
网盘:百度 | 学分:5,VIP免费 | 发布:2023-09-03 | 查看:0 | 更新:2023-09-03 | 测试/产品/安全
全栈web网络安全架构攻防专家职位培训班实战课
网盘:百度 | 学分:5,VIP免费 | 发布:2023-09-03 | 查看:0 | 更新:2023-09-03 | 测试/产品/安全
全栈web网络安全架构攻防专家职位培训班实战课
├─01.网络安全攻防实战课
│&nBSp; &nBSp;&nBSp; &nBSp;01-1.网络安全入门导论.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-2.网络安全行业解读.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-3.网络安全学习指南.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-4.网络&AMp;&AMp;与防御(互联网发展史).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-5.网络&AMp;&AMp;与防御(Kali linux).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-6.网络&AMp;&AMp;与防御(TCP-IP协议栈).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-7.网络&AMp;&AMp;与防御(ARP原理与实践).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-8.网络&AMp;&AMp;与防御(ARP中间人获取网络管理账号密码).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-9.网络&AMp;&AMp;与防御(ARP中间人获取Web网站账号密码).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-10.网络&AMp;&AMp;与防御(DDOS原理与实践-Loic与Hping3).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-11.Kali linux渗透测试原理与实践(揭秘地下&AMp;&AMp;诱导网).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-12.Kali linux渗透测试原理与实践-2-MS12-020.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-13.Kali linux渗透测试原理与实践-3-MS170.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-14.WiFi无线渗透与安全防御.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;01-15.个人信息安全指南(防范电信诈骗指南).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─02.网络安全架构与部署-CCN
│&nBSp;&nBSp;├─1. TCP&AMp;IP协议栈
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-1.微职位介绍-开学典礼-新手上路.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-2.1.1 网络安全入坑指南.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-3.1.2 网络安全入门指南-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-4.1.3 网络安全入坑指南-3.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-5.1.4 网络安全入坑指南-4.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-6.TCP-IP协议栈-互联网发展史.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-7.TCP-IP协议栈-OSI七层模型.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-8.TCP-IP协议栈-OSI七层模型-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-9.TCP-IP协议栈-简介-1.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-10.TCP-IP协议栈-简介-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-11.TCP-IP协议栈-Ethernet协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-12.TCP-IP协议栈-IP协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-13.TCP-IP协议栈-ARP协议(基于P2Pover).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-14.TCP-IP协议栈-ARP&AMp;&AMp;(基于P2Pover).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-15.TCP-IP协议栈-ARP&AMp;&AMp;2(基于CAIn).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-16.TCP-IP协议栈-ARP防御技术.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-17.TCP-IP协议栈-ICMP协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-18.TCP-IP协议栈-DNS协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-19.TCP-IP协议栈-DHCP协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-20.TCP-IP协议栈-DHCP协议-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-21.TCP-IP协议栈-TCP-Telnet协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1-1-22.TCP-IP协议栈-TCP-Telnet-2协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;├─2. 设备原理与操作
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-1.设备型号概述.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-2.设备硬件架构.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-3.设备基础互联.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-4.ios基础操作-1(GNS3-CRT-Wireshark).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-5.ios基础操作-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-6.ios进阶操作-1.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-7.ios进阶操作-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-8.ios进阶操作-3.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2-2-9.ios进阶操作-4.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;├─3. IP子网划分
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-3-3-1.IP地址概述.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-3-3-2.IP子网划分.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-3-3-3.IP子网汇总与考试解答.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;├─4. 路由技术
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-1.静态路由.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-2.默认-浮动路由.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-3.静态路由进阶(跨网段-IP头部变化).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-4.静态路由进阶(跨网段-IP头部变化)-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-5.路由协议概述.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-6.RIP路由协议概述与部署.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-7.RIP路由分组与计时器.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-8.RIP路由算法-防环机制.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-9.RIPv2对比RIPv1.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-10.RIPv2路由汇总.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-11.EIGRP基础概述与特征.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-12.EIGRP邻居建立-基础部署.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-13.EIGRP路由汇总.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-14.OSPF基础概述-部署.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4-4-15.OSPF邻居建立-路由分组-汇总.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;├─5. 交换技术
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-1.局域网基础-标准-原理-交换机实验.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-2.VLAN技术.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-3.Trunk技术-1.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-4.Trunk技术-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-5.Trunk技术-3.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-6.Trunk技术-4.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-7.VTP技术详解.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-8.二层环路形成-广播风暴-STP生成树协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-9.STP生成树协议-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-10.STP生成树协议-3.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-11.交换冗余(链路捆绑).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-12.单臂路由实现VLAN间通信.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-13.三层交换机实现VLAN间通信-DHCP服务.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-14.端口安全实现接入安全.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-16.期中考试-中小型企业网项目实战-1.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5-5-17.期中考试-中小型企业网项目实战-2.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;├─6. 广域网技术
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-6-6-1.HDLC协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-6-6-2.PPP协议.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;├─7. 安全技术
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-7-7-1.访问控制列表.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-7-7-2.时间ACL与自反ACL.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-7-7-3.NAT地址翻转技术.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;└─8. 项目实战
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-8-8-1.期末考试-大中型企业网项目实战.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;
├─03.网络安全架构与部署-高级路由
│&nBSp; &nBSp;&nBSp; &nBSp;03-1.RIP路由认证.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-2.RIP默认路由.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-3.RIP被动接口-单播更新.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-4.RIP计时器-偏移列表.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-5.OSPF路由认证.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-6.OSPF默认路由.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-7.OSPF路由分组-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-8.OSPF路由分组-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-9.OSPF区域类型.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-10.OSPF网络类型.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-11.路由重分发.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-12.路由过滤.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-13.路由策略-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-14.路由策略-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-15.BGP介绍-特征-部署.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-16.BGP基础部署.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-17.BGP路由分组.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-18.BGP邻居建立.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-19.BGP网络设计.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-20.BGP路径属性.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-21.BGP选路原则.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-22.BGP邻居认证-路由汇总-默认路由-对等体组.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-23.BGP路由反射与路由联盟.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-24.BGP团体属性.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-25.BGP后门路由.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;03-26.IPv6协议原理与实践.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─04.网络安全架构-高级交换
│&nBSp; &nBSp;&nBSp; &nBSp;04-1.GNS3 IOU使用方法.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-2.大中型企业网综合项目拓扑搭建.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-3.RSTP概述-端口状态-角色.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-4.RSTP收敛机制-配置-分组.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-5.MSTP基础配置-部署-分组.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-6.BPDU Filter - Guard - Root.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-7.Loop Guard - UDLD - Protected.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-8.交换通信-多层交换基础.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-9.交换通信-多层交换原理.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-10.交换通信-DHCP中继.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-11.交换冗余-链路冗余.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-12.交换冗余-网关冗余之HSRP.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-13.交换冗余-网关冗余之HSRP-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-14.交换冗余-网关冗余之VRRP.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-15.交换冗余-网关冗余之GLBP.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-16.交换冗余-设备冗余.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-17.设备安全-SSH.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-18.设备安全-VTY终端登录限制.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-19.设备安全-HttPS-banner.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-20.设备安全-CDP协议.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-21.协议安全-VLAN安全.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-22.协议安全-MAC安全.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-23.协议安全-DHCP-ARP-IP欺骗与防御.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-24.流量安全Storm-Control.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-25.流量安全VLAN ACL.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-26.流量安全-SPAN.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-27.流量安全-PVLAN 私有VLAN.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;04-28.接入安全-AAA认证授权审计.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─05.VPN原理与实践视频课程
│&nBSp; &nBSp;&nBSp; &nBSp;05-1.密码学原理.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-2.VPN原理-L2L VPN部署.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-3.L2L VPN拓展(nat-t穿越-动态拨号-DYmap).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-4.GRE Over IPsec.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-5.DMVPN.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-6.HA VPN-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-7.HA VPN-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-8.EZVPN.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;05-9.SSL VPN.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─06.防火墙原理与实践视频课程
