Certified Ethical Hacker (CEH) Exam Cram

· Pearson IT Certification
5,0
1 opinia
E-book
448
Strony
Odpowiednia
Oceny i opinie nie są weryfikowane. Więcej informacji

Informacje o e-booku

Certified Ethical Hacker (CEH) Exam Cram is the perfect study guide to help you pass the updated CEH Version 11 exam. Its expert real-world approach reflects Dr. Chuck Easttom's expertise as one of the world's leading cybersecurity practitioners and instructors, plus test-taking insights he has gained from teaching CEH preparation courses worldwide. Easttom assumes no prior knowledge: His expert coverage of every exam topic can help readers with little ethical hacking experience to obtain the knowledge to succeed.


This guide's extensive preparation tools include topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes and tips, an extensive glossary, and the handy CramSheet tear-out: key facts in an easy-to-review format. (This eBook edition of Certified Ethical Hacker (CEH) Exam Cram does not include access to the companion website with practice exam(s) included with the print or Premium edition.)


Certified Ethical Hacker (CEH) Exam Cram helps you master all topics on CEH Exam Version 11:


  • Review the core principles and concepts of ethical hacking
  • Perform key pre-attack tasks, including reconnaissance and footprinting
  • Master enumeration, vulnerability scanning, and vulnerability analysis
  • Learn system hacking methodologies, how to cover your tracks, and more
  • Utilize modern malware threats, including ransomware and financial malware
  • Exploit packet sniffing and social engineering
  • Master denial of service and session hacking attacks, tools, and countermeasures
  • Evade security measures, including IDS, firewalls, and honeypots
  • Hack web servers and applications, and perform SQL injection attacks
  • Compromise wireless and mobile systems, from wireless encryption to recent Android exploits
  • Hack Internet of Things (IoT) and Operational Technology (OT) devices and systems
  • Attack cloud computing systems, misconfigurations, and containers
  • Use cryptanalysis tools and attack cryptographic systems

Oceny i opinie

5,0
1 opinia

O autorze

Dr. Chuck Easttom is the author of 34 books, including several on computer security, forensics, and cryptography. He holds a doctor of science degree in cybersecurity, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is also an inventor with 23 patents. He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for University of Dallas.

Oceń tego e-booka

Podziel się z nami swoją opinią.

Informacje o czytaniu

Smartfony i tablety
Zainstaluj aplikację Książki Google Play na AndroidaiPada/iPhone'a. Synchronizuje się ona automatycznie z kontem i pozwala na czytanie w dowolnym miejscu, w trybie online i offline.
Laptopy i komputery
Audiobooków kupionych w Google Play możesz słuchać w przeglądarce internetowej na komputerze.
Czytniki e-booków i inne urządzenia
Aby czytać na e-papierze, na czytnikach takich jak Kobo, musisz pobrać plik i przesłać go na swoje urządzenie. Aby przesłać pliki na obsługiwany czytnik, postępuj zgodnie ze szczegółowymi instrukcjami z Centrum pomocy.