Uh-oh, it looks like your Internet Explorer is out of date.
For a better shopping experience, please upgrade now.

NOOK Book(eBook)
Available on Compatible NOOK Devices and the free NOOK Apps.
Overview
Don’t Let the Real Test Be Your First Test!
Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment test evaluates your readiness and identifies areas requiring further study. Designed to help you pass the exam, this is the perfect companion to CEH™ Certified Ethical Hacker All-in-One Exam Guide, Third Edition.
Covers all exam topics, including:
• Ethical hacking fundamentals
• Reconnaissance and footprinting
• Scanning and enumeration
• Sniffing and evasion
• Attacking a system
• Hacking Web servers and applications
• Wireless network hacking
• Trojans and other attacks
• Cryptography
• Social engineering and physical security
• Penetration testing
Electronic content includes:
• Test engine that provides full-length practice exams and customized quizzes by chapter
• PDF copy of the book
Product Details
ISBN-13: | 9781259836596 |
---|---|
Publisher: | McGraw-Hill Education |
Publication date: | 12/02/2016 |
Sold by: | Barnes & Noble |
Format: | NOOK Book |
File size: | 6 MB |
About the Author
Matt Walker, CEH, CPTS™, is currently working as a member of the Cyber Defense and Security Strategy team within Hewlett-Packard Enterprise. An IT security and education professional for more than 20 years, he has served as Director of the Network Training Center, a curriculum lead/senior instructor for Cisco Networking Academy on Ramstein AB, Germany, as a network engineer for NASA’s Secure Network Systems (NSS).
Table of Contents
Chapter 1: Getting Started: Essential KnowledgeChapter 2: Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3: Scanning and Enumeration
Chapter 4: Sniffing and Evasion
Chapter 5: Attacking a System
Chapter 6: Web-Based Hacking: Servers and Applications
Chapter 7: Wireless Network Hacking
Chapter 8: Security in Cloud Computing
Chapter 9: The Mobile World
Chapter 10: Malware and other attacks
Chapter 11: Cryptography 101
Chapter 12: Low Tech: Social Engineering and Physical Security
Chapter 13: The Pen Test: Putting It All Together
Appendix A: Pre-assessment Test