CEH Certified Ethical Hacker All-in-One Exam Guide
McGraw-Hill Professional (Verlag)
978-0-07-177229-7 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.
COVERS ALL EXAM TOPICS, INCLUDING:
Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses, trojans, and other attacksWireless hackingPenetration testing
CD-ROM FEATURES:
Two practice examsPDF copy of the bookBonus appendix with author's recommended tools, sites, and references
Matt Walker, CEHv7, CPTS, CNDA, CCNA, MCSE, has held a wide variety of IT security teaching, writing, and leadership roles, including director of the Network Training Center on Ramstein AB, Germany, and IT security manager for Lockheed Martin at Kennedy Space Center. He is currently a security engineer for Hewlett-Packard.
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).
Chapter 1. Ethical Hacking Basics
Chapter 2. Cryptography 101
Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 4. Scanning and Enumeration
Chapter 5. Hacking Through the Network: Sniffers and Evasion
Chapter 6. Attacking a System
Chapter 7. Low Tech: Social Engineering and Physical Security
Chapter 8. Web-Based Hacking: Servers and Applications
Chapter 9. Wireless Network Hacking
Chapter 10. Trojans and Other Attacks
Chapter 11. The Pen Test: Putting It All Together
Appendix A. Tool, Sites, and ReferencesAppendix B. About the CD
Glossary
Index
Reihe/Serie | All-in-One |
---|---|
Zusatzinfo | 200 Illustrations, unspecified |
Sprache | englisch |
Maße | 191 x 241 mm |
Gewicht | 905 g |
Themenwelt | Schulbuch / Wörterbuch ► Lexikon / Chroniken |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 0-07-177229-4 / 0071772294 |
ISBN-13 | 978-0-07-177229-7 / 9780071772297 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich