·µÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)ìÅ¿áÀ´Ï®

°ä²¼¹¦·ò 2018-09-06

¾ÅÔ½ðÇïÀä·çϰϰ £¬GA»Æ½ð¼×ÍøÂç¿Õ¼ä°²È«Ñ§Ôº½«ÔÚÕâÌì¸ßÆøË¬µÄ¼¾½Ú³ö¸ñΪ¸÷ÈËËÍÀ´Ò»³¡¾¢Ë¬Ê®×ãµÄÅàѵÂÄÀú¡ª¡ªÂ·µÂºÚ¿ÍÈÏÖ¤Åàѵ£¨CEH£©£¡ÕâÊÇÊôÓںڿͼ¼Êõ°®ºÃÕßµÄ÷Ò÷Ñ´ó²Í £¬ÏêÇ鸽Ï £¬ÈÃÎÒÃÇһ·²ÎÓëÕâ´Î³ö¸ñµÄìÅ¿á¿ñ»¶£¡ÎÒÃÇÔںڿ͵۹úÆÚ´ýÄãµÄµ½À´£¡£¡ 


Åàѵ¿Î³Ì£ºÂ·µÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)

Åàѵ¼ÛÖµ£º¼¼ÊõÅàѵ8000Ôª/ÈË£¨²»º¬¿¼ÊÔ·Ñ £¬È˶à¸üÓŻݣ¡£©

¿Î³Ì³¤¶È£º5Ìì

ÅàѵµØÖ·£º±±¾©Êк£µíÇøÖйشåÈí¼þÔ°21ºÅÂ¥GA»Æ½ð¼×´óÏÃ

ÓÐÒâÁªÏµ£ºÕÅá° £¬15001306196 £¬zhanglan@venustech.com.cn



GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
·µÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)¿Î³Ì½éÉÜ


CEH£¨Certificated Ethical Hacker£©±»Òµ½ç³ÆÖ®ÎªÂ·µÂºÚ¿Í(ÕýÅɺڿÍ)ÈÏÖ¤¡£ºÚ¿Í¹¥·ÀÊÇÐÅÏ¢°²È«ÁìÓòÖÐ×îÒýÈ˰ÑÎȵIJ¿ÃÅ £¬CEH¾ÍÊǽø½¨ÈôºÎÃæ¶Ô²¢·À±¸ºÚ¿ÍµÄ¹¥»÷ÐÐΪ £¬²»Ö»ÓÐÏàʶ²¡¶¾¡¢Ä¾Âí»òÈ䳿ÈëÇÖÐÐΪ £¬¸üÒªÔì¾ÍºÚ¿ÍµÄ¹¥·À¼¼ÇÉ¡£


EC-COUNCILµÄ×ã¼£±é²¼È«Çò 90¶à¸ö¹ú¶È £¬Õ¼Óг¬¹ý480¸öÈ«ÇòºÏ×÷ͬ°é £¬EC-COUNCILÊÚÓè60, 000λÊÀ½ç500Ç¿µÄÆóÒµ°²È«Ö¤Êé¡£EC-COUNCILµÄ¶àÏîÖ¤ÊéµÃµ½ÃÀ¹úµ±¾Ö»ú¹¹µÄ´óÁ¦Ö§³Ö £¬Æ¾¾ÝÃÀ¹ú¹ú·À²¿DOD 8570×¼Ôò»®¶¨ £¬ËùÓоü·½¡¢Áª¹úµ±¾Ö¡¢±íʵ¥Ôª¡¢Ô¼Æ¸¹ÍȫְºÍ¼æÖ°¹«ÎñÈËÔ± £¬¶¼±ØÐë×ñÑ­¹¤×÷ÄÚÈÝͨ¹ý·µÂºÚ¿ÍÈÏÖ¤´òËãÊé(CEH)¡£


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ÄãÔÚCEH¿Î³ÌÖн«Ñ§µ½Ê²Ã´£¿


ÔÚ±¾¿Î³ÌÖÐѧԱ½«»áµÃµ½Ò»¸öÆëÈ«µÄ³¢ÊÔ»·¾³ £¬ÔÚ³¢ÊÔ»·¾³ÖÐ £¬Ñ§Ô±½«Ñ§»áÈôºÎ½øÐа²È«É¨Ãè £¬²âÊÔ £¬ÆÆ½âºÍ± £»¤×Ô¼ºµÄϵͳ¡£³¢ÊÔÊÒÃÀÂúµÄ»·¾³ £¬»áÈÃÿ¸öѧԱ¶Ñ¼¯´óÁ¿µÄʵ¼Ê¾­Ñé¡£Ê×ÏÈ £¬Ñ§Ô±ÃDZØÒªÆðÍ·ÏàʶÈôºÎ½øÐбíΧ·ÀÓù¹¤×÷ £¬¶øºó·¢Õ¹°²È«É¨ÃèºÍ¹¥»÷²âÊÔ £¬²¢½øÒ»²½ÆðÍ·½ø½¨ÌáȨ¹¥»÷ÒÔ¼°Äܹ»²Éȡʲô´ëÊ©± £»¤ÏµÍ³¡£×îºó £¬Ñ§Ô±»¹½«ÏàʶÈëÇÖ¼ì²âµÀÀí £¬°²È«Õ½Êõ´´½¨ £¬Éç»á¹¤³Ì¼¼Êõ £¬DDOS¹¥»÷¼¼Êõ £¬»º³åÇøÒç³ö¼¼ÊõºÍ²¡¶¾·ÖÎö¼¼Êõ¡£Ñ§Ô±ÔÚ5ÌìÄÚʵÏÖÉÏÊöÃܼ¯µÄ¿Î³Ì £¬°ÑÎÕ·µÂºÚ¿ÍËù±ØÒªµÄ֪ʶ¼°¾­Ñéºó £¬Äܹ»²ÎÓëEC-COUNCILÈÏÖ¤µÄ·µÂºÚ¿Í¿¼ÊÔ312-50¡£


¿Î³Ì¸ÙÁì



1. Introduction to Ethical Hacking (ºÚ¿Í·µÂÓë˾·¨Âɹæ)
2. Footprinting and Reconnaissance  (²Èµã)
3. Scanning Networks (ÍøÂçɨÃè)
4. Enumeration   (ö¾Ù)
5. System Hacking (ϵͳÈëÇÖ)
6. Trojans and Backdoors (ľÂíºÍºóÃÅ)
7. Viruses and Worms  (²¡¶¾ºÍÈ䳿)
8. Sniffers (Ðá̽¼àÌý)
9. Social Engineering (Éç»á¹¤³Ì¹¥»÷)
10. Denial of Service (»Ø¾ø·þÎñ)
11. Session Hijacking (»á»°½Ù³Ö)
12. Hacking Webservers (ÍøÕ¾ÈëÇÖ)
13. Hacking Web Applications Vulnerabilities (WEB·ì϶¹¥»÷¼¼Êõ)
14. SQL Injection (SQL ×¢Èë)
15. Hacking Wireless Networks (ÎÞÏß¹¥»÷)
16. Evading IDS, Firewalls and Honeypots (·À»ðǽ¡¢ÈëÇÖ¼ì²âϵͳ¼°ÃÛ¹Þϵͳ¶ã±Ü¼¼Êõ)
17. Buffer Overflows (»º³åÇøÒç³ö)
18. Cryptography (ÃÜÂëѧ)
19. Penetration Testing (ÉøÈë²âÊÔ) 

¸ü¶à¹ØÓÚCEHÅàѵµÄ¸É»õ³Áµã


Åàѵ¶ÔÏó£º

°²È«ÖÎÀíÈËÔ± £¬Éó¼ÆÈËÔ± £¬°²È«×¨¼Ò £¬ÍøÕ¾ÖÎÀíÈËÔ±ÒÔ¼°ËùÓйØ×¢ÍøÂ簲ȫµÄ°®ºÃÕß¡£


ÈÏÖ¤¿¼ÊÔ£º

·µÂºÚ¿ÍÈÏÖ¤¿¼ÊÔ312-50Äܹ»ÔÚ×îºóÒ»Ìì½øÐмÓÇ¿ÐÍѵÁ·£¨¿ÉÑ¡£© £¬Ñ§Ô±±ØÒªÍ¨¹ýÖ¸¶¨Prometric¿Æ³¡½øÐп¼ÊÔÄÜÁ¦»ñÈ¡CEHÈÏÖ¤¡£


˾·¨ÉêÃ÷Ìõ¿î£º
·µÂºÚ¿ÍÅàѵ»á½²Êö´óÁ¿µÄºÚ¿Í¹¤¾ß £¬²¢Ê¹ÄúÄܹ»´¿ÊìʹÓà £»µ±È» £¬Ê¹ÓÃÕâÀàºÚ¿Í¹¤¾ß±ØÐëÊÇÒÔÉøÈë²âÊÔΪÖ÷ÕŵÄ £¬ËùÒÔ £¬Äã»á±»ÒªÇóÇ©ÊðÒ»·ÝºÍ̸ÉêÃ÷ £¬ÉêÃ÷ÄãÔÚÖ°ºÎÇé¿ö϶¼²»»áʹÓÃÅàѵÖлñµÃµÄ¼¼Êõ½øÐз¸·¨»ò¶ñÒâµÄ¹¥»÷ £¬²»µÃʹÓÃÕâЩ¹¤¾ß·ÛËéÈκÎÍÆËã»úϵͳ £¬²¢È·±£ÕâЩ¹¤¾ß²»»á±»´«²¼ºÍÎóÓá£×îºó £¬ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©½«¶ÔÉêÇëÈ˽øÐÐÉóºË £¬È·ÈÏÉêÇëÈËÊÇ·ñÔںϷ¨µÄ¹«Ë¾½øÐй¤×÷¡£ÈôÊDz»±»ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©ÈÏ¿É £¬ÔòATCÓÐȨ»Ø¾øÉêÇëÈ˽øÐÐCEHÈÏÖ¤¡£