Official Certified Ethical Hacker Review Guide: for Version 7.1

Official Certified Ethical Hacker Review Guide: for Version 7.1

Mixed media product EC-Council Certified Ethical Hacker (Ceh)

By (author) Steven Defino, By (author) Larry Greenblatt

$26.70
List price $29.66
You save $2.96 (9%)

Free delivery worldwide
Available
Dispatched in 2 business days
When will my order arrive?

  • Publisher: Delmar Cengage Learning
  • Format: Mixed media product | 416 pages
  • Dimensions: 183mm x 229mm x 23mm | 522g
  • Publication date: 2 March 2012
  • Publication City/Country: Clifton Park
  • ISBN 10: 1133282911
  • ISBN 13: 9781133282914
  • Sales rank: 244,872

Product description

OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized, respected hacking certification in the world. As experienced instructors of the International Council of Electronic Commerce Consultants (EC-Council), the authors draw on firsthand experience training top-caliber information security professionals for success on the council's Certified Ethical Hacker (CEH) exam. The only exam review guide officially endorsed by the EC-Council, this proven resource focuses on the core concepts that are covered on the newest certification course (version 7.1), as well as a wide array of useful learning tools, including chapter objectives, step-by-step tutorials, "Try it Out" exercises and challenges, group discussion topics, short lab examples, and practice exam questions and answers with explanations.The official CEH course teaches the latest hacking techniques, exploits, automated programs, and defensive recommendations, preparing students to audit organizations' protection of their information assets through a deep understanding of the methodologies and tools of the attack process. This official CEH Exam review guide can be used to either preview and prepare for this comprehensive course or review afterwards to prepare for the challenging exam. It is the perfect complement that gives any student a real advantage toward success with this certification.

Other books in this category

Showing items 1 to 11 of 11
Categories:

Review quote

1. Introduction to Ethical Hacking. 2. Footprinting and Reconnaissanse. 3. Scanning Networks. 4. Enumeration. 5. System Hacking. 6. Trojans and Backdoors. 7. Viruses and Worms. 8. Sniffers and Session Hijacking. 9. Social Engineering. 10. Denial of Service. 11. Webservers and Applications. 12. Hacking Wireless Networks. 13. IDS, Firewalls, and Honeypots. 14. Buffer Overflows. 15. Cryptography. 16. Penetration Testing.

Table of contents

1. Introduction to Ethical Hacking. 2. Footprinting and Reconnaissanse. 3. Scanning Networks. 4. Enumeration. 5. System Hacking. 6. Trojans and Backdoors. 7. Viruses and Worms. 8. Sniffers and Session Hijacking. 9. Social Engineering. 10. Denial of Service. 11. Webservers and Applications. 12. Hacking Wireless Networks. 13. IDS, Firewalls, and Honeypots. 14. Buffer Overflows. 15. Cryptography. 16. Penetration Testing.