did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789740298

Certified Ethical Hacker (CEH) : Learn Earn Essentials from the Expert

by ;
  • ISBN13:

    9780789740298

  • ISBN10:

    078974029X

  • Edition: 1st
  • Format: VHS
  • Copyright: 2013-01-01
  • Publisher: Que
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $85.00
We're Sorry.
No Options Available at This Time.

Summary

From Microsoft to the US Air Force, IBM to the FBI, Cisco to Wipro, thousands of security professionals are seeking the respected Certified Ethical Hacker (CEH) credential. You need information you can trust, delivered in a visual format that's easy to understand and recall. You don't have time to wade through enormous books, and don't want to invest in live classroom training. That's where Preparing for the Certified Ethical Hacker (CEH) Exam Video Mentor comes in. In six hours of personal video mentoring, top IT security expert Shon Harris walks you through the key real-world techniques you'll need to pass your exams the first time. This DVD package is part of the new Shon Harris Security Series, products that will include the right resource for every CEH candidate, regardless of your learning style. In addition to this DVD, we will deliver CertPrepOnline, FlashCardOnline, Online Course, and Cert Snack offerings. 20+ expert DVD videos from Shon Harris, top enterprise security consultant and author of the world's #1 CISSP study guide The best of classroom training for a fraction of the price, in a convenient, flexible visual format Covers all 10 CISSP domains of knowledge - from access control to business continuity to security architecture - all using live equipment and real-world scenarios

Table of Contents

CEH Ethics and Legal Issues
CEH Web Application Vulnerabilities
CEH Footprinting
CEH Web Based Password Cracking Techniques
CEH Scanning
CEH SQL Injection CEH Enumeration
CEH Hacking Wireless Networks
CEH System Hacking
CEH Virus and Worms
CEH Trojans and Backdoors
CEH Hacking Novell
CEH Sniffers
CEH Hacking Linux
CEH Denial of Service
CEH IDS, Firewalls and Honeypots
CEH Social Engineering
CEH Buffer Overflows
CEH Session Hijacking
CEH Cryptography
CEH Hacking Web Servers
CEH Penetration Testing Methodologies
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program