Certified Ethical Hacker (CEH) Exam Cram – Ebook Instant Download/Delivery ISBN(s): 9780137513444,0137513445,9780137513581, 0137513585
Product details:
- ISBN 10: 0137513585
- ISBN 13:9780137513581,
- Author: William Chuck Easttom
Certified Ethical Hacker (CEH) Exam Cram is the perfect study guide to help you pass the updated CEH Version 11 exam. Its expert real-world approach reflects Dr. Chuck Easttom’s expertise as one of the world’s leading cybersecurity practitioners and instructors, plus test-taking insights he has gained from teaching CEH preparation courses worldwide. Easttom assumes no prior knowledge: His expert coverage of every exam topic can help readers with little ethical hacking experience to obtain the knowledge to succeed. This guide’s extensive preparation tools include topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes and tips, an extensive glossary, and the handy CramSheet tear-out: key facts in an easy-to-review format. (This eBook edition of Certified Ethical Hacker (CEH) Exam Cram does not include access to the companion website with practice exam(s) included with the print or Premium edition.) Certified Ethical Hacker (CEH) Exam Cram helps you master all topics on CEH Exam Version 11: Review the core principles and concepts of ethical hacking Perform key pre-attack tasks, including reconnaissance and footprinting Master enumeration, vulnerability scanning, and vulnerability analysis Learn system hacking methodologies, how to cover your tracks, and more Utilize modern malware threats, including ransomware and financial malware Exploit packet sniffing and social engineering Master denial of service and session hacking attacks, tools, and countermeasures Evade security measures, including IDS, firewalls, and honeypots Hack web servers and applications, and perform SQL injection attacks Compromise wireless and mobile systems, from wireless encryption to recent Android exploits Hack Internet of Things (IoT) and Operational Technology (OT) devices and systems Attack cloud computing systems, misconfigurations, and containers Use cryptanalysis tools and attack cryptographic systems
Table contents:
Chapter 1. Reconnaissance and Scanning
Chapter 2. Enumeration and Vulnerability Scanning
Chapter 3. System Hacking
Chapter 4. Malware
Chapter 5. Packet Sniffing and Social Engineering
Chapter 6. Denial of Service and Session Hijacking
Chapter 7. Evading Security Measures
Chapter 8. Hacking Web Servers and Web Applications
Chapter 10. Hacking Mobile
Chapter 11. IOT and OT Hacking
Chapter 12. Cloud Computing and Hacking
Chapter 13. Cryptography
People also search:
what does a certified ethical hacker do
how much does a certified ethical hacker make
to receive a certified ethical hacker certificate
how to become a certified ethical hacker in india
how to become a certified ethical hacker for free