Certified Ethical Hacker (CEH) Version 10 Cert Guide

by ;
Edition: 3rd
Format: Hardcover
Pub. Date: 2019-10-22
Publisher(s): Pearson IT Certification
List Price: $59.99

Buy New

Usually Ships in 2-3 Business Days
$58.19

Rent Book

Select for Price
There was a problem. Please try again later.

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

This item is being sold by an Individual Seller and will not ship from the Online Bookstore's warehouse. The Seller must confirm the order within two business days. If the Seller refuses to sell or fails to confirm within this time frame, then the order is cancelled.

Please be sure to read the Description offered by the Seller.

Summary

This best-of-breed study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. This concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

  • Every feature of this book supports both efficient exam preparation and long-term mastery:
  • Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives
  • Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success
  • Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career
  • Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology


Author Biography

Mr. Michael Gregg is the CEO of Superior Solutions, Inc. (www.thesolutionfirm.com), a Houston based IT security consulting firm.  His organization performs security assessments and penetration testing for fortune 1000 firms. He has more than 20 years experience in the IT field.  He is an expert on cyber security, networking, and Internet technologies.  He has earned multiple degrees and presently maintains the following certifications:  CISSP, CISA, CISM, MCSE, MCT, CTT+, A+, N+, Security+, CNA, CCNA, CCE, CEH, CHFI, CEI, and SSCP.   Michael has authored/co-authored more than twenty books.  

Michael is an adjunct instructor for a Villanova University and the University of West Georgia. He has also led the development of many training classes, courses, and programs used by training vendors, developers, colleges, and universities, some include: Advanced Security Boot Camp, Ethical Hacking, Professional Hacking Boot Camp, Inside Risk Assessment, Introduction to Network Security, Mastering Security, CISA Prep Class, and Advanced Security Concepts.  He is also an Expert Q&A for TechTarget.com web sites including SearchNetworking, SearchMobilNetworking, and SearchSMB.  He has testified before U.S. Congress and for the State of Missouri. He writes for Huffington Post and other online publications. 

Omar Santos is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure. Omar is the author of several best-selling books, white papers, articles, and security configuration guidelines and best practices. Omar is a Principal Engineer of Cisco’s Product Security Incident Response Team (PSIRT) where he mentors and lead engineers and incident managers during the investigation and resolution of security vulnerabilities. You can follow Omar on Twitter: @santosomar or visit his website at: http://omarsantos.io

Table of Contents

Previous Edition Table of Contents

Introduction xxi

Chapter 1 An Introduction to Ethical Hacking

Chapter 2 The Technical Foundations of Hacking

Chapter 3 Footprinting and Scanning

Chapter 4 Enumeration and System Hacking

Chapter 5 Malware Threats

Chapter 6 Sniffers, Session Hijacking, and Denial of Service

Chapter 7 Web Server Hacking, Web Applications, and Database Attacks

Chapter 8 Wireless Technologies, Mobile Security, and Attacks

Chapter 9 IDS, Firewalls, and Honeypots

Chapter 10 Physical Security and Social Engineering

Chapter 11 Cryptographic Attacks and Defenses

Chapter 12 Cloud Computing and Botnets

Chapter 13 Final Preparation

Glossary

 

Online Content:

Glossary

Appendix A Answers to the “Do I Know This Already?” Quizzes and Review Questions

Appendix B Memory Tables

Appendix C Memory Tables Answer Key

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.