µÀµÂºÚ¿ÍÈÏÖ¤Åàѵ(CEH)ìÅ¿áÀ´Ï®
Ðû²¼Ê±¼ä 2018-09-06¾ÅÔ½ðÇïÁ¹·çϰϰ£¬¶«ÉÆ½Ì¨ÍøÂç¿Õ¼äÄþ¾²Ñ§Ôº½«ÔÚÕâÇï¸ßÆøË¬µÄʱ½ÚÌØ±ðΪ¸÷ÈËËÍÀ´Ò»³¡¾¢Ë¬Ê®×ãµÄÅàѵÌåÑ顪¡ªµÀµÂºÚ¿ÍÈÏÖ¤Åàѵ£¨CEH£©£¡ÕâÊÇÊôÓںڿͼ¼ÊõϲºÃÕßµÄ÷Ò÷Ñ´ó²Í£¬ÏêÇ鸽Ï£¬ÈÃÎÒÃÇÒ»Æð¼ÓÈëÕâ´ÎÌØ´ËÍâìÅ¿á¿ñ»¶£¡ÎÒÃÇÔںڿ͵۹úÆÚ´ýÄãµÄµ½À´£¡£¡
Åàѵ¼Û¸ñ£º¼¼ÊõÅàѵ8000Ôª/ÈË£¨²»º¬¿¼ÊÔ·Ñ£¬È˶à¸üÓŻݣ¡£©
¿Î³Ì³¤¶È£º5Ìì
ÅàѵËùÔÚ£º±±¾©Êк£µíÇøÖйشåÈí¼þÔ°21ºÅÂ¥¶«Éƽ̨´óÏÃ
ÓÐÒâÁªÏµ£ºÕÅá°£¬15001306196£¬zhanglan@venustech.com.cn

CEH£¨Certificated Ethical Hacker£©±»Òµ½ç³ÆÖ®ÎªµÀµÂºÚ¿Í(ÕýÅɺڿÍ)ÈÏÖ¤¡£ºÚ¿Í¹¥·ÀÊÇÐÅÏ¢Äþ¾²ÁìÓòÖÐ×îÒýÈË×¢ÒâµÄ²¿ÃÅ£¬CEH¾ÍÊÇѧϰÈçºÎÃæ¶Ô²¢·À·¶ºÚ¿ÍµÄ¹¥»÷ÐÐΪ£¬²»¹âÒªÁ˽ⲡ¶¾¡¢Ä¾Âí»òÈ䳿ÈëÇÖÐÐΪ£¬¸üÒªÅàÑøºÚ¿ÍµÄ¹¥·À¼¼ÇÉ¡£
EC-COUNCILµÄ×ã¼£±é²¼È«Çò 90¶à¸ö¹ú¼Ò£¬ÓµÓÐÁè¼Ý480¸öÈ«ÇòºÏ×÷»ï°é£¬EC-COUNCILÊÚÓè60, 000λÊÀ½ç500Ç¿µÄÆóÒµÄþ¾²Ö¤Êé¡£EC-COUNCILµÄ¶àÏîÖ¤ÊéµÃµ½ÃÀ¹úÕþ¸®»ú¹¹µÄ¶¦Á¦Ö§³Ö£¬Æ¾¾ÝÃÀ¹ú¹ú·À²¿DOD 8570×¼Ôò¹æ¶¨£¬ËùÓоü·½¡¢Áª°îÕþ¸®¡¢Íâʵ¥Ôª¡¢Ô¼Æ¸¹ÍȫְºÍ¼æÖ°¹«ÎñÈËÔ±£¬¶¼±ØÐëÒÀÕÕÊÂÇéÄÚÈÝͨ¹ýµÀµÂºÚ¿ÍÈÏÖ¤¼Æ»®Êé(CEH)¡£

ÄãÔÚCEH¿Î³ÌÖн«Ñ§µ½Ê²Ã´£¿
ÔÚ±¾¿Î³ÌÖÐѧԱ½«»áµÃµ½Ò»¸öÍêÕûµÄʵÑé»·¾³£¬ÔÚʵÑé»·¾³ÖУ¬Ñ§Ô±½«Ñ§»áÈçºÎ½øÐÐÄþ¾²É¨Ã裬²âÊÔ£¬ÆÆ½âºÍ±£»¤×Ô¼ºµÄϵͳ¡£ÊµÑéÊÒÍêÉÆµÄ»·¾³£¬»áÈÃÿ¸öѧԱ»ýÀÛ´óÁ¿µÄʵ¼ù¾Ñé¡£Ê×ÏÈ£¬Ñ§Ô±ÃÇÐèÒª¿ªÊ¼Á˽âÈçºÎ½øÐÐÍâΧ·ÀÓùÊÂÇ飬Ȼºó¿ªÕ¹Äþ¾²É¨ÃèºÍ¹¥»÷²âÊÔ£¬²¢½øÒ»²½¿ªÊ¼Ñ§Ï°ÌáȨ¹¥»÷ÒÔ¼°¿ÉÒÔ½ÓÄÉʲô´ëÊ©±£»¤ÏµÍ³¡£×îºó£¬Ñ§Ô±»¹½«Á˽âÈëÇÖ¼ì²âÔÀí£¬Äþ¾²¼ÆÄ±´´½¨£¬Éç»á¹¤³Ì¼¼Êõ£¬DDOS¹¥»÷¼¼Êõ£¬»º³åÇøÒç³ö¼¼ÊõºÍ²¡¶¾·ÖÎö¼¼Êõ¡£Ñ§Ô±ÔÚ5ÌìÄÚÍê³ÉÉÏÊöÃܼ¯µÄ¿Î³Ì£¬ÕÆÎÕµÀµÂºÚ¿ÍËùÐèÒªµÄ֪ʶ¼°¾Ñéºó£¬¿ÉÒÔ¼ÓÈëEC-COUNCILÈÏÖ¤µÄµÀµÂºÚ¿Í¿¼ÊÔ312-50¡£
¿Î³Ì¸ÙÒª
2. Footprinting and Reconnaissance (²Èµã)
3. Scanning Networks (ÍøÂçɨÃè)
4. Enumeration (ö¾Ù)
5. System Hacking (ϵͳÈëÇÖ)
6. Trojans and Backdoors (ľÂíºÍºóÃÅ)
7. Viruses and Worms (²¡¶¾ºÍÈ䳿)
8. Sniffers (Ðá̽¼àÌý)
9. Social Engineering (Éç»á¹¤³Ì¹¥»÷)
10. Denial of Service (¾Ü¾ø·þÎñ)
11. Session Hijacking (»á»°½Ù³Ö)
12. Hacking Webservers (ÍøÕ¾ÈëÇÖ)
13. Hacking Web Applications Vulnerabilities (WEB©¶´¹¥»÷¼¼Êõ)
14. SQL Injection (SQL ×¢Èë)
15. Hacking Wireless Networks (ÎÞÏß¹¥»÷)
16. Evading IDS, Firewalls and Honeypots (·À»ðǽ¡¢ÈëÇÖ¼ì²âϵͳ¼°ÃÛ¹Þϵͳ¹æ±Ü¼¼Êõ)
17. Buffer Overflows (»º³åÇøÒç³ö)
18. Cryptography (ÃÜÂëѧ)
19. Penetration Testing (ÉøÍ¸²âÊÔ)
¸ü¶à¹ØÓÚCEHÅàѵµÄ¸É»õÖØµã
Äþ¾²¹ÜÀíÈËÔ±£¬Éó¼ÆÈËÔ±£¬Äþ¾²×¨¼Ò£¬ÍøÕ¾¹ÜÀíÈËÔ±ÒÔ¼°ËùÓйØ×¢ÍøÂçÄþ¾²µÄϲºÃÕß¡£
µÀµÂºÚ¿ÍÈÏÖ¤¿¼ÊÔ312-50¿ÉÒÔÔÚ×îºóÒ»Ìì½øÐÐÔöÇ¿ÐÍѵÁ·£¨¿ÉÑ¡£©£¬Ñ§Ô±ÐèҪͨ¹ýÖ¸¶¨Prometric¿¼³¡½øÐп¼ÊÔ²ÅÆø»ñÈ¡CEHÈÏÖ¤¡£
µÀµÂºÚ¿ÍÅàѵ»á½²Êö´óÁ¿µÄºÚ¿Í¹¤¾ß£¬²¢Ê¹Äú¿ÉÒÔÊìÁ·Ê¹Óã»ËäÈ»£¬Ê¹ÓÃÕâÀàºÚ¿Í¹¤¾ß±ØÐëÊÇÒÔÉøÍ¸²âÊÔΪĿµÄµÄ£¬ËùÒÔ£¬Äã»á±»ÒªÇóÇ©ÊðÒ»·ÝÐÒéÉùÃ÷£¬ÉùÃ÷ÄãÔÚÈκÎÇé¿ö϶¼²»»áʹÓÃÅàѵÖлñµÃµÄ¼¼ÄܽøÐзǷ¨»ò¶ñÒâµÄ¹¥»÷£¬²»µÃʹÓÃÕâЩ¹¤¾ßÆÆ»µÈκμÆËã»úϵͳ£¬²¢È·±£ÕâЩ¹¤¾ß²»»á±»Á÷´«ºÍÎóÓá£×îºó£¬ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©½«¶ÔÉêÇëÈ˽øÐÐÉóºË£¬È·ÈÏÉêÇëÈËÊÇ·ñÔںϷ¨µÄ¹«Ë¾½øÐÐÊÂÇé¡£Èç¹û²»±»ÈÏÖ¤ÅàѵÖÐÐÄ£¨ATC£©ÈϿɣ¬ÔòATCÓÐȨ¾Ü¾øÉêÇëÈ˽øÐÐCEHÈÏÖ¤¡£