Home > Art, Film & Photography > ITP Course Practice Test: Certified Ethical Hacker (CEH)
ITP Course Practice Test: Certified Ethical Hacker (CEH)

ITP Course Practice Test: Certified Ethical Hacker (CEH)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Take your IT career to the next level with this video-based online training course designed to provide you with the hands-on experience to mitigate your network, guard it from multifaceted attacks, and prepare you to succeed on the Certified Ethical Hacker (CEH) exam. With this expert-led certification prep course you'll get more than enough practice tests to confidently prepare for the CEH, along with lab-based, real-world projects that explore all sides of multi-pronged cybersecurity attacks to ensure your preparedness to combat attack threats. Who should take this course Skill level | Intermediate Anyone planning to take the EC-Council Certified Ethical Hacker (CEH) Exam to become a Certified Ethical Hacker Anyone who is interested in becoming a cybersecurity professional or concerned about the integrity of their network infrastructure Anyone interested in ethical hacking (penetration testing) In order to achieve certification via the Ethical Hacker (CEH) Certification exam, the EC-Council requires that applicants attend an EC-Council training session or show that they have 2 years of information security experience in each of the 5 CCISCO Domains. For an optimal course experience, we recommend using these browsers and devices. Course includes 18 hours of targeted video-based lessons led by industry experts Hands-on labs to simulate real-world experience performing footprinting, penetration testing, and security risk analysis, as well as measures to guard your network Self-study tools, such as flashcards to study key terms and quizzes to self-asses your progress Exclusive Pearson Test Prep practice exams to fully prepare to take the Certified Ethical Hacker (CEH) exam with confidence 1 year of access* What you'll learn This Pearson IT Training Course covers the full range of topics tested on the Certified Ethical Hacker (CEH) exam, including: Performing footprinting and reconScan networks Performing countermeasures against enumeration Conducting vulnerability analysis Hacking systems and covering your tracks Using and preventing malware Performing network sniffing Conducting social engineering methodologies and learning how to prevent them from happening Performing Denial-of-Service (DoS) and session hijacking attacks, as well as taking measures to guard against them Hacking web servers and applications using multiple tools and techniques Performing attacks using SQL injection Using the best tools and techniques for hacking wireless networks Deploying IDS, firewalls, and honeypots, as well as learning how to evade them Understanding and learning how to use cloud computing for penetration testing Understanding cryptography and cryptanalysis Exploiting the vulnerabilities of Internet of Things (IoT) devices Understanding the vulnerabilities of and methods to hack mobile devices *Retake guarantee Didn't pass your certification exam on your first try? We'll give you six months of additional access at no cost. About Pearson IT Training Courses Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level. From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Table of Contents:
Introduction Overview Module 1: Security Essentials Module 1: Introduction Lesson 1: Course Overview Lesson 1 Learning Objectives 1.1 Areas of Focus and Exam Info 1.2 Course Is and Isn't Lesson 2: Introduction to Ethical Hacking Lesson 2 Learning Objectives 2.1 Cybersecurity Overview 2.2 Threats and Attack Vectors 2.3 Attack Concepts 2.4 Understanding the Legal Aspects of Penetration Testing 2.5 Exploring Penetration Testing Methodologies 2.6 Attack Phases 2.7 Attack Types 2.8 InfoSec Policies Lesson 2: Review Lesson 2 Flashcards Lesson 2 Quiz Lesson 3: Footprinting and Recon Lesson 3 Learning Objectives 3.1 Footprinting Concepts 3.2 Footprinting Objectives 3.3 Footprinting Methodologies 3.4 Search Engines 3.5 Finding People 3.6 Competitive