Ethical Hacking LiveLesson

Ethical Hacking LiveLesson

Mixed media product Shon Harris Security Series, Video Mentor

By (author) Shon Harris, By (author) Don Keeber

List price $98.91

Unavailable - AbeBooks may have this title.

  • Publisher: Pearson It Certification
  • Format: Mixed media product | 100 pages
  • Dimensions: 178mm x 235mm
  • Publication date: 1 November 2012
  • Publication City/Country: Upper Saddle River
  • ISBN 10: 078974029X
  • ISBN 13: 9780789740298
  • Edition: 1
  • Sales rank: 1,635,144

Product description

From Microsoft to the US Air Force, IBM to the FBI, Cisco to Wipro, thousands of security professionals are seeking the respected Certified Ethical Hacker (CEH) credential. You need information you can trust, delivered in a visual format that's easy to understand and recall. You don't have time to wade through enormous books, and don't want to invest in live classroom training. That's where Preparing for the Certified Ethical Hacker (CEH) Exam Video Mentor comes in. In six hours of personal video mentoring, top IT security expert Shon Harris walks you through the key real-world techniques you'll need to pass your exams the first time. This DVD package is part of the new Shon Harris Security Series, products that will include the right resource for every CEH candidate, regardless of your learning style. In addition to this DVD, we will deliver CertPrepOnline, FlashCardOnline, Online Course, and Cert Snack offerings. *20+ expert DVD videos from Shon Harris, top enterprise security consultant and author of the world's #1 CISSP study guide * The best of classroom training for a fraction of the price, in a convenient, flexible visual format * Covers all 10 CISSP domains of knowledge - from access control to business continuity to security architecture - all using live equipment and real-world scenarios

Other people who viewed this bought:

Showing items 1 to 10 of 10

Other books in this category

Showing items 1 to 11 of 11
Categories:

Author information

Shon Harris, CISSP, MCSE, is President of Logical Security, a security consultant, a former engineer in the US Air Force Information Warfare unit, a security instructor for clients such as the U.S. Department of Defense and National Security Agency (NSA), and author of the world's best-selling CISSP book, CISSP All-in-One Exam Guide, now in its Fourth Edition. Recognized by Information Security Magazine as one of the field's top 25 women, Harris specializes in helping clients develop secure enterprise infrastructures, security governance, and enterprise wide risk management and control programs. She was contributing author to Hacker's Challenge and Gray Hat Hacking.

Back cover copy

From Microsoft to the US Air Force, IBM to the FBI, Cisco to Wipro, thousands of security professionals are seeking the respected Certified Ethical Hacker (CEH) credential. You need information you can trust, delivered in a visual format that's easy to understand and recall. You don't have time to wade through enormous books, and don't want to invest in live classroom training. That's where Preparing for the Certified Ethical Hacker (CEH) Exam Video Mentor comes in. In six hours of personal video mentoring, top IT security expert Shon Harris walks you through the key real-world techniques you'll need to pass your exams the first time. This DVD package is part of the new Shon Harris Security Series, products that will include the right resource for every CEH candidate, regardless of your learning style. In addition to this DVD, we will deliver CertPrepOnline, FlashCardOnline, Online Course, and Cert Snack offerings. 20+ expert DVD videos from Shon Harris, top enterprise security consultant and author of the world's #1 CISSP study guide The best of classroom training for a fraction of the price, in a convenient, flexible visual format Covers all 10 CISSP domains of knowledge - from access control to business continuity to security architecture - all using live equipment and real-world scenarios

Table of contents

CEH Ethics and Legal Issues CEH Web Application Vulnerabilities CEH Footprinting CEH Web Based Password Cracking Techniques CEH Scanning CEH SQL Injection CEH Enumeration CEH Hacking Wireless Networks CEH System Hacking CEH Virus and Worms CEH Trojans and Backdoors CEH Hacking Novell CEH Sniffers CEH Hacking Linux CEH Denial of Service CEH IDS, Firewalls and Honeypots CEH Social Engineering CEH Buffer Overflows CEH Session Hijacking CEH Cryptography CEH Hacking Web Servers CEH Penetration Testing Methodologies