-
Notifications
You must be signed in to change notification settings - Fork 1
/
Ethical Hacking Courses.json
1 lines (1 loc) · 37.1 KB
/
Ethical Hacking Courses.json
1
{'kind': 'books#volumes', 'totalItems': 549, 'items': [{'kind': 'books#volume', 'id': 'gaKOzgEACAAJ', 'etag': 'w4PKvFDsTwU', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/gaKOzgEACAAJ', 'volumeInfo': {'title': 'Certified Ethical Hacker V11', 'subtitle': 'Study Guide with Practice Questions and Labs', 'authors': ['I. P. Specialist'], 'publishedDate': '2021-05-10', 'description': "About the Author: Nouman Ahmed Khan AWS/Azure/GCP-Architect, CCDE, CCIEx5 (R&S, SP, Security, DC, Wireless), CISSP, CISA, CISM, CRISC, ISO27K-LA is a Solution Architect working with a global telecommunication provider. He works with enterprises, mega-projects, and service providers to help them select the best-fit technology solutions. He also works as a consultant to understand customer business processes and helps select an appropriate technology strategy to support business goals. He has more than fifteen years of experience working with global clients. About this Workbook: TO BEAT A HACKER, YOU NEED TO THINK LIKE A HACKER Learn the fundamentals and become one of the most in-demand cyber security professional in 2021: an Ethical Hacker! Your only, most comprehensive and all-in-one resource written by cyber security experts to pass the EC-Council's Certified Ethical Hacker (CEH) v11 exam on the first attempt with the best scores. Our most popular title just got fully updated based on the cutting-edge technological innovations and latest developments in cybersecurity field. What's New in this study guide: Emerging attack vectors. Enumeration deep dive. Malware reverse engineering. Emerging Cloud Computing technologies. Advanced penetration tests for web applications. Operational technology (OT). WPA3 This is a highly practical, intensive, yet comprehensive study guide that will teach you to become a REAL White Hat HACKER!!! The book is for anyone who would like to master the art of ethical hacking. Learn the best ethical hacking practices and techniques to prepare for CEH certification with real-world examples. Along with the most current CEH content, the book also contains strong study aides to support your exam preparation Complete CEH blueprint coverage 150+ Real practice questions 15+ Detailed Mind-maps for easy explanations & memorization 30+ Hands-on ethical hacking practice labs. Exam tips. Pass guarantee. Learn the best ethical hacking practices and techniques to prepare for CEHv11 certification with real-world examples, tools and techniques available in the market. Even after exam, this authoritative guide will serve as your go-to-reference during your professional career. With the help of this updated version of the book, you will learn about the most powerful and latest hacking techniques such as, Footprinting & Reconnaissance Scanning Networks Enumeration Vulnerability Analysis System Hacking Malware Threats Sniffing Social Engineering Denial-of-Service (DoS) Session Hijacking Evading IDS, Firewalls, and Honeypots Hacking Web Servers Hacking Web Applications SQL Injection Hacking Wireless Networks Hacking Mobile Applications IoT Hacking Cloud Computing Cryptography", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9798501925922'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 611, 'printType': 'BOOK', 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=gaKOzgEACAAJ&dq=title:Ethical+Hacking+Courses&hl=&cd=1&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=gaKOzgEACAAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Certified_Ethical_Hacker_V11.html?hl=&id=gaKOzgEACAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=gaKOzgEACAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Operational technology (OT). WPA3 This is a highly practical, intensive, yet comprehensive study guide that will teach you to become a REAL White Hat HACKER!!! The book is for anyone who would like to master the art of ethical hacking.'}}, {'kind': 'books#volume', 'id': 'wR9FAgAAQBAJ', 'etag': 'dLxiGu4qDT4', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/wR9FAgAAQBAJ', 'volumeInfo': {'title': 'Certified Ethical Hacker (CEH) Cert Guide', 'subtitle': 'Cert Ethi Hack (CEH Cert Guid', 'authors': ['Michael Gregg'], 'publisher': 'Pearson IT Certification', 'publishedDate': '2013-12-02', 'description': "This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CEH v8 exam success with this cert guide from Pearson IT Certification, a leader in IT certification learning. Master CEH exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. You'll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. This EC-Council authorized study guide helps you master all the topics on the CEH v8 (312-50) exam, including: Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux and automated assessment tools Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Physical security and social engineering", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9780133413021'}, {'type': 'ISBN_10', 'identifier': '0133413020'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 704, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4.5, 'ratingsCount': 5, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '2.185.181.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=wR9FAgAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=wR9FAgAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=wR9FAgAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=2&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=wR9FAgAAQBAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Certified_Ethical_Hacker_CEH_Cert_Guide.html?hl=&id=wR9FAgAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED_FOR_ACCESSIBILITY', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=wR9FAgAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.'}}, {'kind': 'books#volume', 'id': '2mphDwAAQBAJ', 'etag': 'CJYaoXeefGI', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/2mphDwAAQBAJ', 'volumeInfo': {'title': 'LEARN HACKING WITH ETHICS', 'authors': ['Abhishek Ninaniya'], 'publisher': 'Lulu.com', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781387884247'}, {'type': 'ISBN_10', 'identifier': '1387884247'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 112, 'printType': 'BOOK', 'averageRating': 5, 'ratingsCount': 8, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.0.2.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=2mphDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=2mphDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=2mphDwAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=3&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=2mphDwAAQBAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/LEARN_HACKING_WITH_ETHICS.html?hl=&id=2mphDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/LEARN_HACKING_WITH_ETHICS-sample-pdf.acsm?id=2mphDwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=2mphDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Hacking is a word that most people have heard but there are few who actually know how it works. Hacking requires skills, knowledge, training and practice before you call yourself a hacker and that's where this book will help you.'}}, {'kind': 'books#volume', 'id': 'MXlFzQEACAAJ', 'etag': 'B78W3VLfiJs', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/MXlFzQEACAAJ', 'volumeInfo': {'title': 'CEH V10 Certified Ethical Hacker Practice Exams & Dumps', 'subtitle': '700+ Exam Questions with Their Answers for CEH V10 Exam Vol 2', 'authors': ['James Bolton'], 'publishedDate': '2020-01-06', 'description': 'CEH can be said as a certified ethical hacker. This certification is a professional certificate and it is awarded by the EC council (international council of E-commerce consultant). An ethical hacker is a name that is given to penetration testing/ tester. An ethical hacker is employed by the organization with full trust with the employer (ethical hacker) for attempting the penetrating the computer system in order to find and fix all the computer security vulnerabilities. Computer security vulnerabilities also include illegal hacking (gaining authorization to some other computer systems). These activities are criminal activities in almost all countries. Doing a penetrating test in a particular system with the permission of the owner is done and also possible except in Germany. This certification validates the knowledge and skills that are required on how to look for the vulnerabilities as well as weaknesses in a particular computer. This CEH v10 Practice Questions & Exam dumps book contains 700+ questions to help individuals who are preparing to conduct this exam, I have tried my best to share my expertise to help you pass the exams in your very first attempt, This book can also be used for people who have done their CEH already & want to practice their skills About Author James Bolton, CISM, CEH, is a highly qualified IT expert having years of experience in the fields of Information Technology, and cybersecurity. He has worked for several large organizations and has held various roles of a senior instructor, network engineer, programmer, and consultant. Currently, he is serving as a senior security engineer in a well-known organization located in Australia. He also has 1000 of students on Udemy & Coursera under his institution', 'industryIdentifiers': [{'type': 'ISBN_10', 'identifier': '1656420635'}, {'type': 'ISBN_13', 'identifier': '9781656420633'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 184, 'printType': 'BOOK', 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=MXlFzQEACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=MXlFzQEACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=MXlFzQEACAAJ&dq=title:Ethical+Hacking+Courses&hl=&cd=4&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=MXlFzQEACAAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/CEH_V10_Certified_Ethical_Hacker_Practic.html?hl=&id=MXlFzQEACAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=MXlFzQEACAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This CEH v10 Practice Questions & Exam dumps book contains 700+ questions to help individuals who are preparing to conduct this exam, I have tried my best to share my expertise to help you pass the exams in your very first attempt, This ...'