|
[ÀϹݵµ¼] ÇØÅ·°ú º¸¾È - ³×Æ®¿öÅ© ½Ã½ºÅÛ °ü¸®ÀÚ¸¦ À§ÇÑ [4ÆÇ] [ÀýÆÇ] [±ÇÁúµµ¼] |
| * CD Æ÷ÇÔ ÀÌ Ã¥Àº ÇöÀç ±â¼úÀûÀ¸·Î µµ´ÞÇØ ÀÖ´Â °¡Àå ÃÖ½ÅÀÇ ÇØÅ·°ú º¸¾È¿¡ ´ëÇÑ ½ÇÁúÀûÀÎ ±â¹ýµéÀÌ Àϸñ¿©¾ðÇÏ°Ô Á¤¸®µÇ¾î ÀÖ´Ù. ÀÌ Ã¥À» ÅëÇØ ³×Æ®¿öÅ©¿Í ½Ã½ºÅÛ, ¼ÒÇÁÆ®¿þ¿ö Àüü¸¦ ¾Æ¿ì¸£´Â ÇØÅ·ÀÇ ¿ø¸®¿Í ÀÌ¿¡ ´ëÀÀÇÑ º¸¾È ¹æ¹ýÀ» ü°èÀûÀ¸·Î ¹è¿ï ¼ö ÀÖÀ» °ÍÀÌ´Ù. ³×Æ®¿öÅ© °ü¸®ÀÚµéÀÇ Çʼö Áöħ¼, °³Á¤ 4ÆÇÀÌ´Ù. ħÀÔÀÚÀÇ ½À°ü°ú ±â¹ýÀ» ÆľÇÇÒ ¼ö ÀÖ´Â ºÐ¼® ¹æ¹ý, ±×¸®°í ³×Æ®¿öÅ© ¿î¿µÃ¼Á¦ Àü¹Ý¿¡ °ÉÄ£ ÃֽŠÇØÅ· Åø°ú ±â¹ýµéÀ» ¼Ò°³ÇÏ°í ÀÖ¾î ½Ã½ºÅÛ °ü¸®ÀÚµéÀ̶ó¸é ÇѹøÂë »ìÆ캼¸¸ÇÑ ³»¿ëµéÀÌ´Ù.
|
Foundstone Inc.(http://www.foundstone.com)ÀÇ È¸ÀåÀ̸ç, IT º¸¾ÈÆò°¡, ¹æȺ® °ËÅä, PKI, ħÀÔŽÁö, ħÀÔ´ëÀÀ µî ½Ç¹«¿¡ 10³â ÀÌ»ó Á¾»çÇÏ°í ÀÖ´Ù. 2³â °£ ¡®InfoWorld¡¯¿¡¼ ¹ß°£ÇÏ´Â Security Watch¿¡ º¸¾È¹®Á¦, Å»Ãë, Ãë¾à¼º µî¿¡ ´ëÇÑ Ä®·³À» °øµ¿ ÁýÇÊÇÏ¿´´Ù. ±×¸®°í °¢ ±â¾÷, Çб³, Á¤ºÎ±â°ü¿¡¼ Cisco, Nevell, Solaris, AIX, AS/400, WindowsNT, LinuxÀÇ ¿î¿µ°ú ³×Æ®¿öÅ© º¸¾È, ½Ã½ºÅÛ º¸¾È °ü·Ã »ó´ãÀ» ÇØ¿Ô´Ù. |
Part 1 Á¤º¸ ¼öÁý Chapter 1 DzÇÁ¸°ÆÃ(Footprinting) Chapter 2 ½ºÄ³´×(Scanning) Chapter 3 ¸ñ·ÏÈ(Enumeration)Part 2 ½Ã½ºÅÛ ÇØÅ·(System Hacking) Chapter 4 À©µµ¿ì 9x, Me ÇØÅ· Chapter 5 À©µµ¿ì NT Á¦Ç°±º ÇØÅ· Chapter 6 À¯´Ð½º ÇØÅ·(Hacking UNIX) Part 3 ³×Æ®¿öÅ© ÇØÅ·(Network Hacking) Chapter 7 Dial-Up, PBX, Voicemail, VPN ÇØÅ· Chapter 8 ³×Æ®¿öÅ© Àåºñ(Network Devices) Chapter 9 ¹«¼± ÇØÅ·(Wireless Hacking) Chapter 10 ¹æȺ®(Firewalls) Chapter 11 ¼ºñ½º °ÅºÎ °ø°Ý(Denial of Service Attacks) Part 4 ¼ÒÇÁÆ®¿þ¾î ÇØÅ·(Software Hacking) Chapter 12 ¿ø°Ý °ü¸®(Remote Control Insecurities) Chapter 13 °í±Þ ÇØÅ·(Advanced Techniques) Chapter 14 À¥ ÇØÅ·(Web Hacking) Chapter 15 ÀÎÅÍ³Ý »ç¿ëÀÚ °ø°Ý(Hacking the Internet User)
|
|
| | ÇöÀç ÇØÅ·°ú º¸¾È - ³×Æ®¿öÅ© ½Ã½ºÅÛ °ü¸®ÀÚ¸¦ À§ÇÑ [4ÆÇ]¿¡ µî·ÏµÈ ¼ÆòÀÌ ¾ø½À´Ï´Ù. | |
|
|
|