: Link: Http://pan.baidu.com/s/1wG9pO Password: 4d8k
1. Preface and base skewers
Introduction to the training Course System
The industry's requirements for professional Security Practitioners
Network Fundamentals and the ability to engage in information security for Network Skills
Operating System basics and the ability to engage in information security for Network Skills
2. Hardening and security analysis of the operating system
standards and techniques for security hardening of Windows operating systems and their application in Security work
standards and techniques for security hardening of Linux operating systems and their application in Security work
Case explanation of operating system reinforcement based on level protection evaluation standard and risk Evaluation criterion
3. Penetration test System
Introduction of popular penetration testing systems, standards, methodologies, and demonstrations from the attackers ' perspective
Pre-casing detection stage, including various DNS casing, IP counter-check, CDN hidden IP Discovery and Other Technologies
intelligence gathering and finishing stage, including various fingerprint analysis, bypass attack, Google search and Other Technologies
Threat Modeling vulnerability scanning phase, including common foreign and domestic vulnerability scanning, such as Ficus-based commercial leakage , Nessus
Vulnerability System in-depth Analysis phase
infiltration attack phase, including the overflow principle and demonstration, Metalsploit platform, Kali and other techniques of penetrating use
reporting phase, how to write a good penetration test report feedback to the customer
Troubleshooting tips for Windows host intrusion
4. Communication protocol Infiltration
A variety of classic, popular DDoS techniques and defense technologies, as well as hardware DDoS Gateway Technology
legitimate and illegal sniffing visits to listen to
The U.S. NSA's surveillance means big Secret
Intranet Infiltration Technology
Firewall bypass and tunneling technology
case explanation of communication equipment reinforcement based on grade protection evaluation Standard and risk Evaluation criterion
5. Web penetration
A variety of classic, popular web attack tactics and defense technology, as well as hardware, Software Web Defense Technology
A detailed description of the common middleware and database reinforcement techniques under Windows and Linux
Database and middleware reinforcement case interpretation based on grade protection evaluation Standard, risk evaluation criterion Standard
Troubleshooting tips for Web intrusion
6, Wireless penetration
basic knowledge of wireless penetration
counterfeit hotspots, GPU-cracked WPA passwords, traffic hijacking, and other wireless attack techniques are explained and related defense methods.
7. Information Security Products
Hardware firewall, IPS, log Audit, IPS, bastion host and other Product Technologies
WAF, desktop security management, Internet behavior Management, database auditing and other Product Technologies
platform for Pipe Safety
8. Safety standards and information security projects
The significance of penetration testing and reinforcement in safety standard landing and safety Management work
Standard interpretation of safety assessment, risk assessment and Grade Protection
Review of safety projects based on safety assessment, risk assessment, level protection Standards Implementation
Interpretation of security solutions in business topologies in Large Industries
What kind of system should be followed in the future direction of learning
9. Trojan Virus Defense
from in-depth analysis of a variety of Trojan virus (such as remote control Trojan, DDoS Trojan, downloader, evade anti-virus software killing Trojan, etc.)
Behavioral symptoms as well as related defense killing methods (anti-debugging, behavioral analysis, etc. ).
White hat-high-end information security training