CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition - Matt Walker

CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition

(Autor)

Buch | Softcover
576 Seiten
2019 | 4th edition
McGraw-Hill Education (Verlag)
978-1-260-45455-0 (ISBN)
48,60 inkl. MwSt
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Up-to-date coverage of every topic on the CEH v10 exam
Thoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.
Covers all exam topics, including:
•Ethical hacking fundamentals•Reconnaissance and footprinting•Scanning and enumeration•Sniffing and evasion•Attacking a system•Hacking web servers and applications•Wireless network hacking•Security in cloud computing•Trojans and other attacks•Cryptography•Social engineering and physical security•Penetration testing
Digital content includes:
•300 practice exam questions•Test engine that provides full-length practice exams and customized quizzes by chapter

Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).

Chapter 1: Getting Started: Essential Knowledge
Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3: Scanning and Enumeration
Chapter 4: Sniffing and Evasion
Chapter 5: Attacking a System
Chapter 6: Web-Based Hacking: Servers and Applications
Chapter 7: Wireless Network Hacking
Chapter 8: Mobile Communications and the IoT
Chapter 9: Security in Cloud Computing
Chapter 10: Trojan and Other Attacks
Chapter 11: Cryptography 101
Chapter 12: Low Tech: Social Engineering and Physical Security
Chapter 13: The Pen Test: Putting It All Together
Appendix A: Tools, Sites, and References
Glossary

Erscheinungsdatum
Zusatzinfo 80 Illustrations, unspecified
Verlagsort OH
Sprache englisch
Gewicht 832 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen Zertifizierung
ISBN-10 1-260-45455-X / 126045455X
ISBN-13 978-1-260-45455-0 / 9781260454550
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich