CEH Certified Ethical Hacker All-in-One Exam Guide

by
Edition: 1st
Format: Package
Pub. Date: 2011-09-07
Publisher(s): McGraw-Hill Osborne Media
List Price: $52.50

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$62.50
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$62.50*

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

Summary

A comprehensive guide to the CEH exam CEH Certified Ethical Hacker All-in-One Exam Guideoffers complete coverage of the CEH certification which certifies individuals in the specific network security discipline of ethical hacking from a vendor-neutral perspective. The book covers all objectives for the new CEH exam, and provides an integrated study system based on proven pedagogy. Special elements reinforce and teach practical skills, including: step-by-step exercises, exam watch and on-the-job call-outs, and chapter self tests, which include knowledge- and scenario-based questions and one case study-based lab question per chapter. The book and CD combined contain more than 400 practice exam questions. Special coverage of DOD 8570 requirements and US-CERT's EBK and Certified Computer Security Incident Handler (CSIH) standards are included. CEH Certified Ethical Hacker All-in-One Exam Guide Offers in-depth coverage of all official objectives for the CEH exam Includes CD-ROM with two practice exams, lab simulations, video training from the authors, and an e-book Co-written by security experts and experience trainers Serves as a valuable on-the-job reference after certification

Table of Contents

Chapter 1. Ethical Hacking Basics
Chapter 2. Cryptography 101
Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 4. Scanning and Enumeration
Chapter 5. Hacking Through the Network: Sniffers and Evasion
Chapter 6. Attacking a System
Chapter 7. Low Tech: Social Engineering and Physical Security
Chapter 8. Web-Based Hacking: Servers and Applications
Chapter 9. Wireless Network Hacking
Chapter 10. Trojans and Other Attacks
Chapter 11. The Pen Test: Putting It All Together
Appendix A. Tool, Sites, and ReferencesAppendix B. About the CD
Glossary
Index

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.