Copyright 2021
Edition: 1st
Practice Test
ISBN-10: 0-13-731284-9
ISBN-13: 978-0-13-731284-9
Take your IT career to the next level with this video-based online training course designed to provide you with the hands-on experience to mitigate your network, guard it from multifaceted attacks, and prepare you to succeed on the Certified Ethical Hacker (CEH) exam. With this expert-led certification prep course you'll get more than enough practice tests to confidently prepare for the CEH, along with lab-based, real-world projects that explore all sides of multi-pronged cybersecurity attacks to ensure your preparedness to combat attack threats.
Who should take this course Skill level | Intermediate
Anyone planning to take the EC-Council Certified Ethical Hacker (CEH) Exam to become a Certified Ethical Hacker Anyone who is interested in becoming a cybersecurity professional or concerned about the integrity of their network infrastructure Anyone interested in ethical hacking (penetration testing) In order to achieve certification via the Ethical Hacker (CEH) Certification exam, the EC-Council requires that applicants attend an EC-Council training session or show that they have 2 years of information security experience in each of the 5 CCISCO Domains .
For an optimal course experience, we recommend using these browsers and devices .
Course includes 18 hours of targeted video-based lessons led by industry experts Hands-on labs to simulate real-world experience performing footprinting, penetration testing, and security risk analysis, as well as measures to guard your network Self-study tools, such as flashcards to study key terms and quizzes to self-asses your progress Exclusive Pearson Test Prep practice exams to fully prepare to take the Certified Ethical Hacker (CEH) exam with confidence 1 year of access* What you'll learn This Pearson IT Training Course covers the full range of topics tested on the Certified Ethical Hacker (CEH) exam, including:
Performing footprinting and reconScan networks Performing countermeasures against enumeration Conducting vulnerability analysis Hacking systems and covering your tracks Using and preventing malware Performing network sniffing Conducting social engineering methodologies and learning how to prevent them from happening Performing Denial-of-Service (DoS) and session hijacking attacks, as well as taking measures to guard against them Hacking web servers and applications using multiple tools and techniques Performing attacks using SQL injection Using the best tools and techniques for hacking wireless networks Deploying IDS, firewalls, and honeypots, as well as learning how to evade them Understanding and learning how to use cloud computing for penetration testing Understanding cryptography and cryptanalysis Exploiting the vulnerabilities of Internet of Things (IoT) devices Understanding the vulnerabilities of and methods to hack mobile devices *Retake guarantee Didn't pass your certification exam on your first try? We'll give you six months of additional access at no cost.
About Pearson IT Training Courses Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level.
From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.
Table of Contents
Introduction
Overview Module 1: Security Essentials Module 1: Introduction Lesson 1: Course Overview Lesson 1 Learning Objectives 1.1 Areas of Focus and Exam Info 1.2 Course Is and Isn't Lesson 2: Introduction to Ethical Hacking Lesson 2 Learning Objectives 2.1 Cybersecurity Overview 2.2 Threats and Attack Vectors 2.3 Attack Concepts 2.4 Understanding the Legal Aspects of Penetration Testing 2.5 Exploring Penetration Testing Methodologies 2.6 Attack Phases 2.7 Attack Types 2.8 InfoSec Policies Lesson 2: ReviewLesson 2 Flashcards Lesson 2 Quiz Lesson 3: Footprinting and Recon Lesson 3 Learning Objectives 3.1 Footprinting Concepts 3.2 Footprinting Objectives 3.3 Footprinting Methodologies 3.4 Search Engines 3.5 Finding People 3.6 Competitive Intelligence 3.7 Websites 3.8 Email Tracking 3.9 Network Discovery 3.10 DNS/Whois 3.11 Social Engineering 3.12 Employee Online Activities 3.13 Footprinting Tools 3.14 Footprinting Countermeasures 3.15 Penetration Testing: Footprinting and Recon Lesson 3: ReviewLesson 3 Flashcards Lesson 3 Quiz Lesson 4: Scanning Networks Lesson 4 Learning Objectives 4.1 Network Scanning Overview 4.2 Scanning Techniques 4.3 TCP/UDP Refresher 4.4 TCP Scanning Types 4.5 More TCP Scanning Techniques 4.6 Nmap Demo 4.7 IDS Evasion 4.8 Banner Grabbing 4.9 Vulnerability Scanning 4.10 Network Diagramming 4.11 Using and Chaining Proxies 4.12 HTTP and SSH Tunneling 4.13 Anonymizers 4.14 IP Spoofing and Countermeasures 4.15 Penetration Testing: Scanning Networks Lesson 4: ReviewLesson 4 Flashcards Lesson 4 Quiz Module 1: ReviewModule 1 Quiz Module 2: System Security Module 2: Introduction Lesson 5: Enumeration Lesson 5 Learning Objectives 5.1 Enumeration Overview 5.2 NetBIOS Enumeration 5.3 Users and Default Passwords 5.4 SNMP Enumeration 5.5 Linux Enumeration 5.6 LDAP, NTP, SMTP, DNS Enumeration 5.7 Enumerating IKE, IPsec, VPNs 5.8 Enumeration Countermeasures 5.9 Penetration Testing: Enumeration Lesson 5: ReviewLesson 5 Flashcards Lesson 5 Quiz Lesson 6: Vulnerability Analysis Lesson 6 Learning Objectives 6.1 Introducing Vulnerability Research and Classification 6.2 Exploring Vulnerability Assessment 6.3 Vulnerability Management Lifecycle (Vulnerability Assessment Phases) 6.4 Understanding Different Approaches of Vulnerability Assessment Solutions 6.5 Overview of Vulnerability Scoring Systems 6.6 Vulnerability Assessment Tools 6.7 Overview of Vulnerability Assessment Reports Lesson 6: ReviewLesson 6 Flashcards Lesson 6 Quiz Lesson 7: System Hacking Lesson 7 Learning Objectives 7.1 Hacking Methodology 7.2 Password Cracking 7.3 Keyloggers and Anti-keyloggers 7.4 Microsoft Authentication 7.5 Defense Against Password Cracking 7.6 Privilege Escalation 7.7 Executing Applications 7.8 Rootkits and Anti-rootkits 7.9 NTFS Stream Manipulation 7.1 Steganography and Steganalysis Methods 7.11 Covering Tracks 7.12 Penetration Testing: System Hacking Lesson 7: ReviewLesson 7 Flashcards Lesson 7 Quiz Lesson 8: Malware Threats Lesson 8 Learning Objectives 8.1 Understanding Malware and Malware Propagation Techniques 8.2 Trojans, Backdoors, Viruses, Worms 8.3 Indications of Infection 8.4 Common Ports 8.5 How Malware Gets Into a System 8.6 How to Detect 8.7 Anti-malware Software 8.8 Online Malware Analysis Services 8.9 Countermeasures 8.10 Penetration Testing: Malware Threats Lesson 8: ReviewLesson 8 Flashcards Lesson 8 Quiz Lesson 9: Sniffing Lesson 9 Learning Objectives 9.1 Sniffing Overview 9.2 Sniffing Attack Types 9.3 Protocol Analyzers 9.4 Sniffing Tools 9.5 Sniffing Detection and Defense 9.6 Penetration Testing: Sniffing Lesson 9: ReviewLesson 9 Flashcards Lesson 9 Quiz Lesson 10: Social Engineering Lesson 10 Learning Objectives 10.1 Social Engineering Concepts 10.2 Social Networking 10.3 Identity Theft 10.4 Social Engineering Countermeasures 10.5 Understanding Social Engineering 10.6 Surveying Social Engineering Methodologies 10.7 Understanding How to Target Employees 10.8 Exploring Social Engineering Tools 10.9 Exploring the Social Engineering Toolkit (SET) 10.10 Surveying Social Engineering Case Studies 10.11 Penetration Testing: Social Engineering Lesson 10: ReviewLesson 10 Flashcards Lesson 10 Quiz Module 2: ReviewModule 2 Quiz Module 3: Network Security Module 3: Introduction Lesson 11: Denial-of-Service (DoS) Lesson 11 Learning Objectives 11.1 DoS/DDoS Overview 11.2 DoS Techniques 11.3 Botnets 11.4 DoS Attack Tools 11.5 Detection and Countermeasures 11.6 DDoS Protection Tools 11.7 Penetration Testing: DoS Lesson 11: ReviewLesson 11 Flashcards Lesson 11 Quiz Lesson 12: Session Hijacking Lesson 12 Learning Objectives 12.1 What Is Session Hijacking? 12.2 Techniques 12.3 Application Level Session Hijacking 12.4 MitM Attacks 12.5 Cross-site Attacks 12.6 Network Level Hijacking 12.7 Session Hijacking Tools 12.8 Hijacking Protection 12.9 Penetration Testing: Session Hijacking Lesson 12: ReviewLesson 12 Flashcards Lesson 12 Quiz Module 3: ReviewModule 3 Quiz Module 4: Web Services Security Module 4: Introduction Lesson 13: Hacking Webservers Lesson 13 Learning Objectives 13.1 Webserver Concepts 13.2 Webserver Attacks 13.3 Attack Methodology 13.4 Countermeasures 13.5 System Patch Management 13.6 Security Tools 13.7 Exploring CMS and Framework Identification 13.8 Surveying Web Crawlers and Directory Brute Force 13.9 Understanding How Web Application Scanners Work 13.10 Introducing Nikto 13.11 Introducing the Burp Suite 13.12 Introducing OWASP Zed Application Proxy (ZAP) 13.13 Introducing OpenVAS Lesson 13: ReviewLesson 13 Flashcards Lesson 13 Quiz Lesson 14: Hacking Web Applications Lesson 14 Learning Objectives 14.1 Attack Vectors and Threats 14.2 Footprinting 14.3 Authentication and Authorization System Attacks 14.4 Understanding the Need for Web Application Penetration Testing 14.5 Exploring How Web Applications Have Evolved Over Time 14.6 Understanding the Web Application Protocols 14.7 Exploring the HTTP Request and Response 14.8 Surveying Session Management and Cookies 14.9 Understanding the APIs 14.10 Exploring the Tools Used to Test the APIs 14.11 Exploring Cloud Services 14.12 Exploring Web Application Frameworks 14.13 Surveying Docker Containers 14.14 Introducing DevOps 14.15 Understanding Authentication Schemes in Web Applications 14.16 Exploring Session Management Mechanisms and Related Vulnerabilities 14.17 Database Connectivity Attacks Lesson 14: ReviewLesson 14 Flashcards Lesson 14 Quiz Lesson 15: Advanced Web Application Hacking Lesson 15 Learning Objectives 15.1 Understanding What is Command Injection 15.2 Exploiting Command Injection Vulnerabilities 15.3 Understanding What is XML Injection 15.4 Exploiting XML Injection Vulnerabilities 15.5 Undertanding How to Mitigate Injection Vulnerabilities 15.6 Understanding What is XSS 15.7 Exploiting Reflected XSS Vulnerabilities 15.8 Exploiting Stored XSS Vulnerabilities 15.9 Exploiting DOM Based XSS Vulnerabilities 15.10 Understanding Cross-Site Request Forgery (CSRF) 15.11 Exploiting CSRF Vulnerabilities 15.12 Evading Web Application Security Controls 15.13 Mitigating XSS and CSRF Vulnerabilities 15.14 Surveying the Client-side Code and Storage 15.15 Understanding HTML5 Implementations 15.16 Understanding AJAX Implementations 15.17 Mitigating AJAX, HTML5, and Client-side Vulnerabilities 15.18 Understanding the Other Common Security Flaws in Web Applications 15.19 Exploiting Insecure Direct Object References and Path Traversal 15.20 Surveying Information Disclosure Vulnerabilities 15.21 Fuzzing Web Applications 15.22 Web Application Security Tools 15.23 Web Application Firewalls Lesson 15: ReviewLesson 15 Flashcards Lesson 15 Quiz Lesson 16: SQL Injection Lesson 16 Learning Objectives 16.1 Overview 16.2 Attacks Using SQL Injection 16.3 Methodology 16.4 Understanding SQL Injection 16.5 Exploiting SQL Injection Vulnerabilities 16.6 SQL Injection Defense 16.7 Detection Tools Lesson 16: ReviewLesson 16 Flashcards Lesson 16 Quiz Module 4: ReviewModule 4 Quiz Module 5: Wireless and Internet Security Module 5: Introduction Lesson 17: Hacking Wireless Lesson 17 Learning Objectives 17.1 Wireless LAN Overview 17.2 Wireless Encryption 17.3 Wireless Threats 17.4 Understanding Wireless Antennas 17.5 Surveying Wi-Fi Devices Like the Pinneaple 17.6 Building Your Own Lab 17.7 Introducing the Aircrack-ng Suite 17.8 Introducing Airmon-ng 17.9 Understanding Airodump-ng 17.10 Introducing Aireplay-ng 17.11 Introducing Airdecap-ng 17.12 Introducing Airserv-ng 17.13 Introducing Airtun-ng 17.14 Understanding WEP Fundamentals 17.15 Learning How to Crack WEP 17.16 