Certified Ethical Hacker (CEH) Exam Cram
Mixed media product | English
By (author): II William Chuck Easttom William Chuck Easttom II
Covers the critical information you'll need to score higher on your CEH exam!
- Review the core principles and concepts of ethical hacking
- Perform key pre-attack tasks, including reconnaissance and footprinting
- Master enumeration, vulnerability scanning, and vulnerability analysis
- Learn system hacking methodologies, how to cover your tracks, and more
- Utilize modern malware threats, including ransomware and financial malware
- Exploit packet sniffing and social engineering
- Master denial of service and session hacking attacks, tools, and countermeasures
- Evade security measures, including IDS, firewalls, and honeypots
- Hack web servers and applications, and perform SQL injection attacks
- Compromise wireless and mobile systems, from wireless encryption to recent Android exploits
- Hack Internet of Things (IoT) and Operational Technology (OT) devices and systems
- Attack cloud computing systems, misconfigurations, and containers
- Use cryptanalysis tools and attack cryptographic systems
See more