CEH: Certified Ethical Hacker Version 8 Study Guide
Author | : Sean-Philip Oriyano |
Publisher | : John Wiley & Sons |
Total Pages | : 514 |
Release | : 2014-07-31 |
ISBN-10 | : 9781118989289 |
ISBN-13 | : 1118989287 |
Rating | : 4/5 (89 Downloads) |
Download or read book CEH: Certified Ethical Hacker Version 8 Study Guide written by Sean-Philip Oriyano and published by John Wiley & Sons. This book was released on 2014-07-31 with total page 514 pages. Available in PDF, EPUB and Kindle. Book excerpt: Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards. Security remains the fastest growing segment of IT, and CEH certification provides unique skills The CEH also satisfies the Department of Defense’s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course Covers all the exam objectives with an easy-to-follow approach Companion website includes practice exam questions, flashcards, and a searchable Glossary of key terms CEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when you're ready to tackle this challenging exam Also available as a set, Ethical Hacking and Web Hacking Set, 9781119072171 with The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition.