Æ·µÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)ìÅ¿áÀ´Ï®

Ðû²¼Ê±¼ä 2018-09-06

¾ÅÔ½ðÇïÁ¹·çϰϰ£¬£¬£¬£¬ £¬ÍòÀû¹ú¼Ê¹ÙÍøÍøÂç¿Õ¼äÇ徲ѧԺ½«ÔÚÕâÌì¸ßÆøË¬µÄʱ½ÚÌØÊâΪ¸÷ÈËËÍÀ´Ò»³¡¾¢Ë¬Ê®×ãµÄÅàѵÌåÑ顪¡ªÆ·µÂºÚ¿ÍÈÏÖ¤Åàѵ£¨CEH£©£¡ÕâÊÇÊôÓÚºÚ¿ÍÊÖÒÕϲ»¶ÕßµÄ÷Ò÷Ñ´ó²Í£¬£¬£¬£¬ £¬ÏêÇ鸽Ï£¬£¬£¬£¬ £¬ÈÃÎÒÃÇÒ»Æð¼ÓÈëÕâ´ÎÌØ±ðµÄìÅ¿á¿ñ»¶£¡ÎÒÃÇÔںڿ͵۹úÆÚ´ýÄãµÄµ½À´£¡£¡£¡£¡£¡ 


Åàѵ¿Î³Ì£ºÆ·µÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)

Åàѵ¼ÛÇ®£ºÊÖÒÕÅàѵ8000Ôª/ÈË£¨²»º¬¿¼ÊÔ·Ñ£¬£¬£¬£¬ £¬È˶à¸üÓŻݣ¡£¡£¡£¡£©

¿Î³Ì³¤¶È£º5Ìì

ÅàѵËùÔÚ£º±±¾©Êк£µíÇøÖйشåÈí¼þÔ°21ºÅÂ¥ÍòÀû¹ú¼Ê¹ÙÍø´óÏÃ

ÓÐÒâÁªÏµ£ºÕÅá°£¬£¬£¬£¬ £¬15001306196£¬£¬£¬£¬ £¬zhanglan@venustech.com.cn



ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾
Æ·µÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)¿Î³ÌÏÈÈÝ


CEH£¨Certificated Ethical Hacker£©±»Òµ½ç³ÆÖ®ÎªÆ·µÂºÚ¿Í(ÕýÖ±ºÚ¿Í)ÈÏÖ¤¡£¡£¡£¡£ºÚ¿Í¹¥·ÀÊÇÐÅÏ¢Çå¾²ÁìÓòÖÐ×îÒýÈË×¢ÖØµÄ²¿·Ö£¬£¬£¬£¬ £¬CEH¾ÍÊÇѧϰÔõÑùÃæÁÙ²¢Ìá·ÀºÚ¿ÍµÄ¹¥»÷ÐÐΪ£¬£¬£¬£¬ £¬²»µ«ÒªÏàʶ²¡¶¾¡¢Ä¾Âí»òÈ䳿ÈëÇÖÐÐΪ£¬£¬£¬£¬ £¬¸üÒª×÷ÓýºÚ¿ÍµÄ¹¥·À¼¼ÇÉ¡£¡£¡£¡£


EC-COUNCILµÄ×ã¼£±é²¼È«Çò 90¶à¸ö¹ú¼Ò£¬£¬£¬£¬ £¬ÓµÓÐÁè¼Ý480¸öÈ«ÇòÏàÖúͬ°é£¬£¬£¬£¬ £¬EC-COUNCILÊÚÓè60, 000λÌìÏÂ500Ç¿µÄÆóÒµÇå¾²Ö¤Êé¡£¡£¡£¡£EC-COUNCILµÄ¶àÏîÖ¤Êé»ñµÃÃÀ¹úÕþ¸®»ú¹¹µÄ¶¦Á¦´ó¾ÙÖ§³Ö£¬£¬£¬£¬ £¬Æ¾Ö¤ÃÀ¹ú¹ú·À²¿DOD 8570×¼Ôò»®¶¨£¬£¬£¬£¬ £¬ËùÓоü·½¡¢Áª°îÕþ¸®¡¢Íâʵ¥Î»¡¢Ô¼Æ¸¹ÍȫְºÍ¼æÖ°¹«ÎñÖ°Ô±£¬£¬£¬£¬ £¬¶¼±ØÐè×ñÕÕÊÂÇéÄÚÈÝͨ¹ýÆ·µÂºÚ¿ÍÈÏÖ¤ÍýÏëÊé(CEH)¡£¡£¡£¡£


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾



ÄãÔÚCEH¿Î³ÌÖн«Ñ§µ½Ê²Ã´ £¿£¿£¿£¿£¿£¿£¿


ÔÚ±¾¿Î³ÌÖÐѧԱ½«»á»ñµÃÒ»¸öÍêÕûµÄʵÑéÇéÐΣ¬£¬£¬£¬ £¬ÔÚʵÑéÇéÐÎÖУ¬£¬£¬£¬ £¬Ñ§Ô±½«Ñ§»áÔõÑù¾ÙÐÐÇ徲ɨÃ裬£¬£¬£¬ £¬²âÊÔ£¬£¬£¬£¬ £¬ÆÆ½âºÍ± £»£»£»£»¤×Ô¼ºµÄϵͳ¡£¡£¡£¡£ÊµÑéÊÒÍêÉÆµÄÇéÐΣ¬£¬£¬£¬ £¬»áÈÃÿ¸öѧԱ»ýÀÛ´ó×ÚµÄʵ¼ùÂÄÀú¡£¡£¡£¡£Ê×ÏÈ£¬£¬£¬£¬ £¬Ñ§Ô±ÃÇÐèÒª×îÏÈÏàʶÔõÑù¾ÙÐÐÍâΧ·ÀÓùÊÂÇ飬£¬£¬£¬ £¬È»ºó¿ªÕ¹Ç徲ɨÃèºÍ¹¥»÷²âÊÔ£¬£¬£¬£¬ £¬²¢½øÒ»²½×îÏÈѧϰÌáȨ¹¥»÷ÒÔ¼°¿ÉÒÔ½ÓÄÉʲô²½·¥± £»£»£»£»¤ÏµÍ³¡£¡£¡£¡£×îºó£¬£¬£¬£¬ £¬Ñ§Ô±»¹½«ÏàʶÈëÇÖ¼ì²âÔ­Àí£¬£¬£¬£¬ £¬Çå¾²Õ½ÂÔ½¨É裬£¬£¬£¬ £¬Éç»á¹¤³ÌÊÖÒÕ£¬£¬£¬£¬ £¬DDOS¹¥»÷ÊÖÒÕ£¬£¬£¬£¬ £¬»º³åÇøÒç³öÊÖÒպͲ¡¶¾ÆÊÎöÊÖÒÕ¡£¡£¡£¡£Ñ§Ô±ÔÚ5ÌìÄÚÍê³ÉÉÏÊö÷缯µÄ¿Î³Ì£¬£¬£¬£¬ £¬ÕÆÎÕÆ·µÂºÚ¿ÍËùÐèÒªµÄ֪ʶ¼°ÂÄÀúºó£¬£¬£¬£¬ £¬¿ÉÒÔ¼ÓÈëEC-COUNCILÈÏÖ¤µÄÆ·µÂºÚ¿Í¿¼ÊÔ312-50¡£¡£¡£¡£


¿Î³Ì¸ÙÒª



1. Introduction to Ethical Hacking (ºÚ¿ÍÆ·µÂÓëÖ´ÂÉÀýÔò)
2. Footprinting and Reconnaissance  (²Èµã)
3. Scanning Networks (ÍøÂçɨÃè)
4. Enumeration   (ö¾Ù)
5. System Hacking (ϵͳÈëÇÖ)
6. Trojans and Backdoors (ľÂíºÍºóÃÅ)
7. Viruses and Worms  (²¡¶¾ºÍÈ䳿)
8. Sniffers (Ðá̽¼àÌý)
9. Social Engineering (Éç»á¹¤³Ì¹¥»÷)
10. Denial of Service (¾Ü¾øÐ§ÀÍ)
11. Session Hijacking (»á»°Ð®ÖÆ)
12. Hacking Webservers (ÍøÕ¾ÈëÇÖ)
13. Hacking Web Applications Vulnerabilities (WEBÎó²î¹¥»÷ÊÖÒÕ)
14. SQL Injection (SQL ×¢Èë)
15. Hacking Wireless Networks (ÎÞÏß¹¥»÷)
16. Evading IDS, Firewalls and Honeypots (·À»ðǽ¡¢ÈëÇÖ¼ì²âϵͳ¼°ÃÛ¹Þϵͳ¹æ±ÜÊÖÒÕ)
17. Buffer Overflows (»º³åÇøÒç³ö)
18. Cryptography (ÃÜÂëѧ)
19. Penetration Testing (ÉøÍ¸²âÊÔ) 

¸ü¶à¹ØÓÚCEHÅàѵµÄ¸É»õÖØµã


Åàѵ¹¤¾ß£º

Çå¾²ÖÎÀíÖ°Ô±£¬£¬£¬£¬ £¬Éó¼ÆÖ°Ô±£¬£¬£¬£¬ £¬Ç徲ר¼Ò£¬£¬£¬£¬ £¬ÍøÕ¾ÖÎÀíÖ°Ô±ÒÔ¼°ËùÓйØ×¢ÍøÂçÇå¾²µÄϲ»¶Õß¡£¡£¡£¡£


ÈÏÖ¤¿¼ÊÔ£º

Æ·µÂºÚ¿ÍÈÏÖ¤¿¼ÊÔ312-50¿ÉÒÔÔÚ×îºóÒ»Ìì¾ÙÐÐÔöÇ¿ÐÍѵÁ·£¨¿ÉÑ¡£¡£¡£¡£©£¬£¬£¬£¬ £¬Ñ§Ô±ÐèҪͨ¹ýÖ¸¶¨Prometric¿Æ³¡¾ÙÐп¼ÊԲŻª»ñÈ¡CEHÈÏÖ¤¡£¡£¡£¡£


Ö´·¨ÉùÃ÷Ìõ¿î£º
Æ·µÂºÚ¿ÍÅàѵ»á½²Êö´ó×ڵĺڿ͹¤¾ß£¬£¬£¬£¬ £¬²¢Ê¹Äú¿ÉÒÔÊìÁ·Ê¹Óà £»£»£»£»ËäÈ»£¬£¬£¬£¬ £¬Ê¹ÓÃÕâÀàºÚ¿Í¹¤¾ß±ØÐèÊÇÒÔÉøÍ¸²âÊÔΪĿµÄµÄ£¬£¬£¬£¬ £¬ÒÔÊÇ£¬£¬£¬£¬ £¬Äã»á±»ÒªÇóÇ©ÊðÒ»·ÝЭÒéÉùÃ÷£¬£¬£¬£¬ £¬ÉùÃ÷ÄãÔÚÈκÎÇéÐÎ϶¼²»»áʹÓÃÅàѵÖлñµÃµÄÊÖÒÕ¾ÙÐв»·¨»ò¶ñÒâµÄ¹¥»÷£¬£¬£¬£¬ £¬²»µÃʹÓÃÕâЩ¹¤¾ßÆÆËðÈκÎÅÌËã»úϵͳ£¬£¬£¬£¬ £¬²¢È·±£ÕâЩ¹¤¾ß²»»á±»Èö²¥ºÍÎóÓᣡ£¡£¡£×îºó£¬£¬£¬£¬ £¬ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©½«¶ÔÉêÇëÈ˾ÙÐÐÉóºË£¬£¬£¬£¬ £¬È·ÈÏÉêÇëÈËÊÇ·ñÔÚÕýµ±µÄ¹«Ë¾¾ÙÐÐÊÂÇé¡£¡£¡£¡£ÈôÊDz»±»ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©ÈϿɣ¬£¬£¬£¬ £¬ÔòATCÓÐȨ¾Ü¾øÉêÇëÈ˾ÙÐÐCEHÈÏÖ¤¡£¡£¡£¡£