XYZ軟體急先鋒

Career Academy-「Certified Ethical Hacker CBT Training Boot Camp」 教學光碟 (7CD) <<駭客攻擊防護教學>>


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
軟體名稱:Career Academy-「Certified Ethical Hacker CBT Training Boot Camp」 教學光碟 (7CD) <<駭客攻擊防護教學>>
語系版本:
光碟片數:7片裝
破解說明:
系統支援:WIN 9x/WIN ME/WIN NT/WIN 2000/WIN XP/WIN 2003
軟體類型:未分類軟體
硬體需求:PC
更新日期:2005/9/29
官方網站:
中文網站:
軟體簡介:
銷售價格:560
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=




軟體簡介:

      

Career Academy-「Certified Ethical Hacker CBT Training Boot Camp」 教學光碟 (7CD) <<駭客攻擊防護教學>>



內容說明:

本教程是由Career Academy公司與Mile2公司共同出版的駭客攻擊模擬多媒體自學
教程。Mile2公司是全球最大的資訊安全專業培訓組織之一。

本視頻培訓教程將教你如何掃瞄、測試、分析並保證你系統的安全性。通過實例
使每個學生能深入的瞭解有關安全系統的知識並獲得相應的實際操作經驗。同時
,學生還會瞭解Intrusion Detection, Policy Creation, Social Engineering,
DDoS Attacks, Buffer Overflows 和 Virus Creation等有關資訊。

包含內容:
  * 7 課時 CDs 音視頻教學內容
  * 透徹的駭客攻擊及防禦實例
  * 方便列印的 PDF 格式課件
  * 官方 Ethical Hacker Exam 312-50 認證學習指導
  * 完成學習後的函授教育證書


  Career Academy is presenting this self-paced multimedia Ethical Hacking 
  class in partnership with Mile2. Mile2 is largely responsible for the 
  early adoption and success of EC-Council's Certified Ethical Hacker 
  course within the USA and several other countries. Mile2 is the world's 
  largest provider of Penetration Testing training and initially chose the 
  basic CEH course as our flagship for Penetration Testing training events. 
  Mile2 has delivered more CEH classes within the USA than any other training
  provider and possibly globally

  These training videos will show you how to scan, test, hack and secure your
  own systems. The intensive lab demonstrations gives each student in-depth 
  knowledge and practical experience with the current security systems. You 
  will begin by understanding how perimeter defenses work and then be lead
  into scanning and attacking your own networks. You will then learn how 
  intruders escalate privileges and what steps can be taken to secure a system.
  Students will also learn about Intrusion Detection, Policy Creation, Social
  Engineering, DDoS Attacks, Buffer Overflows and Virus Creation



             


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=