Fully up-to-date coverage of every topic on the CEH v9 certification exam
Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.
An integrated study system based on proven pedagogy, CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, features brand-new explanations of cloud computing and mobile platforms and addresses vulnerabilities to the latest technologies and operating systems. Readers will learn about footprinting and reconnaissance, malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and much more. Designed to help you pass the exam with ease, this authoritative resource will also serve as an essential on-the-job reference.
Features more than 400 accurate practice questions, including new performance-based questions Electronic content includes 2 complete practice exams and a PDF copy of the book Written by an experienced educator with more than 30 years of experience in the field
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).
Chapter 1: Getting Started: Essential Knowledge Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker Chapter 3: Scanning and Enumeration Chapter 4: Sniffing and Evasion Chapter 5: Attacking a System Chapter 6: Web-Based Hacking: Servers and Applications Chapter 7: Wireless Network Hacking Chapter 8: Security in Cloud Computing Chapter 9: Trojan and Other Attacks Chapter 10: Cryptography 101 Chapter 11: Low Tech: Social Engineering and Physical Security Chapter 12: The Pen Test: Putting It All Together Appendix A: Tools, Sites, and References Glossary