Hands-On Ethical Hacking and Network Defense

Author: Michael T. Simpson,Kent Backman,James Corley

Publisher: Cengage Learning

ISBN: 1435486099

Category: Computers

Page: 480

View: 3198

DOWNLOAD NOW »

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Release

Official Certified Ethical Hacker Review Guide

Author: Steven DeFino

Publisher: Cengage Learning

ISBN: 1435488539

Category: Computers

Page: 384

View: 1040

DOWNLOAD NOW »

Get ready for the latest Certified Ethical Hacker exam with the only book authorized by the creators of the certification, EC-Council! This book covers all of the various areas of the very challenging Certified Ethical Hacker exam, and includes hundreds of review questions in addition to refresher coverage of the information needed to successfully become a Certified Ethical Hacker. Including helpful at-a-glance quick reference boxes and tables, Exam Essentials summaries, review questions and answers, tutorial information and more, this resource is at once succinct and comprehensive. Not just an exam preparation tool, this book helps prepare future Certified Ethical Hackers to proactively protect their organization’s systems from malicious hackers. It strengthens readers knowledge that will help them successfully assess and analyze computer system weaknesses and vulnerabilities so they can most effectively safeguard the organization’s information and assets. This is the ideal resource for anyone looking to refresh their skills in this area, learn more about ethical hacking, or successfully pass the certification exam and become a Certified Ethical Hacker. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Release

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

Author: EC-Council

Publisher: Cengage Learning

ISBN: 1435483642

Category: Computers

Page: 192

View: 3555

DOWNLOAD NOW »

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Release

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms

Author: EC-Council

Publisher: Cengage Learning

ISBN: 1435483618

Category: Computers

Page: 304

View: 9675

DOWNLOAD NOW »

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Release

Network Defense: Security and Vulnerability Assessment

Author: EC-Council

Publisher: Cengage Learning

ISBN: 1133417310

Category: Computers

Page: 192

View: 1955

DOWNLOAD NOW »

The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, to configuring IPS, IDS, firewalls, bastion host and honeypots. Learners completing this series will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper experience these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification. Proactive vulnerability assessment is key to any organization's security posture. Constant assessment for potential weakness is required to maintain a security edge as new vulnerabilities in operating systems, software, hardware, and even human elements are identified and exploited every day. This book, the fifth in the series, is designed to provide the fundamental knowledge necessary to comprehend overall network security posture and the basic practices in vulnerability assessment. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Release

Network Defense: Security Policy and Threats

Author: EC-Council

Publisher: Cengage Learning

ISBN: 1435483561

Category: Computers

Page: 192

View: 8228

DOWNLOAD NOW »

The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, to configuring IPS, IDS, firewalls, bastion host and honeypots. Learners completing this series will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper experience these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification. Understanding the threats to an organization's infrastructure as well as internal policies and mechanisms used to defend the infrastructure is an integral part to a Network Security Administrator's role. This book, the second in the series, is designed to cover a broad range of topics from a vendor-neutral perspective preparing the Administrator to implement and enforce policies that leverage not only the knowledge of how these threats can materialize, but also the mechanisms used prevent them. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Release