Intelligence 3.7 Websites 3.8 Email Tracking 3.9 Network Discovery 3.10 DNS/Whois 3.11 Social Engineering 3.12 Employee Online Activities 3.13 Footprinting Tools 3.14 Footprinting Countermeasures 3.15 Penetration Testing: Footprinting and Recon Lesson 3: Review Lesson 3 Flashcards Lesson 3 Quiz Lesson 4: Scanning Networks Lesson 4 Learning Objectives 4.1 Network Scanning Overview 4.2 Scanning Techniques 4.3 TCP/UDP Refresher 4.4 TCP Scanning Types 4.5 More TCP Scanning Techniques 4.6 Nmap Demo 4.7 IDS Evasion 4.8 Banner Grabbing 4.9 Vulnerability Scanning 4.10 Network Diagramming 4.11 Using and Chaining Proxies 4.12 HTTP and SSH Tunneling 4.13 Anonymizers 4.14 IP Spoofing and Countermeasures 4.15 Penetration Testing: Scanning Networks Lesson 4: Review Lesson 4 Flashcards Lesson 4 Quiz Module 1: Review Module 1 Quiz Module 2: System Security Module 2: Introduction Lesson 5: Enumeration Lesson 5 Learning Objectives 5.1 Enumeration Overview 5.2 NetBIOS Enumeration 5.3 Users and Default Passwords 5.4 SNMP Enumeration 5.5 Linux Enumeration 5.6 LDAP, NTP, SMTP, DNS Enumeration 5.7 Enumerating IKE, IPsec, VPNs 5.8 Enumeration Countermeasures 5.9 Penetration Testing: Enumeration Lesson 5: Review Lesson 5 Flashcards Lesson 5 Quiz Lesson 6: Vulnerability Analysis Lesson 6 Learning Objectives 6.1 Introducing Vulnerability Research and Classification 6.2 Exploring Vulnerability Assessment 6.3 Vulnerability Management Lifecycle (Vulnerability Assessment Phases) 6.4 Understanding Different Approaches of Vulnerability Assessment Solutions 6.5 Overview of Vulnerability Scoring Systems 6.6 Vulnerability Assessment Tools 6.7 Overview of Vulnerability Assessment Reports Lesson 6: Review Lesson 6 Flashcards Lesson 6 Quiz Lesson 7: System Hacking Lesson 7 Learning Objectives 7.1 Hacking Methodology 7.2 Password Cracking 7.3 Keyloggers and Anti-keyloggers 7.4 Microsoft Authentication 7.5 Defense Against Password Cracking 7.6 Privilege Escalation 7.7 Executing Applications 7.8 Rootkits and Anti-rootkits 7.9 NTFS Stream Manipulation 7.1 Steganography and Steganalysis Methods 7.11 Covering Tracks 7.12 Penetration Testing: System Hacking Lesson 7: Review Lesson 7 Flashcards Lesson 7 Quiz Lesson 8: Malware Threats Lesson 8 Learning Objectives 8.1 Understanding Malware and Malware Propagation Techniques 8.2 Trojans, Backdoors, Viruses, Worms 8.3 Indications of Infection 8.4 Common Ports 8.5 How Malware Gets Into a System 8.6 How to Detect 8.7 Anti-malware Software 8.8 Online Malware Analysis Services 8.9 Countermeasures 8.10 Penetration Testing: Malware Threats Lesson 8: Review Lesson 8 Flashcards Lesson 8 Quiz Lesson 9: Sniffing Lesson 9 Learning Objectives 9.1 Sniffing Overview 9.2 Sniffing Attack Types 9.3 Protocol Analyzers 9.4 Sniffing Tools 9.5 Sniffing Detection and Defense 9.6 Penetration Testing: Sniffing Lesson 9: Review Lesson 9 Flashcards Lesson 9 Quiz Lesson 10: Social Engineering Lesson 10 Learning Objectives 10.1 Social Engineering Concepts 10.2 Social Networking 10.3 Identity Theft 10.4 Social Engineering Countermeasures 10.5 Understanding Social Engineering 10.6 Surveying Social Engineering Methodologies 10.7 Understanding How to Target Employees 10.8 Exploring Social Engineering Tools 10.9 Exploring the Social Engineering Toolkit (SET) 10.10 Surveying Social Engineering Case Studies 10.11 Penetration Testing: Social Engineering Lesson 10: Review Lesson 10 Flashcards Lesson 10 Quiz Module 2: Review Module 2 Quiz Module 3: Network Security Module 3: Introduction Lesson 11: Denial-of-Service (DoS) Lesson 11 Learning Objectives 11.1 DoS/DDoS Overview 11.2 DoS Techniques 11.3 Botnets 11.4 DoS Attack Tools 11.5 Detection and Countermeasures 11.6 DDoS Protection Tools 11.7 Penetration Testing: DoS Lesson 11: Review Lesson 11 Flashcards Lesson 11 Quiz Lesson 12: Session Hijacking Lesson 12 Learning Objectives 12.1 What Is Session Hijacking? 12.2 Techniques 12.3 Application Level Session Hijacking 12.4 MitM Attacks 12.5 Cross-site Attacks 12.6 Network Level Hijacking 12.7 Session Hijacking Tools 12.8 Hijacking Protection 12.9 Penetration Testing: Session Hijacking Lesson 12: Review Lesson 12 Flashcards Lesson 12 Quiz Module 3: Review Module 3 Quiz Module 4: Web Services Security Module 4: Introduction Lesson 13: Hacking Webservers Lesson 13 Learning Objectives 13.1 Webserver Concepts 13.2 Webserver Attacks 13.3 Attack Methodology 13.4 Countermeasures 13.5 System Patch Management 13.6 Security Tools 13.7 Exploring CMS and Framework Identification 13.8 Surveying Web Crawlers and Directory Brute Force 13.9 Understanding How Web Application Scanners Work 13.10 Introducing Nikto 13.11 Introducing the Burp Suite 13.12 Introducing OWASP Zed Application Proxy (ZAP) 13.13 Introducing OpenVAS Lesson 13: Review Lesson 13 Flashcards Lesson 13 Quiz Lesson 14: Hacking Web Applications Lesson 14 Learning Objectives 14.1 Attack Vectors and Threats 14.2 Footprinting 14.3 Authentication and Authorization System Attacks 14.4 Understanding the Need for Web Application Penetration Testing 14.5 Exploring How Web Applications Have Evolved Over Time 14.6 Understanding the Web Application Protocols 14.7 Exploring the HTTP Request and Response 14.8 Surveying Session Management and Cookies 14.9 Understanding the APIs 14.10 Exploring the Tools Used to Test the APIs 14.11 Exploring Cloud Services 14.12 Exploring Web Application Frameworks 14.13 Surveying Docker Containers 14.14 Introducing DevOps 14.15 Understanding Authentication Schemes in Web Applications 14.16 Exploring Session Management Mechanisms and Related Vulnerabilities 14.17 Database Connectivity Attacks Lesson 14: Review Lesson 14 Flashcards Lesson 14 Quiz Lesson 15: Advanced Web Application Hacking Lesson 15 Learning Objectives 15.1 Understanding What is Command Injection 15.2 Exploiting Command Injection Vulnerabilities 15.3 Understanding What is XML Injection 15.4 Exploiting XML Injection Vulnerabilities 15.5 Undertanding How to Mitigate Injection Vulnerabilities 15.6 Understanding What is XSS 15.7 Exploiting Reflected XSS Vulnerabilities 15.8 Exploiting Stored XSS Vulnerabilities 15.9 Exploiting DOM Based XSS Vulnerabilities 15.10 Understanding Cross-Site Request Forgery (CSRF) 15.11 Exploiting CSRF Vulnerabilities 15.12 Evading Web Application Security Controls 15.13 Mitigating XSS and CSRF Vulnerabilities 15.14 Surveying the Client-side Code and Storage 15.15 Understanding HTML5 Implementations 15.16 Understanding AJAX Implementations 15.17 Mitigating AJAX, HTML5, and Client-side Vulnerabilities 15.18 Understanding the Other Common Security Flaws in Web Applications 15.19 Exploiting Insecure Direct Object References and Path Traversal 15.20 Surveying Information Disclosure Vulnerabilities 15.21 Fuzzing Web Applications 15.22 Web Application Security Tools 15.23 Web Application Firewalls Lesson 15: Review Lesson 15 Flashcards Lesson 15 Quiz Lesson 16: SQL Injection Lesson 16 Learning Objectives 16.1 Overview 16.2 Attacks Using SQL Injection 16.3 Methodology 16.4 Understanding SQL Injection 16.5 Exploiting SQL Injection Vulnerabilities 16.6 SQL Injection Defense 16.7 Detection Tools Lesson 16: Review Lesson 16 Flashcards Lesson 16 Quiz Module 4: Review Module 4 Quiz Module 5: Wireless and Internet Security Module 5: Introduction Lesson 17: Hacking Wireless Lesson 17 Learning Objectives 17.1 Wireless LAN Overview 17.2 Wireless Encryption 17.3 Wireless Threats 17.4 Understanding Wireless Antennas 17.5 Surveying Wi-Fi Devices Like the Pinneaple 17.6 Building Your Own Lab 17.7 Introducing the Aircrack-ng Suite 17.8 Introducing Airmon-ng 17.9 Understanding Airodump-ng 17.10 Introducing Aireplay-ng 17.11 Introducing Airdecap-ng 17.12 Introducing Airserv-ng 17.13 Introducing Airtun-ng 17.14 Understanding WEP Fundamentals 17.15 Learning How to Crack WEP 17.16 Understanding WPA Fundamentals 17.17 Surveying Attacks Against WPA2-PSK Networks 17.18 Using coWPAtty 17.19 Using Pyrit 17.20 Exploring WPA Enterprise Hacking 17.21 Using Kismet 17.22 Using Wireshark 17.23 Defining Evil Twin Attacks 17.24 Performing Evil Twin Attacks 17.25 Using Karmetasploit 17.26 Bluetooth and Bluejacking 17.27 Understanding Bluetooth Vulnerabilities 17.28 Surveying Tools for Bluetooth Monitoring 17.29 Wireless Attack Defense 