Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Buy Used
$6.21
+ $3.99 shipping
Used: Very Good | Details
Sold by hippo_books
Condition: Used: Very Good
Comment: Very Good: Cover and pages show some wear from reading and storage.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 7 images

The Hack-Counter Hack Training Course Paperback – 2002

3.6 out of 5 stars 13 customer reviews

See all formats and editions Hide other formats and editions
Price
New from Used from
Paperback, 2002
"Please retry"
$91.32 $6.21

Top 20 lists in Books
Top 20 lists in Books
View the top 20 best sellers of all time, the most reviewed books of all time and some of our editors' favorite picks. Learn more
NO_CONTENT_IN_FEATURE


Product Details

  • Paperback: 120 pages
  • Publisher: PRENTICE HALL-MICROSOFT (2002)
  • Language: English
  • ISBN-10: 013047729X
  • ISBN-13: 978-0130477293
  • Product Dimensions: 7.3 x 1.4 x 9.6 inches
  • Shipping Weight: 14.4 ounces
  • Average Customer Review: 3.6 out of 5 stars  See all reviews (13 customer reviews)
  • Amazon Best Sellers Rank: #3,001,842 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

This is a review of a video lecture series targetted at network administrators and people who are looking to start a career in the security field. It will also go down well with people who are pressed for time, as you can handle each section of the course on your own time, something that invariably doesn't happen with a book.
The lecturer, Ed Skoudis, is very well known in the security community and regularly lectures for [...] - one of the premier information security sites on the web. The course consists of two CD's which have videos broken down into different sections, also included on the CDs are all the tools he demonstrates during the lectures, as well as a sample chapter from a book he has recently authored.
If that were not enough, you also get a workbook to go along with the lectures so that you can revise important information and write your own notes alongside the key points.
The whole approach of the CD is very hands-on, which is a refreshing change from the drab texts that we've all poured over at some point or the other. The course starts from scratch and in the introductory lecture, Skoudis walks you through a full installation of both Windows XP and Redhat Linux 7.2 on two separate machines so that you can have your own laboratory to try the tools out.
Whenever he is demonstrating something, the camera focuses right in on his monitor so that you can see exactly what he is typing at each screen. After you've set up the two systems, he talks you through getting them properly networked, and gives you a few tips on the hardware to buy when setting up your lab.
The rest of the lectures cover the five phases an attacker will use to get into your network.
Read more ›
Comment 6 of 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
This is an excellent tool to help you get started on network security. Skoudis gives excellent short lectures on many topics. Some reviewers don't like this program because they already know what he describes and demonstrates. This is for beginners! You can take a class at a community college or get this training course. I bet you will get your friends right away and show them the demonstration of using ... software to gain information about web sites. The software is on the disk or free on the Internet. If you want to start learning security fast, get this course and his Counter Hack book.
Comment 9 of 10 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
I thought the different things that were presented were great, but the author spends way to much time on unrelated worthless information such as how to install windows NT, how to install software... He just wastes alot of time and doesn't provide nearly as much content as expected for the price. The author should know that people in the security field aren't beginners and can install software and or NT...I think they claim 6 hours of video, more like 2 hours of information padded with 4 hours of wasted time.
Comment 8 of 9 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Setup is extremely easy. No need to install lots of EXEs etc. stuffs like other Computer-Based Training (CBT) programs. You can actually just slide in the CD and jump start the course. It's video based. You can sit back and relax to watch Ed Skoudis explaining how the hacking works and how-to counter them via his video and tools demo. This package does come with some goodies hacking tools in the CD ROM, both Windows and Linux based. Content-wise is pretty good but short. It covers basic technique for information gathering, buffer overflow attack, protocol sniffer & spoofing, etc. Overall, it is highly recommended. Hope Ed will publish more advanced Hack Counter-Hack series of CBT in future.
Comment 4 of 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
This training course is excellent for those who take the time to do everything in this book from cover to cover...lesson by lesson...if you do not know linux you may get into trouble when compiling certain required modules only to find out that there were compilation errors suggesting missing symbolic links and or missing libraries e.g. GTK which then have to be downloaded and installed...too much time was spent on the elementary and not enough on the advanced...overall excellent.
Comment 3 of 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By A Customer on November 7, 2002
I am fairly new to the security field but carry over a background of administration and support. I found this to be of little use to the stuff I have already found on the net in only 2 weeks. At this price it is way to expensive. Also recommendation for later editions is more focus on the actual demonstrations and put in some scenarios and NOT just watching someone sit there and talk. I don't care how many hours of video there is, when its 80% power point slides and someone talking its just padding.
Comment 5 of 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
With quite a bit of experience in networking and security, I bought this on something of a lark. just to see how it was done and what was presented. I would call it a security *survey* class. It assumes a certain base of knowledge with both Windows and Linux which is fine. The information when presented is clear enough but not quite enough detail for someone with good working knowledge already. But, even with my level of knowledge, I found a few new things to learn. The nice thing about this type of presentation is it's a great way to get you off your butt and actually try of the utilities. In my case, I also fired up my sniffer and got some nice trace files of various attacks, scans and other nasties. It's a controlled way to do this, the files are clean and you dont worry about something hidden being inside the file which can be the case just downloading this stuff from the web.
I really disliked having to install RealAudio back on my system just to play the files, I would have liked to see a choice between Windows Media, RealAudio and QuickTime (my personal choice). The supplemental material is very weak. It is just a hardcopy of the slides used in the videos. I had expected more detailed notes on the hardcopy.
But for the price, it's a deal for the newbie security minded administrator or for someone wanting to learn about some tools used for both good and nefarious reasons. Beats shelling out 1-2K for a 1 day seminar for the same info.
Comment 4 of 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews