CEH: Certified Ethical Hacker Version 8 Study Guide
By Sean-Philip Oriyano
Publisher: Wiley / Sybex
Final Release Date: July 2014
Pages: 504

Includes Real-World Scenarios, Hands-On Exercises, and Access to Exam Prep Software Featuring:

+ Practice Test Environment

+ Hundreds of Practice Questions

+ Electronic Flashcards

+ Chapter Review Questions

+ Glossary of Key Terms

Complete Preparation for the Certified Ethical Hacker Exam Version 8

This in-depth study guide prepares you for the unique and challenging Certified Ethical Hacker version 8 (CEHv8) exam. IT security expert Sean-Philip Oriyano has compiled a comprehensive overview of the CEH certification requirements with a concise and easy-to-follow approach to this difficult exam. Essential topics like intrusion detection, DDoS attacks, buffer overflows, and virus creation are covered in detail. This DoD 8570.1-compliant study guide from Sybex includes:

Full coverage of all exam topics in a systematic approach, so you can be confident you’re getting the instruction you need for the exam

Practical hands-on exercises to reinforce critical skills

Real-world scenarios that put what you’ve learned in the context of actual job roles

Challenging review questions in each chapter to prepare you for exam day

Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam

A handy section that maps every official exam objective to the corresponding chapter in the book so you can track your exam prep objective by objective

Sybex Exam Prep Tools

Go to www.sybex.com/go/cehv8 for access to a full set of study tools to help you prepare for the exam, including:

  • Chapter review questions
  • Full-length practice exams
  • Hundreds of electronic flashcards
  • Glossary of key terms

Includes coverage of all exam objectives, including these key topics:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflow
  • Cryptography
  • Penetration Testing
Product Details
Recommended for You
Customer Reviews
 
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook: $49.99
Formats:  ePub, Mobi, PDF