Certified Ethical Hacker (CEH) V11 312-50 Exam Guide: Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities
Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham
Packt Publishing, Limited
2022
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781801813099/?ar |
Zusammenfassung: | Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book Description With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is for This ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected. |
Umfang: | 1 Online-Ressource (664 Seiten) |
ISBN: | 9781801815451 1801815453 9781801813099 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-081559836 | ||
003 | DE-627-1 | ||
005 | 20240228121721.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220815s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781801815451 |c electronic book |9 978-1-80181-545-1 | ||
020 | |a 1801815453 |c electronic book |9 1-80181-545-3 | ||
020 | |a 9781801813099 |9 978-1-80181-309-9 | ||
035 | |a (DE-627-1)081559836 | ||
035 | |a (DE-599)KEP081559836 | ||
035 | |a (ORHE)9781801813099 | ||
035 | |a (DE-627-1)081559836 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/076 |2 23 | |
100 | 1 | |a Meredith, Dale |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Certified Ethical Hacker (CEH) V11 312-50 Exam Guide |b Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities |c Dale Meredith ; foreword by Christopher Rees |
264 | 1 | |a Birmingham |b Packt Publishing, Limited |c 2022 | |
300 | |a 1 Online-Ressource (664 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book Description With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is for This ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected. | ||
650 | 0 | |a Penetration testing (Computer security) |v Study guides |x Examinations | |
650 | 0 | |a Computers |v Study guides |x Access control |x Examinations | |
650 | 0 | |a Computer networks |v Study guides |x Security measures |x Examinations | |
650 | 0 | |a Hackers |v Study guides |x Certification | |
650 | 4 | |a Tests d'intrusion ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Ordinateurs ; Accès ; Contrôle ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Computer networks ; Security measures ; Examinations | |
650 | 4 | |a examination study guides | |
650 | 4 | |a Study guides | |
650 | 4 | |a Study guides | |
650 | 4 | |a Guides de l'étudiant | |
700 | 1 | |a Rees, Christopher |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781801813099/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-081559836 |
---|---|
_version_ | 1821494820170891264 |
adam_text | |
any_adam_object | |
author | Meredith, Dale |
author2 | Rees, Christopher |
author2_role | ctb |
author2_variant | c r cr |
author_facet | Meredith, Dale Rees, Christopher |
author_role | aut |
author_sort | Meredith, Dale |
author_variant | d m dm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)081559836 (DE-599)KEP081559836 (ORHE)9781801813099 |
dewey-full | 005.8/076 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/076 |
dewey-search | 005.8/076 |
dewey-sort | 15.8 276 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04512cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-081559836</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121721.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220815s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801815451</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-80181-545-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1801815453</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-80181-545-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801813099</subfield><subfield code="9">978-1-80181-309-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081559836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP081559836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781801813099</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081559836</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/076</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Meredith, Dale</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Certified Ethical Hacker (CEH) V11 312-50 Exam Guide</subfield><subfield code="b">Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities</subfield><subfield code="c">Dale Meredith ; foreword by Christopher Rees</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (664 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book Description With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is for This ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="v">Study guides</subfield><subfield code="x">Access control</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Study guides</subfield><subfield code="x">Security measures</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Study guides</subfield><subfield code="x">Certification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Accès ; Contrôle ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures ; Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">examination study guides</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Study guides</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Study guides</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guides de l'étudiant</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rees, Christopher</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781801813099/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-081559836 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:27Z |
institution | BVB |
isbn | 9781801815451 1801815453 9781801813099 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (664 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing, Limited |
record_format | marc |
spelling | Meredith, Dale VerfasserIn aut Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities Dale Meredith ; foreword by Christopher Rees Birmingham Packt Publishing, Limited 2022 1 Online-Ressource (664 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book Description With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is for This ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected. Penetration testing (Computer security) Study guides Examinations Computers Study guides Access control Examinations Computer networks Study guides Security measures Examinations Hackers Study guides Certification Tests d'intrusion ; Examens ; Guides de l'étudiant Ordinateurs ; Accès ; Contrôle ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Computer networks ; Security measures ; Examinations examination study guides Study guides Guides de l'étudiant Rees, Christopher MitwirkendeR ctb |
spellingShingle | Meredith, Dale Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities Penetration testing (Computer security) Study guides Examinations Computers Study guides Access control Examinations Computer networks Study guides Security measures Examinations Hackers Study guides Certification Tests d'intrusion ; Examens ; Guides de l'étudiant Ordinateurs ; Accès ; Contrôle ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Computer networks ; Security measures ; Examinations examination study guides Study guides Guides de l'étudiant |
title | Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities |
title_auth | Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities |
title_exact_search | Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities |
title_full | Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities Dale Meredith ; foreword by Christopher Rees |
title_fullStr | Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities Dale Meredith ; foreword by Christopher Rees |
title_full_unstemmed | Certified Ethical Hacker (CEH) V11 312-50 Exam Guide Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities Dale Meredith ; foreword by Christopher Rees |
title_short | Certified Ethical Hacker (CEH) V11 312-50 Exam Guide |
title_sort | certified ethical hacker ceh v11 312 50 exam guide keep up to date with ethical hacking trends and hone your skills with hands on activities |
title_sub | Keep up to Date with Ethical Hacking Trends and Hone Your Skills with Hands-On Activities |
topic | Penetration testing (Computer security) Study guides Examinations Computers Study guides Access control Examinations Computer networks Study guides Security measures Examinations Hackers Study guides Certification Tests d'intrusion ; Examens ; Guides de l'étudiant Ordinateurs ; Accès ; Contrôle ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Computer networks ; Security measures ; Examinations examination study guides Study guides Guides de l'étudiant |
topic_facet | Penetration testing (Computer security) Study guides Examinations Computers Study guides Access control Examinations Computer networks Study guides Security measures Examinations Hackers Study guides Certification Tests d'intrusion ; Examens ; Guides de l'étudiant Ordinateurs ; Accès ; Contrôle ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Computer networks ; Security measures ; Examinations examination study guides Study guides Guides de l'étudiant |
work_keys_str_mv | AT meredithdale certifiedethicalhackercehv1131250examguidekeepuptodatewithethicalhackingtrendsandhoneyourskillswithhandsonactivities AT reeschristopher certifiedethicalhackercehv1131250examguidekeepuptodatewithethicalhackingtrendsandhoneyourskillswithhandsonactivities |