CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

  • 11h 20m
  • Matt Walker
  • McGraw-Hill/Osborne
  • 2017

Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.

An integrated study system based on proven pedagogy, CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, features brand-new explanations of cloud computing and mobile platforms and addresses vulnerabilities to the latest technologies and operating systems. Readers will learn about footprinting and reconnaissance, malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and much more. Designed to help you pass the exam with ease, this authoritative resource will also serve as an essential on-the-job reference.

  • Features more than 400 accurate practice questions
  • Written by an experienced educator with more than 30 years of experience in the field

About the Author

Matt Walker (Melbourne, FL), CCNA, CCNP, MCSE, CEH, CNDA, CPTS, is currently an Incident Response team lead working for Hewlett Packard Enterprise. An IT education professional for over 20 years, Matt has served as the IA Training Instructor Supervisor and a Sr. IA Analyst at Dynetics, Inc., in Huntsville, Alabama, and lead the effort to build the US Air Force's first Cisco Academy in Ramstein AB, Germany, serving as the director of network training, curriculum lead, and senior instructor.

In this Book

  • Introduction
  • Getting Started—Essential Knowledge
  • Reconnaissance—Information Gathering for the Ethical Hacker
  • Scanning and Enumeration
  • Sniffing and Evasion
  • Attacking a System
  • Web-Based Hacking—Servers and Applications
  • Wireless Network Hacking
  • Security in Cloud Computing
  • Trojans and other Attacks
  • Cryptography 101
  • Low Tech—Social Engineering and Physical Security
  • The Pen Test—Putting it All Together
  • Glossary
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE