v

您的位置:VeryCD教育计算机


《EC-Council-CEH.IT技术认证》(EC-Council - Certified Ethical Hacker)[ISO]

  • 状态: 精华资源
  • 摘要:
    发行日期2005年
    对白语言英语
  • 时间: 2007/05/10 10:41:50 发布 | 2007/05/10 10:41:50 更新
  • 分类: 教育  计算机 

lslps

精华资源: 923

全部资源: 1101

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名EC-Council-CEH.IT技术认证
英文名EC-Council - Certified Ethical Hacker
资源格式光盘镜像
发行日期2005年
地区美国
对白语言英语
简介

IPB Image

EC-Council - Certified Ethical Hacker
下载链接来自SHAREVIRU

ECCouncil Certified Ethical Hacker认证题库

EC-COUNCIL Certified Ethical Hacker 认证是业界最广泛认可的IT技术认证之一,也是业界最权威、最受尊敬的认证之一。获得EC-COUNCIL Certified Ethical Hacker认证不仅仅能证明您的IT技术能力,更是您进入职场的敲门砖,也是提高您身价的另一捷径。

EC-COUNCILCertified Ethical Hacker 考题大师由TestInside的资深EC-COUNCIL认证讲师和经验丰富的技术专家精心编辑,整理更新,包含了全套Certified Ethical Hacker认证考试试题截屏题与正确答案,完整覆盖EC-COUNCILCertified Ethical Hacker 考试题库。

拿高薪,是每个人的梦想,但究竟能拿多少钱,得由你的职场身价决定。通过EC-COUNCIL Certified Ethical Hacker 认证考试取得一张“金牌派司”无疑是证明和提升自己身价的一个有效方式。
TestInside EC-COUNCIL Certified Ethical Hacker 考题大师是广大Certified Ethical Hacker认证考生通过考试的最佳利器,让你首次考试及轻松 PASS!

http://www.specializedsolutions.com/ceh.htm

this course on certified ethical hacker will esplore the existence and use of hacking tools and security systems in any network environment.within each domain,you will be presented with several toos that a hacker can use,and which countermeasures are most effective against their use.some of these include:

1: Ethics & Legality
2: Footprinting
3: Scanning
4: Enumeration
5: System Hacking
6: Trojans & Backdoors
7: Sniffers
8: Denial of Service
9: Social Engineering
10: Session Hijacking
11: Hacking Webservers
12: Web Application Vulnerabilities
13: Webbased Password Cracking Techniques
14: SQL Injection
15: Hacking Wireless Networks
16: Virus and Worms
17: Physical Security
18: Linux Hacking
19: Evading Firewalls, IDS & Honeypots
20: Buffer Overflows
21: Cryptography
22: Penetration Testing

IPB Image

Course Objectives Certified Ethical Hacker

Immerse the student into an interactive environment, they will be shown:

How to scan, test and secure their own systems
Get in-depth knowledge & practical experience with current essential security systems
How perimeter defenses work
How hackers scan and attack their own networks
How intruders escalate privileges and what steps can be taken to secure a system

IPB Image

Students will also learn about:

Intrusion Detection
Policy Creation
Social Engineering
Open Source Intelligence
Incident Handling and Log Interpretation

Doelgroep

Networking professionals
IT managers need to understand security solutions existing today
Companies interested in greater eCommerce capabilities need to know information security
This class provides a solid foundation in the security technologies that will pave the way for organizations that are truly interested in reaping the benefits and tapping into the potential of the Internet.

Voorkennis

Computer networking skills
Have been in computer and networking business for several years
Knowledge of hard-/software provided by popular computer & networking vendors

IPB Image

正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有17网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。