[Ebook] CEH Certified Ethical Hacker Bundle, Third Edition
- Series: All-in-One
- Publisher: McGraw-Hill Education; 3 edition (January 24, 2017)
- Language: English
- Price: $76.95
- By: Matt Walker
- ISBN-10: 125983753X
- ISBN-13: 978-1259837531
The CEH Certified Ethical Hacker Bundle, Third Edition, contains a bonus Quick Review Guide that can be used as the final piece for exam preparation. This content comes in addition to the electronic content included with the bundle’s component books. This new edition includes greater emphasis on cloud computing and mobile platforms and addresses new vulnerabilities to the latest technologies and operating systems.
- In all, the bundle includes more than 1000 accurate questions with detailed answer explanations
- Electronic content includes the Total Tester customizable exam engine, Quick Review Guide, and searchable PDF copies of both books
- Readers will save 12% compared to buying the two books separately, and the bonus Quick Review Guide is available only with the
- bundle
Chapter 1: Getting Started: Essential Knowledge
Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3: Scanning and Enumeration
Chapter 4: Sniffing and Evasion
Chapter 5: Attacking a System
Chapter 6: Web-Based Hacking: Servers and Applications
Chapter 7: Wireless Network Hacking
Chapter 8: Security in Cloud Computing
Chapter 9: Trojan and Other Attacks
Chapter 10: Cryptography 101
Chapter 11: Low Tech: Social Engineering and Physical Security
Chapter 12: The Pen Test: Putting It All Together
Appendix A: Tools, Sites, and References
Table of Contents CEH Certified Ethical Hacker Bundle
CEH Practice Exams
Chapter 1: Getting Started: Essential Knowledge
Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3: Scanning and Enumeration
Chapter 4: Sniffing and Evasion
Chapter 5: Attacking a System
Chapter 6: Web-Based Hacking: Servers and Applications
Chapter 7: Wireless Network Hacking
Chapter 8: Security in Cloud Computing
Chapter 9: The Mobile World
Chapter 10: Malware and other attacks
Chapter 11: Cryptography 101
Chapter 12: Low Tech: Social Engineering and Physical Security
Chapter 13: The Pen Test: Putting It All Together
Appendix A: Pre-assessment Test
Mật khẩu giải nén: conglinh.com