جزییات کتاب
The CEH Cert Guide is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Cert Guide method of study. The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes four hours and 125 questions, requiring a broad and deep knowledge of network security issues. The book presents students with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists and a detailed listing of the objectives and where they are covered in the book. (includes chapters and page numbers) make referencing easy. Chapter-ending Exam Preparation Tasks help students drill on key concepts they must know thoroughly. Review questions help them assess their knowledge, and a final preparation chapter guides students through tools and resources to help them craft a final study plan. Master CEH exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions on the practice test engine This best-of-breed study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. This concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology CEH; Certified Ethical Hacker; Hacking; Ethical Hacker; information security; Penetration Testing; Security Assessment; Audit; PCI-DSS; Vulnerability Assessment; Security Breach; Kali; Exploit; Zero Day (0 day); information security certification