Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Certified Ethical Hacker (CEH) Preparation Guide

Best Price (Coupon Required):
Buy Certified Ethical Hacker (CEH) Preparation Guide for $45.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $49.99 - $49.99
BEST PRICE

Single Product Purchase

$45.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$49.99 $49.99

10% OFF
This deals requires coupon
$45.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484272572
Condition
New
Product Description

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exama qualification that tests the cybersecurity professionals baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique lesson format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. What You Will learn Understand the concepts associated with Footprinting Perform active and passive reconnaissance Identify enumeration countermeasures Be familiar with virus types, virus detection methods, and virus countermeasures Know the proper order of steps used to conduct a session hijacking attack Identify defensive strategies against SQL injection attacks Analyze internal and external network traffic using an intrusion detection system Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants,security engineers, and more.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Blow-up Theories for Semilinear Parabolic Equations

Blow-up Theories for Semilinear Parabolic Equations

$34.99
Modular Pricing of Options

Modular Pricing of Options

$74.99
Assessing Emotional Intelligence

Assessing Emotional Intelligence

$169.99
Integrating Economics, Ecology and Thermodynamics

Integrating Economics, Ecology and Thermodynamics

$169.99
Micromanufacturing and Nanotechnology

Micromanufacturing and Nanotechnology

$129.00
Research into Design for a Connected World

Research into Design for a Connected World

$329.99
Optics, Photonics and Laser Technology 2017

Optics, Photonics and Laser Technology 2017

$129.99
A Parameter-Setting Model of L2 Acquisition

A Parameter-Setting Model of L2 Acquisition

$54.99
Der professionelle Lehrer

Der professionelle Lehrer

$74.99
Eukaryotic Gene Expression

Eukaryotic Gene Expression

$84.99
Physics and Finance

Physics and Finance

$79.99
Children and Migration

Children and Migration

$84.99
The Statesman's Yearbook 2005

The Statesman's Yearbook 2005

$299.99
Quality of Software Architectures Models and Architectures

Quality of Software Architectures Models and Architectures

$39.99
High-Speed Networks

High-Speed Networks

$49.99
Critical Information Infrastructures Security

Critical Information Infrastructures Security

$39.99
Yearbook of Morphology 1997

Yearbook of Morphology 1997

$39.99
Mechanisms of Reactions of Organometallic Compounds with Surfaces

Mechanisms of Reactions of Organometallic Compounds with Surfaces

$169.99
Stadtverkehr

Stadtverkehr

$54.99
Real-Time Adaptive Concepts in Acoustics

Real-Time Adaptive Concepts in Acoustics

$109.99
Advances in Chemoreception

Advances in Chemoreception

$54.99
Technische Wrmelehre der Gase und Dmpfe

Technische Wrmelehre der Gase und Dmpfe

$79.99
The Spread of Yield Management Practices

The Spread of Yield Management Practices

$84.99
Ueber den Ausflu des Dampfes aus Mndungen

Ueber den Ausflu des Dampfes aus Mndungen

$59.99
Nutzenmessung im Gesundheitswesen

Nutzenmessung im Gesundheitswesen

$74.99
Non-institutional Political Participation

Non-institutional Political Participation

$54.99
Some Unusual Topics in Quantum Mechanics

Some Unusual Topics in Quantum Mechanics

$59.99
Clinical Image-Based Procedures, Distributed and Collaborative Learning, Artificial Intelligence for

Clinical Image-Based Procedures, Distributed and Collaborative Learning, Artificial Intelligence for

$59.99
Aspects of Littorinid Biology

Aspects of Littorinid Biology

$219.99
Kollegialitt und Kooperation in der Schule

Kollegialitt und Kooperation in der Schule

$39.99
Beschdigte Identitt

Beschdigte Identitt

$59.99
Adobe FrameMaker 8

Adobe FrameMaker 8

$29.99
Neurophysiologische Behandlung bei Erwachsenen und Kindern

Neurophysiologische Behandlung bei Erwachsenen und Kindern

$84.99
Signale aus unserer Welt!

Signale aus unserer Welt!

$29.99
Phonocardiography Signal Processing

Phonocardiography Signal Processing

$29.99
Britain and Ireland in the Eighteenth-Century Crisis of Empire

Britain and Ireland in the Eighteenth-Century Crisis of Empire

$54.99
Science Fiction Roots And Branches

Science Fiction Roots And Branches

$29.99
Logics in Artificial Intelligence

Logics in Artificial Intelligence

$39.99
Human-Computer Interaction: Users and Contexts of Use

Human-Computer Interaction: Users and Contexts of Use

$54.99
Complex Networks & Their Applications IX

Complex Networks & Their Applications IX

$259.00
previous
next