Ethical Hacker's Certification Guide (CEHv11)

  • 4h 18m
  • Mohd Sohaib
  • BPB Publications
  • 2021

The 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way.

The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments.

In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification.

What you will learn

    ● Learn methodologies, tools, and techniques of penetration testing and ethical hacking. ● Expert-led practical demonstration of tools and tricks like nmap, BurpSuite, and OWASP ZAP. ● Learn how to perform brute forcing, wardriving, and evil twinning. ● Learn to gain and maintain access to remote systems. ● Prepare detailed tests and execution plans for VAPT (vulnerability assessment and penetration testing) scenarios.

In this Book

  • Cyber Security, Ethical Hacking, and Penetration Testing
  • CEH v11 Prerequisites and Syllabus
  • Self-Assessment
  • Reconnaissance
  • Social Engineering
  • Scanning Networks
  • Enumeration
  • Vulnerability Assessment
  • System Hacking
  • Session Hijacking
  • Web Server Hacking
  • Web Application Hacking
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Hacking Cloud, IoT, and OT Platforms
  • Cryptography
  • Evading Security Measures
  • Practical Exercises on Penetration Testing and Malware Attacks
  • Roadmap for a Security Professional
  • Digital Compliances and Cyber Laws
  • Self-Assessment 1
  • Self-Assessment 2
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 153 users Rating 4.6 of 153 users (153)
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)