CEH certified ethical hacker cert guide / Michael Gregg and Omar Santos.

By: Gregg, Michael [author.]Contributor(s): Omar, Santos [author.]Material type: TextTextPublication details: Hoboken : Pearson Education, Inc, c2022Edition: 4th editionDescription: xxxviii, 709 pages : illustrations ; 24 cmSubject(s): COMPUTER SECURITY | ELECTRONIC DATA PROCESSING PERSONNEL CERTIFICATION | ELECTRONIC DATA PROCESSING PERSONNEL CERTIFICATION STUDY GUIDES | PENETRATION TESTING (COMPUTER SECURITY)LOC classification: QA 76.9 G74 2022
Contents:
Introduction. -- Chapter 1 : An Introduction to Ethical Hacking. -- Chapter 2 : The Technical Foundations of Hacking. -- Chapter 3 : Footprinting, Reconnaissance, and Scanning. -- Chapter 4 : Enumeration and System Hacking. -- Chapter 5 : Social Engineering, Malware Threats, and Vulnerability Analysis. -- Chapter 6 : Sniffers, Session Hijacking, and Denial of Service. -- Chapter 7 : Web Server Hacking, Web Applications, and Database Attacks. -- Chapter 8 : Wireless Technologies, Mobile Security, and Attacks. -- Chapter 9 : Evading IDS, Firewalls, and Honeypots. -- Chapter 10 : Cryptographic Attacks and Defenses. -- Chapter 11 : Cloud Computing, IoT, and Botnets. -- Chapter 12 : Final Preparation. --
Summary: "This study guide helps you master topics on EC-Council's Certified Ethical Hacker (CEH) exam: Understand technical foundations of hacking and the basics of ethical hacking. Select targets and perform footprinting and enumeration. Uncover detailed information about a target, and begin exploiting vulnerabilities. Explore social engineering, malware threats, and vulnerability tracking and mitigation Review passive and active packet capture techniques Discuss session hijacking, DoS/DDoS, and botnets. Explore web hacking, application attacks, and SQL injection. Review wireless and mobile technologies and vulnerabilities. See how threat actors bypass intrusion detection systems and firewalls. Discover tactics, techniques, and procedures (TTPs) for attacking cryptographic systems Understand cloud models, cloud security, and cloud penetration testing"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Shelving location Call number Status Date due Barcode
Books Books NU Fairview College LRC
NU Fairview College LRC
School of Engineering and Technology Technical Services GC QA 76.9 G74 2022 (Browse shelf(Opens below)) Available NUFAI000005840

Includes index

Introduction. -- Chapter 1 : An Introduction to Ethical Hacking. -- Chapter 2 : The Technical Foundations of Hacking. -- Chapter 3 : Footprinting, Reconnaissance, and Scanning. -- Chapter 4 : Enumeration and System Hacking. -- Chapter 5 : Social Engineering, Malware Threats, and Vulnerability Analysis. -- Chapter 6 : Sniffers, Session Hijacking, and Denial of Service. -- Chapter 7 : Web Server Hacking, Web Applications, and Database Attacks. -- Chapter 8 : Wireless Technologies, Mobile Security, and Attacks. -- Chapter 9 : Evading IDS, Firewalls, and Honeypots. -- Chapter 10 : Cryptographic Attacks and Defenses. -- Chapter 11 : Cloud Computing, IoT, and Botnets. -- Chapter 12 : Final Preparation. --

"This study guide helps you master topics on EC-Council's Certified Ethical Hacker (CEH) exam: Understand technical foundations of hacking and the basics of ethical hacking. Select targets and perform footprinting and enumeration. Uncover detailed information about a target, and begin exploiting vulnerabilities. Explore social engineering, malware threats, and vulnerability tracking and mitigation Review passive and active packet capture techniques Discuss session hijacking, DoS/DDoS, and botnets. Explore web hacking, application attacks, and SQL injection. Review wireless and mobile technologies and vulnerabilities. See how threat actors bypass intrusion detection systems and firewalls. Discover tactics, techniques, and procedures (TTPs) for attacking cryptographic systems Understand cloud models, cloud security, and cloud penetration testing"-- Provided by publisher.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 NU LRC FAIRVIEW. All rights reserved. Privacy Policy I Powered by: KOHA