.

Sybex to Release CEH Book in 2006

<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Sun Jan 01, 2006 6:44 pm

Sybex to Release CEH Book in 2006

CEH: Official Certified Ethical Hacker Review Guide
ISBN: 0-7821-4437-3
Hardcover
264 pages
April 17, 2006
US $29.99


Description
  • The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications.
  • This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
  • Written by bestselling certification author Todd Lammle, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
  • The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Council's CEH training.

Look for a sample chapter before the official release.

Don
CISSP, MCSE, CSTA, Security+ SME
<<

Dengar13

User avatar

Sr. Member
Sr. Member

Posts: 380

Joined: Tue Sep 20, 2005 8:43 am

Location: The Steel City

Post Mon Jan 02, 2006 1:49 am

Re: Sybex to Release CEH Book in 2006

You know this book will be good if it is from Sybex.  If Todd Lammle's hacking book is as good as his Cisco stuff then this will be a great book for that price.
A+, Net+, MCP, CEH
MCSE: Security/Messaging
MCSA: Security/Messaging
Former U.S. Marine and damn proud of it!
<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Mon Mar 06, 2006 12:16 pm

Re: Sybex to Release CEH Book in 2006

According to the publisher, the Sybex book has been pushed back to Aug 14, 2006.

Don
CISSP, MCSE, CSTA, Security+ SME
<<

LegioX

Newbie
Newbie

Posts: 25

Joined: Sun Sep 24, 2006 5:27 am

Post Sun Sep 24, 2006 5:57 am

Re: Sybex to Release CEH Book in 2006

This has been pushed back til Jan '07 now...
MCSE & MCSA : Security (2003), A+, Network+, Security+, CEH, CCNA, JNCIA-FMW
<<

venom77

User avatar

Hero Member
Hero Member

Posts: 1905

Joined: Mon Dec 11, 2006 3:23 pm

Post Fri Jan 26, 2007 2:55 pm

Re: Sybex to Release CEH Book in 2006

I was told 2nd week of February now when I contacted Sybex about this book. Haha, by now it'll probably have to be completely revised for v5 modules/objectives :)
<<

oleDB

User avatar

Recruiters
Recruiters

Posts: 236

Joined: Thu Jul 20, 2006 8:58 am

Location: HOA

Post Fri Jan 26, 2007 3:12 pm

Re: Sybex to Release CEH Book in 2006

Thats a strange listing. It credits Kimberly Graves as the author on the cover, yet lists Lammle in the description as the author
<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Fri Jan 26, 2007 3:42 pm

Re: Sybex to Release CEH Book in 2006

Hmmmmmm??

Also, since this book was delayed so long, did they bother to incude v5 topics? Or will it only have a shelf life until the summer when v5 is the only option?

Looks like I'll have to contact the publisher and find out.

Don
CISSP, MCSE, CSTA, Security+ SME
<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Fri Jan 26, 2007 7:14 pm

Re: Sybex to Release CEH Book in 2006

That would be great. Only 1 book to lug around, instead of two loos-leaf notebooks. It would be good to get up to speed on v5 topics, too. But seeing as how I already passed the exam, I won't be able to test on the v5 stuff. If I had the $$$ for it, that is.  ;D
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

blackazarro

User avatar

Sr. Member
Sr. Member

Posts: 368

Joined: Sun Aug 13, 2006 5:31 pm

Post Fri Jan 26, 2007 8:41 pm

Re: Sybex to Release CEH Book in 2006

I preordered mine this week. I hope the version 5 topics are included.
Security+, OSCP, CEH
<<

venom77

User avatar

Hero Member
Hero Member

Posts: 1905

Joined: Mon Dec 11, 2006 3:23 pm

Post Fri Jan 26, 2007 11:21 pm

Re: Sybex to Release CEH Book in 2006

I didn't realize this book was supposed to come so long ago. I was just looking for additional material before my class/test and saw this book. I figured it was new to match v5 with the Feb. '07 release date. I called Sybex 2 or 3 days ago and was told 2nd week of February. I noticed the author thing, but didn't ask about it.
<<

