Book description
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Acknowledgments
- About the Authors
- CHAPTER 1 Hacking: The Next Generation
- CHAPTER 2 Linux and Penetration Testing
-
CHAPTER 3 TCP/IP Review
-
Exploring the OSI Reference Model
- The Role of Protocols
- Layer 1: Physical Layer
- Layer 2: Data Link Layer
- Layer 3: Network Layer
- Layer 4: Transport Layer
- Layer 5: Session Layer
- Layer 6: Presentation Layer
- Layer 7: Application Layer
- The Role of Encapsulation
- Mapping the OSI Model to Functions and Protocols
- OSI Model Layers and Services
- TCP/IP: A Layer-by-Layer Review
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 3 ASSESSMENT
-
Exploring the OSI Reference Model
-
CHAPTER 4 Cryptographic Concepts
- Cryptographic Basics
- Symmetric and Asymmetric Cryptography
- Cryptographic History
- What Is an Algorithm or Cipher?
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- Digital Signatures
- Public Key Infrastructure
- Common Cryptographic Systems
- Cryptanalysis
- Future Forms of Cryptography
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 4 ASSESSMENT
-
CHAPTER 5 Passive Reconnaissance
- The Information-Gathering Process
- Information on a Company Website and Available Through Social Media
- Discovering Financial Information
- Google Hacking
- Exploring Domain Information Leakage
- Tracking an Organization’s Employees
- Using Basic Countermeasures
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 5 ASSESSMENT
- CHAPTER 6 Active Reconnaissance
- CHAPTER 7 Enumeration and Exploitation
- CHAPTER 8 Malware
- CHAPTER 9 Web and Database Attacks
- CHAPTER 10 Sniffers, Session Hijacking, and Denial of Service Attacks
- CHAPTER 11 Wireless Vulnerabilities
- CHAPTER 12 Social Engineering
-
CHAPTER 13 Defensive Techniques
- What Is a Security Incident?
- The Incident Response Process
- Recovering Systems
- Planning for Disaster and Recovery
- Testing and Evaluation
- Evidence Handling and Administration
- Security Reporting Options and Guidelines
- Requirements of Regulated Industries
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 13 ASSESSMENT
- CHAPTER 14 Defensive Tools
- CHAPTER 15 Physical Security
- APPENDIX A Answer Key
- APPENDIX B Standard Acronyms
- Glossary of Key Terms
- References
- Index
Product information
- Title: Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition
- Author(s):
- Release date: November 2022
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284249002
You might also like
book
Ethical Hacking
A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the …
book
Ransomware and Cyber Extortion: Response and Prevention
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes …
book
CEH v11 Certified Ethical Hacker Study Guide
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security …
book
CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition
Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v11 exam …