White hat-high-end information security training

Source: Internet
Author: User

: Link: Http://pan.baidu.com/s/1wG9pO Password: 4d8k


1. Preface and base skewers

Introduction to the training Course System
The industry's requirements for professional Security Practitioners
Network Fundamentals and the ability to engage in information security for Network Skills
Operating System basics and the ability to engage in information security for Network Skills

2. Hardening and security analysis of the operating system

standards and techniques for security hardening of Windows operating systems and their application in Security work
standards and techniques for security hardening of Linux operating systems and their application in Security work
Case explanation of operating system reinforcement based on level protection evaluation standard and risk Evaluation criterion

3. Penetration test System

Introduction of popular penetration testing systems, standards, methodologies, and demonstrations from the attackers ' perspective
Pre-casing detection stage, including various DNS casing, IP counter-check, CDN hidden IP Discovery and Other Technologies
intelligence gathering and finishing stage, including various fingerprint analysis, bypass attack, Google search and Other Technologies
Threat Modeling vulnerability scanning phase, including common foreign and domestic vulnerability scanning, such as Ficus-based commercial leakage , Nessus
Vulnerability System in-depth Analysis phase
infiltration attack phase, including the overflow principle and demonstration, Metalsploit platform, Kali and other techniques of penetrating use
reporting phase, how to write a good penetration test report feedback to the customer
Troubleshooting tips for Windows host intrusion

4. Communication protocol Infiltration

A variety of classic, popular DDoS techniques and defense technologies, as well as hardware DDoS Gateway Technology
legitimate and illegal sniffing visits to listen to
The U.S. NSA's surveillance means big Secret
Intranet Infiltration Technology
Firewall bypass and tunneling technology
case explanation of communication equipment reinforcement based on grade protection evaluation Standard and risk Evaluation criterion

5. Web penetration

A variety of classic, popular web attack tactics and defense technology, as well as hardware, Software Web Defense Technology
A detailed description of the common middleware and database reinforcement techniques under Windows and Linux
Database and middleware reinforcement case interpretation based on grade protection evaluation Standard, risk evaluation criterion Standard
Troubleshooting tips for Web intrusion

6, Wireless penetration

basic knowledge of wireless penetration
counterfeit hotspots, GPU-cracked WPA passwords, traffic hijacking, and other wireless attack techniques are explained and related defense methods.

7. Information Security Products

Hardware firewall, IPS, log Audit, IPS, bastion host and other Product Technologies
WAF, desktop security management, Internet behavior Management, database auditing and other Product Technologies
platform for Pipe Safety

8. Safety standards and information security projects

The significance of penetration testing and reinforcement in safety standard landing and safety Management work
Standard interpretation of safety assessment, risk assessment and Grade Protection
Review of safety projects based on safety assessment, risk assessment, level protection Standards Implementation
Interpretation of security solutions in business topologies in Large Industries
What kind of system should be followed in the future direction of learning

9. Trojan Virus Defense

from in-depth analysis of a variety of Trojan virus (such as remote control Trojan, DDoS Trojan, downloader, evade anti-virus software killing Trojan, etc.)
Behavioral symptoms as well as related defense killing methods (anti-debugging, behavioral analysis, etc. ).

White hat-high-end information security training

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.