CEH Certified Ethical Hacker Practice Exams

by
Edition: 1st
Format: Package
Pub. Date: 2013-02-19
Publisher(s): McGraw-Hill Osborne Media
List Price: $30.00

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$62.50
$62.50

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Don't let the real test be your first test! Designed as an exam-focused study-self aid and resource, CEH Certified Ethical Hacker Practice Examsoffers practice test items from each domain of the latest CEH exam, and provides knowledge and scenario-based questions plus one case study-based Lab Question per chapter. In-depth answer explanations for both the correct and incorrect answers are included. The book contains more than 400 practice exam questions (in the book and on CD) that match the actual exam questions in content and feel. This is the perfect supplement to CEH Certified Ethical Hacker All-in-One Exam Guide. Covers all exam topics, including intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, virus creation, and more Based on the 2011 CEH exam update Electronic content includes two complete practice exam simulations and an Adobe Digital Editions copy of the book (available for download)

Table of Contents

Chapter 1. Ethical Hacking Basics
Chapter 2. Cryptography 101
Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 4. Scanning and Enumeration
Chapter 5. Hacking Through the Network: Sniffers and Evasion
Chapter 6. Attacking a System
Chapter 7. Low Tech: Social Engineering and Physical Security
Chapter 8. Web-Based Hacking: Servers and Applications
Chapter 9. Wireless Network Hacking
Chapter 10. Trojans and Other Attacks
Chapter 11. The Pen Test: Putting It All Together

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.