Understanding WPA Fundamentals 17.17 Surveying Attacks Against WPA2-PSK Networks 17.18 Using coWPAtty 17.19 Using Pyrit 17.20 Exploring WPA Enterprise Hacking 17.21 Using Kismet 17.22 Using Wireshark 17.23 Defining Evil Twin Attacks 17.24 Performing Evil Twin Attacks 17.25 Using Karmetasploit 17.26 Bluetooth and Bluejacking 17.27 Understanding Bluetooth Vulnerabilities 17.28 Surveying Tools for Bluetooth Monitoring 17.29 Wireless Attack Defense 17.30 Wireless IPS Lesson 17: ReviewLesson 17 Flashcards Lesson 17 Quiz Lesson 18: IDS, Firewalls, and Honeypots Lesson 18 Learning Objectives 18.1 IDS, Firewall, and Honeypot Concepts 18.2 Firewall Tools 18.3 Honeypot Tools 18.4 IDS Tools 18.5 Evading IDS and Firewalls 18.6 Evading IDS and Firewall Tools 18.7 Detecting Honeypots 18.8 Penetration Testing: IDS, Firewalls, and Honeypots Lesson 18: ReviewLesson 18 Flashcards Lesson 18 Quiz Lesson 19: Cloud Computing Lesson 19 Learning Objectives 19.1 Overview 19.2 Providers 19.3 Detection 19.4 Instance and VPC Security Methods 19.5 Cloud Use as a Pen Testing Source 19.6 Understanding the Challenge of Testing Cloud Services 19.7 Exploring How to Test in the Cloud Lesson 19: ReviewLesson 19 Flashcards Lesson 19 Quiz Lesson 20: Cryptography Lesson 20 Learning Objectives 20.1 Overview 20.2 Algorithms 20.3 Tools 20.4 Public Key Infrastructure 20.5 Email 20.6 Disk Encryption and Tools 20.7 Attacks Against Cryptography 20.8 Cryptanalysis Tools Lesson 20: ReviewLesson 20 Flashcards Lesson 20 Quiz Lesson 21: IoT Hacking Lesson 21 Learning Objectives 21.1 Understanding IoT Fundamentals 21.2 Exploring ZigBee and IEEE 802.15.4 21.3 Exploring INSTEON 21.4 Exploring ZWave 21.5 Exploring LoRA 21.6 Overview of IoT Penetration Testing 21.7 IoT Security Tools Lesson 21: ReviewLesson 21 Flashcards Lesson 21 Quiz Lesson 22: Hacking Mobile Platforms Lesson 22 Learning Objectives 22.1 Understanding OWASP Mobile Device Vulnerabilities 22.2 Wrestling with the BYOD Dilemma 22.3 Understanding Mobile Device Management (MDM) 22.4 Understanding Mobile Device Security Policies 22.5 Exploring The Android Security Model 22.6 Exploring Android Emulators and SDK 22.7 Understanding Android Hacking Tools and Methodologies 22.8 Introducing iOS Security 22.9 Exploring Jailbraking iOS 22.1 Surveying Tools for Dissasembling iOS Applications 22.11 Understanding Mobile Spyware 22.12 Exploring How to Make Your Own STORM-like Mobile Hacking Device Lesson 22: ReviewLesson 22 Flashcards Lesson 22 Quiz Module 5: ReviewModule 5 Quiz CEH Version 11 Bonus Content CEH v11 Bonus Content Learning Objectives Understanding IoT Security Threats The Utility Industry Communications Over the Utility WAN Field Area Networks (FANs) IoT Industrial Network Architecture Factory Security The Oil and Gas IndustryTrends and Challenges IoT Architectures for Oil and Gas Securing IoT for Oil and Gas IoT Architecture for Mining Surveying Unsecure Code Practices and Insecure APIs Understanding Security Threats in Cloud Environments Understanding VXLAN and Network Overlays Understanding Microsegmentation Introducing the Different Cloud Deployment and Service Models Surveying Patch Management in the Cloud Performing Security Assessments in Cloud Environments Introducing Agile, DevOps, and CI/CD Pipelines Introducing Serverless Computing Understanding Container Orchestration and an Introduction to Kubernetes Exploring the Concepts of DevSecOps Attacking WPA2 Implementations Assessing Unsecure Code Practices and APIs Exploring Sandboxes and Virtual Machine Escape Attacks The Evolution of IEEE 802.11 Security WPA3 Security Understanding API Access Understanding Authentication Understanding Authorization Modes Managing Security Contexts Managing Kubernetes User Accounts Managing Security (Video Lab) Managing Security (Video Lab Solution) Understanding File-less Malware Concepts Introducing Malware Analysis Exploring WPA3 Attacks and Mitigation