Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice (Final Release)
- Добавил: literator
- Дата: Сегодня, 00:29
- Комментариев: 0

Автор: Matt Walker
Издательство: O’Reilly Media, Inc.
Год: 2025
Страниц: 594
Язык: английский
Формат: epub
Размер: 11.4 MB
The CEH exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing exam will either leave you better prepared to be the best cyber security professional you can be. But preparing for the exam itself needn't be that way.
In this book, IT security and education professional Matt Walker will not only guide you through everything you need to pass the exam, but do so in a way that is actually enjoyable. The subject matter need not be dry and exhausting, and we won't make it that way. You should finish this book looking forward to your exam and your future.
This exam isn’t a walk in the park. The Certified Ethical Hacker (CEH) certification didn’t gain the reputation and value it has by being easy to attain. It requires clearing a challenging examination that tests more than just simple memorization. Its worth has elevated it to one of the top certifications a technician can attain, and it remains part of DoD 8570’s call for certification on DoD networks. In short, this certification actually means something to employers because they know the effort it takes to attain it. If you’re not willing to put in the effort, maybe you should pick up another line of study.
If you’re new to the career field or you’re curious and want to expand your knowledge, you may be standing there with the glow of innocent expectation on your face, wondering whether this is the book for you. To help you decide, let’s take a virtual walk over to our entrance sign and have a look. Come on, you’ve seen one of these signs before—it’s just like the one in front of the roller coaster that reads, “You must be this tall to enter the ride.” However, the prerequisites for this ride are just a little different. Instead of your height, I’m interested in your knowledge, and I have a question or two for you. Do you know the OSI reference model? What port does SMTP use by default? How about Telnet? What transport protocol (TCP or UDP) do they use, and why? Can you possibly run something else over those ports? What’s an RFC?
For those of you who have already put your time in and know the basics, you’ll find this book pleasantly surprising. You’re obviously aware by now that technology isn’t magic, nor is it necessarily difficult or hard to comprehend—it’s just learning how something works so that you can use it to your advantage. I’ve tried to attack ethical hacking in this manner, making things as light as possible and laughing a little along the way. But please be forewarned: you cannot, should not, and will not pass the CEH exam just by reading this book. Any book that promises that is lying to you. Combine this study guide with some hands-on practice, a lot of practice exams, and a whole lot of additional study, and I don’t think you’ll have any trouble at all with the exam. Read it as a one-stop shop for obtaining certification, though, and you’ll be leaving the exam room wondering what happened to you.
This book has, of course, one primary goal and focus—to help you achieve the title of Certified Ethical Hacker by passing the exam. I believe it provides you with everything you’ll need to pass the test. However, I’d like to think there’s more to the book than that. I hope I’ve also succeeded in another goal that’s just as important: helping you to become an employed ethical hacker. No, there is no way someone can simply read a book and magically become a seasoned IT security professional, but I sincerely hope I’ve provided enough real-world insight that you can safely rely on this book along your journey out in the real world.
To help you successfully complete the CEH certification, this book will bring penetration testers, cybersecurity engineers, and cybersecurity analysts up to speed on:
Information security and ethical hacking fundamentals
Reconnaissance techniques
System hacking phases and attack techniques
Network and perimeter hacking
Web application hacking
Wireless network hacking
Mobile, platform, IoT, and OT hacking
Cloud computing
Cryptography
Penetration testing techniques
Matt Walker is an IT security and education professional with more than 20 years of experience. He's served in a variety of cyber security, education, and leadership roles throughout his career.
Скачать Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice (Final Release)

[related-news] [/related-news]
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.