Request for consultation

Thanks for your request. You’ll soon be chatting with a consultant to get the answers you need.
{{formPostErrorMessage.message}} [{{formPostErrorMessage.code}}]
First Name is required. 'First Name' must contain at least 0 characters 'First Name' cannot exceed 0 characters Please enter a valid First Name
Last Name is required. 'Last Name' must contain at least 0 characters 'Last Name' cannot exceed 0 characters Please enter a valid Last Name
Institution is required.
Discipline is required.
Why are you contacting us today? is required. 'Why are you contacting us today?' must contain at least 0 characters 'Why are you contacting us today?' cannot exceed 0 characters Please enter a valid Why are you contacting us today?

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH) 2nd Edition


  • Published

Textbook Only Options

Traditional eBook and Print Options

{{collapseContainerClosed['9781305883468_txtbook_0'] ? 'Show More' : 'Show Less'}}

  • STARTING AT $41.49

  • ISBN-10: 133742367X
  • ISBN-13: 9781337423670
  • STARTING AT $104.49

  • ISBN-10: 1305883462
  • ISBN-13: 9781305883468
  • Bookstore Wholesale Price $112.50
  • RETAIL $149.95


The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C|EH certification exam from EC-Council.


The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker course, Computer Hacking Forensics Investigator program, License Penetration Tester program and various other programs offered in over 60 countries around the globe. These certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, and the US Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) certifying EC-Council Network Security Administrator (ENSA) program for meeting the 4011 training standard for information security professionals.
  • Hands-On Projects encourage learners to apply the knowledge they have gained after finishing the chapter. Files for the Hands-On Projects can be found in the MindTap or on the Student Resource Center.
  • Exposes the reader to security checklists that can aid in auditing an organization's information assets; tools which will check for vulnerabilities that can be exploited; and above all a methodology to assess the security posture of an organization by doing a penetration test against it.
  • The C
  • EH body of knowledge represents detailed contributions from many security experts, academicians, industry practitioners and the security community at large.
  • Includes all the need-to-know information about hacking: tools, vulnerabilities, how to solve them and prevent hacking from happening.
  • Free instructor resources available online, including an Instructor’s Manual, Cognero test banks, PowerPoint presentations, additional hands-on activities and labs, assessment activities, and a final exam.

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH)


1. Hacking Wireless Networks.
2. Physical Security.
3. Evading IDS, Firewalls and Detecting Honeypots.
4. Hacking Routers and Cable Modems.
5. Linux Hacking.
6. Mac OS X Hacking.
7. Hacking Mobile Phones, PDAs, and Handheld Devices.
8. Hacking Portable Devices.
9. Cryptography.

Cengage provides a range of supplements that are updated in coordination with the main title selection. For more information about these supplements, contact your Learning Consultant.


Instructor's Web Site

ISBN: 9781305883789
Everything you need for your course in one place! This collection of product-specific lecture and class tools is available online via the instructor resource center at You'll be able to access and download materials such as PowerPoint presentations, images, instructor’s manual, videos, and more.

Cengage Learning Testing, powered by Cognero® Instant Access

ISBN: 9781305883802
Cengage Learning Testing Powered by Cognero® is a flexible, online system that allows you to: import, edit, and manipulate content from the text's test bank or elsewhere, including your own favorite test questions; create multiple test versions in an instant; and deliver tests from your LMS, your classroom, or wherever you want.