·µÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)ìÅ¿áÀ´Ï®
°ä²¼¹¦·ò 2018-09-06¾ÅÔ½ðÇïÀä·çϰϰ£¬GA»Æ½ð¼×ÍøÂç¿Õ¼ä°²È«Ñ§Ôº½«ÔÚÕâÌì¸ßÆøË¬µÄ¼¾½Ú³ö¸ñΪ¸÷ÈËËÍÀ´Ò»³¡¾¢Ë¬Ê®×ãµÄÅàѵÂÄÀú¡ª¡ªÂ·µÂºÚ¿ÍÈÏÖ¤Åàѵ£¨CEH£©£¡ÕâÊÇÊôÓںڿͼ¼Êõ°®ºÃÕßµÄ÷Ò÷Ñ´ó²Í£¬ÏêÇ鸽Ï£¬ÈÃÎÒÃÇһ·²ÎÓëÕâ´Î³ö¸ñµÄìÅ¿á¿ñ»¶£¡ÎÒÃÇÔںڿ͵۹úÆÚ´ýÄãµÄµ½À´£¡£¡
Åàѵ¼ÛÖµ£º¼¼ÊõÅàѵ8000Ôª/ÈË£¨²»º¬¿¼ÊÔ·Ñ£¬È˶à¸üÓŻݣ¡£©
¿Î³Ì³¤¶È£º5Ìì
ÅàѵµØÖ·£º±±¾©Êк£µíÇøÖйشåÈí¼þÔ°21ºÅÂ¥GA»Æ½ð¼×´óÏÃ
ÓÐÒâÁªÏµ£ºÕÅá°£¬15001306196£¬zhanglan@venustech.com.cn
CEH£¨Certificated Ethical Hacker£©±»Òµ½ç³ÆÖ®ÎªÂ·µÂºÚ¿Í(ÕýÅɺڿÍ)ÈÏÖ¤¡£ºÚ¿Í¹¥·ÀÊÇÐÅÏ¢°²È«ÁìÓòÖÐ×îÒýÈ˰ÑÎȵIJ¿ÃÅ£¬CEH¾ÍÊǽø½¨ÈôºÎÃæ¶Ô²¢·À±¸ºÚ¿ÍµÄ¹¥»÷ÐÐΪ£¬²»Ö»ÓÐÏàʶ²¡¶¾¡¢Ä¾Âí»òÈ䳿ÈëÇÖÐÐΪ£¬¸üÒªÔì¾ÍºÚ¿ÍµÄ¹¥·À¼¼ÇÉ¡£
EC-COUNCILµÄ×ã¼£±é²¼È«Çò 90¶à¸ö¹ú¶È£¬Õ¼Óг¬¹ý480¸öÈ«ÇòºÏ×÷ͬ°é£¬EC-COUNCILÊÚÓè60, 000λÊÀ½ç500Ç¿µÄÆóÒµ°²È«Ö¤Êé¡£EC-COUNCILµÄ¶àÏîÖ¤ÊéµÃµ½ÃÀ¹úµ±¾Ö»ú¹¹µÄ´óÁ¦Ö§³Ö£¬Æ¾¾ÝÃÀ¹ú¹ú·À²¿DOD 8570×¼Ôò»®¶¨£¬ËùÓоü·½¡¢Áª¹úµ±¾Ö¡¢±íʵ¥Ôª¡¢Ô¼Æ¸¹ÍȫְºÍ¼æÖ°¹«ÎñÈËÔ±£¬¶¼±ØÐë×ñѹ¤×÷ÄÚÈÝͨ¹ý·µÂºÚ¿ÍÈÏÖ¤´òËãÊé(CEH)¡£
ÄãÔÚCEH¿Î³ÌÖн«Ñ§µ½Ê²Ã´£¿
ÔÚ±¾¿Î³ÌÖÐѧԱ½«»áµÃµ½Ò»¸öÆëÈ«µÄ³¢ÊÔ»·¾³£¬ÔÚ³¢ÊÔ»·¾³ÖУ¬Ñ§Ô±½«Ñ§»áÈôºÎ½øÐа²È«É¨Ã裬²âÊÔ£¬ÆÆ½âºÍ±£»¤×Ô¼ºµÄϵͳ¡£³¢ÊÔÊÒÃÀÂúµÄ»·¾³£¬»áÈÃÿ¸öѧԱ¶Ñ¼¯´óÁ¿µÄʵ¼Ê¾Ñé¡£Ê×ÏÈ£¬Ñ§Ô±ÃDZØÒªÆðÍ·ÏàʶÈôºÎ½øÐбíΧ·ÀÓù¹¤×÷£¬¶øºó·¢Õ¹°²È«É¨ÃèºÍ¹¥»÷²âÊÔ£¬²¢½øÒ»²½ÆðÍ·½ø½¨ÌáȨ¹¥»÷ÒÔ¼°Äܹ»²Éȡʲô´ëÊ©±£»¤ÏµÍ³¡£×îºó£¬Ñ§Ô±»¹½«ÏàʶÈëÇÖ¼ì²âµÀÀí£¬°²È«Õ½Êõ´´½¨£¬Éç»á¹¤³Ì¼¼Êõ£¬DDOS¹¥»÷¼¼Êõ£¬»º³åÇøÒç³ö¼¼ÊõºÍ²¡¶¾·ÖÎö¼¼Êõ¡£Ñ§Ô±ÔÚ5ÌìÄÚʵÏÖÉÏÊöÃܼ¯µÄ¿Î³Ì£¬°ÑÎÕ·µÂºÚ¿ÍËù±ØÒªµÄ֪ʶ¼°¾Ñéºó£¬Äܹ»²ÎÓëEC-COUNCILÈÏÖ¤µÄ·µÂºÚ¿Í¿¼ÊÔ312-50¡£
