Don't Let the Real Test Be Your First Test!Written by an IT security and education expert, CEH Certified Ethical Hacker Practice Exams is filled with more than 500 realistic practice exam questions based on the latest release of the Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are included for every question. This practical guide covers all CEH exam objectives developed by the EC-Council and is the perfect companion to CEH Certified Ethical Hacker All-in-One Exam Guide.
Covers all exam topics, including:
Ethical hacking basicsCryptography Reconnaissance and footprinting Scanning and enumeration Sniffers and evasionAttacking a systemSocial engineering and physical security Web-based hacking-servers and applicationsWireless network hacking Trojans, viruses, and other attacks Penetration testing
Electronic content includes:
Simulated practice examPDF eBookBonus practice exam (with free online registration)
Reihe
Sprache
Verlagsort
Verlagsgruppe
McGraw-Hill Education - Europe
Zielgruppe
Für die Erwachsenenbildung
Illustrationen
Maße
Höhe: 231 mm
Breite: 185 mm
Dicke: 17 mm
Gewicht
ISBN-13
978-0-07-181026-5 (9780071810265)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).
Chapter 1. Ethical Hacking Basics
Chapter 2. Cryptography 101
Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 4. Scanning and Enumeration
Chapter 5. Hacking Through the Network: Sniffers and Evasion
Chapter 6. Attacking a System
Chapter 7. Low Tech: Social Engineering and Physical Security
Chapter 8. Web-Based Hacking: Servers and Applications
Chapter 9. Wireless Network Hacking
Chapter 10. Trojans and Other Attacks
Chapter 11. The Pen Test: Putting It All Together