│&nBSp; &nBSp;&nBSp; &nBSp;06-1.防火墙基础与入门.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;06-2.防火墙部署.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;06-3.防火墙进阶-ACL与NAT.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;06-4.防火墙进阶-DHCP-PPPOE.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;06-5.防火墙进阶-透明模式.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;06-6.防火墙进阶-多模式.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;06-7.防火墙高级-FAIlover故障切换.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;06-8.防火墙高级-ASDM-VPN实践.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─07.防御与安全审计
│&nBSp;&nBSp;├─1. &AMp;&AMp;防御原理与实践
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-1.IDS-IPS&AMp;&AMp;防御概述.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-2.IDS-IPS&AMp;&AMp;防御环境搭建.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-3.IDS-IPS&AMp;&AMp;防御实验部署.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;└─2. 安全审计(流量控制)原理与实践
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-1.Panabit流量控制原理(面授).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-2.Panabit流量控制实践(面授).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-3.(录制)Panabit介绍.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-4.(录制)产品介绍.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-5.(录制)部署模型.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-6.(录制)初始安装.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-7.(录制)快速调试.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-8.(录制)产品界面.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-9.(录制)策略路由.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-10.(录制)流量控制-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-11.(录制)流量控制-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-12.(录制)流量控制-3.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-13.(录制)流量控制-4.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-14.(录制)高级流控.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-15.(录制)HTTP管控.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-16.(录制)MAC管控.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-17.(录制)连接控制.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-18.(录制)PPPOE认证.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;2-19.(录制)Web认证.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;
├─08.信息安全等级保护项目
│&nBSp; &nBSp;&nBSp; &nBSp;08-1.项目工程课介绍.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;08-2.项目基础介绍(流程-角色-标的).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;08-3.项目文档编制-1(投招标书-技术方案).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;08-4.项目文档编制-2(投招标书-技术方案).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;08-5.项目文档编制-3(投招标书-技术方案).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;08-6.网络安全设备选型.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;08-7.信息安全等保项目解读.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;08-8.信息安全等保项目实战(Visio绘制安全项目拓扑).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─09.Kali linux渗透测试
│&nBSp; &nBSp;&nBSp; &nBSp;09-1.Kali linux渗透测试原理与安全实验室搭建.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-2.信息搜集-DNS-IP踩点.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-3.信息搜集-搜索引擎-拓扑路径踩点.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-4.信息搜集-主机扫描-系统扫描-端口扫描.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-5.信息搜集-漏洞扫描.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-6.信息搜集-Telnet网络查点.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-7.信息搜集-SSH网络查点.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-8.渗透实战-漏洞复现-MS12020-MS08067.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-9.渗透实战-漏洞复现-MS17010.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-10.渗透实战-SAMba漏洞服务&AMp;&AMp;.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-11.渗透实战-ADobe阅读器漏洞服务&AMp;&AMp;.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-12.渗透实战-Office办公软件漏洞服务&AMp;&AMp;.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-13.渗透实战-社会工程学之伪装木马&AMp;&AMp;-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-14.渗透实战-社会工程学之伪装木马&AMp;&AMp;-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-15.渗透实战-社会工程学之伪装木马&AMp;&AMp;-3.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-16.渗透实战-社会工程学之网站钓鱼&AMp;&AMp;.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-17.渗透实战-自动化渗透.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;09-18.后渗透&AMp;&AMp;-MeterPreter.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─10.Web安全技术入门
│&nBSp;&nBSp;├─1. Web白帽子黑客入门导论
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-1.Web安全学习路线图.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-2.Web安全学习方法.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;├─2. Web网站实战(成为站长必经之路)
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-1.WordPress在线建站.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-2.XAMpp原理与实践(Web集成环境解读).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-3.XAMpp安装WordPress.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-4.Joomla介绍与安装.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-5.Discuz介绍与安装.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-6.XiunobBS介绍与安装.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;2-7.dedecms介绍与安装.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;└─3. HTTP协议原理与实践(读懂Web通信底层)
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-1.HTTP协议概述.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-2.HTTP请求响应.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-3.HTTP请求方法.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-4.HTTP响应方法.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-5.HTTP消息报文之请求报文.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-6.HTTP消息报文之响应报文-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-7.HTTP消息报文之响应报文-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-8.HTTP消息报文之通用报文.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;3-9.HTTP消息报文之实体报文.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;
├─11.Web前端开发
│&nBSp; &nBSp;&nBSp; &nBSp;11-1.Webstorm安装与使用.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-2.HTML入门.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-3.HTML头部.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-4.HTML标题.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-5.HTML段落.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-6.HTML文本.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-7.HTML链接.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-8.HTML列表.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-9.HTML表格.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-10.HTML表单.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-11.HTML排版布局.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-12.HTML项目一.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-13.HTML项目二.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-14.CSS入门-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-15.CSS入门-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-16.CSS选择器.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-17.CSS背景.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-18.CSS文本.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-19.CSS字体.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-20.CSS链接.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-21.CSS盒模型.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-22.CSS定位-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-23.CSS定位-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-24.CSS浮动.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-25.CSS项目-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-26.CSS项目-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-27.JavaScrIPt简介.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-28.JavaScrIPt基础.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-29.JavaScrIPt变量.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-30.JavaScrIPt数字.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-31.JavaScrIPt字符串.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-32.JavaScrIPt数组.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-33.JavaScrIPt词典.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-34.JavaScrIPt流程控制-if-switch.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-35.JavaScrIPt流程控制-for-while.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-36.JavaScrIPt流程控制-break-continue.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-37.JavaScrIPt DOM基础.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-38.JavaScrIPt DOM事件.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-39.JavaScrIPt BOM事件.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-40.JavaScrIPt项目一-返回顶部按钮.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-41.JavaScrIPt项目二-下拉菜单.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;11-42.JavaScrIPt项目三-轮播图.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─12.python Web开发
│&nBSp;&nBSp;├─1. python编程原理与实践(面授版)
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-1.python导论入门.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-2.python环境安装(Pycharm).mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-3.python对象类型-变量.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-4.python对象类型-数字.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-5.python对象类型-字符串.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-6.python对象类型-列表.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-7.python对象类型-字典.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-8.python流程控制-if条件语句.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-9.python流程控制-for循环语句.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-10.python函数与模块.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;1-11.python类与面向对象.mkv
│&nBSp;&nBSp;│&nBSp; &nBSp;&nBSp; &nBSp;
│&nBSp;&nBSp;└─2. DjanGo Web原理与实践(面授版)
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-1.DjanGo Web框架介绍.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-2.DjanGo框架安装.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-3.DjanGoCMS实战-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-4.DjanGoCMS实战-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-5.DjanGo Models模型原理.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-6.DjanGo视图-后台管理-模板.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp; 2-7.DjanGoBlog实战.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;
├─13.Web安全渗透测试与安全防御
│&nBSp; &nBSp;&nBSp; &nBSp;13-1.Web安全实验室搭建.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-2.Web信息搜集-目标扫描.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-3.Web信息搜集-搜索引擎.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-4.Web信息搜集-域名遍历.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-5.Web信息搜集-指纹识别.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-6.Web漏洞扫描-BurPSuite.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-7.Web漏洞扫描-WPScan-Joomscan.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-8.SQL注入原理与实践-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-9.SQL注入原理与实践-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-10.SQL注入原理与实践-3.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-11.SQL注入原理与实践-4.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-12.文件上传与网站木马-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-13.文件上传与网站木马-2.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-14.命令执行-1.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-15.文件包含(LFI与RFI).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-16.XSS跨站请求&AMp;&AMp;与防御.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;13-17.CSRF跨站请求&AMp;&AMp;与防御.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─14.CTF靶机实战系列(夺旗赛-网络安全比赛)
│&nBSp; &nBSp;&nBSp; &nBSp;14-1.CTF夺旗赛入门(赛事介绍-真题解析-实战演练).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;14-2.CTF赛事与真题解析(赛事介绍-真题解析-实战演练).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;14-3.一步一步拿下WordPress网站 - CTF夺旗赛系列课.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;14-4.CTF4靶机实战 - CTF夺旗赛系列课.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;14-5.CTF6靶机实战 - CTF夺旗赛系列课.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;14-6.CTF7靶机实战 - CTF夺旗赛系列课.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;14-7.Matrix1靶机实战 - CTF夺旗赛系列课.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─15.WiFi渗透与安全防御
