Ethical Hacker's Certification Guide (CEHv11) (notice n° 76290)

détails MARC
000 -LEADER
fixed length control field 03805cam a2200277zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88939088
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250108000845.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250108s2021 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789391392161
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88939088
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sohaib, Mohd
245 01 - TITLE STATEMENT
Title Ethical Hacker's Certification Guide (CEHv11)
Remainder of title A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment
Statement of responsibility, etc. ['Sohaib, Mohd']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer BPB Publications
Date of production, publication, distribution, manufacture, or copyright notice 2021
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features? Courseware and practice papers with solutions for C.E.H. v11.? Includes hacking tools, social engineering techniques, and live exercises.? Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing..DescriptionThe 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way.The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments.In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification.What you will learn? Learn methodologies, tools, and techniques of penetration testing and ethical hacking.? Expert-led practical demonstration of tools and tricks like nmap, BurpSuite, and OWASP ZAP.? Learn how to perform brute forcing, wardriving, and evil twinning.? Learn to gain and maintain access to remote systems.? Prepare detailed tests and execution plans for VAPT (vulnerability assessment and penetration testing) scenarios.Who this book is forThis book is intended for prospective and seasonal cybersecurity lovers who want to master cybersecurity and ethical hacking. It also assists software engineers, quality analysts, and penetration testing companies who want to keep up with changing cyber risks.Table of Contents1. Cyber Security, Ethical Hacking, and Penetration Testing2. CEH v11 Prerequisites and Syllabus3. Self-Assessment4. Reconnaissance5. Social Engineering6. Scanning Networks7. Enumeration8. Vulnerability Assessment9. System Hacking10. Session Hijacking11. Web Server Hacking12. Web Application Hacking13. Hacking Wireless Networks14. Hacking Mobile Platforms15. Hacking Clout, IoT, and OT Platforms16. Cryptography17. Evading Security Measures18. Practical Exercises on Penetration Testing and Malware Attacks19. Roadmap for a Security Professional20. Digital Compliances and Cyber Laws21. Self-Assessment-122. Self-Assessment-2
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Sohaib, Mohd
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88939088">https://international.scholarvox.com/netsen/book/88939088</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025