CEH Certified Ethical Hacker Practice Exams, Second Edition (häftad)
Format
CD-Extra
Språk
Engelska
Antal sidor
320
Utgivningsdatum
2014-09-16
Upplaga
2
Förlag
McGraw-Hill Education
Dimensioner
228 x 184 x 19 mm
Vikt
612 g
Antal komponenter
1
Komponenter
CD-ROM (1), Paperback (1)
ISBN
9780071838733

CEH Certified Ethical Hacker Practice Exams, Second Edition

CD-Extra,  Engelska, 2014-09-16

Slutsåld

Don't Let the Real Test Be Your First Test!

fully updated for the ceh v8 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the ec-council's certified ethical hacker exam. to aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. a valuable pre-assessment test evaluates your readiness and identifies areas requiring further study. designed to help you pass the exam, this is theperfect companion to CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition.

Covers all exam topics, including:
  • Introduction to ethical hacking
  • Reconnaissance and footprinting
  • Scanning and enumeration
  • Sniffing and evasion
  • Attacking a system
  • Hacking web servers and applications
  • Wireless network hacking
  • Trojans and other attacks
  • Cryptography
  • Social engineering and physical security
  • Penetration testing
Electronic content includes:
  • Test engine that provides full-length practice exams and customized quizzes by chapter
  • PDF copy of the book

Kundrecensioner

Fler böcker av Matt Walker

Övrig information

Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).

Innehållsförteckning

Chapter 1. Ethical Hacking BasicsChapter 2. Cryptography 101Chapter 3. Reconnaissance: Information Gathering for the Ethical HackerChapter 4. Scanning and EnumerationChapter 5. Sniffers and EvasionChapter 6. Attacking a SystemChapter 7. Social Engineering and Physical SecurityChapter 8. Web-Based Hacking: Servers and ApplicationsChapter 9. Wireless Network HackingChapter 10. Trojans and Other AttacksChapter 11. The Pen Test: Putting It All Together