CEH: Certified Ethical Hacker Version 8 Study Guide
- Length: 504 pages
- Edition: 1
- Language: English
- Publisher: Sybex
- Publication Date: 2014-08-25
- ISBN-10: 111864767X
- ISBN-13: 9781118647677
- Sales Rank: #853215 (See Top 100 Books)
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide
Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards.
- Security remains the fastest growing segment of IT, and CEH certification provides unique skills
- The CEH also satisfies the Department of Defense’s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications
- This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course
- Covers all the exam objectives with an easy-to-follow approach
- Companion website includes practice exam questions, flashcards, and a searchable Glossary of key terms
CEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when you’re ready to tackle this challenging exam
Table of Contents
Chapter 1: Getting Started with Ethical Hacking
Chapter 2: System Fundamentals
Chapter 3: Cryptography
Chapter 4: Footprinting and Reconnaissance
Chapter 5: Scanning Networks
Chapter 6: Enumeration of Services
Chapter 7: Gaining Access to a System
Chapter 8: Trojans, Viruses, Worms, and Covert Channels
Chapter 9: Sniffers
Chapter 10: Social Engineering
Chapter 11: Denial of Service
Chapter 12: Session Hijacking
Chapter 13: Web Servers and Web Applications
Chapter 14: SQL Injection
Chapter 15: Wireless Networking
Chapter 16: Evading IDSs, Firewalls, and Honeypots
Chapter 17: Physical Security
Appendix A: Answers to Review Questions
Appendix B: About the Additional Study Tools
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.