- Tapa blanda: 504 páginas
- Editor: John Wiley & Sons Inc; Edición: 1 (14 de octubre de 2014)
- Idioma: Inglés
- ISBN-10: 111864767X
- ISBN-13: 978-1118647677
- Valoración media de los clientes: 1 opinión de cliente
- Clasificación en los más vendidos de Amazon: nº171.826 en Libros en idiomas extranjeros (Ver el Top 100 en Libros en idiomas extranjeros)
- Ver el Índice completo
Ceh: Certified Ethical Hacker Version 8 Study Guide (Inglés) Tapa blanda – 14 oct 2014
|Nuevo desde||Usado desde|
Hay una nueva edición de este producto:
Los clientes que compraron este producto también compraron
Descripción del producto
Reseña del editor
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards. * Security remains the fastest growing segment of IT, and CEH certification provides unique skills * The CEH also satisfies the Department of Defense s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications * This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course * Covers all the exam objectives with an easy-to-follow approach * Companion website includes practice exam questions, flashcards, and a searchable Glossary of key terms CEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when you're ready to tackle this challenging exam Also available as a set, Ethical Hacking and Web Hacking Set, 9781119072171 with The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition.
Includes Real-World Scenarios, Hands-On Exercises, and Access to Exam Prep Software Featuring:
+ Practice Test Environment
+ Hundreds of Practice Questions
+ Electronic Flashcards
+ Chapter Review Questions
+ Glossary of Key Terms
Complete Preparation for the Certified Ethical Hacker Exam Version 8
This in-depth study guide prepares you for the unique and challenging Certified Ethical Hacker version 8 (CEHv8) exam. IT security expert Sean-Philip Oriyano has compiled a comprehensive overview of the CEH certification requirements with a concise and easy-to-follow approach to this difficult exam. Essential topics like intrusion detection, DDoS attacks, buffer overflows, and virus creation are covered in detail. This DoD 8570.1-compliant study guide from Sybex includes:
Full coverage of all exam topics in a systematic approach, so you can be confident youre getting the instruction you need for the exam
Practical hands-on exercises to reinforce critical skills
Real-world scenarios that put what youve learned in the context of actual job roles
Challenging review questions in each chapter to prepare you for exam day
Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
A handy section that maps every official exam objective to the corresponding chapter in the book so you can track your exam prep objective by objective
Sybex Exam Prep Tools
Go to www.sybex.com/go/cehv8 for access to a full set of study tools to help you prepare for the exam, including:
- Chapter review questions
- Full-length practice exams
- Hundreds of electronic flashcards
- Glossary of key terms
Includes coverage of all exam objectives, including these key topics:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Evading IDS, Firewalls, and Honeypots
- Buffer Overflow
- Penetration Testing
No es necesario ningún dispositivo Kindle. Descárgate una de las apps de Kindle gratuitas para comenzar a leer libros Kindle en tu smartphone, tablet u ordenador.
Obtén la app gratuita:
Detalles del producto
Si eres el vendedor de este producto, ¿te gustaría sugerir ciertos cambios a través del servicio de atención al vendedor?
Opiniones de clientes
Principales opiniones de clientes
Ha surgido un problema al filtrar las opiniones justo en este momento. Vuelva a intentarlo en otro momento.
Opiniones de clientes más útiles en Amazon.com
The problem I have -- and the reason I am dropping this to 2 stars -- is the number of mistakes in this book. Whoever did the technical editing on this thing needs to be fired. Or, perhaps the problem is that no one ever did any technical editing?
Many of the issues are in the review questions in the back of each of the chapters. The answers don't match the questions in some cases, and in other cases wrong answers are given. I can point to two such examples in the review question set of the final chapter alone. Questions 3 and 10 are wrong. Book mentions fences should be 8 feet high. That isn't an option for question 3, but you can choose either 10 feet or 6 foot. Logical choice would be 10 feet since it is higher, and thus more secure. Nope -- book tells you it is 6 feet. Question 10 deals with type 2 errors in biometrics. A type 2 error is when a null hypothesis is false but erroneously fails to be rejected. This is also known as false acceptance. The content in the chapter describes it correctly, but the review question tells you that the answer to the question concerning type 2 errors is "false rejection".
I pulled these two errors from the last chapter because that was the last chapter I read and thus was freshest in my mind. There are a ton of other errors like this throughout the book.
Just be careful reading through this thing. Had I not already known 90% of the content, I probably wouldn't been able to spot all of the mistakes. Hopefully this poorly edited book doesn't cause anyone to miss questions on the exam.
Note to future Test Takers:
EC-Council’s Certified Ethical Hacker (CEH) v8 was updated in OCT 2015 without notice to students who had been studying v8 material, which resulted in massive failures globally. EC Council responded with a 50% discount to retake the exam to those students - plus, the students now had to learn the v9 material despite EC Council's claim that their certifications were no longer carrying a version number. That excuse had nothing to do with the total over haul of the exam updated on OCT 15, 2015 from EC Council's Malaysia corporate office. This unannounced update and careless attitude by EC Council has cost it hundreds of students that are now seeking alternatives to EC Council's CEH, which does not actually teach hacking, just the concepts. Other platforms such as GIAC/SANS and MILE 2 have courses that out perform EC Council's CEH and do teach instructional labs that give student the necessary skills to ethically hack or perform penetration testing. Word of caution, stay away from a non-US company that will only leave you with the impression that you know what you are doing. Instead, go with proven leaders in the IT Security world that are accepted and respected. IT certification communities not even aligned with the above mentioned that are high ranking are even talking about this offline. It all comes down to what your employers wants you to have or will accept.
Checking Archieve.org the update to v9 material wasn't even posted until way after the un-announced update was put in place. A $500 exam lost is something no one can easy stomach, so - I'm posting this warning others of the tactics used by EC Council. To re-take the test, they offer a $150 off the $500 to retake it. Don't hate me for posting this. They did this a hundreds of test takers worldwide. Unprofessional at best.
Also, some of the practice questions are flat out wrong. For example, Chapter 11 asks the difference between a smurf and fraggle attack. The answer should be UDP vs ICMP, but the book says a smurf attack uses TCP. Page 263 clearly states "a smurf attack spoofs the IP address ... and sends numerous ICMP echo request packets." The same chapter has a sample question that shows a wireshark capture. The answer says it's a SYN flood but there's only a single packet in view. Other concepts, such as password salts and hashing, are incorrectly explained.
I would not rely entirely on this book for your study as that would be a dangerous proposition.