The EC-Council | Press Ethical Hacking and Countermeasures Series is
comprised of five books covering a broad base of topics in offensive
network security, ethical hacking, and network defense and
countermeasures. The content of this series is designed to immerse the
reader into an interactive environment where they will be shown how to
scan, test, hack and secure information systems. With the full series of
books, the reader will gain in-depth knowledge and practical experience
with essential security systems, and
become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.
become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.
No comments:
Post a Comment