CEH Certified Ethical Hacker All-in-One Exam Guide, 3rd Edition Front Cover

CEH Certified Ethical Hacker All-in-One Exam Guide, 3rd Edition

  • Length: 464 pages
  • Edition: 3
  • Publisher:
  • Publication Date: 2016-09-12
  • ISBN-10: 125983655X
  • ISBN-13: 9781259836558
  • Sales Rank: #354501 (See Top 100 Books)
Description

Fully up-to-date coverage of every topic on the CEH v9 certification exam

Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council’s Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.

An integrated study system based on proven pedagogy, CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, features brand-new explanations of cloud computing and mobile platforms and addresses vulnerabilities to the latest technologies and operating systems. Readers will learn about footprinting and reconnaissance, malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and much more. Designed to help you pass the exam with ease, this authoritative resource will also serve as an essential on-the-job reference.

  • Features more than 400 accurate practice questions
  • Electronic content includes test engine that provides full-length practice exams and customized quizzes by chapter
  • Written by an experienced educator with more than 30 years of experience in the field

Table of Contents

Chapter 1 Getting Started: Essential Knowledge
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3 Scanning and Enumeration
Chapter 4 Sniffing and Evasion
Chapter 5 Attacking a System
Chapter 6 Web-Based Hacking: Servers and Applications
Chapter 7 Wireless Network Hacking
Chapter 8 Security in Cloud Computing
Chapter 9 Trojans and Other Attacks
Chapter 10 Cryptography 101
Chapter 11 Low Tech: Social Engineering and Physical Security
Chapter 12 The Pen Test: Putting It All Together
Appendix A  Tool, Sites, and References
Appendix B  About the Download

To access the link, solve the captcha.