Certified.Ethical.Hacker.CEH.Foundation.Guide

时间:2019-12-23 07:52:39
【文件属性】:
文件名称:Certified.Ethical.Hacker.CEH.Foundation.Guide
文件大小:12.15MB
文件格式:PDF
更新时间:2019-12-23 07:52:39
Certified Ethical Hacker Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification. Table of Contents Chapter 1: Operating System Basics Chapter 2: Database Basics Chapter 3: Networking Basics Chapter 4: Programming Basics for Security Enthusiasts and Hackers Chapter 5: Virtualization and Cloud Basics Chapter 6: Information Security Basics Chapter 7: Penetration Testing Chapter 8: Information Gathering Chapter 9: Hacking Basics Chapter 10: Web Application Hacking Chapter 11: Wireless Hacking Chapter 12: Hacking Mobile Platforms Chapter 13: IDSes, Firewalls, and Honeypots Chapter 14: Cryptography Appendix A: Career Tracks Available after CEH Appendix B: Interview Questions Appendix C: Answers for Sample Questions

网友评论