Certified Ethical Hacker (CEH) Foundation Guide
Apress (Verlag)
978-1-4842-2324-6 (ISBN)
The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.
What You Will Learn
Gain the basics of hacking (apps, wireless devices, and mobile platforms)
Discover useful aspects of databases and operating systems from a hacking perspective
Develop sharper programming and networking skills for the exam
Explore the penetration testing life cycle
Bypass security appliances like IDS, IPS, and honeypots
Grasp the key concepts of cryptography
Discover the career paths available after certification
Revise key interview questions for a certified ethical hacker
Who This Book Is For
Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
Sagar Rahalkar, is a seasoned information security professional having more than 9 years of comprehensive experience in various verticals of Information Security. His domain expertise is mainly into Cyber Crime Investigations, Digital Forensics, Application Security, Vulnerability Assessment & Penetration Testing, Compliance for Mandates & Regulations, IT GRC etc. He holds a Master’s Degree in Computer Science and several Industry recognized certifications like Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), PRINCE2 to name a few. He has been closely associated with Indian Law Enforcement agencies for over 4 years, dealing with digital crime investigations and related trainings for officers and received several awards and appreciations from senior officials from Police and Defense Organizations in India. He possesses the right "security aptitude" to face challenges of upcoming technologies and address risks in the dynamic threat landscape. Sagar has also been one of the reviewers for multiple books like “Metasploit Penetration Testing Cookbook, Second Edition”, "Mastering Metasploit" by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer.
PART I
Chapter 1: Operating System Basics
Chapter 2: Database Basics
Chapter 3: Networking Basics
Chapter 4: Programming Basics
Chapter 5: Virtualization and Cloud Basics
PART II
Chapter 6: Information Security Basics
Chapter 7: Penetration Testing
Chapter 8: Information Gathering
Chapter 9: Hacking Basics
Chapter 10: Web Application Hacking
Chapter 11: Wireless Hacking
Chapter 12: Hacking Mobile platforms
Chapter 13: IDS, Firewalls and Honeypots
Chapter 14: Cryptography
Appendix A: Career Tracks Available After CEH
Appendix B: Interview Questions
Erscheinungsdatum | 21.12.2016 |
---|---|
Zusatzinfo | 58 Illustrations, color; 10 Illustrations, black and white; XXIII, 198 p. 68 illus., 58 illus. in color. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 178 x 254 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Zertifizierung | |
Schlagworte | ceh • Certification • certified ethical hacker • cryptography • Foundation • Hacking • Information Security • Networking • programming |
ISBN-10 | 1-4842-2324-1 / 1484223241 |
ISBN-13 | 978-1-4842-2324-6 / 9781484223246 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich