會員登錄
軟體搜尋
您的位置: 網站首頁 >> 專業知識教學 >> 電腦教學認證 >> 商品詳情
商品詳情
商品編號:TIC1809 碟片數量:1片 銷售價格:80 瀏覽次數:34726 【轉載TXT文檔】 |
您可能也喜歡:
DVDP4356--The Gnomon Workshop - Designing Spaceships for Games 遊戲太空船概念設計教學 英文教學版(DVD9一片裝 此片售價200元)
DVD29830--The Gnomon Workshop - The Art of Visual Storytelling 視覺故事概念設計教學 英文教學版(DVD一片裝)
TIC3086--新多益滿分講師授課:全新制NEW TOEIC多益閱讀高分關鍵+狠準擬真試題+解析 繁體中文教學版
DVD29802--Udemy - Blender Essential From Beginner to 3D Masterclass (B3D基礎教學) 英文教學版(DVD一片裝)
DVDP4341--Unreal Engine 5 The Complete Automotive Cinematic Course (UE5 電影感車輛製作教學) 英文教學版(DVD9一片裝 此片售價200元)
商品描述
VTC com Using Security 英文正式版(教學)
軟體簡介:
VTC com Using Security 英文正式版(教學)
官方網站: http://www.vtc.com/modules/products/titleDetails.php?doorway=Using-Security-Tools-Tutorials.htm&type=products
中文網站:
軟體簡介: (以官方網站為準)
Introduction
Course Introduction
General Utilities
Secure Shell (ssh)
VNC
NX Client
VMware pt. 1
VMware pt. 2
Host Security
Anti-Virus pt. 1
Anti-Virus pt. 2
Anti-Malware
Linux Host Lockdown Tools
Windows Host Lockdown Tools (SCAT) pt. 1
Windows Host Lockdown Tools (SCAT) pt. 2
Windows Utilities
Windows Command-Line Tools pt. 1
Windows Command-Line Tools pt. 2
Windows Firewall pt. 1
Windows Firewall pt. 2
MBSA
MSConfig
Linux Tools
User Tools pt. 1
User Tools pt. 2
tcpdump (05:51)
Inetd/TCP Wrappers & Xinetd pt. 1
Inetd/TCP Wrappers & Xinetd pt. 2
md5sum (05:51)
File Security Tools
su & sudo
Scanning & Reconnaisance Tools
Nmap pt. 1
Nmap pt. 2
Nessus pt. 1
Nessus pt. 2
Hping3 (07:19)
Look-at-Lan
nslookup & dig
Ping & Traceroute pt. 1
Ping & Traceroute pt. 2
Superscan pt. 1
Superscan pt. 2
Fing
Network Security Tools
SmoothWall Firewall pt. 1
SmoothWall Firewall pt. 2
SmoothWall Firewall pt. 3
SmoothWall Firewall pt. 4
Linux Firewalls pt. 1
Linux Firewalls pt. 2
3rd Party Windows Firewalls pt. 1
3rd Party Windows Firewalls pt. 2
Wireshark pt. 1
Wireshark pt. 2
Wireless Security
Net Stumbler
inSSIDer
Wireless Capture Tools pt. 1
Wireless Capture Tools pt. 2
Web Tools
Google Hacking Techniques pt. 1
Google Hacking Techniques pt. 2
Nikto/Wikto
NetCraft
whois
Paros Proxy
Encryption Tools
TrueCrypt (07:55)
Encrypting Files in Linux pt. 1
Encrypting Files in Linux pt. 2
Microsoft Windows EFS
Using Encrypted Email - PGP pt. 1
Using Encrypted Email - PGP pt. 2
Penetration Testing tools
Metasploit Framework pt. 1
Metasploit Framework pt. 2
Netcat
John the Ripper pt. 1
John the Ripper pt. 2
Cain & Abel pt. 1
Cain & Abel pt. 2
Colasoft Packet Builder
Computer Forensics Tools
Adepto
Adepto Demonstration
Ghost
Autopsy
Forensics Tool Kit pt. 1
Forensics Tool Kit pt. 2
Live Linux Distros
Backtrack 4
Helix
Damn Vulnerable Linux
Building a Security Toolbox
Creating a Security Toolbox
