Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Record 36 of 210
Results Page:  Previous Next

Title Certified ethical hacker (CEH) v.12. [O'Reilly electronic resource]

Edition [First edition].
Publication Info. [Place of publication not identified] : Packt Publishing, 2024.
QR Code
Description 1 online resource (1 video file (48 hr., 19 min.)) : sound, color.
Playing Time 481900
Description digital rdatr
video file rdaft
Instructional films lcgft
Performer ACI Learning, Daniel Lowrie, Sophie Goodwin, instructors.
Summary The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
Subject Computer security -- Examinations -- Study guides.
Penetration testing (Computer security) -- Examinations -- Study guides.
Hacking -- Examinations -- Study guides.
Computer networks -- Security measures -- Examinations -- Study guides.
Electronic data processing personnel -- Certification.
Hackers -- Examinations -- Study guides.
Sécurité informatique -- Examens -- Guides de l'étudiant.
Tests d'intrusion -- Examens -- Guides de l'étudiant.
Piratage informatique -- Examens -- Guides de l'étudiant.
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Examens -- Guides de l'étudiant.
Pirates informatiques -- Examens -- Guides de l'étudiant.
Genre Instructional films.
Nonfiction films.
Internet videos.
Films de formation.
Films autres que de fiction.
Vidéos sur Internet.
Added Author Lowrie, Daniel, instructor.
Goodwin, Sophie, instructor.
ACI Learning, instructor.
Packt Publishing, publisher.
ISBN 9781835886328 (electronic video)
1835886329 (electronic video)
Patron reviews: add a review
Click for more information
EVIDEO
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information