blackazarro

User avatar

Sr. Member
Sr. Member

Posts: 368

Joined: Sun Aug 13, 2006 5:31 pm

Post Sat Jan 27, 2007 2:10 am

Re: Sybex to Release CEH Book in 2006

Since it's being release in February of this year, it must have v5 materials. If it doesn't then the publisher are going to lose money. They can't be that stupid.
Security+, OSCP, CEH
<<

blackazarro

User avatar

Sr. Member
Sr. Member

Posts: 368

Joined: Sun Aug 13, 2006 5:31 pm

Post Tue Jan 30, 2007 12:28 am

Re: Sybex to Release CEH Book in 2006

Here's the table of contents for this review guide, posted in sybex website. Similar to the eccouncil's CEH objectives in http://www.eccouncil.org/312-50.htm. However, both the book and eccouncil's objectives do not include the new advanced modules. Does this mean that module 23-26 won't be asked in the CEH v5 test?

For more info refer to the following link:
http://www.sybex.com/WileyCDA/Section/id-301060.html


Chapter 1: Ethics and Legality.

Understand Ethical Hacking terminology.

Define the Job role of an ethical hacker.

Understand the different phases involved in ethical hacking.

Identify different types of hacking technologies.

List the 5 stages of ethical hacking?.

What is Hacktivism?.

List different types of hacker classes.

Define the skills required to become an ethical hacker.

What is vulnerability research?.

Describe the ways in conducting ethical hacking.

Understand the Legal implications of hacking.

Understand 18 U.S.C. § 1030 US Federal Law.

Chapter 2: Footprinting and Social Engineering.

Define the term Footprinting.

Describe information gathering methodology.

Describe competitive intelligence.

Understand DNS enumeration.

Understand Whois, ARIN lookup.

Identify different types of DNS records.

Understand how traceroute is used in Footprinting.

Understand how e-mail tracking works.

Understand how web spiders work.

What is Social Engineering?.

What are the Common Types of Attacks.

Understand Dumpster Diving.

Understand Reverse Social Engineering.

Understand Insider attacks.

Understand Identity Theft.

Describe Phishing Attacks.

Understand Online Scams.

Understand URL obfuscation.

Social Engineering countermeasures.

Chapter 3: Scanning and Enumeration.

Define the term port scanning, network scanning and vulnerability scanning.

Understand the CEH scanning methodology.

Understand Ping Sweep techniques.

Understand nmap command switches.

Understand SYN, Stealth, XMAS, NULL, IDLE and FIN scans.

List TCP communication flag types.

Understand War dialing techniques.

Understand banner grabbing and OF fingerprinting techniques.

Understand how proxy servers are used in launching an attack.

How does anonymizers work.

Understand HTTP tunneling techniques.

Understand IP spoofing techniques.

What is Enumeration?.

What is meant by null sessions.

What is SNMP enumeration?.

What are the steps involved in performing enumeration?.

Chapter 4: System hacking.

Understanding password cracking techniques.

Understanding different types of passwords.

Identifying various password cracking tools.

Understand Escalating privileges.

Understanding keyloggers and other spyware technologies.

Understand how to Hide files.

Understanding rootkits.

Understand Steganography technologies.

Understand how to covering your tracks and erase evidences.

Chapter 5: Trojans, Backdoors, Viruses, and Worms.

What is a Trojan?.

What is meant by overt and covert channels?.

List the different types of Trojans.

What are the indications of a Trojan attack?.

Understand how “Netcat” Trojan works.

What is meant by “wrapping”.

How does reverse connecting Trojans work?.

What are the countermeasure techniques in preventing Trojans?.

Understand Trojan evading techniques.

Understand the difference between an virus and a Worm.

Understand the types of Viruses.

How a virus spreads and infects the system.

Understand antivirus evasion techniques.

Understand Virus detection methods.

Chapter 6: Sniffers.

Understand the protocol susceptible to sniffing.

Understand active and passive sniffing.

Understand ARP poisoning.

Understand ethereal capture and display filters.

Understand MAC flooding.

Understand DNS spoofing techniques.

Describe sniffing countermeasures.

Chapter 7: Denial of Service and Session Hijacking.

