User log in
User registration
Registrations are open
Click here to register
Email: forgotten email?
Password: lost pass?
  Resend activation email
Get VPN Now for FREE! Protect your privacy! Use a VPN When Downloading Torrents
Your IP Address is . Location is .
Your Internet Provider is tracking your torrent activity! Hide your IP ADDRESS with a VPN!
We strongly recommend using Trust.Zone VPN to anonymize your torrenting!
Black Friday Deal! -80% off for Demonoid users Also, while you are using Trba99101ust.o929f10Zone VPN you get No Ads on Demonoid site Get o929f10VPN No929f10ow!
Details for Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
Created by Ratio: 1.00Expasy 1 year ago 0   0
Books : Educational : English
41svSAdS1DL._SX327_BO1,204,203,200_.jpg


Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam―a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs.
You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation.

This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more.


What You Will learn

Understand the concepts associated with Footprinting
Perform active and passive reconnaissance
Identify enumeration countermeasures
Be familiar with virus types, virus detection methods, and virus countermeasures
Know the proper order of steps used to conduct a session hijacking attack
Identify defensive strategies against SQL injection attacks
Analyze internal and external network traffic using an intrusion detection system


Who This Book Is For

Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more


About the Author
Ahmed Sheikh is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as an IT Expert Engineer at a leading IT electrical company.

Product details
Publisher ‏ : ‎ Apress; 1st ed. edition (September 27, 2021)
Language ‏ : ‎ English
Paperback ‏ : ‎ 227 pages
ISBN-10 ‏ : ‎ 1484272579
ISBN-13 ‏ : ‎ 978-1484272572
Item Weight ‏ : ‎ 1.11 pounds
Facebook Twitter Digg Reddit LinkedIn StumbleUpon Email
Show Demonoid some love with BitCoin: 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk How to get BitCoins?
Peers: 5 seeders, 0 leechers, 708 total - Updated: 17 hours 8 minutes 23 seconds ago
Size: 16.34 MB  

Sponsored links
Related torrents
Torrents you may also like:
Download this torrent
Extra information
Tracker: udp://opentor.org:2710/announce
Torrent hash: 3F7F8CFF 70E8C9C8 DC174B4D 2E2555FB 30E5E232
Files described inside the torrent: 2 [ Click here to show the full list ]
Comments
No comments posted yet

Disclaimer: None of the files shown here are actually hosted or transmitted by this server. The links are provided solely by this site's users. The site moderation is also a service provided by the site's users. The administrator of this site (demonoid.is) cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

By using this site you indicate your agreement to our terms and conditions
   
Link to us | Contact us | API | Feeds/RSS | DMCA
This site and the Demonoid logo are Copyright © Demonoid. All rights reserved.

Show Demonoid some love with 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk