Fully up-to-date coverage of every topic on the CEH v9 certification exam
Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.
An integrated study system based on proven pedagogy, CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, features brand-new explanations of cloud computing and mobile platforms and addresses vulnerabilities to the latest technologies and operating systems. Readers will learn about footprinting and reconnaissance, malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and much more. Designed to help you pass the exam with ease, this authoritative resource will also serve as an essential on-the-job reference.
- Features more than 400 accurate practice questions
- Electronic content includes test engine that provides full-length practice exams and customized quizzes by chapter
- Written by an experienced educator with more than 30 years of experience in the field
|Publisher:||McGraw-Hill Professional Publishing|
|Product dimensions:||7.30(w) x 9.10(h) x 1.10(d)|
About the Author
Matt Walker (Melbourne, FL), CCNA, CCNP, MCSE, CEH, CNDA, CPTS, is currently an Incident Response team lead working for Hewlett Packard Enterprise. An IT education professional for over 20 years, Matt has served as the IA Training Instructor Supervisor and a Sr. IA Analyst at Dynetics, Inc., in Huntsville, Alabama, and lead the effort to build the US Air Force's first Cisco Academy in Ramstein AB, Germany, serving as the director of network training, curriculum lead, and senior instructor.
Table of Contents
Chapter 1: Getting Started: Essential Knowledge
Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3: Scanning and Enumeration
Chapter 4: Sniffing and Evasion
Chapter 5: Attacking a System
Chapter 6: Web-Based Hacking: Servers and Applications
Chapter 7: Wireless Network Hacking
Chapter 8: Security in Cloud Computing
Chapter 9: Trojan and Other Attacks
Chapter 10: Cryptography 101
Chapter 11: Low Tech: Social Engineering and Physical Security
Chapter 12: The Pen Test: Putting It All Together
Appendix A: Tools, Sites, and References