Chapter 1 Overview of Information Security
1. 1 some questions
1.2 A story
1.3 information and information security
1.3. 1 Definition of information
1.3.2 Definition of information security
1.3.3P2DR2 security model
1.3.4 information security architecture
1.3.5 the goal of information security
1.4. Information security threats
1.4. 1 physical layer security risk analysis
1.4.2 network layer security risk analysis
1.4.3 security risk analysis of operating system layer
1.4.4 application layer security risk analysis
1.4.5 management security risk analysis
1.5 Requirements and Implementation of Information Security
1.5. 1 information security requirements
1.5.2 implementing information security
1.6 information security development process
1.7 exercise
Chapter 2 Fundamentals of Network Security
2. 1OSI reference model
2.2TCP/IP reference model
2.3 Common network services
Web service
FTP service
Email service
Telecommunication network service
2.4 Common network commands
2.4. 1ping command
Ipconfig command
Netstat command
address resolution protocol
network program
atcommands
Tracert command
Route command
Nbtstat command
2.5 practice
Chapter 3 Network Scanning and Network Monitoring
3. 1 hacker overview
3. 1. 1 The concept of hacker
3. The concept of1.2 attack
3. 1.3 Classification of attacks
3.2 Network stepping on the spot
3.3 Network scanning
3.3. 1 Overview of security vulnerabilities
3.3.2 Why do you want to scan the network?
3.3.3 Scan after finding the target.
3.3.4 Port scanning for detecting open services
Vulnerability scanning
Introduction to scanning tools
3.4 Network monitoring
3. 4. 1 working principle of hub and network card
3.4.2 Working principle of network monitoring
3.4.3 Hazards of network monitoring
3.4.4 Prevention and detection of network monitoring
3.4.5 Common network monitoring tools
3.5 practice
Chapter 4 Hacking Technology
4. 1 General process of attack
4.2 Methods and techniques of attack
4.2. 1 password cracking attack
4.2.2 Buffer overflow attack
4.2.3 Deception attack
DoS/DDoS attack
SQL injection attack
Network worm
4.2.7 Social engineering
4.3 practice
Chapter V Network Backdoor and Network Stealth
5. 1 Trojan attack
5. 1. 1 Trojan horse overview
5. 1.2 Common types and deception methods
5. 1.3 Trojan example
5. 1.4 Prevention of Trojan horses
5.2 Network Backdoor
5.3 Clear the attack marks
5.3. 1Windows Clear the attack trace.
5.3.2UNIX clears the attack trace under UNIX.
5.4 practice
Chapter 6 Computer Virus and Malware
6. 1 computer virus overview
6. 1. 1 the concept of computer virus
6. 1.2 causes of computer virus
6. 1.3 Computer Virus History
6. 1.4 characteristics of computer virus
6. 1.5 Naming of computer viruses
6. 1.6 antivirus software
6.2 Typical virus analysis
6.2. 1U disk "Run Auto ..." folder virus and its cleaning method
6.2.2U virus in autorun.inf file of U disk and its cleaning method.
6.2.3U disk RavMonE.exe virus and its removal method.
arp virus
6.2.5 "Panda Burning Incense" Virus
6.2.6QQ and MSN virus
6.2.7 Introduction of Typical Mobile Phone Virus
6.3 Malware
Overview of malware
Types of malware
Removal of Malware
6.4 practice
Chapter 7 Physical Environment and Equipment Safety
7. 1 physical layer security threats
7.2 Physical layer security protection
7.3 Physical layer security equipment
7.3. 1 computer network physical security isolation card
7.3.2 Other physical isolation equipment
7.4 Physical layer management security
7.4. 1 Isolation management of internal network and external network
7.4.2 Internal network security management
7.5 practice
Chapter VIII Firewall Technology
8. 1 firewall overview
8. 1. 1 Definition of firewall
8. 1.2 development history of firewall
8. 1.3 rules of firewall
8. 1.4 characteristics of firewall
8. 1.5 Other functions of firewall
8.2 firewall technology
8.2. 1 packet filtering technology
8.2.2 Application of Gateway Technology
8.2.3 Circuit-level Gateway Technology
8.2.4 State detection technology
Proxy server technology
8.2.6 Network Address Translation Technology
Personal firewall
Distributed firewall
8.3 firewall architecture
8.3. 1 related terms
Dual host architecture
Shielded host architecture
Shielded subnet architecture
8.4 Hardware implementation technology of firewall
8.5 Performance indicators of firewall
8.6 Common functional indicators of firewall
8.7 Introduction of Common Firewall Products
8.8 Development trend of firewall
8.9 practice
Chapter 9 Intrusion Detection Technology
9. 1 Overview of Intrusion Detection
Why does 9. 1. 1 need an intrusion detection system?
