tetox Posted March 23, 2018 Share #1 Posted March 23, 2018 (edited) Book: Certified Ethical Hacker (CEH) Version 9 Cert Guide Author(s): Michael Gregg Publisher: Pearson IT Certification Tags: Computers & Technology, Certification, Cloud Security, IT Security Year: 2nd Edition (April 28, 2017) Print Length: 656 pages Format: PDF (True), *EPUB, *MOBI Language: English ISBN-10: 0789756919 ISBN-13: 9780789756916 Size: 42.4 MB (RAR 10% Recovery) Note: * Converted Formats In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology This study guide helps you master all the topics on the latest CEH exam, including Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux distro’s, such as Kali and automated assessment tools Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Cloud security and social engineering Hidden Content Give reaction to this post to see the hidden content. Credits to the one who initially shared the file. Edited April 2, 2020 by bluescope dead links removed 2 Link to comment
tetox Posted May 24, 2019 Author Share #2 Posted May 24, 2019 (edited) Michael Gregg - Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition (2019) Hidden Content Give reaction to this post to see the hidden content. Book: Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition Author(s): Michael Gregg, Omar Santos Publisher: Pearson IT Tags: Social Engineering, IT security, Cryptographic Attacks. Year: 3rd Edition (July 18, 2019) Print Length: 656 pages Format: EPUB (True) Language: English ISBN-10: 0789760525 ISBN-13: 9780789760524 Size: 41.1 MB (Rar) Book Description This best-of-breed study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. This concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology Table of Contents Introduction Chapter 1. An Introduction to Ethical Hacking Chapter 2. The Technical Foundations of Hacking Chapter 3. Footprinting and Scanning Chapter 4. Enumeration and System Hacking Chapter 5. Social Engineering, Malware Threats, and Vulnerability Analysis Chapter 6. Sniffers, Session Hijacking, and Denial of Service Chapter 7. Web Server Hacking, Web Applications, and Database Attacks Chapter 8. Wireless Technologies, Mobile Security, and Attacks Chapter 9. IDS, Firewalls, and Honeypots Chapter 10. Cryptographic Attacks and Defenses Chapter 11. Cloud Computing, IoT, and Botnets Chapter 12. Final Preparation Glossary Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions Hidden Content Give reaction to this post to see the hidden content. Credits to the ones who initially shared the files. Edited April 2, 2020 by bluescope dead links removed 2 Link to comment
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now