leechers: 2 Added on May 20, 2016 by trancedudein Books > Ebooks Torrent verified.
CEH v9 Certified Ethical Hacker Version 9 Study Guide, 3rd Edition (Size: 15.07 MB)
Description CEH v9 Certified Ethical Hacker Version 9 Study Guide, 3rd Edition Details: CEH v9: Certified Ethical Hacker Version 9 Study Guide, 3rd Edition Oriyano 2016 | ISBN-10: 1119252245 | 648 pages | PDF, EPUB| 9+7 MB The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. Review all CEH v9 topics systematically Reinforce critical skills with hands-on exercises Learn how concepts apply in real-world scenarios Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam—making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors. PS : If You got an error while extracting while others are working try diferent directory path in your PC. Somtimes if you got a long directory path while extracting it will giv you an error. To solve this issue , as an example just paste the tgz file in C drive and extract (just inside the C drive not with in any other folder). Hope your Understand Update Torrent Stats to see Current Seeders and Leechers Visit my account to download more apps and ebooks + magazines If This Torrent Helpful Please Support the Authors by Purchasing It!.. Thanx http://i52.fastpic.ru/big/20...04e0648651bc4bb3f9fb2bf8.gif http://i64.fastpic.ru/big/20...cda43a4b9f8de099d0a1cba0.gif http://i61.fastpic.ru/big/20...13635c7e6629451e48dc9fdc.jpg http://i61.fastpic.ru/big/20...4aa8da93343400a4fe87e83a.jpg Related Torrents
Sharing Widget Download torrent seeders:2 CEH v9 Certified Ethical Hacker Version 9 Study Guide, 3rd Edition |
Home > Store
Certified Ethical Hacker C E H TM Certified Ethical Hacker Target Audience Ethical hackers, System Administrators, Network Administrators and Engineers, Webmanagers, Auditors, Security Professionals in general. C E H TM Certified Ethical Hacker Suggested Duration 5 days (9am – 5pm) Minimum 40 hours Certification. Certified Ethical Hacker (CEH) v9 tool kit (Software PDF Slides). ISO software package + Pdf. Certified Ethical Hacker CEH v9. The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally.
- By Michael Gregg
- Published Apr 28, 2017 by Pearson IT Certification. Part of the Certification Guide series.
Premium Edition eBook
- Your Price: $47.99
- List Price: $59.99
- Link to download the enhanced Pearson IT Certification Practice Test exam engine
- Access code for question database
- eBook in the following formats, accessible from your Account page after purchase:
The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Tests. Click on the 'Premium Edition' tab (on the left side of this page) to learn more about this product.
Your purchase will deliver:
EPUBThe open industry format known for its reflowable content and usability on supported mobile devices.
MOBIThe eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDFThe popular standard, used most often with the free Adobe® Reader® software.
The eBooks require no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
About
Features
- Fully revised and updated for the newly-released CEH 9.0 exam objectives
- In-depth, expert explanations of all attacks, countermeasures, and techniques covered on the CEH exam
- Learn from widely-recognized security author Michael Gregg, a nine-time winner of Global Knowledge’s Perfect Instructor Award
- Practice with hundreds of challenging practice questions delivered through Pearson’s state-of-the-art PCPT testing engine
- Build and deepen your knowledge with popular Cert Guide features such as Memory Tables and Exam Alerts
Description
- Copyright 2017
- Dimensions: 7-3/8' x 9-1/8'
- Pages: 650
- Edition: 2nd
- Premium Edition eBook
- ISBN-10: 0-13-468080-4
- ISBN-13: 978-0-13-468080-4
Certified Ethical Hacker (CEH) Version 9 Cert Guide, Premium Edition eBook and Practice Test
The exciting new Certified Ethical Hacker (CEH) Version 9 Cert Guide, Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice text software. The Premium Edition eBook and Practice Test contains the following items:
· The Certified Ethical Hacker (CEH) Version 9 Cert Guide Premium Edition Practice Test, including four practice exams and enhanced practice test features
· PDF and EPUB formats of the Certified Ethical Hacker (CEH) Version 9 Cert Guide from Pearson IT Certification, which are accessible via your PC, tablet, and smartphone
About the Premium Edition Practice Test
This Premium Edition contains an enhanced version of the Pearson Test Prep practice text software with four full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package
· Enables you to focus on individual topic areas or take complete, timed exams
· Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
· Provides unique sets of exam-realistic practice questions
· Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most
Pearson Test Prep practice test software minimum system requirements:
Browsers:
· Chrome (Windows and Mac), version 40 and above
· Firefox (Windows and Mac), version 35 and above
· Safari (Mac), version 7
· Internet Explorer 10, 11
Ceh Certified Ethical Hacker Version 9 Download Torrent Free
· Microsoft Edge
· Opera
Devices:
· Desktop and laptop computers
· Tablets running on Android and iOS
· Smartphones with a minimum screen size of 4.7 inches
About the Premium Edition eBook

In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.
