Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Certified Ethical Hacker (CEH) Version 9 Cert Guide

Certified Ethical Hacker (CEH) Version 9 Cert Guide

of: Michael Gregg

Pearson Education, 2017

ISBN: 9780134680859 , 656 Pages

Format: ePUB

Copy protection: DRM

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Apple iPod touch, iPhone und Android Smartphones

Price: 68,59 EUR



More of the content

Certified Ethical Hacker (CEH) Version 9 Cert Guide


 

In this best-of-breed study guide, Certified Ethical Hacker (CEH) Version 9 Cert Guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael's concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book is designed to support both efficient exam preparation and long-term mastery: Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questionsgoing beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This is the eBook edition of the Certified Ethical Hacker (CEH) Version 9 Cert Guide. This eBook does not include the practice exam that comes with the print edition. This study guide helps you master all the topics on the latest CEH exam, including Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux distro's, such as Kali and automated assessment tools Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Cloud security and social engineering