September 27, 2016

New Book ‘Live Hacking’ Benefits Candidates of the Certified Ethical Hacker Course

Live Hacking’ aims to educate IT professionals about hacking techniques and countermeasures. At the same time it can be a valuable resource for those taking the EC-Council’s Certified Ethical Hacker course.


Dr. Ali Jahangiri, a recipient of the Instructor Circle of Excellence Award in 2009 by the EC- Council for his Certified Ethical Hacker (CEH) and Certified Hacking Forensic Investigation (CHFI) workshops, is pleased to announce the launch of his new book ‘Live Hacking’. Not only is to Live Hacking a guide to hacking techniques and countermeasures for ethical hackers, it is also a great resource for those IT professionals who are taking the EC-Council’s
Certified Ethical Hacker course.

The Certified Ethical Hacker (312-50 Exam) course from the International Council of E-Commerce Consultants (EC-Council) is a professional certification program where candidates learn to use the same tools and techniques used by hackers and so learn how to find weaknesses in IT systems and then how to make those systems more secure.

In ethical hacking, the hacker is authorized and trusted to try and penetrate a network to find its vulnerabilities. This is very different from illegal hacking where a criminal tries to access the computers without authorization.

For those interested in ethical hacking and the EC-Council’s 312-50 certification program, Live Hacking is a valuable resource. It is written to instruct and educate IT professionals and so prepare them to protect their computer systems from potential hacking threats.

Live Hacking, which is available from Amazon.com, covers all of the important aspects of ethical hacking and starts with Basic Hacking Terminology and progresses to look at the different areas of hacking and security including Google Hacking, Scanning, Password Cracking, Windows Hacking and hacking on Wireless Networks.
The Live Hacking book also has an accompanying website livehacking.com where you can find a sample chapter on Wireless Networking Hacking and other information about the book including the table of contents, index and more information about Dr. Jahangiri.

Share and Enjoy:
  • Print
  • Digg
  • StumbleUpon
  • del.icio.us
  • Facebook
  • Yahoo! Buzz
  • Twitter
  • Google Bookmarks