Every feature of this book is designed to support both efficient exam preparation and long-term mastery:
· Opening topics lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives
· Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success
· Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career
· Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology
The companion website contains access to the powerful Pearson Test Prep practice test software and four complete exams with access to a large library of exam-realistic questions.
This study guide helps you master all the topics on the latest CEH exam, including
· Ethical hacking basics
· Technical foundations of hacking
· Footprinting and scanning
· Enumeration and system hacking
· Linux distro’s, such as Kali and automated assessment tools
· Trojans and backdoors
· Sniffers, session hijacking, and denial of service
· Web server hacking, web applications, and database attacks
· Wireless technologies, mobile security, and mobile attacks
· IDS, firewalls, and honeypots
· Buffer overflows, viruses, and worms
· Cryptographic attacks and defenses
· Cloud security and social engineering
Sample Content
Sample Pages
Download the sample pages (includes Chapter 1 and index)
Table of Contents
Introduction xxi
Chapter 1 An Introduction to Ethical Hacking
“Do I Know This Already?” Quiz
Foundation Topics
Security Fundamentals
Goals of Security
Risk, Assets, Threats, and Vulnerabilities
Backing Up Data to Reduce Risk
Defining an Exploit
Risk Assessment
Security Testing
No-Knowledge Tests (Black Box)
Full-Knowledge Testing (White Box)
Partial-Knowledge Testing (Gray Box)
Types of Security Tests
Hacker and Cracker Descriptions
Who Attackers Are
Ethical Hackers
Required Skills of an Ethical Hacker
Modes of Ethical Hacking
Test Plans–Keeping It Legal
Test Phases
Establishing Goals
Getting Approval
Ethical Hacking Report
Vulnerability Research–Keeping Up with Changes
Ethics and Legality
Overview of U.S. Federal Laws
Compliance Regulations
Payment Card Industry Data Security Standard (PCI-DSS)
Summary
Exam Preparation Tasks
Hands-On Labs
Lab 1-1 Examining Security Policies
Review Questions
Chapter 2 The Technical Foundations of Hacking
“Do I Know This Already?” Quiz
Foundation Topics
The Attacker’s Process
Performing Reconnaissance and Footprinting
Scanning and Enumeration
Gaining Access
Escalation of Privilege
Maintaining Access
Covering Tracks and Planting Backdoors
The Ethical Hacker’s Process
NIST SP 800-15
Operationally Critical Threat, Asset, and Vulnerability Evaluation
Open Source Security Testing Methodology Manual
Security and the Stack
The OSI Model
Anatomy of TCP/IP Protocols
The Application Layer
The Transport Layer
The Internet Layer
The Network Access Layer
Summary
Exam Preparation Tasks
Exercises
2.1 Install a Sniffer and Perform Packet Captures
2.2 List the Protocols, Applications, and Services Found at Each Layer of the Stack
Chapter 3 Footprinting and Scanning
“Do I Know This Already?” Quiz
Foundation Topics
Overview of the Seven-Step Information-Gathering Process
Information Gathering
Documentation
The Organization’s Website
Job Boards
Employee and People Searches
EDGAR Database
Google Hacking
Usenet
Registrar Query
DNS Enumeration
Determining the Network Range
Traceroute
Identifying Active Machines
Finding Open Ports and Access Points
Nmap
SuperScan
THC-Amap
Hping
Port Knocking
War Driving
OS Fingerprinting
Active Fingerprinting Tools
Fingerprinting Services
Default Ports and Services
Finding Open Services
Mapping the Network Attack Surface
Manual Mapping
Automated Mapping
Summary
Exam Preparation Tasks
Exercises
3.1 Performing Passive Reconnaissance
3.2 Performing Active Reconnaissance
Chapter 4 Enumeration and System Hacking
“Do I Know This Already?” Quiz
Foundation Topics
Enumeration
Windows Enumeration
Windows Security
NetBIOS and LDAP Enumeration
NetBIOS Enumeration Tools
SNMP Enumeration
Linux/UNIX Enumeration
Version 9 Yahoo Messenger
NTP Enumeration
SMTP Enumeration
DNS Enumeration
System Hacking
Nontechnical Password Attacks
Technical Password Attacks
Password Guessing
Automated Password Guessing
Password Sniffing
Keylogging
Privilege Escalation and Exploiting Vulnerabilities
Exploiting an Application
Exploiting a Buffer Overflow
Owning the Box
Windows Authentication Types
Cracking Windows Passwords
Linux Authentication and Passwords
Cracking Linux Passwords
Hiding Files and Covering Tracks
Rootkits
File Hiding
Summary
Exam Preparation Tasks
Exercise
4.1 NTFS File Streaming
Review Questions
Chapter 5 Malware Threats
“Do I Know This Already?” Quiz
Foundation Topics
Viruses and Worms
Types and Transmission Methods of Viruses
Virus Payloads
History of Viruses
Well-Known Viruses
Virus Tools
Trojans
Trojan Types
Trojan Ports and Communication Methods
Trojan Goals
Trojan Infection Mechanisms
Effects of Trojans
Trojan Tools
Distributing Trojans
Covert Communication
Tunneling via the Internet Layer
Tunneling via the Transport Layer
Tunneling via the Application Layer
Port Redirection
Keystroke Logging and Spyware
Hardware Keyloggers
Software Keyloggers
Spyware
Malware Countermeasures
Detecting Malware
Antivirus
Analyzing Malware
Static Analysis
Dynamic Analysis
Summary
Exam Preparation Tasks
Exercises
5.1 Finding Malicious Programs
5.2 Using Process Explorer
Review Questions
Chapter 6 Sniffers, Session Hijacking, and Denial of Service
“Do I Know This Already?” Quiz
Foundation Topics
Sniffers
Passive Sniffing
Active Sniffing
Address Resolution Protocol
ARP Poisoning and MAC Flooding
Tools for Sniffing
Wireshark
Other Sniffing Tools
Sniffing and Spoofing Countermeasures
Session Hijacking
Transport Layer Hijacking
Identify and Find an Active Session
Predict the Sequence Number
Take One of the Parties Offline
Take Control of the Session
Application Layer Hijacking
Session Sniffing
Predictable Session Token ID
Man-in-the-Middle Attacks
Man-in-the-Browser Attacks
Client-Side Attacks
Session Replay Attacks
Session Fixation Attacks
Session Hijacking Tools
Preventing Session Hijacking
Denial of Service and Distributed Denial of Service
DoS Attack Techniques
Bandwidth Attacks
SYN Flood Attacks
ICMP Attacks
Peer-to-Peer Attacks
Program- and Application-Level Attacks
Permanent DoS Attacks
Distributed Denial of Service
DDoS Tools
DoS and DDOS Countermeasures
Summary
Exam Preparation Tasks
Exercises
6.1 Scanning for DDoS Programs
6.2 Using SMAC to Spoof Your MAC Address
Review Questions
Chapter 7 Web Server Hacking, Web Applications, and Database Attacks
“Do I Know This Already?” Quiz
Foundation Topics
Web Server Hacking
Scanning Web Servers
Banner Grabbing and Enumeration
Web Server Vulnerability Identification
Attacking the Web Server
DoS/DDoS Attacks
DNS Server Hijacking and DNS Amplification Attacks
Directory Traversal
Man-in-the-Middle Attacks
Website Defacement
Web Server Misconfiguration
HTTP Response Splitting
Web Server Password Cracking
IIS Vulnerabilities
Automated Exploit Tools
Securing Web Servers
Web Application Hacking
Unvalidated Input
Parameter/Form Tampering
Injection Flaws
Cross-Site Scripting and Cross-Site Request Forgery Attacks
Hidden Field Attacks
Other Web Application Attacks
Attacking Web-Based Authentication
Web-Based Password Cracking and Authentication Attacks
Cookies
URL Obfuscation
Intercepting Web Traffic
Securing Web Applications
Database Hacking
Identifying SQL Servers
SQL Injection Vulnerabilities
SQL Injection Hacking Tools
Summary
Exam Preparation Tasks
Exercise
7.1 Review CVEs and Buffer Overflows
Review Questions
Chapter 8 Wireless Technologies, Mobile Security, and Attacks
“Do I Know This Already?” Quiz
Foundation Topics
Wireless Technologies
Wireless History
Satellite TV
Cordless Phones
Mobile Device Operation and Security
Mobile Device Concerns
Mobile Device Platforms
Android
iOS
Windows Phone
BlackBerry
Mobile Device Management and Protection
Bluetooth
Wireless LANs
Wireless LAN Basics
Wireless LAN Frequencies and Signaling
Wireless LAN Security
Wireless LAN Threats
Eavesdropping
Configured as Open Authentication
Rogue and Unauthorized Access Points
Denial of Service (DoS)
Wireless Hacking Tools
Discover Wi-Fi Networks
Perform GPS Mapping
Wireless Traffic Analysis
Launch Wireless Attacks
Crack and Compromise the Wi-Fi Network
Securing Wireless Networks
Defense in Depth
Site Survey
Robust Wireless Authentication
Misuse Detection
Summary
Exam Preparation Tasks
Review Questions
Chapter 9 IDS, Firewalls, and Honeypots
“Do I Know This Already?” Quiz
Foundation Topics
Intrusion Detection Systems
IDS Types and Components
Pattern Matching and Anomaly Detection
Snort
IDS Evasion
Flooding
Insertion and Evasion
Session Splicing
Shellcode Attacks
Other IDS Evasion Techniques
IDS Evasion Tools
Firewalls
Firewall Types
Network Address Translation
Packet Filters
Application and Circuit-Level Gateways
Stateful Inspection
Identifying Firewalls
Bypassing Firewalls
Honeypots
Types of Honeypots
Detecting Honeypots
Summary
Exam Preparation Tasks
Review Questions
Chapter 10 Physical Security and Social Engineering
“Do I Know This Already?” Quiz
Foundation Topics
Physical Security
Threats to Physical Security
Physical Security for Documentation and Storage Media
Equipment Controls
Locks
Fax Machines
Area Controls

Location Data and Geotagging
Facility Controls
Personal Safety Controls
Fire Prevention, Detection, and Suppression
Physical Access Controls
Authentication
Defense in Depth
Social Engineering
Six Types of Social Engineering
Person-to-Person Social Engineering
Computer-Based Social Engineering
Phishing, Social Networking, and Targeted Attacks
Reverse Social Engineering
Policies and Procedures
Employee Hiring and Termination Policies
Help Desk Procedures and Password Change Policies
Employee Identification
Privacy Policies
Governmental and Commercial Data Classification
User Awareness
Summary
Exam Preparation Tasks
Exercise
10.1 Encrypting Data at Rest for Added Physical Security
Review Questions
Chapter 11 Cryptographic Attacks and Defenses
“Do I Know This Already?” Quiz
Foundation Topics
Functions of Cryptography
History of Cryptography
Algorithms
Symmetric Encryption
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
Rivest Cipher

Asymmetric Encryption (Public Key Encryption)
RSA
Diffie-Hellman
ElGamal
Elliptic Curve Cryptography (ECC)
Hashing
Digital Signature
Steganography
Digital Certificates
Public Key Infrastructure
Trust Models
Single-Authority Trust
Hierarchical Trust
Web of Trust
Protocols, Applications, and Attacks
Encryption Cracking and Tools
Weak Encryption
Encryption-Cracking Tools
Summary
Exam Preparation Tasks
Exercises
11.1 Examining an SSL Certificate
11.2 Using PGP
11.3 Using a Steganographic Tool to Hide a Message
Review Questions
Chapter 12 Cloud Computing and Botnets
“Do I Know This Already?” Quiz
Foundation Topics
Cloud Computing
Cloud Computing Issues and Concerns
Cloud Computing Attacks
Cloud Computing Security
Botnets
Botnet Countermeasures
Summary
Exam Preparation Tasks
Exercise
12.1 Scanning for DDoS Programs
Review Questions
Chapter 13 Final Preparation
Hands-on Activities
Suggested Plan for Final Review and Study
Summary
Glossary
Online Content:
Glossary
Appendix A Answers to the “Do I Know This Already?” Quizzes and Review Questions
Appendix B Memory Tables
Appendix C Memory Tables Answer Key
9780789756916 TOC 3/10/2017
More Information
Other Things You Might Like
- Book $43.99
- Book $119.00
- Book $119.00