│&nBSp; &nBSp;&nBSp; &nBSp;15-1.WiFi攻防实战课(面授).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-2.(录制)WiFi安全漫谈.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-3.(录制)WiFi拓扑组成.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-4.(录制)WiFi术语解读.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-5.(录制)无线路由器设置.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-6.(录制)&AMp;&AMp;环境设置.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-7.(录制)使用Wirelessmon进行无线热点扫描.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-8.(录制)WEP密码破解.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-9.(录制)WPA-WP2密码破解(Minidwep).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-10.(录制)WPA-WP2密码破解(EWSA).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-11.(录制)WPS密码破解(PIN暴力破解).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-12.(录制)WPS密码破解(QSS快速安全设置).mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-13.(录制)内网渗透-破解隐藏SSID热点.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-14.(录制)内网渗透-绕过MAC地址过滤.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-15.(录制)内网渗透-绕过DHCP关闭限制.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-16.(录制)无线基础防御.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-17.(录制)无线进阶防御.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;15-18.(录制)无线高级防御.mkv
│&nBSp; &nBSp;&nBSp; &nBSp;
├─全栈网络AQ专家-m3u8.rar
│&nBSp; &nBSp;&nBSp; &nBSp;
└─课件
&nBSp; &nBSp; ├─1
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;01网络安全入坑指南.pdf
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2网络安全行业解读.pdf
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;4网络与防御(互联网发展史).pdf
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;5网络与防御(Kali linux).pdf
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;网络与防御(ARP中间人获取网络管理账号密码).docx
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;网络与防御(TCP-IP协议栈).zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─2
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-10TCP-IP协议栈-简介-2 课堂笔记-交换技术.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-11TCP-IP协议栈-Ethernet协议课堂笔记-安全策略.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-31.2 网络安全入门指南-2 上课工具下载.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-8TCP-IP协议栈-OSI七层模型-2 课堂笔记-IP地址与子网划分.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─3
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2RIP默认路由RIP 从入门到精通课堂笔记(请用onenote打开).zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;5OSPF路由认证路 由策略课堂笔记.one.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;7OSPF默认路由 IPv6课堂笔记.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─5
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2VPN原理-L2L VPN部署 网络安全之VPN技术课堂笔记.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;3L2L VPN拓展(nat-t穿越-动态拨号-DYmap) VPN配套工具.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─6
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;3防火墙进阶-ACL与NAT PIX-2012-8-27配置.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;4防火墙进阶-DHCP-PPPOE 防火墙课堂配套笔记.one.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─7
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-2IDS-IPS--防御环境搭建 网络安全之入侵防御课堂笔记.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-3IDS-IPS防御实验部署 IPS镜像文件.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2-2Panabit流量控制实践(面授) Panabit上网行为管理(流量控制)系统镜像打包下载(Panabit从入门到精通配套镜像共享).zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2-3(录制)Panabit介绍 Panabit从入门到精通「PingingLab陈鑫杰-出品」上网行为管理-流控-智能应用网关经典入.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─8
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2项目基础介绍(流程-角色-标的) 等保项目(国土厅).zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;3项目文档编制-1(投招标书-技术方案) 等保原理文档.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;4项目文档编制-2(投招标书-技术方案) 项目工程讲解.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─9
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-2Web安全学习方法 Web技术入门书籍.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2-2XAMpp原理与实践(Web集成环境解读) Web技术入门授课课件.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2信息搜集-DNS-IP踩点 Metasploit渗透测试从入门到精通配套上课课件-解压后用Mindmanager打开(Pingi.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;4信息搜集-主机扫描-系统扫描-端口扫描 Metasploit渗透测试从入门到精通配套书籍(3本)请解压后用PDF打开(PingingLab陈.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;5信息搜集-漏洞扫描 BT5
&nBSp; &nBSp; ├─11
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;2HTML入门 Web前端授课书籍.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;3HTML头部Web前端授课代码.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;4HTML标题 Web前端授课课件.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─12
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-2python环境安装(Pycharm)&nBSp;&nBSp;python编程入门课配套书籍与工具下载.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;1-3python对象类型-变量 python授课课件by陈鑫杰(xmind思维导图).zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─13
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;4Web信息搜集-域名遍历 Web安全授课课件(by陈鑫杰老师).zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; ├─14
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;6CTF7靶机实战 - CTF夺旗赛系列课 CTF7靶机实战-配套资料.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;7Matrix1靶机实战 - CTF夺旗赛系列课 Matrix1靶机实战-配套资料.zIP
&nBSp; &nBSp; │&nBSp; &nBSp;&nBSp; &nBSp;
&nBSp; &nBSp; └─15
&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;&nBSp;&nBSp;1WiFi攻防实战课(面授) WiFi安全攻防实战课(分享版加水印).pdf
&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;&nBSp;&nBSp;2(录制)WiFi安全漫谈 WiFi攻防那些事配套工具下载链接.zIP
&nBSp; &nBSp;&nBSp; &nBSp;&nBSp; &nBSp;&nBSp;&nBSp;3(录制)WiFi拓扑组成 《WiFi攻防那些事》配套课件请用Mindmanager软件打开-黑客渗透经典「PingingLab.zIP
*声明:课程资源购自网络,版权归原作者所有,仅供参考学习使用,严禁外传及商用,若侵犯到您的权益请联系客服删除。