In the name of Allah the Merciful

CEH Certified Ethical Hacker Cert Guide

Michael Gregg, Omar Santos, 9780137489886, 9780137489985, 0137489986, 2021947879, 978-0137489886, 978-0137489985

10 $

English | 2022 | EPUB, Converted PDF

number
type
  • {{value}}
wait a little

This is the eBook edition of the CEH Certified Ethical Hacker Cert   Guide. This eBook does not include the practice exam that comes with  the  print edition.
In this best-of-breed study guide, CEH  Certified  Ethical Hacker Cert Guide, leading experts Michael Gregg and  Omar  Santos help you master all the topics you need to know to succeed  on  your Certified Ethical Hacker exam and advance your career in IT   security. The authors’ concise, focused approach explains every exam   objective from a real-world perspective, helping you quickly identify   weaknesses and retain everything you need to know.

Every feature of this book is designed to support both efficient exam preparation and long-term mastery:
* Opening topics lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives
* Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success
*   Exam Preparation Tasks enable you to review key topics, define key   terms, work through scenarios, and answer review questions...going   beyond mere facts to master the concepts that are crucial to passing  the  exam and enhancing your career
* Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology

This study guide helps you master all the topics on the latest CEH exam, including
* Ethical hacking basics
* Technical foundations of hacking
* Footprinting and scanning
* Enumeration and system hacking
* Social engineering, malware threats, and vulnerability analysis
* Sniffers, session hijacking, and denial of service
* Web server hacking, web applications, and database attacks
* Wireless technologies, mobile security, and mobile attacks
* IDS, firewalls, and honeypots
* Cryptographic attacks and defenses
* Cloud computing, IoT, and botnets