• Complain

Dale Meredith - Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities

Here you can read online Dale Meredith - Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Packt Publishing, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Dale Meredith Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
  • Book:
    Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2022
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam

Key Features
  • Learn how to look at technology from the standpoint of an attacker
  • Understand the methods that attackers use to infiltrate networks
  • Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests
Book Description

With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attackers mindset is a necessary skill, which you can hone with the help of this cybersecurity book.

This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. Youll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. Youll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, youll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.

By the end of this book, youll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker.

What you will learn
  • Get to grips with information security and ethical hacking
  • Undertake footprinting and reconnaissance to gain primary information about a potential target
  • Perform vulnerability analysis as a means of gaining visibility of known security weaknesses
  • Become familiar with the tools and techniques used by an attacker to hack into a target system
  • Discover how network sniffing works and ways to keep your information secure
  • Explore the social engineering techniques attackers use to compromise systems
Who this book is for

This ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.

Table of Contents
  1. Understanding Ethical Hacking
  2. Introduction to Reconnaissance
  3. Reconnaissance A Deeper Dive
  4. Scanning Networks
  5. Enumeration
  6. Vulnerability Analysis
  7. System Hacking
  8. Social Engineering
  9. Malware and Other Digital Attacks
  10. Sniffing and Evading IDS, Firewalls, and Honeypots
  11. Hacking Wireless Networks
  12. Hacking Mobile Platforms
  13. Hacking Web Servers and Web Apps
  14. Hacking IoT and OT
  15. Cloud Computing
  16. Using Cryptography
  17. CEH Exam Practice Questions

Dale Meredith: author's other books


Who wrote Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities? Find out the surname, the name of the author of the book and a list of all author's works by series.

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Certified Ethical Hacker CEH v11 312-50 Exam Guide Keep up to date with - photo 1
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide

Keep up to date with ethical hacking trends and hone your skills with hands-on activities

Dale Meredith

BIRMINGHAMMUMBAI Certified Ethical Hacker CEH v11 312-50 Exam Guide Copyright - photo 2

BIRMINGHAMMUMBAI

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide

Copyright 2022 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Vijin Boricha

Publishing Product Manager: Meeta Rajani

Senior Editor: Athikho Sapuni Rishana

Content Development Editor: Sayali Pingale

Technical Editor: Nithik Cheruvakodan

Copy Editor: Safis Editing

Book Project Manager: Neil Dmello

Proofreader: Safis Editing

Indexer: Pratik Shirodkar

Production Designer: Prashant Ghare

Marketing Coordinator: Hemangi Lotlikar

First published: June 2022

Production reference: 1010622

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

978-1-80181-309-9

www.packt.com

This book is dedicated to all my students over the years. Those who have sat in on one of my live classes, watched my courses on Pluralsight, or listened to me speak at conferences. Thank you for putting up with my jokes. I know some were rough, some were good, and some I need to retire. Thank you all for allowing me to be a part of your learning journey. If you learn something from this book, do me a favor and reach out to me on social media and let me know. Some of my best days are the ones that start with folks letting me know I did something to help them.

Foreword

Continually learning, evolving, and growing is a skill everyone should master. Being able to facilitate that growth and transfer that knowledge to others is an absolute gift. I have been an IT leader and author for over 20 years, having published over 40 courses on cybersecurity, networking, business continuity/disaster recovery, security leadership, and governance. I've always looked up to people who are great presenters and have the unique ability to transfer their knowledge effectively, break down complex topics into digestible chunks, and, most importantly, have fun in the process.

I have been very fortunate to personally know Dale Meredith for the better part of a decade, for he has that unique gift of teaching while making it fun. I call it edutainment, and every time I watch one of his courses or read an article he has published, I learn something. It could be a piece of technical detail I was not aware of (or had forgotten about) or something about the way he delivers material. Keeping a listener engaged while delivering training is no easy task, and in this Dale excels.

Cybersecurity is a vast and complex topic, with new threats emerging every day. The goalpost is constantly moving, and the need for certified, competent cybersecurity professionals gets bigger every day. Hundreds of thousands of cybersecurity jobs go unfilled globally each year as companies of all sizes and all industries face increased threats daily. It is no longer a matter of if a company will be targeted, but rather when. Being able to think like a hacker and solidify a company's defenses has never been more critical.

Dale has helped hundreds of thousands of people around the world to learn everything from hardware and networking to cybersecurity and ethical hacking. I am excited to see the impact this book will have on people's careers, and ultimately their lives. This book will provide the knowledge necessary to develop critical cybersecurity skills and will empower you to take action, all while having fun in the process.

Christopher Rees

Enterprise IT Leader and Author

Contributors
About the author

Dale Meredith is an EC-Council Certified Ethical Hacker/Instructor and a Microsoft Certified Trainer. Dale has over 10 years of senior IT management experience and was a CTO for an ISP. Dale's skill as an IT trainer lies in clarifying complicated concepts and ensuring students understand the theories. Dale's teaching style is memorable and entertaining. His expertise has led to many opportunities, including teaching teams in Fortune 500 firms, universities globally, the Department of Homeland Security, and many US military branches. Along with authoring video courses, consulting, and classroom training, you can catch Dale on stage speaking at IT conferences around the world, helping teams keep their companies safe, relevant, and breach-aware.

To my wife, Alice Meredith, the strongest woman I've ever met (she has to be, to be married to me!). Thanks for supporting me in my love of technology and building me up when things got rough.

To my kids and grandkids, thanks for letting me be your Batman. "Everything's impossible until somebody does it" Bruce Wayne

Thanks to the team at Packt (Neil, Sayali, and I'm sure countless others behind the scenes) for being patient with me. Thanks for giving me this opportunity.

Thanks also to Scott Merritt, the man who took so much off my plate to allow me to focus. Your work ethic and knowledge allowed my dream of being published to take place...Thank you, my friend.

About the reviewers

Vinod Babu Bollikonda is a cybersecurity speaker, trainer, and technopreneur with two decades of experience in information technology and cybersecurity. He is a certified trainer for CompTIA, Microsoft, EC-Council, and ISACA courses, and a research scholar (PhD) on a niche topic in cybersecurity. He has worked at iGATE and Franklin Templeton and delivered training across 14 countries on 35 customized course curricula in cybersecurity. Vinod has also delivered expert-level training in a number of niche areas, including embedded, IoT, automotive, and industrial control system security testing. He has served as a security consultant on cybercrimes related to the dark web and cryptocurrencies and is the cofounder of VSVS Technologies. Vinod's hobbies include undertaking research on extra-terrestrial sounds and experiments with software-defined radio (SDR).

Thanks would be a small word to my beautiful wife, Swapna, the cofounder of VSVS Technologies, who helped me throughout this journey.

Sai Praveen Kumar Jalasutram is a certified and experienced cybersecurity professional with expertise in security operations, incident response, threat intelligence, threat hunting, forensic investigations, malware analysis, and detection engineering. He has worked for various global organizations across multiple industries, including government, technology, and education as a security consultant expert for enhancing cyber threat detection. Sai is one of the key developers of the Certified Ethical Hacker (CEHv10) and

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities»

Look at similar books to Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities»

Discussion, reviews of the book Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.