Certified Ethical Hacker (CEH) Foundation Guide

Author:   Sagar Ajay Rahalkar
Publisher:   APress
Edition:   1st ed.
ISBN:  

9781484223246


Pages:   198
Publication Date:   01 December 2016
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $47.95 Quantity:  
Add to Cart

Share |

Certified Ethical Hacker (CEH) Foundation Guide


Add your own review!

Overview

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Full Product Details

Author:   Sagar Ajay Rahalkar
Publisher:   APress
Imprint:   APress
Edition:   1st ed.
Dimensions:   Width: 17.80cm , Height: 1.20cm , Length: 25.40cm
Weight:   4.293kg
ISBN:  

9781484223246


ISBN 10:   1484223241
Pages:   198
Publication Date:   01 December 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

PART I Chapter 1: Operating System Basics Chapter 2: Database Basics Chapter 3: Networking Basics Chapter 4: Programming Basics Chapter 5: Virtualization and Cloud Basics PART II Chapter 6: Information Security Basics Chapter 7: Penetration Testing Chapter 8: Information Gathering Chapter 9: Hacking Basics Chapter 10: Web Application Hacking Chapter 11: Wireless Hacking Chapter 12: Hacking Mobile platforms Chapter 13: IDS, Firewalls and Honeypots Chapter 14: Cryptography Appendix A: Career Tracks Available After CEH Appendix B: Interview Questions

Reviews

Author Information

"Sagar Rahalkar, is a seasoned information security professional having more than 9 years of comprehensive experience in various verticals of Information Security. His domain expertise is mainly into Cyber Crime Investigations, Digital Forensics, Application Security, Vulnerability Assessment & Penetration Testing, Compliance for Mandates & Regulations, IT GRC etc. He holds a Master’s Degree in Computer Science and several Industry recognized certifications like Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), PRINCE2 to name a few. He has been closely associated with Indian Law Enforcement agencies for over 4 years, dealing with digital crime investigations and related trainings for officers and received several awards and appreciations from senior officials from Police and Defense Organizations in India. He possesses the right ""security aptitude"" to face challenges of upcoming technologies and address risks in the dynamic threat landscape. Sagar has also been one of the reviewers for multiple books like “Metasploit Penetration Testing Cookbook, Second Edition”, ""Mastering Metasploit"" by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer."

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List