You are previewing CEH v9.
O'Reilly logo
CEH v9

Book Description

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material.

The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material.

  • Review all CEH v9 topics systematically
  • Reinforce critical skills with hands-on exercises
  • Learn how concepts apply in real-world scenarios
  • Identify key proficiencies prior to the exam

The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam—making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors.

Table of Contents

  1. Introduction
    1. Exam 312-50 Exam Objectives
  2. Assessment Test
    1. Answers to Assessment Test
  3. Chapter 1: Introduction to Ethical Hacking
    1. Hacking: the Evolution
    2. So, What Is an Ethical Hacker?
    3. Summary
    4. Exam Essentials
    5. Review Questions
  4. Chapter 2: System Fundamentals
    1. Exploring Network Topologies
    2. Working with the Open Systems Interconnection Model
    3. Dissecting the TCP/IP Suite
    4. IP Subnetting
    5. Hexadecimal vs. Binary
    6. Exploring TCP/IP Ports
    7. Understanding Network Devices
    8. Working with MAC Addresses
    9. Intrusion Prevention and Intrusion Detection Systems
    10. Network Security
    11. Knowing Operating Systems
    12. Backups and Archiving
    13. Summary
    14. Exam Essentials
    15. Review Questions
  5. Chapter 3: Cryptography
    1. Cryptography: Early Applications and Examples
    2. Cryptography in Action
    3. Understanding Hashing
    4. Issues with Cryptography
    5. Applications of Cryptography
    6. Summary
    7. Exam Essentials
    8. Review Questions
  6. Chapter 4: Footprinting
    1. Understanding the Steps of Ethical Hacking
    2. What Is Footprinting?
    3. Terminology in Footprinting
    4. Threats Introduced by Footprinting
    5. The Footprinting Process
    6. Summary
    7. Exam Essentials
    8. Review Questions
  7. Chapter 5: Scanning
    1. What Is Scanning?
    2. Checking for Live Systems
    3. Checking the Status of Ports
    4. The Family Tree of Scans
    5. OS Fingerprinting
    6. Countermeasures
    7. Vulnerability Scanning
    8. Mapping the Network
    9. Using Proxies
    10. Summary
    11. Exam Essentials
    12. Review Questions
  8. Chapter 6: Enumeration
    1. A Quick Review
    2. What Is Enumeration?
    3. About Windows Enumeration
    4. Linux Basic
    5. Enumeration with SNMP
    6. Unix and Linux Enumeration
    7. LDAP and Directory Service Enumeration
    8. Enumeration Using NTP
    9. SMTP Enumeration
    10. Summary
    11. Exam Essentials
    12. Review Questions
  9. Chapter 7: System Hacking
    1. Up to This Point
    2. System Hacking
    3. Summary
    4. Exam Essentials
    5. Review Questions
  10. Chapter 8: Malware
    1. Malware
    2. Overt and Covert Channels
    3. Summary
    4. Exam Essentials
    5. Review Questions
  11. Chapter 9: Sniffers
    1. Understanding Sniffers
    2. Using a Sniffer
    3. Switched Network Sniffing
    4. Summary
    5. Exam Essentials
    6. Review Questions
  12. Chapter 10: Social Engineering
    1. What Is Social Engineering?
    2. Social Networking to Gather Information?
    3. Commonly Employed Threats
    4. Identity Theft
    5. Summary
    6. Exam Essentials
    7. Review Questions
  13. Chapter 11: Denial of Service
    1. Understanding DoS
    2. Understanding DDoS
    3. DoS Tools
    4. DDoS Tools
    5. DoS Defensive Strategies
    6. DoS Pen-Testing Considerations
    7. Summary
    8. Exam Essentials
    9. Review Questions
  14. Chapter 12: Session Hijacking
    1. Understanding Session Hijacking
    2. Exploring Defensive Strategies
    3. Summary
    4. Exam Essentials
    5. Review Questions
  15. Chapter 13: Web Servers and Applications
    1. Exploring the Client-Server Relationship
    2. Summary
    3. Exam Essentials
    4. Review Questions
  16. Chapter 14: SQL Injection
    1. Introducing SQL Injection
    2. Summary
    3. Exam Essentials
    4. Review Questions
  17. Chapter 15: Hacking Wi-Fi and Bluetooth
    1. What Is a Wireless Network?
    2. Summary
    3. Exam Essentials
    4. Review Questions
  18. Chapter 16: Mobile Device Security
    1. Mobile OS Models and Architectures
    2. Goals of Mobile Security
    3. Device Security Models
    4. Countermeasures
    5. Summary
    6. Exam Essentials
    7. Review Questions
  19. Chapter 17: Evasion
    1. Honeypots, IDSs, and Firewalls
    2. Summary
    3. Exam Essentials
    4. Review Questions
  20. Chapter 18: Cloud Technologies and Security
    1. What Is the Cloud?
    2. Summary
    3. Exam Essentials
    4. Review Questions
  21. Chapter 19: Physical Security
    1. Introducing Physical Security
    2. Summary
    3. Exam Essentials
    4. Review Questions
  22. Appendix A: Answers to Review Questions
    1. Chapter 1: Introduction to Ethical Hacking
    2. Chapter 2: System Fundamentals
    3. Chapter 3: Cryptography
    4. Chapter 4: Footprinting
    5. Chapter 5: Scanning
    6. Chapter 6: Enumeration
    7. Chapter 7: System Hacking
    8. Chapter 8: Malware
    9. Chapter 9: Sniffers
    10. Chapter 10: Social Engineering
    11. Chapter 11: Denial of Service
    12. Chapter 12: Session Hijacking
    13. Chapter 13: Web Servers and Applications
    14. Chapter 14: SQL Injection
    15. Chapter 15: Hacking Wi-Fi and Bluetooth
    16. Chapter 16: Mobile Device Security
    17. Chapter 17: Evasion
    18. Chapter 18: Cloud Technologies and Security
    19. Chapter 19: Physical Security
  23. Appendix B: Penetration Testing Frameworks
    1. Overview of Alternative Methods
    2. Penetration Testing Execution Standard
    3. Summary
  24. Appendix C: Building a Lab
    1. Why Build a Lab?
    2. Creating a Test Setup
    3. The Installation Process
    4. Summary
  25. Advert
  26. EULA