Skip to main content
  • Book
  • © 2016

Certified Ethical Hacker (CEH) Foundation Guide

Apress
  • Covers essential concepts which are necessary from a hacking and security perspective

  • Covers all the concepts required to take the CEH course and exam in very simple, to-the-point, and digestible format

  • Simple do-it-yourself exercises in every chapter to get hands-on knowledge

  • A complete information primer on various career paths available after CEH certification along with how to stay updated and ahead of the competition

  • A set of interview questions related to information security and ethical hacking to aid the reader in job interviews

Buy it now

Buying options

eBook USD 24.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 34.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 chapters)

  1. Front Matter

    Pages i-xxiii
  2. Part I

    1. Front Matter

      Pages 1-1
    2. Operating System Basics

      • Sagar Ajay Rahalkar
      Pages 3-21
    3. Database Basics

      • Sagar Ajay Rahalkar
      Pages 23-35
    4. Networking Basics

      • Sagar Ajay Rahalkar
      Pages 37-52
    5. Virtualization and Cloud Basics

      • Sagar Ajay Rahalkar
      Pages 71-82
  3. Part II

    1. Front Matter

      Pages 83-83
    2. Information Security Basics

      • Sagar Ajay Rahalkar
      Pages 85-95
    3. Penetration Testing

      • Sagar Ajay Rahalkar
      Pages 97-107
    4. Information Gathering

      • Sagar Ajay Rahalkar
      Pages 109-118
    5. Hacking Basics

      • Sagar Ajay Rahalkar
      Pages 119-129
    6. Web Application Hacking

      • Sagar Ajay Rahalkar
      Pages 131-141
    7. Wireless Hacking

      • Sagar Ajay Rahalkar
      Pages 143-151
    8. Hacking Mobile Platforms

      • Sagar Ajay Rahalkar
      Pages 153-159
    9. IDSes, Firewalls, and Honeypots

      • Sagar Ajay Rahalkar
      Pages 161-169
    10. Cryptography

      • Sagar Ajay Rahalkar
      Pages 171-182
  4. Back Matter

    Pages 183-198

About this book

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.

The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.



What You Will Learn
  • Gain the basics of hacking (apps, wireless devices, and mobile platforms)
  • Discover useful aspects of databases and operating systems from a hacking perspective
  • Develop sharper programming and networking skills for the exam
  • Explore the penetration testing life cycle
  • Bypass security appliances like IDS, IPS, and honeypots
  • Grasp the key concepts of cryptography
  • Discover the career paths available after certification
  • Revise key interview questions for a certified ethical hacker
Who This Book Is For




Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Authors and Affiliations

  • Pune, India

    Sagar Ajay Rahalkar

About the author

Sagar Rahalkar, is a seasoned information security professional having more than 9 years of comprehensive experience in various verticals of Information Security. His domain expertise is mainly into Cyber Crime Investigations, Digital Forensics, Application Security, Vulnerability Assessment & Penetration Testing, Compliance for Mandates & Regulations, IT GRC etc. He holds a Master’s Degree in Computer Science and several Industry recognized certifications like Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), PRINCE2 to name a few. He has been closely associated with Indian Law Enforcement agencies for over 4 years, dealing with digital crime investigations and related trainings for officers and received several awards and appreciations from senior officials from Police and Defense Organizations in India. He possesses the right "security aptitude" to face challenges of upcoming technologies and address risks in the dynamic threat landscape.


Sagar has also been one of the reviewers for multiple books like “Metasploit Penetration Testing Cookbook, Second Edition”, "Mastering Metasploit" by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer.

Bibliographic Information

Buy it now

Buying options

eBook USD 24.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 34.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access