Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.
The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.
What You Will Learn
Gain the basics of hacking (apps, wireless devices, and mobile platforms)
Discover useful aspects of databases and operating systems from a hacking perspective
Develop sharper programming and networking skills for the exam
Explore the penetration testing life cycle
Bypass security appliances like IDS, IPS, and honeypots
Grasp the key concepts of cryptography
Discover the career paths available after certification
Revise key interview questions for a certified ethical hacker
Who This Book Is For
Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...
Beginning Ethical Hacking with Python
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...
This is the fundamental truth about data protection: backup is dead.
Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.
So what is data...