Publisher's Synopsis
Includes Real–World Scenarios, Hands–On Exercises, and Access to Exam Prep Software Featuring:
+ Practice Test Environment
+ Hundreds of Practice Questions
+ Electronic Flashcards
+ Chapter Review Questions
+ Glossary of Key Terms
Complete Preparation for the Certified Ethical Hacker Exam Version 8
This in–depth study guide prepares you for the unique and challenging Certified Ethical Hacker version 8 (CEHv8) exam. IT security expert Sean–Philip Oriyano has compiled a comprehensive overview of the CEH certification requirements with a concise and easy–to–follow approach to this difficult exam. Essential topics like intrusion detection, DDoS attacks, buffer overflows, and virus creation are covered in detail. This DoD 8570.1–compliant study guide from Sybex includes:
Full coverage of all exam topics in a systematic approach, so you can be confident you re getting the instruction you need for the exam
Practical hands–on exercises to reinforce critical skills
Real–world scenarios that put what you ve learned in the context of actual job roles
Challenging review questions in each chapter to prepare you for exam day
Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
A handy section that maps every official exam objective to the corresponding chapter in the book so you can track your exam prep objective by objective
Sybex Exam Prep Tools
Go to www.sybex.com/go/cehv8 for access to a full set of study tools to help you prepare for the exam, including:
- Chapter review questions
- Full–length practice exams
- Hundreds of electronic flashcards
- Glossary of key terms
Includes coverage of all exam objectives, including these key topics:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Evading IDS, Firewalls, and Honeypots
- Buffer Overflow
- Cryptography
- Penetration Testing