02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

Introduction<br />

Assessment Test<br />

xxi<br />

xxx<br />

Chapter 1 Getting Started with <strong>Ethical</strong> Hacking 1<br />

Hacking: A Short History 2<br />

The Early Days of Hacking 2<br />

Current Developments 3<br />

Hacking: Fun or Criminal Activity? 4<br />

The Evolution and Growth of Hacking 6<br />

What Is an <strong>Ethical</strong> <strong>Hacker</strong>? 7<br />

<strong>Ethical</strong> Hacking and Penetration Testing 10<br />

Hacking Methodologies 15<br />

Vulnerability Research and Tools 18<br />

Ethics and the Law 18<br />

Summary 20<br />

Exam Essentials 20<br />

Review Questions 21<br />

Chapter 2 System Fundamentals 25<br />

Exploring Network Topologies 26<br />

Working with the Open Systems Interconnection Model 30<br />

Dissecting the TCP/IP Suite 33<br />

IP Subnetting 35<br />

Hexadecimal vs. Binary 35<br />

Exploring TCP/IP Ports 37<br />

Domain Name System 39<br />

Understanding Network Devices 39<br />

Routers and Switches 39<br />

Working with MAC Addresses 41<br />

Proxies and Firewalls 42<br />

Intrusion Prevention and Intrusion Detection Systems 43<br />

Network Security 44<br />

Knowing Operating Systems 46<br />

Windows 46<br />

Mac OS 47<br />

Linux 48<br />

Backups and Archiving 49<br />

Summary 49<br />

Exam Essentials 50<br />

Review Questions 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!