This comprehensive, step-by-step video training course will empower every network and system administrator to defend their network assets, whether or not they have security experience. Through more than 3 hours of desktop digital video and audio, security expert Ed Skoudis shows how to protect both Windows and Linux systems, offering insider's descriptions of today's most destructive hacker tools, and proven, step-by-step countermeasures. Watch, listen, and learn as Skoudis presents the hacker's view of networks and their ...
Read More
This comprehensive, step-by-step video training course will empower every network and system administrator to defend their network assets, whether or not they have security experience. Through more than 3 hours of desktop digital video and audio, security expert Ed Skoudis shows how to protect both Windows and Linux systems, offering insider's descriptions of today's most destructive hacker tools, and proven, step-by-step countermeasures. Watch, listen, and learn as Skoudis presents the hacker's view of networks and their vulnerabilities, and introduces all five phases of hacking: reconnaissance (targeting of a network); scanning for vulnerabilities; gaining access and exploiting the system; maintaining access; and preventing detection. Discover today's most dangerous attack scenarios and widely-used hacker tools, including war dialers, port scanners, firewall scanners, sniffers, and session hijackers -- and learn today's most effective countermeasures. Understand techniques such as IP spoofing, IP fragmentation, and denial of service attacks -- and learn exactly how to detect and prevent them. Then, practice with the hands-on projects included on CD-ROM -- and compare your results against Ed Skoudis' expert solutions. Includes a custom workbook containing all video presentation materials!
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!