Series: Cert Guide
Hardcover: 704 pages
Publisher: Pearson IT Certification; 1 edition (December 25, 2013)
Language: English
ISBN-10: 0789751275
ISBN-13: 978-0789751270
Product Dimensions: 7.7 x 1.8 x 9.2 inches
Shipping Weight: 2.8 pounds (View shipping rates and policies)
Average Customer Review: 3.3 out of 5 stars See all reviews (18 customer reviews)
Best Sellers Rank: #407,808 in Books (See Top 100 in Books) #144 in Books > Computers & Technology > Certification > Security #297 in Books > Computers & Technology > Internet & Social Media > Hacking #369 in Books > Computers & Technology > Networking & Cloud Computing > Network Security
Certified Ethical Hacking (CEH) has been around for many years but hasn't been widely recognized due to the use of the evil H-word (Hacker). The media has done a great job of blaming all technology woes on hackers so obtaining a certification with that name on it was similar to getting a bad tattoo on your forehead or posting drunk party pictures on a social media site. It has taken time to undo some of that poor naming damage but at least the media hasn't gotten a hold of the other name for CEHs, which is penetration testers. You can be sure the media would link that title to the porn industry instead of cyber security.This is the second printing of Michael Gregg’s book on CEH, which must mean he's popular and a good writer. Reading his book shows that he has done his research and drops plenty of names along the way. The overall purpose of this 640 plus page book (and practice exam DVD) is to prepare the reader for taking the EC-Council Certified Ethical Hacker 312-50 exam. This book is not a guide to hacking nor it is a license break into your neighbors WiFi router for free bandwidth. This is a license to learn and to show you how much you need to learn before you attempt the exam.Like many exam prep books, this one offers you a chance to prove yourself early on by asking you a couple of basic questions. I guess “basic” is the wrong word because the difficultly of the question depends on how much you already know about each topic ahead of time. To make these questions a bit more slippery, the author left out portions of answers to see if you really know your stuff or if you are flapping like a fish inside a boat. An example of this is in question 2 of the first chapter-What are two major laws in the United States that deal with computer crimes?1.
Certified Ethical Hacker (CEH) Cert Guide CEH v9: Certified Ethical Hacker Version 9 Practice Tests Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH) The Hacker's Briefcase (Hacker Magazine Book 1) Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Learn Adobe InDesign CC for Print and Digital Media Publication: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA)) Learn Adobe Animate CC for Interactive Media: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA)) CNA Certified Nursing Assistant Review; Nursing Assistant Prep Comprehensive Review for the Certified Nursing Assistant Exam 6 Hours, 6 Audio CDs MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring (Certification Guide) CCNA Cloud CLDFND 210-451 Official Cert Guide VCP6-NV Official Cert Guide (Exam #2V0-641) (VMware Press Certification) MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring Hacking University: Freshman Edition Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beginners, Computer ... (Hacking Freedom and Data Driven Book 1) The Car Hacker's Handbook: A Guide for the Penetration Tester XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation Hacking University: Freshman Edition: Essential Beginner's Guide on How to Become an Amateur Hacker Hacking: Tapping into the Matrix Tips, Secrets, steps, hints, and hidden traps to hacking: Hacker, Computer, Programming, Security & Encryption 2600: The Hacker Digest - Volume 2 The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws