Certified Ethical Hacker (CEH) Foundation Guide
Author:by Sagar Ajay Rahalkar (Author)
Publisher finelybook 出版社:Apress
Edition 版本:1st ed. edition
Publication Date 出版日期:2016-12-1
Language 语言:English
Print Length 页数:221pages
ISBN-10:1484223241
ISBN-13:9781484223246
Book Description
From the Back Cover
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.
The book explains the concepts with the help of practical real-world scenarios and examples. You’ll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.
In this book you will:
- Gain the basics of hacking (apps, wireless devices, and mobile platforms)
- Discover useful aspects of databases and operating systems from a hacking perspective
- Develop sharper programming and networking skills for the exam
- Explore the penetration testing life cycle
- Bypass security appliances like IDS, IPS, and honeypots
- Grasp the key concepts of cryptography
- Discover the career paths available after certification
- Revise key interview questions for a certified ethical hacker
About the Author
Sagar has also been one of the reviewers for multiple books like “Metasploit Penetration Testing Cookbook, Second Edition”, “Mastering Metasploit” by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer.
下载地址
相关推荐
Introduction to Computer Organization: ARM Edition
Data Security and Privacy Protection: A Comprehensive Guide
Android Studio Meerkat Essentials – Compose Edition: Developing Android Apps with Android Studio, Jetpack Compose, and Kotlin
Ultimate Pentesting for Web Applications: Unlock Advanced Web App Security Through Penetration Testing
The Art of Mac Malware, Volume 2: Detecting Malicious Software
Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics
链接?
已更新