Read more
Informationen zum Autor Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract). Klappentext Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Up-to-date coverage of every topic on the CEH v10 exam Thoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference. Covers all exam topics, including: .Ethical hacking fundamentals.Reconnaissance and footprinting.Scanning and enumeration.Sniffing and evasion.Attacking a system.Hacking web servers and applications.Wireless network hacking.Security in cloud computing.Trojans and other attacks.Cryptography.Social engineering and physical security.Penetration testing Digital content includes: .300 practice exam questions.Test engine that provides full-length practice exams and customized quizzes by chapter Inhaltsverzeichnis Chapter 1: Getting Started: Essential Knowledge Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker Chapter 3: Scanning and Enumeration Chapter 4: Sniffing and Evasion Chapter 5: Attacking a System Chapter 6: Web-Based Hacking: Servers and Applications Chapter 7: Wireless Network Hacking Chapter 8: Mobile Communications and the IoT Chapter 9: Security in Cloud Computing Chapter 10: Trojan and Other Attacks Chapter 11: Cryptography 101 Chapter 12: Low Tech: Social Engineering and Physical Security Chapter 13: The Pen Test: Putting It All Together Appendix A: Tools, Sites, and References Glossary ...