Dual-Booting a Security Laptop pt. 1
Dual-Booting a Security Laptop pt. 2
Creating a Security USB Stick pt. 1
Creating a Security USB Stick pt. 2
Creating Your Own Live Security CD pt. 1
Creating Your Own Live Security CD pt. 2
Conclusion
Using Security Tools - Conclusion
Resources
Credits
About this Author
軟體簡介:
VTC com Using Security 英文正式版(教學)
官方網站: http://www.vtc.com/modules/products/titleDetails.php?doorway=Using-Security-Tools-Tutorials.htm&type=products
中文網站:
軟體簡介: (以官方網站為準)
Introduction
Course Introduction
General Utilities
Secure Shell (ssh)
VNC
NX Client
VMware pt. 1
VMware pt. 2
Host Security
Anti-Virus pt. 1
Anti-Virus pt. 2
Anti-Malware
Linux Host Lockdown Tools
Windows Host Lockdown Tools (SCAT) pt. 1
Windows Host Lockdown Tools (SCAT) pt. 2
Windows Utilities
Windows Command-Line Tools pt. 1
Windows Command-Line Tools pt. 2
Windows Firewall pt. 1
Windows Firewall pt. 2
MBSA
MSConfig
Linux Tools
User Tools pt. 1
User Tools pt. 2
tcpdump (05:51)
Inetd/TCP Wrappers & Xinetd pt. 1
Inetd/TCP Wrappers & Xinetd pt. 2
md5sum (05:51)
File Security Tools
su & sudo
Scanning & Reconnaisance Tools
Nmap pt. 1
Nmap pt. 2
Nessus pt. 1
Nessus pt. 2
Hping3 (07:19)
Look-at-Lan
nslookup & dig
Ping & Traceroute pt. 1
Ping & Traceroute pt. 2
Superscan pt. 1
Superscan pt. 2
Fing
Network Security Tools
SmoothWall Firewall pt. 1
SmoothWall Firewall pt. 2
SmoothWall Firewall pt. 3
SmoothWall Firewall pt. 4
Linux Firewalls pt. 1
Linux Firewalls pt. 2
3rd Party Windows Firewalls pt. 1
3rd Party Windows Firewalls pt. 2
Wireshark pt. 1
Wireshark pt. 2
Wireless Security
Net Stumbler
inSSIDer
Wireless Capture Tools pt. 1
Wireless Capture Tools pt. 2
Web Tools
Google Hacking Techniques pt. 1
Google Hacking Techniques pt. 2
Nikto/Wikto
NetCraft
whois
Paros Proxy
Encryption Tools
TrueCrypt (07:55)
Encrypting Files in Linux pt. 1
Encrypting Files in Linux pt. 2
Microsoft Windows EFS
Using Encrypted Email - PGP pt. 1
Using Encrypted Email - PGP pt. 2
Penetration Testing tools
Metasploit Framework pt. 1
Metasploit Framework pt. 2
Netcat
John the Ripper pt. 1
John the Ripper pt. 2
Cain & Abel pt. 1
Cain & Abel pt. 2
Colasoft Packet Builder
Computer Forensics Tools
Adepto
Adepto Demonstration
Ghost
Autopsy
Forensics Tool Kit pt. 1
Forensics Tool Kit pt. 2
Live Linux Distros
Backtrack 4
Helix
Damn Vulnerable Linux
Building a Security Toolbox
Creating a Security Toolbox
Dual-Booting a Security Laptop pt. 1
Dual-Booting a Security Laptop pt. 2
Creating a Security USB Stick pt. 1
Creating a Security USB Stick pt. 2
Creating Your Own Live Security CD pt. 1
Creating Your Own Live Security CD pt. 2
Conclusion
Using Security Tools - Conclusion
Resources
Credits
About this Author