Preface
Welcome, dear reader! I sincerely hope you’ve found your way to this introduction happy, healthy, and brimming with confidence—or, at the very least, with curiosity. I can see you there, standing in your bookstore and flipping through the book, or sitting in your living room while clicking through virtual pages at some online retailer. And you’re trying to decide whether you’ll buy it—whether this is the book you need for your study guide. You probably have perused the outline, checked the chapter titles—heck, you may have even read the author bio they forced me to write. And now you’ve found your way to this, the preface. Sure, this preface is supposed to be designed to explain the ins and outs of the book—to lay out its beauty and crafty witticisms in such a way that you just can’t resist buying it. But I’m also going to take a moment to explain the realities of the situation and let you know what you’re really getting yourself into.
This exam isn’t a walk in the park. The Certified Ethical Hacker (CEH) certification didn’t gain the reputation and value it has by being easy to attain. It requires clearing a challenging examination that tests more than just simple memorization. Its worth has elevated it to one of the top certifications a technician can attain, and it remains part of DoD 8570’s call for certification on DoD networks. In short, this certification actually means something to employers because they know the effort it takes to attain it. If you’re not willing ...