Your order must be $59 or more to qualify for free economy shipping.
Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
Get Rewarded for Ordering Your Textbooks!Enroll Now
Customer ReviewsRead Reviews
Write a Review
List Price: $50.00
Add to Cart
What is included with this book?
The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
A comprehensive guide to the CEH exam CEH Certified Ethical Hacker All-in-One Exam Guideoffers complete coverage of the CEH certification which certifies individuals in the specific network security discipline of ethical hacking from a vendor-neutral perspective. The book covers all objectives for the new CEH exam, and provides an integrated study system based on proven pedagogy. Special elements reinforce and teach practical skills, including: step-by-step exercises, exam watch and on-the-job call-outs, and chapter self tests, which include knowledge- and scenario-based questions and one case study-based lab question per chapter. The book and CD combined contain more than 400 practice exam questions. Special coverage of DOD 8570 requirements and US-CERT's EBK and Certified Computer Security Incident Handler (CSIH) standards are included. CEH Certified Ethical Hacker All-in-One Exam Guide Offers in-depth coverage of all official objectives for the CEH exam Includes CD-ROM with two practice exams, lab simulations, video training from the authors, and an e-book Co-written by security experts and experience trainers Serves as a valuable on-the-job reference after certification
Table of Contents
Chapter 1. Ethical Hacking Basics Chapter 2. Cryptography 101 Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker Chapter 4. Scanning and Enumeration Chapter 5. Hacking Through the Network: Sniffers and Evasion Chapter 6. Attacking a System Chapter 7. Low Tech: Social Engineering and Physical Security Chapter 8. Web-Based Hacking: Servers and Applications Chapter 9. Wireless Network Hacking Chapter 10. Trojans and Other Attacks Chapter 11. The Pen Test: Putting It All Together Appendix A. Tool, Sites, and ReferencesAppendix B. About the CD Glossary Index