CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition
McGraw-Hill Education (Verlag)
978-1-260-45455-0 (ISBN)
- Lieferbar
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
Up-to-date coverage of every topic on the CEH v10 exam
Thoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.
Covers all exam topics, including:
•Ethical hacking fundamentals•Reconnaissance and footprinting•Scanning and enumeration•Sniffing and evasion•Attacking a system•Hacking web servers and applications•Wireless network hacking•Security in cloud computing•Trojans and other attacks•Cryptography•Social engineering and physical security•Penetration testing
Digital content includes:
•300 practice exam questions•Test engine that provides full-length practice exams and customized quizzes by chapter
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).
Chapter 1: Getting Started: Essential Knowledge
Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3: Scanning and Enumeration
Chapter 4: Sniffing and Evasion
Chapter 5: Attacking a System
Chapter 6: Web-Based Hacking: Servers and Applications
Chapter 7: Wireless Network Hacking
Chapter 8: Mobile Communications and the IoT
Chapter 9: Security in Cloud Computing
Chapter 10: Trojan and Other Attacks
Chapter 11: Cryptography 101
Chapter 12: Low Tech: Social Engineering and Physical Security
Chapter 13: The Pen Test: Putting It All Together
Appendix A: Tools, Sites, and References
Glossary
Erscheinungsdatum | 15.03.2019 |
---|---|
Zusatzinfo | 80 Illustrations |
Verlagsort | OH |
Sprache | englisch |
Gewicht | 832 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 1-260-45455-X / 126045455X |
ISBN-13 | 978-1-260-45455-0 / 9781260454550 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich