CEH Certified Ethical Hacker Practice Exams

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v11 exam objectives, this practical guide contains more than 550 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. Designed to help you pass the exam, this is the perfect companion to CEH™ Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition. Covers all exam topics, including: • Ethical hacking fundamentals • Reconnaissance and footprinting • Scanning and enumeration • Sniffing and evasion • Attacking a system • Hacking web servers and applications • Wireless network hacking • Mobile, IoT, and OT • Security in cloud computing • Trojans and other attacks, including malware analysis • Cryptography • Social engineering and physical security • Penetration testing Online test engine provides full-length practice exams and customizable quizzes by chapter or exam domain

Author(s): Matt Walker
Edition: 5
Publisher: McGraw Hill
Year: 2022

Language: English
Commentary: Vector PDF
Pages: 352
City: New York, NY
Tags: Cloud Computing; Security; Penetration; Testing; Web Applications; Cryptography; Vulnerability Scanning; Social Engineering; Wireless Communications; Physical Security; Ethical Hacking; Information Gathering; Hacking; Certification

Cover
CEH™ Certified Ethical Hacker Practice Exams Fifth Edition
ABOUT THE AUTHOR
Title
Copyright
Dedication
CONTENTS AT A GLANCE
CONTENTS
ACKNOWLEDGMENTS
INTRODUCTION
Getting Started: Essential Knowledge
Reconnaissance: Information Gathering for the Ethical Hacker
Scanning and Enumeration
Sniffing and Evasion
Attacking a System
Web-Based Hacking: Ser vers and Applications
Wireless Network Hacking
Mobile Communications and the IoT
Security in Cloud Computing
Trojans and Other Attacks
Cr yptography 101
Low Tech: Social Engineering and Physical Security
The Pen Test: Putting It All Together
About the Online Content