CEH Certified Ethical Hacker Study Guide

CEH Certified Ethical Hacker Study Guide

Paperback

By (author) Kimberly Graves

$32.48
List price $53.41
You save $20.93 39% off

Free delivery worldwide
Available
Dispatched in 3 business days
When will my order arrive?

  • Publisher: John Wiley & Sons Ltd
  • Format: Paperback | 432 pages
  • Dimensions: 185mm x 234mm x 33mm | 386g
  • Publication date: 28 April 2010
  • Publication City/Country: Chichester
  • ISBN 10: 0470525207
  • ISBN 13: 9780470525203
  • Edition statement: Study Guide
  • Sales rank: 232,474

Product description

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf

Other people who viewed this bought:

Showing items 1 to 10 of 10

Other books in this category

Showing items 1 to 11 of 11
Categories:

Author information

Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.

Back cover copy

Prepare for CEH certification with this comprehensive guideLearn how to identify security risks to networks and computers as you prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide thoroughly covers all exam objectives and topics, while showing you how Black Hat hackers think, helping you spot vulnerabilities in systems, and preparing you to beat the bad guys at their own game. Inside, you'll find: Full coverage of all exam objectives in a systematic approach, so you can be confident you're getting the instruction you need for the examPractical hands-on exercises to reinforce critical skillsReal-world scenarios that put what you've learned in the context of actual job rolesChallenging review questions in each chapter to prepare you for exam dayExam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the examA handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objectiveLook inside for complete coverage of all exam objectives.

Table of contents

1 Introduction to Ethical Hacking, Ethics, and Legality. 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering. 3 Gathering Network and Host Information: Scanning and Enumeration. 4 System Hacking: Password Cracking, Escalating Privileges, and Hiding Files. 5 Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms. 6 Gathering Data from Networks: Sniffers. 7 Denial of Service and Session Hijacking. 8 Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques. 9 Attacking Applications: SQL Injection and Buffer Overflows. 10 Wireless Network Hacking. 11 Physical Site Security. 12 Hacking Linux Systems. 13 Bypassing Network Security: Evading IDS, Honeypots, and Firewalls. 14 Understanding Cryptography. 15 Performing a Penetration Test.