Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2015-2019  (2)
  • 2000-2004
  • Safari, an O’Reilly Media Company  (2)
  • [Erscheinungsort nicht ermittelbar] : Pearson IT Certification  (2)
  • Computer security ; Examinations  (2)
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 18 hr., 36 min.)
    Edition: 2nd edition
    Series Statement: LiveLessons
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Electronic videos ; local ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Computer networks ; Security measures ; Examinations ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: 18+ Hours of Video Instruction Learn everything you need to know to pass the Certified Ethical Hacker exam. Overview Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. With 5 modules containing more than 18 hours of training, this course covers all concepts in the objectives so you can master the knowledge you need to pass the exam. Build your ethical hacking skills with the foundations of reconnaissance, footprinting, enumeration, and vulnerability analysis and dive into hacking web servers, applications, wireless networks, IoT devices, and mobile platforms. Veteran security experts Omar Santos, Nick Garner, and Bo Rothwell provide a thorough foundation through demos and best practices for security risk analysis, as well as hacking tools and methods. With this knowledge, you will be able to confidently mitigate and help guard your network from the multifaceted attacks that you will encounter while also preparing you to pass the CEH exam. Regardless of your level of experience, this video course explores all sides of a multi-pronged cybersecurity attack to ensure that you are prepared to combat attack threats. About the Instructors Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives and standards bodies. He is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. He is the author of several cybersecurity books and video courses. You can obtain additional information about Omar’s projects at omarsantos.io and h4cker.org. Nick Garner , CCIE No. 17871, is a solutions integration architect for Cisco Systems. He has been in Cisco Advanced Services supporting customers in both transactional and subscription engagements for 8 years. In his primary role, he has deployed and supported large-scale data center designs for prominent clients in the San Francisco Bay area. His primary technical focus outside of data center routing and switching designs is security and multicast. William “Bo” Rothwell has a passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. H...
    Note: Online resource; Title from title screen (viewed July 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135305409
    Language: English
    Pages: 1 online resource (706 pages)
    Edition: 1st edition
    Keywords: Penetration testing (Computer security) Study guides Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Electronic books ; local ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors' concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives · Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success · Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career · Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including · Ethical hacking basics · Technical foundations of hacking · Footprinting and scanning · Enumeration and system hacking · Social engineering, malware threats, and vulnerability analysis · Sniffers, session hijacking, and denial of service · Web server hacking, web applications, and database attacks · Wireless technologies, mobile security, and mobile attacks · IDS, firewalls, and honeypots · Cryptographic attacks and defenses · Cloud computing, IoT, and botnets
    Note: Online resource; Title from title page (viewed August 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...