}}, {'kind': 'books#volume', 'id': 'aSigDQAAQBAJ', 'etag': '096fZT4MrSE', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/aSigDQAAQBAJ', 'volumeInfo': {'title': 'Certified Ethical Hacker (CEH) Foundation Guide', 'authors': ['Sagar Ajay Rahalkar'], 'publisher': 'Apress', 'publishedDate': '2016-11-29', 'description': "Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781484223253'}, {'type': 'ISBN_10', 'identifier': '148422325X'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 207, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '2.5.4.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=aSigDQAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=aSigDQAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=aSigDQAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=5&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=aSigDQAAQBAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Certified_Ethical_Hacker_CEH_Foundation.html?hl=&id=aSigDQAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Certified_Ethical_Hacker_CEH_Foundation-sample-epub.acsm?id=aSigDQAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Certified_Ethical_Hacker_CEH_Foundation-sample-pdf.acsm?id=aSigDQAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=aSigDQAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'In this book you will: Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the ...'}}, {'kind': 'books#volume', 'id': 'WbNOCAAAQBAJ', 'etag': '3taotzfRC/8', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/WbNOCAAAQBAJ', 'volumeInfo': {'title': 'A First Course In Ethical Hacking', 'authors': ['Herman van Heerden'], 'publisher': 'Lulu Press, Inc', 'publishedDate': '2014-11-07', 'description': 'As a youngster, the romance of hacking took hold of my imagination. Computers were always my passion, and the myth (legend?) of kids who moved a satellite by messing around were well known and the subject of daydreaming. But where to begin? While still working a student job, I got my hands on the “Hackers Handbook". To put things in perspective, the internet was young, Microsoft did not believe in CD-ROMs and “Do you Netscape” was the web browsing term. Modems were the way you connected. I printed the entire “Handbook” on a dot matrix printer, ready to enrich myself with the knowledge of hackers. The text was about BAUD, modems and the protocols used by BBSs. I found the reading as exiting as a student who got his hands on a banned copy of The Little Red Book. But the content proved rather less than insightful. Yes, hacking was different when the words were uttered “the beauty of the baud” (from the original Hackers Manifesto), but times have changed and changed again in a very short period of time.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781300920632'}, {'type': 'ISBN_10', 'identifier': '1300920637'}], 'readingModes': {'text': True, 'image': True}, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.1.2.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=WbNOCAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=WbNOCAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=WbNOCAAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=6&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=WbNOCAAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=WbNOCAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 3.17, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 3.17, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=WbNOCAAAQBAJ&rdid=book-WbNOCAAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 3170000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 3170000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/A_First_Course_In_Ethical_Hacking-sample-epub.acsm?id=WbNOCAAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/A_First_Course_In_Ethical_Hacking-sample-pdf.acsm?id=WbNOCAAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=WbNOCAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'The text was about BAUD, modems and the protocols used by BBSs. I found the reading as exiting as a student who got his hands on a banned copy of The Little Red Book. But the content proved rather less than insightful.'}}, {'kind': 'books#volume', 'id': 'ATiZDwAAQBAJ', 'etag': '5zxI9ODby0w', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/ATiZDwAAQBAJ', 'volumeInfo': {'title': 'CEH v10 Certified Ethical Hacker Study Guide', 'authors': ['Ric Messier'], 'publisher': 'John Wiley & Sons', 'publishedDate': '2019-06-25', 'description': 'As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781119533191'}, {'type': 'ISBN_10', 'identifier': '1119533198'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 592, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4.5, 'ratingsCount': 2, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.1.1.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=ATiZDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=ATiZDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=ATiZDwAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=7&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=ATiZDwAAQBAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/CEH_v10_Certified_Ethical_Hacker_Study_G.html?hl=&id=ATiZDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/CEH_v10_Certified_Ethical_Hacker_Study_G-sample-pdf.acsm?id=ATiZDwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=ATiZDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles.'}}, {'kind': 'books#volume', 'id': 'B0zHDwAAQBAJ', 'etag': 'fnT8jYaQQRY', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/B0zHDwAAQBAJ', 'volumeInfo': {'title': 'CEH v10 Certified Ethical Hacker Practice Exams & Dumps', 'subtitle': '700+ Exam Questions with their Answers for CEH v10 Exam', 'authors': ['James Bolton'], 'publisher': 'Publicancy Ltd', 'publishedDate': '2019-10-14', 'description': 'CEH can be said as a certified ethical hacker. This certification is a professional certificate and it is awarded by the EC council (international council of E-commerce consultant). An ethical hacker is a name that is given to penetration testing/ tester. An ethical hacker is employed by the organization with full trust with the employer (ethical hacker) for attempting the penetrating the computer system in order to find and fix all the computer security vulnerabilities. Computer security vulnerabilities also include illegal hacking (gaining authorization to some other computer systems). These activities are criminal activities in almost all countries. Doing a penetrating test in a particular system with the permission of the owner is done and also possible except in Germany. This certification validates the knowledge and skills that are required on how to look for the vulnerabilities as well as weaknesses in a particular computer.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781699625224'}, {'type': 'ISBN_10', 'identifier': '1699625220'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 183, 'printType': 'BOOK', 'categories': ['Education'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=B0zHDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=B0zHDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=B0zHDwAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=8&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=B0zHDwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=B0zHDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 5.66, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 5.66, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=B0zHDwAAQBAJ&rdid=book-B0zHDwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 5660000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 5660000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/CEH_v10_Certified_Ethical_Hacker_Practic-sample-pdf.acsm?id=B0zHDwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=B0zHDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'CEH can be said as a certified ethical hacker.'}}, {'kind': 'books#volume', 'id': '9i_1DwAAQBAJ', 'etag': 'ZXlbHG+lAJM', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/9i_1DwAAQBAJ', 'volumeInfo': {'title': 'Hands on Hacking', 'subtitle': 'Become an Expert at Next Gen Penetration Testing and Purple Teaming', 'authors': ['Matthew Hickey', 'Jennifer Arcuri'], 'publisher': 'John Wiley & Sons', 'publishedDate': '2020-09-16', 'description': "A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781119561453'}, {'type': 'ISBN_10', 'identifier': '1119561450'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 608, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4.5, 'ratingsCount': 11, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.1.1.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=9i_1DwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=9i_1DwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=9i_1DwAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=9&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=9i_1DwAAQBAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Hands_on_Hacking.html?hl=&id=9i_1DwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Hands_on_Hacking-sample-pdf.acsm?id=9i_1DwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=9i_1DwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike.'}}, {'kind': 'books#volume', 'id': 'DeAEAAAAQBAJ', 'etag': 'j/9BDb8LdEs', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/DeAEAAAAQBAJ', 'volumeInfo': {'title': 'Ethical Hacking and Countermeasures: Attack Phases', 'authors': ['EC-Council'], 'publisher': 'Cengage Learning', 'publishedDate': '2009-09-22', 'description': "The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781111786984'}, {'type': 'ISBN_10', 'identifier': '1111786984'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 352, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4.5, 'ratingsCount': 3, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=DeAEAAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=DeAEAAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=DeAEAAAAQBAJ&printsec=frontcover&dq=title:Ethical+Hacking+Courses&hl=&cd=10&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=DeAEAAAAQBAJ&dq=title:Ethical+Hacking+Courses&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Ethical_Hacking_and_Countermeasures_Atta.html?hl=&id=DeAEAAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=DeAEAAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems.'}}]}