班级人数--热线:4008699035 手机:15921673576/13918613812( 微信同号) |
增加互动环节,
保障培训效果,坚持小班授课,每个班级的人数限3到5人,超过限定人数,安排到下一期进行学习。 |
授课地点及时间 |
上课地点:【上海】:同济大学(沪西)/新城金郡商务楼(11号线白银路站) 【深圳分部】:电影大厦(地铁一号线大剧院站)/深圳大学成教院 【北京分部】:北京中山/福鑫大楼 【南京分部】:金港大厦(和燕路) 【武汉分部】:佳源大厦(高新二路) 【成都分部】:领馆区1号(中和大道) 【广州分部】:广粮大厦 【西安分部】:协同大厦 【沈阳分部】:沈阳理工大学/六宅臻品 【郑州分部】:郑州大学/锦华大厦 【石家庄分部】:河北科技大学/瑞景大厦
开班时间(连续班/晚班/周末班):即将开课,详情请咨询客服。(欢迎您垂询,视教育质量为生命!) |
课时 |
◆资深工程师授课
☆注重质量
☆边讲边练
☆若学员成绩达到合格及以上水平,将获得免费推荐工作的机会
★查看实验设备详情,请点击此处★ |
质量以及保障 |
☆
1、如有部分内容理解不透或消化不好,可免费在以后培训班中重听;
☆ 2、在课程结束之后,授课老师会留给学员手机和E-mail,免费提供半年的课程技术支持,以便保证培训后的继续消化;
☆3、合格的学员可享受免费推荐就业机会。
☆4、合格学员免费颁发相关工程师等资格证书,提升您的职业资质。 |
☆课程大纲☆ |
|
Command-Line Tools and How to Use Them
TShark and Dumpcap Command-Line Tools
Capinfos Command-Line Tool
Editcap Command-Line Tool
Mergecap Command-Line Tool
Text2pcap Command-Line Tool
Split and Merge Trace Files
Advance usage of Capture and Display Filters
Writing advanced Capture filters scripts
Writing Advanced Display filters
Using triggered filters
The Expert System Advance Usage
Dealing with congestion - shattered windows and flooding
Baseline network communications
Unusual network communications
Vulnerabilities in the TCP/IP resolution process
Lab exercises and case studies
Who is talking?
Port Scans
Mutant Scans
IP Scans
Application Mapping
OS Fingerprinting
Lab exercises and case studies
VoIP Analysis
SIP analysis and troubleshooting
RTP, RTCP and media analysis
Creating VoIP filters and analysis profiles
Lab exercises and case studies
Applications Analysis and Troubleshooting
HTTP analysis and troubleshooting
FTP analysis and troubleshooting
DNS operation and troubleshooting
Video transmission analysys
Databases network-related problems
Network Security and Forensics Basics
Gather information – what to look for
Unusual traffic patterns
Complementary tools
Detecting Security Suspicious Patterns
MAC and IP address spoofing
Attacks signatures and signature locations
ARP poisoning
Header and sequencing signatures
Attacks and exploits
TCP splicing and unusual traffic
DoS and DDoS Attacks
Protocol scans
maliciously malformed packets
Lab exercises and case studies
|