Publisher's Synopsis
The Hack Counter-Hack Training CourseWatch, listen, learn-as leading Network security expert Ed Skoudis walks you through today's most dangerous attacks, and demonstrates your best countermeasures! Covers the five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection Over 4 hours of expert digital video instruction, detailed explanations, and hands-on exercises-a complete learning experience Up-to-the-minute security solutions for both Linux and Windows environments By the security expert who demonstrated hacking to the U. S. Senate! SECURE YOUR NETWORK -- RIGHT NOW! Stop struggling with dense textbooks! Watch, listen, and learn the key security techniques you need to know to protect your network and data right now! Ed Skoudis, the top network security consultant who demonstrated hacking to the U. S. Senate, will show you exactly how hackers attack your network-and how to fix your vulnerabilities before they can! In over four hours of digital videos straight from Skoudis' desktop, you'll learn crucial skills for protecting both Windows and Linux systems, and responding to today's most dangerous attacks-step-by-step.;Network security has never been this visual-or this easy! A DIGITAL SEMINAR FROM ONE OF THE WORLD'S TOP NETWORK SECURITY EXPERTS! Master Network security the easy way, by watching digital videos straight from the desktop of expert Network Security consultant Ed Skoudis-more than four hours of personal instruction in all! Covers essential and advanced Network Security techniques! Practical coverage includes Windows, Linux, and TCP/IP vulnerabilities, key hacker and defense tools, attacks, countermeasures, and more. Based on the best-selling book from Ed Skoudis, Counter Hack! You'll learn how to respond to every phase of the hacker's attack: reconnaissance, scanning, gaining and maintaining access, exploitation, and preventing detection. Skoudis presents in-depth descriptions of war dialers, port and firewall scanners, sniffers, IP spoofing, IP fragmentation, denial of service attacks -- plus specific actions you can take to protect yourself today! BONUS! Follow the course from start to finish using the customized print workbook containing all of Ed Skoudis' presentation slides! Covers all this, and more...All 5 phases of the hacker attack: reconnaissance, scanning, gaining access,;His specialty is identifying and resolving security vulnerabilities in Unix, Windows, firewall architectures, and web servers. Skoudis is a frequent speaker at major security conferences such as SANS, and has demonstrated hacker techniques for the United States Senate. Hear what folks are saying about Ed Skoudis" Extraordinarily valuable material and a wonderful teacher. Few network, system or security administrators can do their jobs effectively without the knowledge Ed teaches on this CD. Ed is one of the 20 best security teachers in the world. How do I know? Because SANS has had more than 220 people try out to be teachers and only 20 have been accepted on the faculty. We actually guarantee that our faculty are the best teachers of their subjects in the United States. Ed is one of SANS' most highly rated teachers. We hope you'll come learn from him in live courses held all over the world, and learn from some of the other wonderful teachers at SANS, as well. And if you cannot travel to SANS programs, they are offered on line, too. See www. sans. org for details. " Alan Paller, SANS Other Training Course Products The JavaScript Training Course: A Desktop Seminar from R.;Allen Wyke and Jason D. Gilliam Pete Moulton's A+ Training Course, Second Edition Eben Hewitt's ColdFusion Training Course Elijah Lovejoy's ASP Training Course Dan Livingston's Advanced Macromedia Flash Training Course Lynn Kyle's Dreamweaver Training Course Lynn Kyle's Flash Training Course Lynn Kyle's Photoshop Training Course System Requirements For Windows Windows 98/NT4/2000/XP Internet Explorer 5. 5 (included) or higher For LinuxRedHat Linux 6. 2 or higher Netscape 4. 76 - 4. 79 (not included) Hardware Requirements300 MHz processor or higher32 MB disk space/64 MB RAM (128 recommended) CD-ROM drive and sound card support Supportin