Certified Ethical Hacker (CEH) Foundation Guide - Sagar Ajay Rahalkar

Certified Ethical Hacker (CEH) Foundation Guide (eBook)

eBook Download: PDF
2016 | 1st ed.
XXIII, 198 Seiten
Apress (Verlag)
978-1-4842-2325-3 (ISBN)
Systemvoraussetzungen
34,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.

The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.


What You Will Learn
  • Gain the basics of hacking (apps, wireless devices, and mobile platforms)
  • Discover useful aspects of databases and operating systems from a hacking perspective
  • Develop sharper programming and networking skills for the exam
  • Explore the penetration testing life cycle
  • Bypass security appliances like IDS, IPS, and honeypots
  • Grasp the key concepts of cryptography
  • Discover the career paths available after certification
  • Revise key interview questions for a certified ethical hacker
Who This Book Is For

Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.


Sagar Rahalkar, is a seasoned information security professional having more than 9 years of comprehensive experience in various verticals of Information Security. His domain expertise is mainly into Cyber Crime Investigations, Digital Forensics, Application Security, Vulnerability Assessment & Penetration Testing, Compliance for Mandates & Regulations, IT GRC etc. He holds a Master's Degree in Computer Science and several Industry recognized certifications like Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), PRINCE2 to name a few. He has been closely associated with Indian Law Enforcement agencies for over 4 years, dealing with digital crime investigations and related trainings for officers and received several awards and appreciations from senior officials from Police and Defense Organizations in India. He possesses the right 'security aptitude' to face challenges of upcoming technologies and address risks in the dynamic threat landscape.

Sagar has also been one of the reviewers for multiple books like 'Metasploit Penetration Testing Cookbook, Second Edition', 'Mastering Metasploit' by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer.

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.What You Will LearnGain the basics of hacking (apps, wireless devices, and mobile platforms)Discover useful aspects of databases and operating systems from a hacking perspectiveDevelop sharper programming and networking skills for the examExplore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypotsGrasp the key concepts of cryptographyDiscover the career paths available after certificationRevise key interview questions for a certified ethical hackerWho This Book Is ForBeginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Sagar Rahalkar, is a seasoned information security professional having more than 9 years of comprehensive experience in various verticals of Information Security. His domain expertise is mainly into Cyber Crime Investigations, Digital Forensics, Application Security, Vulnerability Assessment & Penetration Testing, Compliance for Mandates & Regulations, IT GRC etc. He holds a Master’s Degree in Computer Science and several Industry recognized certifications like Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), PRINCE2 to name a few. He has been closely associated with Indian Law Enforcement agencies for over 4 years, dealing with digital crime investigations and related trainings for officers and received several awards and appreciations from senior officials from Police and Defense Organizations in India. He possesses the right "security aptitude" to face challenges of upcoming technologies and address risks in the dynamic threat landscape.Sagar has also been one of the reviewers for multiple books like “Metasploit Penetration Testing Cookbook, Second Edition”, "Mastering Metasploit" by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer.

PART IChapter 1: Operating System BasicsChapter Goal: To introduce the basic concepts of Operating Systems from hacking perspective.No of pages:Chapter 2: Database BasicsChapter Goal: Basic concepts of Databases from hacking perspective.No of pages:Chapter 3: Networking BasicsChapter Goal: Basic Networking concepts from hacking perspective.No of pages:Chapter 4: Programming BasicsChapter Goal: To introduce basic programming & scripting concepts which are required for hacking and security.No of pages:Chapter 5: Virtualization and Cloud BasicsChapter Goal: Overview of basic concepts of Cloud & Virtualization from security perspective.No of pagesPART IIChapter 1: Basics of Information SecurityChapter Goal: Concepts and the building blocks of Information SecurityNo of pages:Chapter 2: Penetration TestingChapter Goal: Introduce to the penetration testing lifecycle and key terminologyNo of pages:Chapter 3: Information GatheringChapter Goal: Highlight various techniques of information gathering required for penetration testing.No of pages:Chapter 4: Hacking BasicsChapter Goal: Introduction of various concepts related to system hacking.No of pages:Chapter 5: Web Application HackingChapter Goal: Provide an overview of Web Application vulnerabilities and Application Security testingNo of pages:Chapter 6: Wireless HackingChapter Goal: Introduction to various key concepts of Wireless hackingNo of pages:Chapter 7: Hacking Mobile platformsChapter Goal: Highlight vulnerabilities and security issues in Mobile Platforms, Mobile hacking concepts. No of pages:Chapter 8: IDS, Firewalls & Honeypots evasionChapter Goal: Introduction to security appliances like IDS, IPS, Honeypots and various techniques to bypass and evade their security.No of pages:Chapter 9: CryptographyChapter Goal: Introduction to key concepts related to Cryptography.No of pages:Appendix A: Career paths available after CEHAppendix B: Information Security interview questions

Erscheint lt. Verlag 29.11.2016
Zusatzinfo XXIII, 198 p. 68 illus., 58 illus. in color.
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Zertifizierung
Naturwissenschaften
Schlagworte ceh • Certification • certified ethical hacker • cryptography • Foundation • Hacking • Information Security • Networking • programming
ISBN-10 1-4842-2325-X / 148422325X
ISBN-13 978-1-4842-2325-3 / 9781484223253
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 12,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90