Certified Ethical Hacker (CEH) Foundation Guide
- Length: 194 pages
- Edition: 1st ed.
- Language: English
- Publisher: Apress
- Publication Date: 2016-12-25
- ISBN-10: 1484223241
- ISBN-13: 9781484223246
- Sales Rank: #2883709 (See Top 100 Books)
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.
The book explains the concepts with the help of practical real-world scenarios and examples. You’ll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.
What You Will Learn
- Gain the basics of hacking (apps, wireless devices, and mobile platforms)
- Discover useful aspects of databases and operating systems from a hacking perspective
- Develop sharper programming and networking skills for the exam
- Explore the penetration testing life cycle
- Bypass security appliances like IDS, IPS, and honeypots
- Grasp the key concepts of cryptography
- Discover the career paths available after certification
- Revise key interview questions for a certified ethical hacker
Who This Book Is For
Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
Table of Contents
Chapter 1: Operating System Basics
Chapter 2: Database Basics
Chapter 3: Networking Basics
Chapter 4: Programming Basics for Security Enthusiasts and Hackers
Chapter 5: Virtualization and Cloud Basics
Chapter 6: Information Security Basics
Chapter 7: Penetration Testing
Chapter 8: Information Gathering
Chapter 9: Hacking Basics
Chapter 10: Web Application Hacking
Chapter 11: Wireless Hacking
Chapter 12: Hacking Mobile Platforms
Chapter 13: IDSes, Firewalls, and Honeypots
Chapter 14: Cryptography
Appendix A: Career Tracks Available after CEH
Appendix B: Interview Questions
Appendix C: Answers for Sample Questions