Fishpond Gift Vouchers - Let them choose!

Shop over a million Toys in our Huge New Range

Certified Ethical Hacker (CEH) Foundation Guide
By

Rating

Product Description
Product Details

Table of Contents

PART I
Chapter 1: Operating System BasicsChapter Goal: To introduce the basic concepts of Operating Systems from hacking perspective.No of pages:
Chapter 2: Database BasicsChapter Goal: Basic concepts of Databases from hacking perspective.No of pages:
Chapter 3: Networking BasicsChapter Goal: Basic Networking concepts from hacking perspective.No of pages:
Chapter 4: Programming BasicsChapter Goal: To introduce basic programming & scripting concepts which are required for hacking and security.No of pages:
Chapter 5: Virtualization and Cloud BasicsChapter Goal: Overview of basic concepts of Cloud & Virtualization from security perspective.No of pages
PART II
Chapter 1: Basics of Information SecurityChapter Goal: Concepts and the building blocks of Information SecurityNo of pages:
Chapter 2: Penetration TestingChapter Goal: Introduce to the penetration testing lifecycle and key terminologyNo of pages:
Chapter 3: Information GatheringChapter Goal: Highlight various techniques of information gathering required for penetration testing.No of pages:
Chapter 4: Hacking BasicsChapter Goal: Introduction of various concepts related to system hacking.No of pages:
Chapter 5: Web Application HackingChapter Goal: Provide an overview of Web Application vulnerabilities and Application Security testingNo of pages:
Chapter 6: Wireless HackingChapter Goal: Introduction to various key concepts of Wireless hackingNo of pages:
Chapter 7: Hacking Mobile platformsChapter Goal: Highlight vulnerabilities and security issues in Mobile Platforms, Mobile hacking concepts. No of pages:
Chapter 8: IDS, Firewalls & Honeypots evasionChapter Goal: Introduction to security appliances like IDS, IPS, Honeypots and various techniques to bypass and evade their security.No of pages:
Chapter 9: CryptographyChapter Goal: Introduction to key concepts related to Cryptography.No of pages:
Appendix A: Career paths available after CEHAppendix B: Information Security interview questions

About the Author

Sagar Rahalkar, is a seasoned information security professional having more than 9 years of comprehensive experience in various verticals of Information Security. His domain expertise is mainly into Cyber Crime Investigations, Digital Forensics, Application Security, Vulnerability Assessment & Penetration Testing, Compliance for Mandates & Regulations, IT GRC etc. He holds a Master's Degree in Computer Science and several Industry recognized certifications like Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), PRINCE2 to name a few. He has been closely associated with Indian Law Enforcement agencies for over 4 years, dealing with digital crime investigations and related trainings for officers and received several awards and appreciations from senior officials from Police and Defense Organizations in India. He possesses the right "security aptitude" to face challenges of upcoming technologies and address risks in the dynamic threat landscape.
Sagar has also been one of the reviewers for multiple books like "Metasploit Penetration Testing Cookbook, Second Edition", "Mastering Metasploit" by Packt Publishing. Apart from this, he is also associated with several other online Information Security publications, both as an author as well as a reviewer.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Security » Networking
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Certified Ethical Hacker (CEH) Foundation Guide on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top