did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

CEH Certified Ethical Hacker Boxed Set

9780071811705

CEH Certified Ethical Hacker Boxed Set

  • ISBN 13:

    9780071811705

  • ISBN 10:

    0071811702

  • Edition: 1st
  • Format: Package
  • Copyright: 04/30/2013
  • Publisher: McGraw-Hill Osborne Media
  • Newer Edition
Sorry, this item is currently unavailable on Knetbooks.com

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

Designed as a comprehensive program for self-study, this money-saving boxed set includes CEH Certified Ethical Hacker All-in-One Exam Guide and CEH Certified Ethical Hacker Practice Exams, and bonus electronic content, all at a discount of 12% off MSRP.

CEH Certified Ethical Hacker Boxed Set provides you with a variety of exam-focused, test prep resources to use in preparation for the Certified Ethical Hacker exam. As a course for study, you can first read CEH Certified Ethical Hacker All-in-One Exam Guide, an in-depth exam review covering all 19 CEH exam domains. Then, you can test what you’ve learned with the more than 500 practice exam questions featured in CEH Certified Ethical Hacker Practice Exams. Next, move on to the bonus electronic content which features an additional practice exam and a Quick Review Guide that can be used as the final piece of exam preparation. This comes in addition to the four electronic practice exams that are included with the Exam Guide and Practice Exams books.

  • Save 12% in comparison to buying the Exam Guide and Practice Exams books separately—Bonus electronic content available only with the boxed set
  • The boxed set provides a low-cost, comprehensive, self-study training solution from a trusted IT security expert
  • Covers all CEH exam topics, including intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, virus creation, and more

Supplemental Materials

Read more