Torrent details for "CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Editi…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
19.2 MB
Info Hash:
4119161632D7E3D4CCD2B3D863B5D845F9BC4884
Added By:
Added:
June 1, 2023, 10:58 p.m.
Stats:
|
(Last updated: July 11, 2025, 12:35 a.m.)
Name
DL
Uploader
Size
S/L
Added
-
26.5 MB
[21
/
1]
2023-12-11
| Uploaded by FreeCourseWeb | Size 26.5 MB | Health [ 21 /1 ] | Added 2023-12-11 |
-
562.6 MB
[21
/
9]
2025-10-14
| Uploaded by FlexiStore | Size 562.6 MB | Health [ 21 /9 ] | Added 2025-10-14 |
-
11.5 MB
[32
/
32]
2023-06-24
| Uploaded by hakimyous | Size 11.5 MB | Health [ 32 /32 ] | Added 2023-06-24 |
-
26.5 MB
[16
/
11]
2023-12-05
| Uploaded by indexFroggy | Size 26.5 MB | Health [ 16 /11 ] | Added 2023-12-05 |
NOTE
SOURCE: CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition by Matt Walker
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.
Covers all exam topics, including:
•Ethical hacking fundamentals
•Reconnaissance and footprinting
•Scanning and enumeration
•Sniffing and evasion
•Attacking a system
•Hacking web servers and applications
•Wireless network hacking
•Security in cloud computing
•Trojans and other attacks
•Cryptography
•Social engineering and physical security
•Penetration testing
×



