Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Certified Ethical Hacker (CEH) Preparation Guide

Best Price (Coupon Required):
Buy Certified Ethical Hacker (CEH) Preparation Guide for $45.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $49.99 - $49.99
BEST PRICE

Single Product Purchase

$45.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$49.99 $49.99

10% OFF
This deals requires coupon
$45.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484272572
Condition
New
Product Description

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exama qualification that tests the cybersecurity professionals baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique lesson format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. What You Will learn Understand the concepts associated with Footprinting Perform active and passive reconnaissance Identify enumeration countermeasures Be familiar with virus types, virus detection methods, and virus countermeasures Know the proper order of steps used to conduct a session hijacking attack Identify defensive strategies against SQL injection attacks Analyze internal and external network traffic using an intrusion detection system Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants,security engineers, and more.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Intelligente Objekte

Intelligente Objekte

$29.99
Die Plazenta

Die Plazenta

$119.00
Yeats and Women

Yeats and Women

$54.99
Toxicology- From Cells to Man

Toxicology- From Cells to Man

$109.99
Verwaltungsreformen

Verwaltungsreformen

$37.99
Cancer in Children

Cancer in Children

$109.99
EPR of Free Radicals in Solids I

EPR of Free Radicals in Solids I

$329.99
Biological Control

Biological Control

$54.99
Methoden-Baukasten fr ganzheitliches Prozessmanagement

Methoden-Baukasten fr ganzheitliches Prozessmanagement

$74.99
Handbook of Outpatient Medicine

Handbook of Outpatient Medicine

$129.00
Clinical Approach to Infection in the Compromised Host

Clinical Approach to Infection in the Compromised Host

$74.99
The Word and the World

The Word and the World

$119.99
Connected Lands

Connected Lands

$84.99
U.S. Imperialism and Revolution in the Philippines

U.S. Imperialism and Revolution in the Philippines

$54.99
Rational Drug Design

Rational Drug Design

$84.99
Formalization of Banking Supervision

Formalization of Banking Supervision

$59.99
Frberei- und textilchemische Untersuchungen

Frberei- und textilchemische Untersuchungen

$44.99
Sick Building Syndrome

Sick Building Syndrome

$169.00
One Family

One Family

$5.21
Bioorganic Chemistry in Healthcare and Technology

Bioorganic Chemistry in Healthcare and Technology

$39.99
New Phenomena in Subnuclear Physics

New Phenomena in Subnuclear Physics

$109.99
Computational Thinking

Computational Thinking

$54.99
Science and Culture

Science and Culture

$169.99
Nichteheliche Lebensgemeinschaften

Nichteheliche Lebensgemeinschaften

$59.99
Fuzzy Choice Functions

Fuzzy Choice Functions

$109.99
Fault-Tolerant Computing Systems

Fault-Tolerant Computing Systems

$109.99
Investitionsschutz fr Maschinendaten

Investitionsschutz fr Maschinendaten

$119.99
Scholar Zone Summer ELA Grade 5 (2 Scholar)

Scholar Zone Summer ELA Grade 5 (2 Scholar)

$130.00
Statistische Datenanalyse mit SPSS

Statistische Datenanalyse mit SPSS

$84.99
Study of Travelling Interplanetary Phenomena 1977

Study of Travelling Interplanetary Phenomena 1977

$219.99
Systemkonsolidierung und Datenmigration als Erfolgsfaktoren

Systemkonsolidierung und Datenmigration als Erfolgsfaktoren

$17.99
Critical Social Psychology of Social Class

Critical Social Psychology of Social Class

$129.99
Modelling and Simulation for Autonomous Systems

Modelling and Simulation for Autonomous Systems

$79.99
Life-Cycle Assessment of Semiconductors

Life-Cycle Assessment of Semiconductors

$109.99
Personaleinsatz bei stationren intermittierenden Dialysen

Personaleinsatz bei stationren intermittierenden Dialysen

$59.99
French Royalism under the Third and Fourth Republics

French Royalism under the Third and Fourth Republics

$54.99
Pollination Mechanisms, Reproduction and Plant Breeding

Pollination Mechanisms, Reproduction and Plant Breeding

$84.99
Institutions, Entrepreneurs, and American Economic History

Institutions, Entrepreneurs, and American Economic History

$54.99
Sozialer Raum und Soziale Arbeit

Sozialer Raum und Soziale Arbeit

$19.99
Social Computing and Social Media

Social Computing and Social Media

$79.99
previous
next