• Complain

Ahmed Sheikh - Lesson-Based Review of Ethical Hacking and Penetration Testing

Here you can read online Ahmed Sheikh - Lesson-Based Review of Ethical Hacking and Penetration Testing full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ahmed Sheikh Lesson-Based Review of Ethical Hacking and Penetration Testing
  • Book:
    Lesson-Based Review of Ethical Hacking and Penetration Testing
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2021
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Lesson-Based Review of Ethical Hacking and Penetration Testing: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Lesson-Based Review of Ethical Hacking and Penetration Testing" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Ahmed Sheikh: author's other books


Who wrote Lesson-Based Review of Ethical Hacking and Penetration Testing? Find out the surname, the name of the author of the book and a list of all author's works by series.

Lesson-Based Review of Ethical Hacking and Penetration Testing — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Lesson-Based Review of Ethical Hacking and Penetration Testing" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Certified Ethical Hacker CEH Preparation Guide Ahmed Sheikh - photo 1
Book cover of Certified Ethical Hacker (CEH) Preparation Guide
Ahmed Sheikh
Certified Ethical Hacker (CEH) Preparation Guide
Lesson-Based Review of Ethical Hacking and Penetration Testing
1st ed.
Logo of the publisher Ahmed Sheikh Miami FL USA ISBN 978-1-4842-7257-2 - photo 2
Logo of the publisher
Ahmed Sheikh
Miami, FL, USA
ISBN 978-1-4842-7257-2 e-ISBN 978-1-4842-7258-9
https://doi.org/10.1007/978-1-4842-7258-9
Ahmed Sheikh 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

This book is affectionately dedicated to all IT experts, professionals, and students.

Introduction

This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker (CEH) exama qualification that tests the cybersecurity professionals baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs.

You will review the organized certified hacking mechanism along with stealthy network recon, passive traffic detection, privilege escalation, vulnerability recognition, remote access, spoofing, impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation.

This book uses a unique lesson format with objectives and instruction to succinctly review each major topic, including footprinting, reconnaissance, scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking web servers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more.

What You Will Learn
You will get do the following:
  • Understand the concepts associated with footprinting

  • Perform active and passive reconnaissance

  • Identify enumeration countermeasures

  • Be familiar with virus types, virus detection methods, and virus countermeasures

  • Know the proper order of steps used to conduct a session hijacking attack

  • Identify defensive strategies against SQL injection attacks

  • Analyze internal and external network traffic using an intrusion detection system

Who This Book Is For

This book is for security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and others.

Table of Contents
About the Author
Ahmed Sheikh

is a Fulbright alumnus and has earned a masters degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as an IT Expert Engineer at a leading IT electrical company.

About the Technical Reviewer
Asad Ali

has been associated with High Speed Networks Lab, National Chiao Tung University, Taiwan since March 2018 where he is working on a research project funded by the Ministry of Science and Technology, Taiwan. In this project, he is designing a secure and federated authentication mechanism for multiple computing paradigms in collaboration with multiple partners in Bangladesh, Turkey, and USA. He is also working on the cost minimization of bi-directional offloading in federated computing paradigms. In the past, he worked with the Network Benchmarking Lab (NBL), Taiwan where he designed various security tests for IP cameras. He has various publications in the domains of computer networks, cognitive radio networks, PCB routing, optimization, Internet of Things, and network security.

The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
A. Sheikh Certified Ethical Hacker (CEH) Preparation Guide https://doi.org/10.1007/978-1-4842-7258-9_1
1. Introduction to Ethical Hacking
Ahmed Sheikh
(1)
Miami, FL, USA

In this chapter, you will learn about the five phases of ethical hacking and the different types of hacker attacks.

By the end of this chapter, you will be able to
  • Identify the five phases of ethical hacking.

  • Identify the different types of hacker attacks.

Ethical Hacking

Companies employ ethical hackers to do what illegal hackers do: exploit vulnerabilities. Ethical hackers also go by the names of security testers or penetration testers . In this chapter, you will take a look at the skills required to protect a network from an attack. You will focus on the key points listed below as you progress through each chapter.

Throughout the book, assume that there is upper management buy-in on the fact that the organizations information assets need to be secured. Also assume that upper management has put the proper security policies in place in support of their recognized need for security.
  • Information: Assets of information must be secured.

  • Assumptions: Assume that the upper management recognizes the need for security and that there is a security policy in place that defines how objects can interact in a security domain.

  • Challenge: Your task is to prevent exploits of the infrastructure by being mindful of those who can use a similar infrastructure for their own motives.

  • Solution: Employ an ethical hacker with a malicious hackers capabilities.

Vulnerability
It is necessary to keep in mind that vulnerability is a weakness that can be manipulated while a threat is an action or occurrence that can jeopardize security. Consider how identified weaknesses can have an effect on security. Think about the following:
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Lesson-Based Review of Ethical Hacking and Penetration Testing»

Look at similar books to Lesson-Based Review of Ethical Hacking and Penetration Testing. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Lesson-Based Review of Ethical Hacking and Penetration Testing»

Discussion, reviews of the book Lesson-Based Review of Ethical Hacking and Penetration Testing and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.