Understand the types of DoS Attacks.

Understand how DDoS attack works.

Understand how BOTs/BOTNETS work.

What is “smurf” attack.

What is “SYN” flooding.

Describe the DoS/DDoS countermeasures.

Understand Spoofing vs. Hijacking.

List the types of Session Hijacking.

Understand Sequence Prediction.

What are the steps in performing session hijacking.

Describe how you would prevent session hijacking.

Chapter 8: Hacking Web Servers, Web Application Vulnerabilities and Web Based Password Cracking Techniques.

List the types of web server vulnerabilities.

Understand the attacks Against Web Servers.

Understand IIS Unicode exploits.

Understand patch management techniques.

Understand Web Application Scanner.

What is Metasploit Framework?.

Describe Web Server hardening methods.

Understanding how web application works.

Objectives of web application hacking.

Anatomy of an attack.

Web application threats.

Understand Google hacking.

Understand Web Application Countermeasures.

List the Authentication types.

What is a Password Cracker?.

How does a Password Cracker work?.

Understand Password Attacks - Classification.

Understand Password Cracking Countermeasures.

Chapter 9: SQL Injection and Buffer Overflows.

What is SQL injection?.

Understand the Steps to conduct SQL injection.

Understand SQL Server vulnerabilities.

Describe SQL Injection countermeasures.

Overview of stack based buffer overflows.

Identify the different types of buffer overflows and methods of detection.

Overview of buffer overflow mutation techniques.

Chapter 10: Wireless Hacking.

Overview of WEP, WPA authentication systems and cracking techniques.

Overview of wireless Sniffers and SSID, MAC Spoofing.

Understand Rogue Access Points.

Understand Wireless hacking techniques.

Describe the methods in securing wireless networks.

Chapter 11: Physical Security.

Physical security breach incidents.

Understanding physical security.

What is the need for physical security?.

Who is accountable for physical security?.

Factors affecting physical security.

Chapter 12: Linux Hacking.

Understand how to compile a Linux Kernel.

Understand GCC compilation commands.

Understand how to install LKM modules.

Understand Linux hardening methods.

Chapter 13: Evading IDS, Honeypots and Firewalls.

List the types of Intrusion Detection Systems and evasion techniques.

List firewall and honeypot evasion techniques.

Chapter 14: Cryptography.

Overview of cryptography and encryption techniques.

Describe how public and private keys are generated.

Overview of MD5, SHA, RC4, RC5, Blowfish algorithms.

Chapter 15: Penetration Testing Methodologies.

Overview of penetration testing methodologies.

List the penetration testing steps.

Overview of the Pen-Test legal framework.

Overview of the Pen-Test deliverables.

List the automated penetration testing tools.
Security+, OSCP, CEH
<<

venom77

User avatar

Hero Member
Hero Member

Posts: 1905

Joined: Mon Dec 11, 2006 3:23 pm

Post Fri Mar 09, 2007 8:52 pm

Re: Sybex to Release CEH Book in 2006

I went to Borders to have a look at this book today. It's exactly as you've stated. The book is fairly small and follows the EC-Council objectives. It's almost the exact study guide that I created (I apparently should have written a book :P) and I'm glad I didn't wait to purchase this one :)

If you prefer to take the quick route to studying the material for the exam, this book is probably a good reference in addition to reading the official courseware. If you learn better by reading and writing the material into your own study guide, then just follow the EC-Council objectives and you don't really need to buy this book.

The advanced modules are self-study only, they are not included on the v5 exam.
<<

Kev

Post Fri Mar 09, 2007 10:06 pm

Re: Sybex to Release CEH Book in 2006

Yes I agree. I got it just because I have some weird compulsion to by any books on Hacking even if they suck ,lol. Well this book doesn’t suck but at best I would call it a nice supplement to the much larger book "Exam Prep" by Michael Grepp.  Actually put those 2 books together with Counter Hack by Ed Skoudis and you should have a good over view of the subject. Hopefully that would be enough info to get da  booty off da arm chair and start hacking for realz.

Return to CEH - Certified Ethical Hacker

Who is online

Users browsing this forum: No registered users and 1 guest

cron
.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software