• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Certified Ethical Hacker (CEH) Foundation Guide » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Certified Ethical Hacker (CEH) Foundation Guide

ISBN-13: 9781484223246 / Angielski / Miękka / 2016 / 198 str.

Sagar Rahalkar
Certified Ethical Hacker (CEH) Foundation Guide Sagar Rahalkar 9781484223246 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Certified Ethical Hacker (CEH) Foundation Guide

ISBN-13: 9781484223246 / Angielski / Miękka / 2016 / 198 str.

Sagar Rahalkar
cena 132,80
(netto: 126,48 VAT:  5%)

Najniższa cena z 30 dni: 127,20
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!
Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - General
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484223246
Rok wydania:
2016
Ilość stron:
198
Waga:
0.39 kg
Wymiary:
25.4 x 17.78 x 1.19
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

PART I

Chapter 1: Operating System Basics
Chapter Goal: To introduce the basic concepts of Operating Systems from hacking perspective.
No of pages:

Chapter 2: Database Basics
Chapter Goal: Basic concepts of Databases from hacking perspective.
No of pages:

Chapter 3: Networking Basics
Chapter Goal: Basic Networking concepts from hacking perspective.
No of pages:

Chapter 4: Programming Basics
Chapter Goal: To introduce basic programming & scripting concepts which are required for hacking and security.
No of pages:

Chapter 5: Virtualization and Cloud Basics
Chapter Goal: Overview of basic concepts of Cloud & Virtualization from security perspective.
No of pages

PART II

Chapter 1: Basics of Information Security
Chapter Goal: Concepts and the building blocks of Information Security
No of pages:

Chapter 2: Penetration Testing
Chapter Goal: Introduce to the penetration testing lifecycle and key terminology
No of pages:

Chapter 3: Information Gathering
Chapter Goal: Highlight various techniques of information gathering required for penetration testing.
No of pages:

Chapter 4: Hacking Basics
Chapter Goal: Introduction of various concepts related to system hacking.
No of pages:

Chapter 5: Web Application Hacking
Chapter Goal: Provide an overview of Web Application vulnerabilities and Application Security testing
No of pages:

Chapter 6: Wireless Hacking
Chapter Goal: Introduction to various key concepts of Wireless hacking
No of pages:

Chapter 7: Hacking Mobile platforms
Chapter Goal: Highlight vulnerabilities and security issues in Mobile Platforms, Mobile hacking concepts.  
No of pages:

Chapter 8: IDS, Firewalls & Honeypots evasion
Chapter Goal: Introduction to security appliances like IDS, IPS, Honeypots and various techniques to bypass and evade their security.
No of pages:

Chapter 9: Cryptography
Chapter Goal: Introduction to key concepts related to Cryptography.
No of pages:

Appendix A: Career paths available after CEH
Appendix B: Information Security interview questions

Sagar Rahalkar, is a seasoned information security professional having more than 9 years of comprehensive experience in various verticals of Information Security. His domain expertise is mainly into Cyber Crime Investigations, Digital Forensics, Application Security, Vulnerability Assessment & Penetration Testing, Compliance for Mandates & Regulations, IT GRC etc. He holds a Master’s Degree in Computer Science and several Industry recognized certifications like Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), PRINCE2 to name a few. He has been closely associated with Indian Law Enforcement agencies for over 4 years, dealing with digital crime investigations and related trainings for officers and received several awards and appreciations from senior officials from Police and Defense Organizations in India. He possesses the right "security aptitude" to face challenges of upcoming technologies and address risks in the dynamic threat landscape.

Sagar has also been one of the reviewers for multiple books like “Metasploit Penetration Testing Cookbook, Second Edition”, "Mastering Metasploit" by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer.

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.

The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.

In this book you will:

  • Gain the basics of hacking (apps, wireless devices, and mobile platforms)
  • Discover useful aspects of databases and operating systems from a hacking perspective
  • Develop sharper programming and networking skills for the exam
  • Explore the penetration testing life cycle
  • Bypass security appliances like IDS, IPS, and honeypots
  • Grasp the key concepts of cryptography
  • Discover the career paths available after certification
  • Revise key interview questions for a certified ethical hacker



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia