商品詳情
Career Academy-「Certified Ethical Hacker CBT Training Boot Camp」 教學光碟 (7CD) <<駭客攻擊防護教學>>
商品編號:
本站售價:NT$560
碟片片數:7片
瀏覽次數:34149
|
【轉載TXT文檔】
|
您可能感興趣:
您可能也喜歡:
商品描述
Career Academy-「Certified Ethical Hacker CBT Training Boot Camp」 教學光碟 (7CD) <<駭客攻擊防護教學>>
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
軟體名稱:Career Academy-「Certified Ethical Hacker CBT Training Boot Camp」 教學光碟 (7CD) <<駭客攻擊防護教學>>
語系版本:
光碟片數:7片裝
破解說明:
系統支援:WIN 9x/WIN ME/WIN NT/WIN 2000/WIN XP/WIN 2003
軟體類型:未分類軟體
硬體需求:PC
更新日期:2005/9/29
官方網站:
中文網站:
軟體簡介:
銷售價格:560
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
軟體簡介:
Career Academy-「Certified Ethical Hacker CBT Training Boot Camp」 教學光碟 (7CD) <<駭客攻擊防護教學>>
內容說明:
本教程是由Career Academy公司與Mile2公司共同出版的駭客攻擊模擬多媒體自學
教程。Mile2公司是全球最大的資訊安全專業培訓組織之一。
本視頻培訓教程將教你如何掃瞄、測試、分析並保證你系統的安全性。通過實例
使每個學生能深入的瞭解有關安全系統的知識並獲得相應的實際操作經驗。同時
,學生還會瞭解Intrusion Detection, Policy Creation, Social Engineering,
DDoS Attacks, Buffer Overflows 和 Virus Creation等有關資訊。
包含內容:
* 7 課時 CDs 音視頻教學內容
* 透徹的駭客攻擊及防禦實例
* 方便列印的 PDF 格式課件
* 官方 Ethical Hacker Exam 312-50 認證學習指導
* 完成學習後的函授教育證書
Career Academy is presenting this self-paced multimedia Ethical Hacking
class in partnership with Mile2. Mile2 is largely responsible for the
early adoption and success of EC-Council's Certified Ethical Hacker
course within the USA and several other countries. Mile2 is the world's
largest provider of Penetration Testing training and initially chose the
basic CEH course as our flagship for Penetration Testing training events.
Mile2 has delivered more CEH classes within the USA than any other training
provider and possibly globally
These training videos will show you how to scan, test, hack and secure your
own systems. The intensive lab demonstrations gives each student in-depth
knowledge and practical experience with the current security systems. You
will begin by understanding how perimeter defenses work and then be lead
into scanning and attacking your own networks. You will then learn how
intruders escalate privileges and what steps can be taken to secure a system.
Students will also learn about Intrusion Detection, Policy Creation, Social
Engineering, DDoS Attacks, Buffer Overflows and Virus Creation
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=