Jump to ratings and reviews
Rate this book

Certified Ethical Hacker (CEH) Version 9 Cert Guide

Rate this book
This is the eBook edition of the Certified Ethical Hacker (CEH) Version 9 Cert Guide . This eBook does not include the practice exam that comes with the print edition.   In this best-of-breed study guide, Certified Ethical Hacker (CEH) Version 9 Cert Guide , leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.   Every feature of this book is designed to support both efficient exam preparation and long-term ·         Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives ·         Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success ·         Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career ·         Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology     This study guide helps you master all the topics on the latest CEH exam, including ·         Ethical hacking basics ·         Technical foundations of hacking ·         Footprinting and scanning ·         Enumeration and system hacking ·         Linux distro’s, such as Kali and automated assessment tools ·         Trojans and backdoors ·         Sniffers, session hijacking, and denial of service ·         Web server hacking, web applications, and database attacks ·         Wireless technologies, mobile security, and mobile attacks ·         IDS, firewalls, and honeypots ·         Buffer overflows, viruses, and worms ·         Cryptographic attacks and defenses ·         Cloud security and social engineering 

656 pages, Kindle Edition

First published August 30, 2013

66 people are currently reading
83 people want to read

About the author

Michael Gregg

48 books3 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
15 (51%)
4 stars
6 (20%)
3 stars
7 (24%)
2 stars
0 (0%)
1 star
1 (3%)
Displaying 1 - 2 of 2 reviews
46 reviews4 followers
June 5, 2015
This was a great book. It contained a lot of information. I also liked the beginning and end of each chapter. In the beginning, there is a do you know it already quiz, so you can gauge if you can skip the chapter. At the end, there is a quick review and example test questions. At the very end of the book, there are 2 complete 312-50 C)EH practice tests for version 8. These also help studying. I can't wait until I have the prerequisite job experience to take the exam
Profile Image for Fuat .
22 reviews
March 4, 2015
I think the book is well organized and to the point.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.