Home » Ceh: Certified Ethical Hacker Version 8 Study Guide by Sean-Philip Oriyano
Ceh: Certified Ethical Hacker Version 8 Study Guide Sean-Philip Oriyano

Ceh: Certified Ethical Hacker Version 8 Study Guide

Sean-Philip Oriyano

Published
ISBN : 9781118763322
ebook
504 pages
Enter the sum

 About the Book 

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guideSecurity professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of aMorePrepare for the new Certified Ethical Hacker version 8 exam with this Sybex guideSecurity professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards. Security remains the fastest growing segment of IT, and CEH certification provides unique skills The CEH also satisfies the Department of Defenses 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course Covers all the exam objectives with an easy-to-follow approach Companion website includes practice exam questions, flashcards, and a searchable Glossary of key termsCEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when youre ready to tackle this challenging exam Also available as a set, Etical Hacking and Web Hacking Set, 9781119072171 with The Web Application Hackers Handbook: Finding and Exploiting Security Flaws, 2nd Edition.