CEH: Certified Ethical Hacker Version 8 Study Guide Front Cover

CEH: Certified Ethical Hacker Version 8 Study Guide

  • Length: 504 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2014-08-25
  • ISBN-10: 111864767X
  • ISBN-13: 9781118647677
  • Sales Rank: #853215 (See Top 100 Books)
Description

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards.

  • Security remains the fastest growing segment of IT, and CEH certification provides unique skills
  • The CEH also satisfies the Department of Defense’s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications
  • This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course
  • Covers all the exam objectives with an easy-to-follow approach
  • Companion website includes practice exam questions, flashcards, and a searchable Glossary of key terms

CEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when you’re ready to tackle this challenging exam

Table of Contents

Chapter 1: Getting Started with Ethical Hacking
Chapter 2: System Fundamentals
Chapter 3: Cryptography
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration of Services
Chapter 7: Gaining Access to a System
Chapter 8: Trojans, Viruses, Worms, and Covert Channels
Chapter 9: Sniffers
Chapter 10: Social Engineering
Chapter 11: Denial of Service
Chapter 12: Session Hijacking
Chapter 13: Web Servers and Web Applications
Chapter 14: SQL Injection
Chapter 15: Wireless Networking
Chapter 16: Evading IDSs, Firewalls, and Honeypots
Chapter 17: Physical Security

Appendix A: Answers to Review Questions
Appendix B: About the Additional Study Tools

To access the link, solve the captcha.