Skip to main content
Certified Ethical Hacker (CEH) Preparation Guide (9781484272572)

Certified Ethical Hacker (CEH) Preparation Guide (9781484272572)

SKU: 9781484272572
Price $54.99

Total for 1 copy:

Adding to cart… The item has been added
You can purchase this title directly online anytime! If you need a formal quote for budget approval, submit a request and we’ll get it to you quickly.
  • Free shipping over $95
  • Price Match Guarantee. Found a better price? Let us know! We’ll work to match it so you get the best value with BookPal.

Overview

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs.

You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation.

This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more.


What You Will learn

  • Understand the concepts associated with Footprinting
  • Perform active and passive reconnaissance
  • Identify enumeration countermeasures
  • Be familiar with virus types, virus detection methods, and virus countermeasures
  • Know the proper order of steps used to conduct a session hijacking attack
  • Identify defensive strategies against SQL injection attacks
  • Analyze internal and external network traffic using an intrusion detection system


Who This Book Is For

Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more

Details

Customer Reviews

This product hasn't received any reviews yet. Be the first to review this product!

Need Books? BookPal Makes it Easy

  • Free Shipping

    Enjoy free ground shipping on us! Most orders over $95 qualify for free standard ground shipping.It takes an estimated 7-10 business days to deliver and may require additional processing time

    Learn More
  • Dedicated Account Managers

    At BookPal, we go beyond the transaction by providing personal support and a dedicated account manager for every customer.

    Learn More
  • Flexible Delivery Options

    We offer flexible delivery options such Free Ground Shipping (on most orders over $100), Expedited Premium, Expedited Express, International Shipping etc.

    Learn More
  • Sales Tax Exemption

    BookPal is a tax-exempt supplier for all 50 states. We can provide you with a tax-exempt certificate to use on your orders.

    Learn More
  • Price Match Guarantee

    With over 3 million book titles available, it's impossible to always be the lowest priced. If you find a lower price on a new title elsewhere that is available to ship in the quantity you need, we are happy to discount your books and match the lower price.

    Learn More
  • Multiple Payment Options

    BookPal accepts all major credit cards, PayPal, and checks by mail, along with Purchase Orders upon approval. We also accept ACH payments and wire transfers.

    Learn More

We are here to help, reach out to our team anytime!

Connect With Us

Subscribe to our newsletter for $25 off your next order of $500+

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty
Recently Viewed Recently Viewed
Back to top Back to top