|
|
4 курс 2 семестр:
4 курс 1 семестр:
3 курс 2 семестр:
2 курс 2 семестр:
|
Array
(
[0] => stdClass Object
(
[id] => 274981
[label] => 1. Этапы сетевой атаки.
[private] => 0
[hits] => 141
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 4
[abs_unique] => 3
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[1] => stdClass Object
(
[id] => 274982
[label] => 2. Исследования сетевой топологии.
[private] => 0
[hits] => 145
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 14
[abs_unique] => 13
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[2] => stdClass Object
(
[id] => 275097
[label] => 3. Обнаружение доступных сетевых служб
[private] => 0
[hits] => 136
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 21
[abs_unique] => 20
[category_id] => 0
[metka] => 1554362186
[ban] => 3
)
[3] => stdClass Object
(
[id] => 274983
[label] => 4. Выявление уязвимых мест атакуемой системы.
[private] => 0
[hits] => 141
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 19
[abs_unique] => 18
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[4] => stdClass Object
(
[id] => 274984
[label] => 5. Реализация атак. Выявление атаки на протокол SMB.
[private] => 0
[hits] => 165
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 23
[abs_unique] => 22
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[5] => stdClass Object
(
[id] => 274985
[label] => 6. Понятие межсетевого экрана. Компоненты межсетевого экрана.
[private] => 0
[hits] => 148
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 41
[abs_unique] => 40
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[6] => stdClass Object
(
[id] => 274986
[label] => 7. Политика межсетевого экранирования.
[private] => 0
[hits] => 205
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 1
[abs_unique] => 0
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[7] => stdClass Object
(
[id] => 274987
[label] => 8. Архитектура межсетевого экрана.
[private] => 0
[hits] => 143
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 5
[abs_unique] => 4
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[8] => stdClass Object
(
[id] => 274988
[label] => 9. Применение межсетевого экрана на основе двудомного узла. Применение межсетевого экрана на основе фильтрующего маршрутизатора.
[private] => 0
[hits] => 132
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 19
[abs_unique] => 18
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[9] => stdClass Object
(
[id] => 274989
[label] => 10. Применение межсетевого экрана на основе экранирующего узла. Применение технологий трансляции сетевых адресов.
[private] => 0
[hits] => 153
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 13
[abs_unique] => 12
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[10] => stdClass Object
(
[id] => 274990
[label] => 11. Системы обнаружения атак. Сигнатурный анализ и обнаружение аномалий.
[private] => 0
[hits] => 145
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 11
[abs_unique] => 10
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[11] => stdClass Object
(
[id] => 274991
[label] => 12. СОА. Обнаружения в реальном времени и отложенный анализ.
[private] => 0
[hits] => 140
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 31
[abs_unique] => 30
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[12] => stdClass Object
(
[id] => 274992
[label] => 13. СОА. Локальные и сетевые системы обнаружения атак.
[private] => 0
[hits] => 149
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 18
[abs_unique] => 17
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[13] => stdClass Object
(
[id] => 274993
[label] => 14. СОА. Распределенные системы обнаружения атак.
[private] => 0
[hits] => 148
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 28
[abs_unique] => 22
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[14] => stdClass Object
(
[id] => 274994
[label] => 15. Системы обнаружения атак Snort.
[private] => 0
[hits] => 138
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 12
[abs_unique] => 10
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[15] => stdClass Object
(
[id] => 274995
[label] => 16. Задачи, решаемые VPN. Туннелирование в VPN.
[private] => 0
[hits] => 124
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 47
[abs_unique] => 46
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[16] => stdClass Object
(
[id] => 274996
[label] => 17. Уровни защищенных каналов.
[private] => 0
[hits] => 143
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 5
[abs_unique] => 4
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[17] => stdClass Object
(
[id] => 274997
[label] => 18. Организация VPN средствами протокола PPTP.
[private] => 0
[hits] => 156
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 56
[abs_unique] => 54
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[18] => stdClass Object
(
[id] => 274998
[label] => 19. Защита данных на канале и сетевом уровнях.
[private] => 0
[hits] => 151
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 6
[abs_unique] => 5
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[19] => stdClass Object
(
[id] => 274999
[label] => 20. Организация VPN средствами СИЗ VipNet.
[private] => 0
[hits] => 328
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 79
[abs_unique] => 73
[category_id] => 0
[metka] => 1554072613
[ban] => 0
)
[20] => stdClass Object
(
[id] => 275000
[label] => 21. Организация VPN средствами СИЗ StrongNet.
[private] => 0
[hits] => 159
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 36
[abs_unique] => 35
[category_id] => 0
[metka] => 1554072613
[ban] => 3
)
[21] => stdClass Object
(
[id] => 275089
[label] => 22.Использование протокола IPSec для защиты сетей Шифрование трафика с использованием протокола IPSec
[private] => 0
[hits] => 366
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 61
[abs_unique] => 60
[category_id] => 0
[metka] => 1554362186
[ban] => 0
)
[22] => stdClass Object
(
[id] => 275090
[label] => 23) Защита информации на транспортном уровне.Организация VPN средствами протокола SSL в Windows Server 2003
[private] => 0
[hits] => 157
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 16
[abs_unique] => 14
[category_id] => 0
[metka] => 1554362186
[ban] => 3
)
[23] => stdClass Object
(
[id] => 275091
[label] => 24.Организация VPN прикладного уровня средствами протокола S/MIME и СКЗИ КриптоПро CSP
[private] => 0
[hits] => 149
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 6
[abs_unique] => 5
[category_id] => 0
[metka] => 1554362186
[ban] => 3
)
[24] => stdClass Object
(
[id] => 275092
[label] => 25.Общие сведения о технологии терминального доступа Обеспечение безопасности ОС Windows Server 2003
[private] => 0
[hits] => 144
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 18
[abs_unique] => 16
[category_id] => 0
[metka] => 1554362186
[ban] => 3
)
[25] => stdClass Object
(
[id] => 275093
[label] => 26. Настройки сервера MSTS
[private] => 0
[hits] => 142
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 3
[abs_unique] => 2
[category_id] => 0
[metka] => 1554362186
[ban] => 3
)
[26] => stdClass Object
(
[id] => 275094
[label] => 27. Настройка протокола RDP
[private] => 0
[hits] => 145
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 4
[abs_unique] => 3
[category_id] => 0
[metka] => 1554362238
[ban] => 3
)
[27] => stdClass Object
(
[id] => 275098
[label] => 28. Общие сведения о службах каталогов. Структура каталога LDAP.
[private] => 0
[hits] => 157
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 17
[abs_unique] => 16
[category_id] => 0
[metka] => 1554362248
[ban] => 3
)
[28] => stdClass Object
(
[id] => 275095
[label] => 29. Система единого входа в сеть на основе протокола Kerberos. Создание единого пространства безопасности на базе Active Directory.
[private] => 0
[hits] => 509
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 61
[abs_unique] => 60
[category_id] => 0
[metka] => 1554362186
[ban] => 0
)
[29] => stdClass Object
(
[id] => 275096
[label] => 30. Понятие аудита информационной безопасности.
[private] => 0
[hits] => 195
[like] => 0
[extra_title] =>
[site_id] =>
[content_unique] => 33
[abs_unique] => 28
[category_id] => 0
[metka] => 1554362186
[ban] => 3
)
)
Защита информации в компьютерных сетях
|
|
Copyright © 2013-2025. All Rights Reserved. |
помощь
|
|