icon
Image from Google Jackets
Image from OpenLibrary

CEH certified ethical hacker cert guide / Omar Santos, Michael Gregg.

By: Contributor(s): Publisher: United Kingdom : Pearson Education, Inc, 2022Description: xxxviii ,709 pages : 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780137489985
Subject(s): DDC classification:
  • 23 005.8 G819
Summary: "This study guide helps you master topics on EC-Council's Certified Ethical Hacker (CEH) exam: Understand technical foundations of hacking and the basics of ethical hacking. Select targets and perform footprinting and enumeration. Uncover detailed information about a target, and begin exploiting vulnerabilities. Explore social engineering, malware threats, and vulnerability tracking and mitigation Review passive and active packet capture techniques Discuss session hijacking, DoS/DDoS, and botnets. Explore web hacking, application attacks, and SQL injection. Review wireless and mobile technologies and vulnerabilities. See how threat actors bypass intrusion detection systems and firewalls. Discover tactics, techniques, and procedures (TTPs) for attacking cryptographic systems Understand cloud models, cloud security, and cloud penetration testing"--
Item type: كتاب
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Notes Date due Barcode
كتاب كتاب Central Library المكتبة المركزية 005.8 G819 (Browse shelf(Opens below)) Available قاعة الكتب 48045

"This study guide helps you master topics on EC-Council's Certified Ethical Hacker (CEH) exam: Understand technical foundations of hacking and the basics of ethical hacking. Select targets and perform footprinting and enumeration. Uncover detailed information about a target, and begin exploiting vulnerabilities. Explore social engineering, malware threats, and vulnerability tracking and mitigation Review passive and active packet capture techniques Discuss session hijacking, DoS/DDoS, and botnets. Explore web hacking, application attacks, and SQL injection. Review wireless and mobile technologies and vulnerabilities. See how threat actors bypass intrusion detection systems and firewalls. Discover tactics, techniques, and procedures (TTPs) for attacking cryptographic systems Understand cloud models, cloud security, and cloud penetration testing"--