CEH Certified Ethical Hacker Cert Guide, 4th edition

Published by Pearson IT Certification (December 29, 2022) © 2022

  • Michael Gregg
  • Omar Santos Best-selling Cisco Press author, expert trainer, and Principal Engineer at Cisco (PSIRT)

Purchasing Instructions

This form contains two groups of radio buttons, one for Exam Pack purchasing options, and one for standard purchasing options. Only one option can be chosen for purchase. Any option that is selected will deselect any previously selected purchase option.

eTextbook on Pearson+

ISBN-13: 9780137952687 (2022 update)

Unlock extra study tools for other course help

eTextbook + Study & Exam Prep on Pearson+

ISBN-13: 9780137952687 (2022 update)

In this eTextbook — More ways to learn

  • More flexible. Start learning right away, on any device.
  • More supportive. Get AI explanations and practice questions (select titles).
  • More interactive. Bring learning to life with audio, videos, and diagrams.
  • More memorable. Make concepts stick with highlights, search, notes, and flashcards.
  • More understandable. Translate text into 100+ languages with one tap.

Purchasing Instructions

This form contains two groups of radio buttons, one for Exam Pack purchasing options, and one for standard purchasing options. Only one option can be chosen for purchase. Any option that is selected will deselect any previously selected purchase option.

eTextbook access on Pearson+

ISBN-13: 9780137952687 (2022 update)

Unlock extra study tools for other course help

eTextbook access + Study & Exam Prep monthly subscription on Pearson+

ISBN-13: 9780137952687 (2022 update)

In this eTextbook — More ways to learn

  • More flexible. Start learning right away, on any device.
  • More supportive. Get AI explanations and practice questions (select titles).
  • More interactive. Bring learning to life with audio, videos, and diagrams.
  • More memorable. Make concepts stick with highlights, search, notes, and flashcards.
  • More understandable. Translate text into 100+ languages with one tap.

Table of contents

  • Introduction
  • Chapter 1 An Introduction to Ethical Hacking
  • Chapter 2 The Technical Foundations of Hacking
  • Chapter 3 Footprinting, Reconnaissance, and Scanning
  • Chapter 4 Enumeration and System Hacking
  • Chapter 5 Social Engineering, Malware Threats, and Vulnerability Analysis
  • Chapter 6 Sniffers, Session Hijacking, and Denial of Service
  • Chapter 7 Web Server Hacking, Web Applications, and Database Attacks
  • Chapter 8 Wireless Technologies, Mobile Security, and Attacks
  • Chapter 9 Evading IDS, Firewalls, and Honeypots
  • Chapter 10 Cryptographic Attacks and Defenses
  • Chapter 11 Cloud Computing, IoT, and Botnets
  • Chapter 12 Final Preparation
  • Glossary of Key Terms
  • Appendix A Answers to the "Do I Know This Already?" Quizzes and Review Questions
  • Appendix B CEH Certified Ethical Hacker Cert Guide Exam Updates

Author bios

This publication contains markup to enable structural navigation and compatibility with assistive technologies. Images in the publication are fully described. The publication supports text reflow, is screen-reader friendly, and contains no content hazards known to cause adverse physical reactions.

Need help?Get in touch