9. 1.2 concept of intrusion detection
9. 1.3 Intrusion detection history
9. 1.4 the role of intrusion detection system
9. 1.5 classification of intrusion detection system
9. 1.6 Architecture of Intrusion Detection System
9.2 Intrusion detection technology
9.2. 1 anomaly detection technology
9.2.2 Misuse Detection Technology
9.2.3 Other intrusion detection technologies
9.3 standardization of ids
9.3. Progress of Standardization of1IDS
9.3.2 Intrusion Detection Working Group
9.3.3 Public Intrusion Detection Framework
9.4 Development of Intrusion Detection
9.4. 1 Problems in Intrusion Detection System
9.4.2 Development direction of intrusion detection technology
9.4.3 From IDS to IPS and IMS
9.5 practice
Chapter 10 VPN technology
10. 1VPN overview
The concept of 10. 1. 1VPN
Characteristics of 10. 1.2VPN
Classification of 10. 1.3VPN
10.2VPN technology
10.2. 1VPN security technology
10.2.2VPN tunnel protocol
10.2.3MPISVPN
10.2.4 VPN based on IPv6
10.3VPN application new technology
10 . 3 . 1
Secure multicast based on VPN
Development trend of 10.4VPN
10.5 exercise
Chapter 1 1 Windows operating system security
11.1Introduction to Windows Operating System
1 1.2Windows2000 security configuration
1 1.2. 1 guarantee account
1 1.2.2 Set the security password.
1 1.2.3 Set the screen saver password.
1 1.2.4 Shut down unnecessary services.
1 1.2.5 Close unnecessary ports.
1 1.2.6 Start the system audit strategy.
1 1.2.7 Turn on the password policy.
1 1.2.8 account locking policy.
1 1.2.9 Download the latest patch.
1 1.2. 10 closes the system and enjoys it by default.
11.2.11prohibits TTL from judging the host type.
1 1.3 Precautions for installing Windows operating system
1 1.4 patch the operating system.
1 1.5 motion
Chapter 12 UNIX and Linux operating system security
12.1Overview of UNIX and Linux operating systems
12.2UNIX and Linux system security
12.2. 1 password security of the system
12.2.2 account security
65438 and SGID
12.2.4 service security
12.3 exercise
Chapter 13 Cryptography Basis
13. 1 encryption overview
13. 1. 1 cryptology development history
13. 1.2 Basic concepts of cryptography
13. 1.3 Basic types of cryptographic systems
13. 1.4 classification of cryptographic systems
13. 1.5 password attack
13.2 classical cryptography
13.2. 1
13.2.2 instead of password
13.2.3 transposition password
13.3 symmetric encryption
13.3. 1 Overview of Symmetric Encryption
13.3.2DES encryption algorithm
13.4 asymmetric encryption
13.4. 1 Overview of Asymmetric Encryption
13.4.2RSA algorithm
13.5 hash function
13.5. 1 Overview of Hash Function
13.5.2MD5 algorithm
13.6 digital signature'
13.6. 1 uses asymmetric encryption algorithm for digital signature.
13.6.2 Digital signature using symmetric encryption algorithm.
13.6.3 digital signature algorithm and confidentiality of digital signature
Absolute security and relative security of 13.7 password
13.7. 1 is not absolutely safe.
Relative safety
The new direction of 13.8 cryptography
13.9 exercise
Chapter 14 PKI principle and application
14. 1PKI overview
The function of 14. 1. 1PKI
The architecture of 14. 1.2PKI
Composition of 14. 1.3PKI
14. 1.4PKI standard
14.2 certifiCAte authority ca
14.3 digital certificate
14.3. 1 digital certificate overview
14.3.2 digital certificate issuing process
The application of 14.4PKI
14.4. 1 typical PKI application standard
14.4.2 Typical PKI application mode
Development of 14.5PKI
14.6 exercise
Chapter 15 database system security
15. 1 database system security overview
15.2 attack database system
15.2. 1 weak password attack.
15.2.2 exploit vulnerability to attack database.
Single byte overflow attack of 15.2.3SQLServer
15.2.4SQL injection attack
15.3 preventive measures against database attacks
15.3. 1 Overview of database attack defense
15.3.2SQL injection attack SQL prevention
15.4 exercise
16 chapter information security management and laws and regulations
16. 1 information system security management
16. 1. 1 information security management overview
16. 1.2 information security management mode
16. 1.3 information security management system functions
16. 1.4 steps to build an information security management system
16. 1.5BS7799, ISO/IEC 17799 and ISO2700 1.
16.10.6 evaluation and certification of information security products
16.2 information security related laws and regulations
16.2. 1 domestic information security related laws and regulations
16.2.2 foreign information security related laws and regulations
16.3 exercise
Chapter 17 hierarchical protection and risk management of information systems
17. 1 information security level protection
17. 1. 1 China information security level protection
17. 1.2 foreign information security level protection
17.2 information security risk management
17.3 information system risk assessment
17.3. 1 Overview of information security risk assessment
17.3.2 information security risk assessment method
17.4 exercise
Chapter 18 Emergency Response of Information System
18. 1 emergency response overview
18. 1. 1 introduction to emergency response
18. 1.2 international emergency organization
18. 1.3 China Emergency Organization
18.2 emergency response phase
18.3 emergency response method
18.3. 1Windows system emergency response method
18.3.2 using personal software firewall
18.3.3 honeypot technology
18.4 computer crime evidence collection
18.5 exercise
Chapter 19 Data Backup and Recovery
19. 1 Overview of data backup and recovery
19.2 data backup in windows XP
19.2. 1 backup system files
19.2.2 backup hardware configuration file
19.2.3 Back up the registry file.
19.2.4 making system startup disk
Back up the whole system.
19.2.6 Create a system restore point
19.2.7 Set the corresponding policy of WindowsXP when the system stops abnormally.
19.3 data recovery in windows XP
19.3. 1 system restore method
19.3.2 Restore driver
Use "Safe Mode"
19.3.4 emergency recovery of computer "crash"
19.3.5 automatic system fault recovery
19.3.6 Restore routine data.
Use 19.4 data recovery software EasyRecovery.
19.5 exercise
refer to
……