Ã¥¼Ò°³
¡ºCompTIA Security+¡»´Â Comp TIA¿¡¼ ÁÖ°üÇÏ´Â ÀÚ°ÝÁõÀÎ Security+¸¦ ÁغñÇÏ´Â ¼öÇè»ýµéÀ» À§ÇÑ º¸¾È Áöħ¼ÀÌ´Ù. ¼¼°è ¾îµð¼³ª ÀÎÁ¤¹Þ°í ÇØ¿Ü À¯ÇÐÀ̳ª Ãë¾÷, À̹Π½Ã 100% È¿°ú¸¦ °ÅµÑ ¼ö ÀÖ´Â ÀÚ°ÝÁõÀÎ Comp TIA ÀÚ°Ý ½ÃÇèÀ» ´ëºñÇϱâ À§ÇÑ ¾ÏÈ£È ±â¹ý, ÀÎÁõ ±â¹ý°ú ¹«¼± º¸¾È±îÁö ÃÖ±ÙÀÇ º¸¾ÈħÇظ¦ ºÐ¼®ÇÏ¿© ¼ö·ÏÇÏ¿´´Ù.
¸ñÂ÷
Â÷·Ê
CHAPTER 1 Á¤º¸ º¸¾È
1. Á¤º¸ º¸È£
2. Á¤º¸ º¸¾È
3. °ø°ÝÀÚ¶õ?
4. °ø°Ý°ú ¹æ¾î
CHAPTER 2 ½Ã½ºÅÛ À§Çù°ú À§Çè
1. ¼ÒÇÁÆ®¿þ¾î ±â¹Ý °ø°Ý
2. Çϵå¿þ¾î ±â¹Ý °ø°Ý
3. °¡»ó°ø°Ý
CHAPTER 3 ½Ã½ºÅÛ º¸È£Çϱâ
1. ¿î¿µÃ¼Á¦ °ÈÇϱâ
2. À¥ºê¶ó¿ìÀú º¸È£Çϱâ
3. À¥¼¹ö °ÈÇϱâ
4. Åë½Å ±â¹Ý °ø°Ý¿¡¼ ½Ã½ºÅÜ º¸È£Çϱâ
5. º¸¾È ¼ÒÇÁÆ®¿þ¾î ÇÁ·Î±×·¥
CHAPTER 4 ³×Æ®¿öÅ© °ø°Ý°ú ¹æ¾î
1. ³×Æ®¿öÅ©ÀÇ Ãë¾àÁ¡
2. °ø°ÝÀÇ À¯Çü
3. ³×Æ®¿öÅ© °ø°Ý¹ý
4. ³×Æ®¿öÅ© ¹æ¾î
CHAPTER 5 ¹«¼± ³×Æ®¿öÅ© º¸¾È
1. IEEE 802.11 ¹«¼± º¸¾È
2. °³ÀÎ ¹«¼± º¸¾È
3. ´ë±Ô¸ð ¹«¼± º¸¾È
CHAPTER 6 ¾×¼¼½ºÄÁÆ®·Ñ
1. Á¢±ÙÅëÁ¦(Access Control)¶õ?
2. ³í¸®Àû Á¢±ÙÅëÁ¦
3. ¹°¸®Àû Á¢±ÙÅëÁ¦
4. Á¤º¸ Á¢±ÙÅëÁ¦
CHAPTER 7 ÀÎÁõ
1. ÀÎÁõÀ̶õ?
2. ÀÎÁõ¹ý
3. EAP(Extended Authentication Protocol)
4. ¿ø°ÝÀÎÁõ°ú º¸¾È
CHAPTER 8 Ãë¾àÁ¡ Æò°¡¿Í º¸¾È°Ë»ç
1. À§±âÀÇ °ü¸®, Æò°¡, ±×¸®°í ¿ÏÈ
2. Ãë¾àÁ¡ ¾Ë¾Æ³»±â
3. ±ÇÇÑ °¨»ç
4. °¨»çÇϱâ
5. ¸ð´ÏÅ͸µ ¹æ¹ý°ú µµ±¸µé
CHAPTER 9 ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ Á¤ÀÇ
2. ¾ÏÈ£È
3. ¾ÏÈ£È ¾Ë°í¸®Áò(Algorithm)
4. ÆÄÀÏ°ú µð½ºÅ© ¾ÏÈ£È
CHAPTER 10 ¾ÏÈ£È ÀûÀÀ
1. µðÁöÅÐ Áõ¸í(Digital Certificate)
2. PKI (Public Key Infastructure)
3. Å° °ü¸®(Key Management)
4. ¾ÏÈ£ Àü¼Û ÇÁ·ÎÅäÄÝ
CHAPTER 11 ½Ã½ºÅÛ ¿î¿µÀÇ Áö¼ÓÁ¶°Ç
1. ȯ°æÀû ÅëÁ¦
2. Áߺ¹(Redundancy) °èȹ
3. À糺¹±¸ °úÁ¤
4. »ç°í¼ö½À °úÁ¤
CHAPTER 12 º¸¾ÈÁ¤Ã¥°ú ½Ç½À
1. º¸¾ÈÁ¤Ã¥ ¼¼¿ì±â
2. º¸¾ÈÁ¤Ã¥ Çü½Ä
3. ±³À°°ú ÈÆ·Ã
¿¬½À¹®Á¦