Certified ethical hacker (CEH) v.12

The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course c...

Full description

Bibliographic Details
Main Author: Lowrie, Daniel (instructor)
Corporate Author: ACI Learning
Other Authors: Goodwin, Sophie (instructor)
Format: eBook
Language:English
Published: [Place of publication not identified] Packt Publishing 2024
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04861nmm a2200481 u 4500
001 EB002193077
003 EBX01000000000000001330542
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240201 ||| eng
020 |a 9781835886328 
050 4 |a QA76.9.A25 
100 1 |a Lowrie, Daniel  |e instructor 
245 0 0 |a Certified ethical hacker (CEH) v.12 
250 |a [First edition] 
260 |a [Place of publication not identified]  |b Packt Publishing  |c 2024 
300 |a 1 video file (48 hr., 19 min.)  |b sound, color 
653 |a Vidéo en continu 
653 |a Hacking / Examinations / Study guides 
653 |a Computer security / Examinations / Study guides 
653 |a Tests d'intrusion / Examens / Guides de l'étudiant 
653 |a Computer networks / Security measures / Examinations / Study guides 
653 |a Penetration testing (Computer security) / Examinations / Study guides 
653 |a Electronic data processing personnel / Certification 
653 |a Pirates informatiques / Examens / Guides de l'étudiant 
653 |a streaming video / aat 
653 |a Hackers / Examinations / Study guides 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures / Examens / Guides de l'étudiant 
653 |a Piratage informatique / Examens / Guides de l'étudiant 
653 |a Sécurité informatique / Examens / Guides de l'étudiant 
653 |a Streaming video / http://id.loc.gov/authorities/subjects/sh2005005237 
700 1 |a Goodwin, Sophie  |e instructor 
710 2 |a ACI Learning 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/videos/~/9781835886328/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 374 
082 0 |a 005.8 
520 |a The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges.  
520 |a What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step.  
520 |a The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity.  
520 |a Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity