Certified Ethical Hacker (CEH) Cert Guide et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 34,69
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Certified Ethical Hacker ... a été ajouté à votre Panier
Amazon rachète votre
article EUR 14,48 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Certified Ethical Hacker (CEH) Cert Guide (Anglais) Relié – 15 décembre 2013


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Relié
"Veuillez réessayer"
EUR 34,69
EUR 30,69 EUR 37,65

A court d'idées pour Noël ?

A court d'idées pour Noël ?
Découvrez dès aujourd'hui toutes nos Idées Cadeaux Livres. Vous trouverez sur nos étagères des milliers de livres disponibles pour combler ceux que vous aimez.

Offres spéciales et liens associés


Les clients ayant acheté cet article ont également acheté


Descriptions du produit

Présentation de l'éditeur

Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification.

 

  • Master CEH exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions on the CD

 

Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

 

You'll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.

 

The companion CD contains the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most, so you can succeed on the exam the first time.

 

This study guide helps you master all the topics on the CEH v8 (312-50) exam, including

 

  • Ethical hacking basics
  • Technical foundations of hacking
  • Footprinting and scanning
  • Enumeration and system hacking
  • Linux distros and automated assessment tools
  • Trojans and backdoors
  • Sniffers, session hijacking, and denial of service
  • Web server hacking, web applications, and database attacks
  • Wireless technologies, mobile security, and mobile attacks
  • IDS, firewalls, and honeypots
  • Buffer overflows, viruses, and worms
  • Cryptographic attacks and defenses
  • Physical security and social engineering

 

Companion CD

The CD contains two free, complete practice exams, plus memory tables and answers to help you study more efficiently and effectively.

 

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512MB RAM; 650MB disc space plus 50MB for each downloaded practice exam; access to the Internet to register and download exam databases

 

Biographie de l'auteur

Michael Gregg (CISSP, SSCP, CISA, MCSE, MCT, CTT+, A+, N+, Security+, CCNA, CASP, CISA, CISM, CEH, CHFI, and GSEC) is the founder and president of Superior Solutions, Inc., a Houston, Texas-based IT security consulting firm. Superior Solutions performs security assessments and penetration testing for Fortune 1000 firms. The company has performed security assessments for private, public, and governmental agencies. Its Houston-based team travels the country to assess, audit, and provide training services.

 

Michael is responsible for working with organizations to develop cost-effective and innovative technology solutions to security issues and for evaluating emerging technologies. He has more than 20 years of experience in the IT field and holds two associate’s degrees, a bachelor’s degree, and a master’s degree. In addition to coauthoring the first, second, and third editions of Security Administrator Street Smarts, Michael has written or co-authored 14 other books, including Build Your Own Security Lab: A Field Guide for Network Testing (Wiley, 2008); Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network (Syngress, 2006); Certified Ethical Hacker Exam Prep 2 (Que, 2006); and Inside Network Security Assessment: Guarding Your IT Infrastructure (Sams, 2005).

 

Michael has been quoted in newspapers such as the New York Times and featured on various television and radio shows, including NPR, ABC, CBS, Fox News, and others, discussing cyber security and ethical hacking. He has created more than a dozen IT security training security classes. He has created and performed video instruction on many security topics, such as cyber security, CISSP, CISA, Security+, and others.

 

When not consulting, teaching, or writing, Michael enjoys 1960s muscle cars and has a slot in his garage for a new project car.

 

You can reach Michael by email at MikeG@thesolutionfirm.com.



Vendez cet article - Prix de rachat jusqu'à EUR 14,48
Vendez Certified Ethical Hacker (CEH) Cert Guide contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 14,48, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 10 commentaires
4 internautes sur 4 ont trouvé ce commentaire utile 
CEH Cert Guide from Pearson IT is the most comprehensive tool I have encountered 26 février 2014
Par Sonoran Desert Securiy Users Group - Publié sur Amazon.com
Format: Relié
CEH Cert Guide from Pearson IT is the most comprehensive tool I have encountered in my studies of IT security, and Ethical Hacking. The "Do I know this already?" quizzes help students who have informal, or experiential knowledge of the subjects covered in the chapters. The caveat on each quiz that "Giving yourself credit for an answer you incorrectly guess..." should definitely stay. Some of the folks we work with in our industry, need that guidance. The value added features such as the software included with the book are essential for the exam environment, which happens to also be computer based. This book is essential for the self-motivated learner, who can give him, or herself quizzes. Aside from hands-on learning, the text delivers some of the lesser known resources for open source intelligence, examples of vulnerability research, and a plethora of real world security insight, all the way down to the tumblers on locking mechanisms, one of my favored subjects. CEH Cert Guide is a great value for the price. I highly recommend it for the non-traditional, self-motivated students, as well as other IT Professionals.--CHR
1 internautes sur 1 ont trouvé ce commentaire utile 
It is really good book, but... 6 avril 2014
Par Mikheil Sandadze - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
It is really good book, but I found some mistakes in it. I think it is not from author of it.
i.e. It says:
The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks : Class A network IP address range = 10.0.0.0–10.255.255.255, Class B network IP address range = 172.31.0.0–172.31.255.255, and Class C network IP address range = 192.168.255.0– 192.168.255.255.

Look at the Class B range they are not correct and I saw them few times in this book.
Lots of Good Reading But You Still Need to Research on Your Own 15 octobre 2014
Par Bob Monroe - Publié sur Amazon.com
Format: Relié
Certified Ethical Hacking (CEH) has been around for many years but hasn't been widely recognized due to the use of the evil H-word (Hacker). The media has done a great job of blaming all technology woes on hackers so obtaining a certification with that name on it was similar to getting a bad tattoo on your forehead or posting drunk party pictures on a social media site. It has taken time to undo some of that poor naming damage but at least the media hasn't gotten a hold of the other name for CEHs, which is penetration testers. You can be sure the media would link that title to the porn industry instead of cyber security.

This is the second printing of Michael Gregg’s book on CEH, which must mean he's popular and a good writer. Reading his book shows that he has done his research and drops plenty of names along the way. The overall purpose of this 640 plus page book (and practice exam DVD) is to prepare the reader for taking the EC-Council Certified Ethical Hacker 312-50 exam. This book is not a guide to hacking nor it is a license break into your neighbors WiFi router for free bandwidth. This is a license to learn and to show you how much you need to learn before you attempt the exam.

Like many exam prep books, this one offers you a chance to prove yourself early on by asking you a couple of basic questions. I guess “basic” is the wrong word because the difficultly of the question depends on how much you already know about each topic ahead of time. To make these questions a bit more slippery, the author left out portions of answers to see if you really know your stuff or if you are flapping like a fish inside a boat. An example of this is in question 2 of the first chapter-
What are two major laws in the United States that deal with computer crimes?
1. 1029 and 1030
2. 1026 and 1027
3. 1028 and 1029
4. 1027 and 1029
If you look at the question closely you will see that it asks about major laws. The answers you are given are actually sections or segments of U.S. laws. It's a legal technicality but it also throws off anyone who hasn't paid attention to Cyber Crime Law. If you breezed through this question you might want to go back and read Orin Kerr a bit deeper.

The author does this on purpose in several areas in the book, where he gives you part of the answer but recommends you research yourself for the rest of the answer or the reason why things are done this way.

I wrote many notes of disagreement and encouragement as I read through the book. Little things like the Robert Morris Worm was created by Robert Morris Jr., not Robert Morris. Robert Morris Sr. was actually working in the ARPNET Incident Center (NSA's Situation Room before there was such as thing) when he found out his son lost control of a piece of code, known as the Morris Worm. Old history but a funny story anyways when told over cold beverages. Geeks do enjoy a good story too.

For those of you who already know about OSSTMM, you can skip the next couple of sentences. If you don't know what OSSTMM is, pay attention cause I was dancing around my computer when I saw it come up several times in the book. This is a testing methodology (free) created by hundreds of volunteer experts from around the world under the direction on Pete Herzog. The basic premise of this testing process is trust. You shouldn't take a computer, test it, harden it, retest it and call it secure because as soon as you add on another piece of hardware or software, your testing and trust goes out the window. OSSTMM was created to allow you a dynamic process to test and trust your network as you work. It is a continuous process that ensures you can trust that your data is not being siphoned off to your competitor or a hacker. You can find out more by either reading this book or going to www.ISECOM.org. Sorry for that plug but I work for ISECOM and Pete Herzog so I was thrilled to see it mentioned in the CEH guide.

There is a vital portion in the CEH book for required skills. It is way too often that we come across a security professional with all kinds of cool sounding certification but they don't know much about the fundamental tools we use. Believe it or not but good guys use the same tools bad guys do, each just uses different syntax. It is critical that anyone looking at the CEH know how Nmap, Wireshark, Kali (not Backtrack), putty, traceroute and a dozen other tools work from the command line (CLI). Forget GUI. Know CLI first because there are numerous undocumented commands available only to CLI. Mr. Gregg does a good job of lifting this mighty rock for his readers to look under but it is up to the reader to dig into each tool on their own. The same goes with the OSI model, ports and services. Learn them.

Some of the tools the author mentions are outdated which tells me that he must be trying to market towards defense contractors. Those poor souls were using Retina when I left back in 2006. BTW- Core Impact is written by four programmers in Argentina yet it is on the GSA schedule. It's also mentioned in this book as an exploit tool.

I was a bit disappointed that the author didn't bring up the need to document everything when conducting an ethical hack. Armitage is a framework for Metasploit that makes a pen testers life so much easier by documenting the results of every test on every node. Document everything in case things go sour during or after the test. It's not uncommon to find another hacker already inside a system you are contracted to test. Things can get very ugly and documentation is the only thing that will save your bacon if the other hacker decided he wants to make your life difficult.

Michael Gregg has a massive subject area to cover and he does a good job of touching on all the key points. Don't expect to read this book and then go pass the CEH exam. Even if you do, there is still so much more you will need to know as a CEH in the real world. Some of the stories about walking up to the receptionist and obtaining access to a conference room with network access are old wives tales. The receptionist is the gatekeeper, the holder of the keys and they aren't going to let anyone past their area without a pound of flesh or a permission slip. Those stories go back to Kevin Mitnick days.

The Certificated Ethical Hacker Cert Guide by Michael Gregg is well written and full of useful content. There are plenty of practice exam questions in the book and in the attached DVD. You may want to ask yourself why some of these questions are written they way they are. Think of cyber security as a massive puzzle. Each book you read, every blog you note and every tip you are given will slowly fill in that massive puzzle and allow you to see the big picture. It is a three dimensional puzzle where many things link together and you have to think about action and reaction as you work.

It is not a cat and mouse game: that is too linear. Michael Gregg provides some nice research spots to camp out and hunt your prey. Good luck.
4 internautes sur 6 ont trouvé ce commentaire utile 
Agree with the other reviewer, NOT a true representation of exam material. 30 mai 2014
Par Joey - Publié sur Amazon.com
Format: Relié Achat vérifié
As part of my prep for the CEH v8, I used this book as my primary reading source. I read it through cover to cover twice. After other prep, I missed the exam by three points. I was shocked when I took the exam and it seemed like there were a lot of things that either were not covered by the book, or mostly were not presented the way the book presents it. This book covers WAY more tools and things than is covered in the exam, rather than cover all of the exam objectives thoroughly. Come to find out from some other folks that just failed the exam, the one thing we have in common is using this book. However everyone else I've read about passing, have used the older Matt Walker CEH All In One that was made for the v7. I switched to reading that version of the CEH All In One and it's a WORLD of difference in the material presented and how it's presented.

I give this book a 1 star as an exam prep book (and a 1 star overall because that IS the stated purpose of the book), however as an on the job or reference book I would give it a 5 star as it lists a ton of tools and sites that you could use to perform the functions of a CEH.
All around excellent study material 20 juin 2014
Par Kevin Patrick Waters - Publié sur Amazon.com
Format: Relié Achat vérifié
I used this book to help study for the CEH exam along with some other ones. Two things I noticed during my studying: Appendix A: Review questions #19 gives incorrect ranges for Class B and C IP Addresses and Chapter 5 "Do I Know This" Question #7 should be C. Chroot instead of Chkrootkit. Otherwise, I found this book to be a valuable studying tool
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?