Nelson Higher Education

Higher Education

Hands-On Ethical Hacking and Network Defense, 3rd Edition

  • Michael T. Simpson
  • Nicholas Antill
  • ISBN-10: 1285454618
  • ISBN-13: 9781285454610
  • 512 Pages | Paperback
  • Previous Editions: 2011, 2006
  • COPYRIGHT: 2017 Published
Request a Copy for Review


About the Product

Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps readers gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today’s cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.


  • This hands-on, highly practical text provides a step-by-step approach to penetration testing techniques and methodologies, equipping readers to apply what they learn with confidence in a variety of scenarios.

  • The authors help readers identify network vulnerabilities and prevent potential threats by deploying the tools and techniques hackers use to bypass network security.

  • In addition to detailed practical material on network security, wireless technology, and their effect on Wide Area Networks, the text provides a useful grounding in ethical and legal issues relevant to penetration testing.

  • Extensive learning tools--including Review Questions, Hands-On Projects, and Case Projects--help reinforce key concepts and allow readers to gain valuable practice applying what they have learned.

  • Numerous case studies guide readers through all aspects of network planning, including interconnectivity issues, physical transmission options, voice and data integration, WAN transport methods, and ATM technologies.

About the Author

Michael T. Simpson

Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle® database and UNIX® administrator, and held multiple cyber security positions.

Nicholas Antill

Nicholas Antill is a seasoned information security professional with over 10 years of specialized cyber security experience. He specializes in penetration testing, proactive security controls, and network defense. In addition to earning a B.S. from the University of Pittsburgh and an M.S. from Capella University, he holds many industry certifications, including the OSCP, GWAPT, GPEN, GCIH, CISA, CISSP, and GCFE. Nicholas started his career at a small grocery chain in Pittsburgh, where he developed a fascination with network attack and defense techniques. He worked in support of the U.S. Department of Justice and the U.S. Department of Defense before returning to the private sector, where he currently manages the ethical hacking program at a large U.S. financial institution.

Table of Contents

1. Ethical Hacking Overview.
2. TCP/IP Concepts Review.
3. Network and Computer Attacks.
4. Footprinting and Social Engineering.
5. Port Scanning.
6. Enumeration.
7. Programming for Security Professionals.
8. Desktop and Server OS Vulnerabilities.
9. Embedded Operating Systems: The Hidden Threat.
10. Hacking Web Applications.
11. Hacking Wireless Networks.
12. Cryptography.
13. Network Protection Systems.
Appendix A: Legal Resources.
Appendix B: Resources.

New to this edition

  • Extensively updated for today’s cyber security landscape, the Third Edition features current computer security tools, a discussion of new vulnerabilities and exploits, and coverage of innovative methods to protect modern networks.
  • The text includes updated information on computer crime laws at the state and federal level, including recent changes in penalties for illegal computer hacking.
  • A new, bootable Kali Linux™ DVD contains many of the security tools discussed in the text, making hands-on activities easier to perform and allowing readers to devote more time to mastering the use of security tools, rather than learning how to install and configure Linux®. In addition, instructions for creating a bootable USB drive with Kali Linux extend the same advantages to students using eBooks.
  • The authors have added discussion of smartphone security, providing valuable insights and guidance on the current mobile security landscape in a time when smartphone usage and mobile networking continue to grow.
  • Web application hacking sections are now enhanced with coverage of newer attacks, as well as new web application testing methodology.


All supplements have been updated in coordination with the Main title.
Please see Main title page for new to this edition information.

Instructor Supplements

Instructor Website  (ISBN-10: 1305086627 | ISBN-13: 9781305086623)

Everything you need for your course in one place! This collection of product-specific lecture and class tools is available online via the instructor resource center at You’ll be able to access and download materials such as PowerPoint® presentations, images, instructor’s manual, videos, and more.

Cengage Testing, powered by Cognero® Instant Access  (ISBN-10: 1305109368 | ISBN-13: 9781305109360)

Cengage Learning Testing, powered by Cognero® is a flexible, online system that allows you to import, edit, and manipulate content from the text’s test bank or elsewhere, including your own favorite test questions; create multiple test versions in an instant; and deliver tests from your LMS, your classroom, or wherever you want.

DVD  (ISBN-10: 1285454669 | ISBN-13: 9781285454665)
MindTap Information Security, 1 term (6 months) Instant Access for Simpson/Antill’s Hands-On Ethical Hacking and Network Defense  (ISBN-10: 133727173X | ISBN-13: 9781337271738)

MindTap Information Security for Simpson/Antill’s Hands-On Ethical Hacking and Network Defense, 3rd Edition is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course—to provide engaging content, to challenge every individual, and to build their confidence. Empower students to accelerate their progress with MindTap. MindTap: Powered by You. MindTap gives complete ownership of content. All activities and assignments connect to learning objectives, while hands-on labs provide real-life application and practice. Readings and whiteboard videos support lectures and "In the News" assignments encourage students to stay current. Pre- and post-course assessments allow you to measure student progress using analytics and reporting. Customize the interactive syllabi, emphasize key topics, and add your own material to the eBook.

Student Supplements

MindTap Information Security, 1 term (6 months) Instant Access for Simpson/Antill’s Hands-On Ethical Hacking and Network Defense  (ISBN-10: 133727173X | ISBN-13: 9781337271738)

MindTap Information Security for Simpson/Antill’s Hands-On Ethical Hacking and Network Defense, 3rd Edition helps you learn on your terms. INSTANT ACCESS IN YOUR POCKET. Take advantage of the MindTap Mobile App. Read or listen to the text and study with the aid of instructor notifications, flashcards, and practice quizzes. MINDTAP HELPS YOU GEAR UP FOR ULTIMATE SUCCESS. Track your scores and stay motivated toward goals. Whether you have more work to do or are ahead of the curve, you’ll know where to focus efforts. You can view In the News articles to stay current with the latest news in cyber security. Visualize Videos with engaging animations help explain and illustrate difficult information security concepts. MINDTAP HELPS YOU MAKE THE TEXT YOURS. No one knows what works for you better than you. Highlight key text, add notes, and create custom flashcards to gather into study guides you organize.