Certified Ethical Hacker (CEH) v12 312-50 Exam Guide : Keep up to date with ethical hacking trends and hone your skills with hands-on activities

With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book.

This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.

By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker.

Aloita tämä kirja jo tänään, hintaan 0€

  • Kokeilujakson aikana käytössäsi on kaikki sovelluksen kirjat
  • Ei sitoumusta, voit perua milloin vain
Kokeile nyt ilmaiseksi
Yli 52 000 ihmistä on antanut Nextorylle viisi tähteä App Storessa ja Google Playssä.

Muut ovat myös lukeneet

Ohita lista
  1. Kali Linux Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

    book
  2. Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

    Mohammed Abutheraa, Rishalin Pillay

    book
  3. Hands-On Ethical Hacking Tactics : Strategies, tools, and techniques for effective cyber defense

    Shane Hartman

    book
  4. Learn Kali Linux 2019 : Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark

    Glen D. Singh

    book
  5. Conquer the Web : The Ultimate Cybersecurity Guide

    Nick Wilding, Tim Mitchell, Maureen Kendal, Nick Ioannou

    book
  6. Learn Ethical Hacking from Scratch. : Your stepping stone to penetration testing

    Zaid Sabih

    book
  7. Python Ethical Hacking from Scratch : Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware

    Fahad Ali Sarwar

    book
  8. Hacking the CAGED System : Book 2

    Graham Tippett

    book
  9. Kali Linux Web Penetration Testing Cookbook : Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x

    Gilberto Najera-Gutierrez

    book
  10. Kali Linux - An Ethical Hacker's Cookbook : End-to-end penetration testing solutions

    Himanshu Sharma

    book
  11. Adversarial AI Attacks, Mitigations, and Defense Strategies : A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

    John Sotiropoulos

    book
  12. The Cybersecurity Survival Bible : Avoid Scams, Hackers, and Online Threats with a Step-by-Step Guide to Cybersecurity, Privacy, and Digital Safety for Seniors and Beginners

    Colin Mercer

    book

Liittyvät kategoriat