17.30 Wireless IPS Lesson 17: Review Lesson 17 Flashcards Lesson 17 Quiz Lesson 18: IDS, Firewalls, and Honeypots Lesson 18 Learning Objectives 18.1 IDS, Firewall, and Honeypot Concepts 18.2 Firewall Tools 18.3 Honeypot Tools 18.4 IDS Tools 18.5 Evading IDS and Firewalls 18.6 Evading IDS and Firewall Tools 18.7 Detecting Honeypots 18.8 Penetration Testing: IDS, Firewalls, and Honeypots Lesson 18: Review Lesson 18 Flashcards Lesson 18 Quiz Lesson 19: Cloud Computing Lesson 19 Learning Objectives 19.1 Overview 19.2 Providers 19.3 Detection 19.4 Instance and VPC Security Methods 19.5 Cloud Use as a Pen Testing Source 19.6 Understanding the Challenge of Testing Cloud Services 19.7 Exploring How to Test in the Cloud Lesson 19: Review Lesson 19 Flashcards Lesson 19 Quiz Lesson 20: Cryptography Lesson 20 Learning Objectives 20.1 Overview 20.2 Algorithms 20.3 Tools 20.4 Public Key Infrastructure 20.5 Email 20.6 Disk Encryption and Tools 20.7 Attacks Against Cryptography 20.8 Cryptanalysis Tools Lesson 20: Review Lesson 20 Flashcards Lesson 20 Quiz Lesson 21: IoT Hacking Lesson 21 Learning Objectives 21.1 Understanding IoT Fundamentals 21.2 Exploring ZigBee and IEEE 802.15.4 21.3 Exploring INSTEON 21.4 Exploring ZWave 21.5 Exploring LoRA 21.6 Overview of IoT Penetration Testing 21.7 IoT Security Tools Lesson 21: Review Lesson 21 Flashcards Lesson 21 Quiz Lesson 22: Hacking Mobile Platforms Lesson 22 Learning Objectives 22.1 Understanding OWASP Mobile Device Vulnerabilities 22.2 Wrestling with the BYOD Dilemma 22.3 Understanding Mobile Device Management (MDM) 22.4 Understanding Mobile Device Security Policies 22.5 Exploring The Android Security Model 22.6 Exploring Android Emulators and SDK 22.7 Understanding Android Hacking Tools and Methodologies 22.8 Introducing iOS Security 22.9 Exploring Jailbraking iOS 22.1 Surveying Tools for Dissasembling iOS Applications 22.11 Understanding Mobile Spyware 22.12 Exploring How to Make Your Own STORM-like Mobile Hacking Device Lesson 22: Review Lesson 22 Flashcards Lesson 22 Quiz Module 5: Review Module 5 Quiz CEH Version 11 Bonus Content CEH v11 Bonus Content Learning Objectives Understanding IoT Security Threats The Utility Industry Communications Over the Utility WAN Field Area Networks (FANs) IoT Industrial Network Architecture Factory Security The Oil and Gas Industry—Trends and Challenges IoT Architectures for Oil and Gas Securing IoT for Oil and Gas IoT Architecture for Mining Surveying Unsecure Code Practices and Insecure APIs Understanding Security Threats in Cloud Environments Understanding VXLAN and Network Overlays Understanding Microsegmentation Introducing the Different Cloud Deployment and Service Models Surveying Patch Management in the Cloud Performing Security Assessments in Cloud Environments Introducing Agile, DevOps, and CI/CD Pipelines Introducing Serverless Computing Understanding Container Orchestration and an Introduction to Kubernetes Exploring the Concepts of DevSecOps Attacking WPA2 Implementations Assessing Unsecure Code Practices and APIs Exploring Sandboxes and Virtual Machine Escape Attacks The Evolution of IEEE 802.11 Security WPA3 Security Understanding API Access Understanding Authentication Understanding Authorization Modes Managing Security Contexts Managing Kubernetes User Accounts Managing Security (Video Lab) Managing Security (Video Lab Solution) Understanding File-less Malware Concepts Introducing Malware Analysis Exploring WPA3 Attacks and Mitigation


Best Sellers


Product Details
  • ISBN-13: 9780137311316
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson It Certification
  • Language: English
  • ISBN-10: 0137311311
  • Publisher Date: 05 Nov 2020
  • Binding: Digital online
  • Sub Title: Certified Ethical Hacker (CEH)


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
ITP Course Practice Test: Certified Ethical Hacker (CEH)
Pearson Education (US) -
ITP Course Practice Test: Certified Ethical Hacker (CEH)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

ITP Course Practice Test: Certified Ethical Hacker (CEH)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA