| |
| |
The Hack Counter-Hack Training Course Watch, listen, learn-as leading | |
| |
| |
Network security expert Ed Skoudis walks you through today''s most dangerous attacks, and demonstrates your best countermeasures! | |
| |
| |
Covers the five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection | |
| |
| |
Over 4 hours of expert digital video instruction, detailed explanations, and hands-on exercises-a complete learning experience | |
| |
| |
Up-to-the-minute security solutions for both Linux and Windows environments By the security expert who demonstrated hacking to the U.S. Senate! | |
| |
| |
Secure Your Network -- Right Now! | |
| |
| |
Stop struggling with dense textbooks! | |
| |
| |
Watch, listen, and learn the key security techniques you need to know to protect your network and data right now! | |
| |
| |
Ed Skoudis, the top network security consultant who demonstrated hacking to the U.S | |
| |
| |
Senate, will show you exactly how hackers attack your network-and how to fix your vulnerabilities before they can! | |
| |
| |
In over four hours of digital videos straight from Skoudis'' desktop, you''ll learn crucial skills for protecting both Windows and Linux systems, and responding to today''s most dangerous attacks-step-by-step | |
| |
| |
Network security has never been this visual-or this easy! | |
| |
| |
A Digital Seminar from One of the World''s Top Network Security Experts! | |
| |
| |
Master Network security the easy way, by watching digital videos straight from the desktop of expert | |
| |
| |
Network Security consultant | |
| |
| |
Ed Skoudis-more than four hours of personal instruction in all! | |
| |
| |
Covers essential and advanced Network Security techniques! | |
| |
| |
Practical coverage includes Windows, Linux, and TCP/IP vulnerabilities, key hacker and defense tools, attacks, countermeasures, and more | |
| |
| |
Based on the best-selling book from Ed Skoudis, Counter Hack! | |
| |
| |
You''ll learn how to respond to every phase of the hacker''s attack: reconnaissance, scanning, gaining and maintaining access, exploitation, and preventing detection | |
| |
| |
Skoudis presents in-depth descriptions of war dialers, port and firewall scanners, sniffers, IP spoofing, IP fragmentation, denial of service attacks -- plus specific actions you can take to protect yourself today! | |
| |
| |
Bonus! | |
| |
| |
Follow the course from start to finish using the customized print workbook containing all of Ed Skoudis'' presentation slides! | |
| |
| |
Covers all this, and more... All 5 phases of the hacker attack: reconnaissance, scanning, gaining access, maintaining access, and covering tracks | |
| |
| |
Key hacker tools: Building and using your hacker tool analysis laboratory | |
| |
| |
Real-world attacks and countermeasures: password cracking, buffer overflows, session hijacking, Trojan horses, backdoors, and more Windows and Linux | |
| |
| |
Practical techniques and tools for today''s leading server environments | |
| |
| |
Specially Designed for: Anyone responsible for implementing or enhancing network security | |
| |
| |
Webmasters and netadmins who want to master basic security techniques fast -- hands-on Experienced professionals seeking to update and strengthen their security skills | |
| |
| |
Windows and Linux users | |
| |
| |
About the Author | |
| |
| |
Ed Skoudis is Technical Director of Global Integrity, a Reston, VA-based company focusing on the deployment of secure systems | |
| |
| |
His specialty is identifying and resolving security vulnerabilities in Unix, Windows, firewall architectures, and web servers | |
| |
| |
Skoudis is a frequent speaker at major security conferences such as SANS, and has demonstrated hacker techniques for the United States Senate | |
| |
| |
Hear what folks are saying about Ed Skoudis "Extraordinarily valuable material and a wonderful teacher | |
| |
| |
Few network, system or security administrators can do their jobs effectively without the knowledge Ed teaches on this CD | |
| |
| |
Ed is one of the 20 best security teachers in the world | |
| |
| |
How do I know? Because SANS has had more than 220 people try out to be teachers and only 20 have been accepted on the faculty | |
| |
| |
We actually guarantee that our faculty are the best teachers of their subjects in the United States | |
| |
| |
Ed is one of SANS'' most highly rated teachers | |
| |
| |
We hope you''ll come learn from him in live courses held all over the world, and learn from some of the other wonderful teachers at SANS, as well | |
| |
| |
And if you cannot travel to SANS programs, they are offered on line, too | |
| |
| |
See www.sans.org for details." Alan Paller, SANS | |
| |
| |
Other Training Course Products | |
| |
| |
The JavaScript Training Course: A Desktop Seminar from R. Allen Wyke and Jason D. Gilliam Pete Moulton''s | |
| |
| |
A+ Training Course, Second Edition Eben Hewitt''s ColdFusion | |
| |
| |
Training Course Elijah Lovejoy''s ASP | |
| |
| |
Training Course Dan Livingston''s Advanced Macromedia Flash | |
| |
| |
Training Course Lynn Kyle''s Dreamweaver | |
| |
| |
Training Course Lynn Kyle''s Flash Training Course Lynn Kyle''s Photoshop | |
| |
| |
Training Course System Requirements For Windows Windows 98/NT4/2000/XP Internet Explorer 5.5 (included) or higher For Linux RedHat | |
| |
| |
Linux 6.2 or higher Netscape 4.76 - 4.79 (not included) | |
| |
| |
Hardware Requirements 300 MHz processor or higher32 MB disk space/64 MB RAM (128 recommended) | |
| |
| |
CD-ROM drive and sound card support Supporting Applications Required Adobe Acrobat Reader 5.0 (Windows version included) | |
| |
| |
Real Player | |
| |
| |
8 Basic or higher (not included) | |