buchspektrum Internet-Buchhandlung

Neuerscheinungen 2016

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Sagar Rahalkar

Certified Ethical Hacker (CEH) Foundation Guide


1st ed. 2016. xxiii, 198 S. 10 SW-Abb., 58 Farbabb. 254 mm
Verlag/Jahr: SPRINGER, BERLIN; APRESS 2016
ISBN: 1-484-22324-1 (1484223241)
Neue ISBN: 978-1-484-22324-6 (9781484223246)

Preis und Lieferzeit: Bitte klicken


Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.

The book explains the concepts with the help of practical real-world scenarios and examples. You´ll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.

What You Will Learn

Gain the basics of hacking (apps, wireless devices, and mobile platforms)
Discover useful aspects of databases and operating systems from a hacking perspective
Develop sharper programming and networking skills for the exam
Explore the penetration testing life cycle
Bypass security appliances like IDS, IPS, and honeypots
Grasp the key concepts of cryptography
Discover the career paths available after certification
Revise key interview questions for a certified ethical hacker Who This Book Is For
Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
PART I
Chapter 1: Operating System Basics Chapter Goal: To introduce the basic concepts of Operating Systems from hacking perspective. No of pages:
Chapter 2: Database Basics Chapter Goal: Basic concepts of Databases from hacking perspective. No of pages:
Chapter 3: Networking Basics Chapter Goal: Basic Networking concepts from hacking perspective. No of pages:
Chapter 4: Programming Basics Chapter Goal: To introduce basic programming & scripting concepts which are required for hacking and security. No of pages:
Chapter 5: Virtualization and Cloud Basics Chapter Goal: Overview of basic concepts of Cloud & Virtualization from security perspective. No of pages
PART II
Chapter 1: Basics of Information Security Chapter Goal: Concepts and the building blocks of Information Security No of pages:
Chapter 2: Penetration Testing Chapter Goal: Introduce to the penetration testing lifecycle and key terminology No of pages:
Chapter 3: Information Gathering Chapter Goal: Highlight various techniques of information gathering required for penetration testing. No of pages:
Chapter 4: Hacking Basics Chapter Goal: Introduction of various concepts related to system hacking. No of pages:
Chapter 5: Web Application Hacking Chapter Goal: Provide an overview of Web Application vulnerabilities and Application Security testing No of pages:
Chapter 6: Wireless Hacking Chapter Goal: Introduction to various key concepts of Wireless hacking No of pages:
Chapter 7: Hacking Mobile platforms Chapter Goal: Highlight vulnerabilities and security issues in Mobile Platforms, Mobile hacking concepts. No of pages:
Chapter 8: IDS, Firewalls & Honeypots evasion Chapter Goal: Introduction to security appliances like IDS, IPS, Honeypots and various techniques to bypass and evade their security. No of pages:
Chapter 9: Cryptography Chapter Goal: Introduction to key concepts related to Cryptography. No of pages:
Appendix A: Career paths available after CEH Appendix B: Information Security interview questions