls, and Honeypots

    Identify intrusion detection systems, and techniques.

    Identify the classes of firewalls.

    Define a honeypot.

    Analyze internal and external network traffic using an intrusion detection system.

    Chapter 14. Buffer Overflow

    Define a buffer overflow.

    Identify a buffer overflow.

    Identify buffer overflow countermeasures.

    Chapter 15. Cryptography

    Recognize public key cryptography.

    Identify a digital signature.

    Define a message digest.

    Define secure sockets layer (SSL).

    Analyze encrypted email.

    Chapter 16. Penetration Testing

    Identify types of security assessments.

    Identify steps of penetration testing.

    Examine risk management.

    Identify various penetration testing tools.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account