CEH certified ethical hacker cert guide / Michael Gregg and Omar Santos.
Material type:
Item type | Current library | Home library | Collection | Shelving location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|
![]() |
NU Fairview College LRC | NU Fairview College LRC | School of Engineering and Technology | Technical Services | GC QA 76.9 G74 2022 (Browse shelf(Opens below)) | Available | NUFAI000005840 |
Browsing NU Fairview College LRC shelves, Shelving location: Technical Services, Collection: School of Engineering and Technology Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
![]() |
||
GC K 3264 B87 2020 Digital data collection and information privacy law / | GC LB 1028.5 B53 2022 Beginning teaching with digital technology / | GC QA 39.2 W55 2021 Practical discrete mathematics : discover math principles that fuel algorithms for computer science and machine learning with Python / | GC QA 76.9 G74 2022 CEH certified ethical hacker cert guide / | GC QA 76.28 S93 2024 AP computer science principles 2024 / | GC QA 76.585 D56 2022 Exam ref AZ-500 : Microsoft Azure security technologies / | GC QA 76.585 P58 2022 Exam ref AZ-700 designing and implementing microsoft azure networking solutions / |
Includes index
Introduction. -- Chapter 1 : An Introduction to Ethical Hacking. -- Chapter 2 : The Technical Foundations of Hacking. -- Chapter 3 : Footprinting, Reconnaissance, and Scanning. -- Chapter 4 : Enumeration and System Hacking. -- Chapter 5 : Social Engineering, Malware Threats, and Vulnerability Analysis. -- Chapter 6 : Sniffers, Session Hijacking, and Denial of Service. -- Chapter 7 : Web Server Hacking, Web Applications, and Database Attacks. -- Chapter 8 : Wireless Technologies, Mobile Security, and Attacks. -- Chapter 9 : Evading IDS, Firewalls, and Honeypots. -- Chapter 10 : Cryptographic Attacks and Defenses. -- Chapter 11 : Cloud Computing, IoT, and Botnets. -- Chapter 12 : Final Preparation. --
"This study guide helps you master topics on EC-Council's Certified Ethical Hacker (CEH) exam: Understand technical foundations of hacking and the basics of ethical hacking. Select targets and perform footprinting and enumeration. Uncover detailed information about a target, and begin exploiting vulnerabilities. Explore social engineering, malware threats, and vulnerability tracking and mitigation Review passive and active packet capture techniques Discuss session hijacking, DoS/DDoS, and botnets. Explore web hacking, application attacks, and SQL injection. Review wireless and mobile technologies and vulnerabilities. See how threat actors bypass intrusion detection systems and firewalls. Discover tactics, techniques, and procedures (TTPs) for attacking cryptographic systems Understand cloud models, cloud security, and cloud penetration testing"-- Provided by publisher.
There are no comments on this title.