Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    ISBN: 9780137489930
    Language: English
    Pages: 1 online resource (752 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: This book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The authors concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Councils official exam objectives Key Topics figures, tables, and lists call attention to the information that is most crucial for exam success Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questionsgoing beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career Key Terms are listed in each chapter and defined in a complete glossary, explaining essential terminology within the field This study guide helps you master all the topics on the latest CEH exam, including: Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Social engineering, malware threats, and vulnerability analysis Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Cryptographic attacks and defenses Cloud computing, IoT, and botnets
    Note: Online resource; Title from title page (viewed February 8, 2022) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...