¿Î³Ì¸ÙÁì
2. Footprinting and Reconnaissance (²Èµã)
3. Scanning Networks (ÍøÂçɨÃè)
4. Enumeration (ö¾Ù)
5. System Hacking (ϵͳÈëÇÖ)
6. Trojans and Backdoors (ľÂíºÍºóÃÅ)
7. Viruses and Worms (²¡¶¾ºÍÈ䳿)
8. Sniffers (Ðá̽¼àÌý)
9. Social Engineering (Éç»á¹¤³Ì¹¥»÷)
10. Denial of Service (»Ø¾ø·þÎñ)
11. Session Hijacking (»á»°½Ù³Ö)
12. Hacking Webservers (ÍøÕ¾ÈëÇÖ)
13. Hacking Web Applications Vulnerabilities (WEB·ì϶¹¥»÷¼¼Êõ)
14. SQL Injection (SQL ×¢Èë)
15. Hacking Wireless Networks (ÎÞÏß¹¥»÷)
16. Evading IDS, Firewalls and Honeypots (·À»ðǽ¡¢ÈëÇÖ¼ì²âϵͳ¼°ÃÛ¹Þϵͳ¶ã±Ü¼¼Êõ)
17. Buffer Overflows (»º³åÇøÒç³ö)
18. Cryptography (ÃÜÂëѧ)
19. Penetration Testing (ÉøÈë²âÊÔ)
¸ü¶à¹ØÓÚCEHÅàѵµÄ¸É»õ³Áµã
°²È«ÖÎÀíÈËÔ±£¬Éó¼ÆÈËÔ±£¬°²È«×¨¼Ò£¬ÍøÕ¾ÖÎÀíÈËÔ±ÒÔ¼°ËùÓйØ×¢ÍøÂ簲ȫµÄ°®ºÃÕß¡£
·µÂºÚ¿ÍÈÏÖ¤¿¼ÊÔ312-50Äܹ»ÔÚ×îºóÒ»Ìì½øÐмÓÇ¿ÐÍѵÁ·£¨¿ÉÑ¡£©£¬Ñ§Ô±±ØÒªÍ¨¹ýÖ¸¶¨Prometric¿Æ³¡½øÐп¼ÊÔÄÜÁ¦»ñÈ¡CEHÈÏÖ¤¡£
·µÂºÚ¿ÍÅàѵ»á½²Êö´óÁ¿µÄºÚ¿Í¹¤¾ß£¬²¢Ê¹ÄúÄܹ»´¿ÊìʹÓ㻵±È»£¬Ê¹ÓÃÕâÀàºÚ¿Í¹¤¾ß±ØÐëÊÇÒÔÉøÈë²âÊÔΪÖ÷Õŵģ¬ËùÒÔ£¬Äã»á±»ÒªÇóÇ©ÊðÒ»·ÝºÍ̸ÉêÃ÷£¬ÉêÃ÷ÄãÔÚÖ°ºÎÇé¿ö϶¼²»»áʹÓÃÅàѵÖлñµÃµÄ¼¼Êõ½øÐз¸·¨»ò¶ñÒâµÄ¹¥»÷£¬²»µÃʹÓÃÕâЩ¹¤¾ß·ÛËéÈκÎÍÆËã»úϵͳ£¬²¢È·±£ÕâЩ¹¤¾ß²»»á±»´«²¼ºÍÎóÓá£×îºó£¬ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©½«¶ÔÉêÇëÈ˽øÐÐÉóºË£¬È·ÈÏÉêÇëÈËÊÇ·ñÔںϷ¨µÄ¹«Ë¾½øÐй¤×÷¡£ÈôÊDz»±»ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©ÈϿɣ¬ÔòATCÓÐȨ»Ø¾øÉêÇëÈ˽øÐÐCEHÈÏÖ¤¡£


¾©¹«Íø°²±¸11010802024551ºÅ