
- English
- PDF
- Available on iOS & Android
CEH v11 Certified Ethical Hacker Study Guide
About this book
As protecting informationcontinues to bea growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more.
This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles.
- Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated
- Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions
- Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security
- Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms
Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- About the Author
- Contents at a Glance
- Contents
- Introduction
- Assessment Test
- Answers to Assessment Test
- Chapter 1 Ethical Hacking
- Chapter 2 Networking Foundations
- Chapter 3 Security Foundations
- Chapter 4 Footprinting and Reconnaissance
- Chapter 5 Scanning Networks
- Chapter 6 Enumeration
- Chapter 7 System Hacking
- Chapter 8 Malware
- Chapter 9 Sniffing
- Chapter 10 Social Engineering
- Chapter 11 Wireless Security
- Chapter 12 Attack and Defense
- Chapter 13 Cryptography
- Chapter 14 Security Architecture and Design
- Chapter 15 Cloud Computing and the Internet of Things
- Appendix Answers to Review Questions
- Index
- Comprehensive Online Learning Environment
- EULA