ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition

دانلود کتاب راهنمای آزمون همه کاره هکر اخلاقی CEH، ویرایش پنجم، ویرایش پنجم

CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition

مشخصات کتاب

CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition

ویرایش: [5th edition.] 
نویسندگان: ,   
سری:  
 
ناشر:  
سال نشر: 2021 
تعداد صفحات: [964] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 30 Mb 

قیمت کتاب (تومان) : 54,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای آزمون همه کاره هکر اخلاقی CEH، ویرایش پنجم، ویرایش پنجم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Copyright
Contents
CEH™ Certified Ethical Hacker Cover
	CEH™ Certified Ethical Hacker
	ABOUT THE AUTHOR
	Title
	Copyright
	Dedication
	CONTENTS AT A GLANCE
	CONTENTS
	ACKNOWLEDGMENTS
	INTRODUCTION
	Getting Started: Essential Knowledge
		Security 101
			Essentials
			Security Basics
		Introduction to Ethical Hacking
			Hacking Terminology
			The Ethical Hacker
		Chapter Review
			Questions
			Answers
	Reconnaissance: Information Gathering for the Ethical Hacker
		Footprinting
			Passive Footprinting
			Active Footprinting
		Footprinting Methods and Tools
			Search Engines
			Website and E-mail Footprinting
			DNS Footprinting
			Network Footprinting
			Other Tools
		Chapter Review
			Questions
			Answers
	Scanning and Enumeration
		Fundamentals
			TCP/IP Networking
			Subnetting
		Scanning Methodology
			Identifying Targets
			Port Scanning
			Evasion
			Vulnerability Scanning
		Enumeration
			Windows System Basics
			Unix/Linux System Basics
			Enumeration Techniques
		Chapter Review
			Questions
			Answers
	Sniffing and Evasion
		Essentials
			Network Knowledge for Sniffing
			Active and Passive Sniffing
		Sniffing Tools and Techniques
			Techniques
			Tools
		Evasion
			Devices Aligned Against You
			Evasion Techniques
		Chapter Review
			Questions
			Answers
	Attacking a System
		Getting Started
			Windows Security Architecture
			Linux Security Architecture
			Methodology
		Hacking Steps
			Authentication and Passwords
			Privilege Escalation and Executing Applications
			Hiding Files and Covering Tracks
		Chapter Review
			Questions
			Answers
	Web-Based Hacking:Ser vers and Applications
		Web Servers
			Nonprofit Organizations Promoting Web Security
			Attack Methodology
			Web Server Architecture
			Web Server Attacks
		Attacking Web Applications
			Application Attacks
			Countermeasures
		Chapter Review
			Questions
			Answers
	Wireless Network Hacking
		Wireless Networking
			Wireless Terminology, Architecture, and Standards
			Wireless Hacking
		Chapter Review
			Questions
			Answers
		The Mobile World
			Mobile Vulnerabilities and Risks
			Mobile Platforms and Attacks
		IoT
			IoT Architecture
			IoT Vulnerabilities and Attacks
			IoT Hacking Methodology
		OT Hacking
			Definition and Concepts
			Security Concerns
		Chapter Review
			Questions
			Answers
	Security in CloudComputing
		Cloud Computing
			Cloud Computing Service Types
			Cloud Deployment Models
		Cloud Security
			Cloud Threats
			Cloud Attacks and Mitigations
			Cloud Hacking
		Chapter Review
			Questions
			Answers
		The “Malware” Attacks
			Trojans
			Viruses and Worms
			Fileless Malware
			Malware Analysis
			Malware Countermeasures
		Remaining Attacks
			Denial of Service
			Session Hijacking
		Chapter Review
			Questions
			Answers
	Cryptography 101
		Cryptography and Encryption Overview
			Terminology
			Encryption Algorithms and Techniques
		PKI, the Digital Certificate, and Digital Signatures
			The PKI System
			Digital Certificates
			Digital Signatures
			To Sum Up
		Encrypted Communication and Cryptography Attacks
			Encrypted Communication
			Cryptography Attacks
		Chapter Review
			Questions
			Answers
	Low Tech:Social Engineeringand Physical Security
		Social Engineering
			Human-Based Social Engineering Attacks
			Computer-Based Attacks
			Mobile-Based Attacks
			Preventing Social Engineering Attacks
		Physical Security
			Physical Security 101
			Testing Physical Security
		Chapter Review
			Questions
			Answers
	The Pen Test:Putting It All Together
		Methodology and Steps
			Security Assessments
			Security Assessment Deliverables
			Guidelines
		More Terminology
		Chapter Review
			Questions
			Answers
	Appendix A Tool, Sites, and References
		Vulnerability Research Sites
		Footprinting Tools
		Scanning and Enumeration Tools
		System Hacking Tools
		Cryptography and Encryption
		Sniffing
		Wireless
		Mobile and IoT
		Trojans and Malware
		Web Attacks
		Miscellaneous
		Tools, Sites, and References Disclaimer
	Appendix B About the Online Content
		System Requirements
		Your Total Seminars Training Hub Account
			Privacy Notice
		Single User License Terms and Conditions
		TotalTester Online
		Technical Support
CEH™Certified Ethical Hacker Practice Exams Cover
	CEH™Certified Ethical Hacker Practice Exams
	ABOUT THE AUTHOR
	Title
	Copyright
	Dedication
	CONTENTS AT A GLANCE
	CONTENTS
	ACKNOWLEDGMENTS
	INTRODUCTION
	Getting Started: Essential Knowledge
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Reconnaissance: Information Gathering for the Ethical Hacker
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Scanning and Enumeration
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Sniffing and Evasion
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Attacking a System
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Web-Based Hacking: Ser vers and Applications
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Wireless Network Hacking
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Mobile Communications and the IoT
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Security in Cloud Computing
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Trojans and Other Attacks
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Cryptography 101
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	Low Tech: Social Engineering and Physical Security
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	The Pen Test: Putting It All Together
		QUESTIONS
		QUICK ANSWER KEY
		ANSWERS
	About the Online Content




نظرات کاربران