Certified Ethical Hacker (CEH) Version 10 Cert Guide eBook, 3rd Edition

Omar Santos all

View sample pages

Certified Ethical Hacker (CEH) Version 10 Cert Guide eBook, 3rd Edition

By Omar Santos, Michael Gregg
In stock
Add to cart
Omar Santos all
Published Date
In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors’ concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

Every feature of this book supports both efficient exam preparation and long-term mastery:
  • Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives
  • Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success
  • Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career
  • Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology
This study guide helps you master all the topics on the latest CEH exam, including
  • Ethical hacking basics
  • Technical foundations of hacking
  • Footprinting and scanning
  • Enumeration and system hacking
  • Social engineering, malware threats, and vulnerability analysis
  • Sniffers, session hijacking, and denial of service
  • Web server hacking, web applications, and database attacks
  • Wireless technologies, mobile security, and mobile attacks
  • IDS, firewalls, and honeypots
  • Cryptographic attacks and defenses
  • Cloud computing, IoT, and botnets

The full text downloaded to your computer

With eBooks you can:

  • search for key concepts, words and phrases
  • make highlights and notes as you study
  • share your notes with friends

eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.

Upon purchase, you'll gain instant access to this eBook.

Time limit

The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

Table of contents
  • Chapter 1 An Introduction to Ethical Hacking
  • Chapter 2 The Technical Foundations of Hacking
  • Chapter 3 Footprinting and Scanning
  • Chapter 4 Enumeration and System Hacking
  • Chapter 5 Social Engineering, Malware Threats, and Vulnerability Analysis
  • Chapter 6 Sniffers, Session Hijacking, and Denial of Service
  • Chapter 7 Web Server Hacking, Web Applications, and Database Attacks
  • Chapter 8 Wireless Technologies, Mobile Security, and Attacks
  • Chapter 9 IDS, Firewalls, and Honeypots
  • Chapter 10 Cryptographic Attacks and Defenses
  • Chapter 11 Cloud Computing, IoT, and Botnets
  • Chapter 12 Final Preparation
  • Glossary
  • Appendix A Answers to the “Do I Know This Already?” Quizzes and Review Questions