
The Hack-Counter Hack Training Course
A Network Security Seminar from Ed Skoudis
Résumé
The Hack Counter-Hack Training Course
- Watch, listen, learn-as leading Network security expert Ed Skoudis walks you through today's most dangerous attacks, and demonstrates your best countermeasures!
- Covers the five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection
- Over 4 hours of expert digital video instruction, detailed explanations, and hands-on exercises-a complete learning experience
- Up-to-the-minute security solutions for both Linux and Windows environments
- By the security expert who demonstrated hacking to the U.S. Senate!
SECURE YOUR NETWORK -- RIGHT NOW!
Stop struggling with dense textbooks! Watch, listen, and
learn the key security techniques you need to know to
protect your network and data right now! Ed Skoudis, the
top network security consultant who demonstrated hacking to
the U.S. Senate, will show you exactly how hackers attack
your network-and how to fix your vulnerabilities before
they can! In over four hours of digital videos straight
from Skoudis' desktop, you'll learn crucial skills for
protecting both Windows and Linux systems, and responding
to today's most dangerous attacks-step-by-step. Network
security has never been this visual-or this easy!
A DIGITAL SEMINAR FROM ONE OF THE WORLD'S TOP
NETWORK SECURITY EXPERTS!
Master Network security the easy way, by watching digital
videos straight from the desktop of expert Network Security
consultant Ed Skoudis-more than four hours of personal
instruction in all!
Covers essential and advanced Network Security techniques! Practical coverage includes Windows, Linux, and TCP/IP vulnerabilities, key hacker and defense tools, attacks, countermeasures, and more.
Based on the best-selling book from Ed Skoudis, Counter Hack!
You'll learn how to respond to every phase of the hacker's attack: reconnaissance, scanning, gaining and maintaining access, exploitation, and preventing detection. Skoudis presents in-depth descriptions of war dialers, port and firewall scanners, sniffers, IP spoofing, IP fragmentation, denial of service attacks -- plus specific actions you can take to protect yourself today!
BONUS!
Follow the course from start to finish using the customized
print workbook containing all of Ed Skoudis' presentation
slides!
Covers all this, and more...
All 5 phases of the hacker attack: reconnaissance,
scanning, gaining access, maintaining access, and covering
tracks Key hacker tools: Building and using your hacker
tool analysis laboratory Real-world attacks and
countermeasures: password cracking, buffer overflows,
session hijacking, Trojan horses, backdoors, and more
Windows and Linux: Practical techniques and tools for
today's leading server environments
SPECIALLY DESIGNED FOR:
Anyone responsible for implementing or enhancing network
security Webmasters and netadmins who want to master basic
security techniques fast -- hands-on Experienced
professionals seeking to update and strengthen their
security skills Windows and Linux users
System Requirements
For Windows
- Windows 98/NT4/2000/XP
- Internet Explorer 5.5 (included) or higher
- RedHat® Linux 6.2 or higher
- Netscape 4.76 - 4.79 (not included)
- 300 MHz processor or higher32 MB disk space/64 MB RAM (128 recommended)
- CD-ROM drive and sound card support Supporting Applications Required
- Adobe Acrobat Reader 5.0 (Windows version included)
- Real Player® 8 Basic or higher (not included)
L'auteur - Edward Skoudis
Edward Skoudis is Vice President of Security Strategy for Predictive Systems, a leading independent infrastructure network consulting company, helping global enterprises and service providers harness the power of network technology. His specialty is identifying and resolving security vulnerabilities in UNIX, Windows, firewall architectures, and Web servers. Skoudis is a frequent speaker at major security conferences such as SANS and has demonstrated hacker techniques for the United States Senate.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Edward Skoudis |
Parution | 08/07/2002 |
Nb. de pages | 106 |
Format | 18,5 x 24 |
Couverture | Broché |
Poids | 410g |
Intérieur | Noir et Blanc |
EAN13 | 9780130477293 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet