Jump to content

Michael Gregg - Certified Ethical Hacker (CEH) Version 9 and 10 Cert Guide


tetox

Recommended Posts

0789756919.jpg

Book: Certified Ethical Hacker (CEH) Version 9 Cert Guide
Author(s): Michael Gregg
Publisher: Pearson IT Certification
Tags: Computers & Technology, Certification, Cloud Security, IT Security
Year: 2nd Edition (April 28, 2017)
Print Length: 656 pages
Format: PDF (True), *EPUB, *MOBI
Language: English
ISBN-10: 0789756919
ISBN-13: 9780789756916
Size: 42.4 MB (RAR 10% Recovery)
Note: * Converted Formats

In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

Every feature of this book supports both efficient exam preparation and long-term mastery:

Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives

Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success

Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career

Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology

This study guide helps you master all the topics on the latest CEH exam, including

  • Ethical hacking basics
  • Technical foundations of hacking
  • Footprinting and scanning
  • Enumeration and system hacking
  • Linux distro’s, such as Kali and automated assessment tools
  • Trojans and backdoors
  • Sniffers, session hijacking, and denial of service
  • Web server hacking, web applications, and database attacks
  • Wireless technologies, mobile security, and mobile attacks
  • IDS, firewalls, and honeypots
  • Buffer overflows, viruses, and worms
  • Cryptographic attacks and defenses
  • Cloud security and social engineering

Hidden Content

    Give reaction to this post to see the hidden content.

Credits to the one who initially shared the file.
 

Edited by bluescope
dead links removed
  • Like 2
Link to comment

Michael Gregg - Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition (2019)

Hidden Content

    Give reaction to this post to see the hidden content.

Book: Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition
Author(s): Michael Gregg, Omar Santos
Publisher: Pearson IT
Tags: Social Engineering, IT security, Cryptographic Attacks.
Year: 3rd Edition (July 18, 2019)
Print Length: 656 pages
Format: EPUB (True)
Language: English
ISBN-10: 0789760525
ISBN-13: 9780789760524
Size: 41.1 MB (Rar)

Book Description
This best-of-breed study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. This concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

Every feature of this book supports both efficient exam preparation and long-term mastery:

  • Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives
  • Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success
  • Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career
  • Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology

Table of Contents
Introduction
Chapter 1. An Introduction to Ethical Hacking
Chapter 2. The Technical Foundations of Hacking
Chapter 3. Footprinting and Scanning
Chapter 4. Enumeration and System Hacking
Chapter 5. Social Engineering, Malware Threats, and Vulnerability Analysis
Chapter 6. Sniffers, Session Hijacking, and Denial of Service
Chapter 7. Web Server Hacking, Web Applications, and Database Attacks
Chapter 8. Wireless Technologies, Mobile Security, and Attacks
Chapter 9. IDS, Firewalls, and Honeypots
Chapter 10. Cryptographic Attacks and Defenses
Chapter 11. Cloud Computing, IoT, and Botnets
Chapter 12. Final Preparation
Glossary
Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions

Hidden Content

    Give reaction to this post to see the hidden content.

Credits to the ones who initially shared the files.

Edited by bluescope
dead links removed
  • Like 2
Link to comment

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...