当前位置:网站首页>2022 Guangxi Autonomous Region secondary vocational group "Cyberspace Security" competition and its analysis (super detailed)
2022 Guangxi Autonomous Region secondary vocational group "Cyberspace Security" competition and its analysis (super detailed)
2022-07-06 01:20:00 【Lonely fish】
2022 Secondary vocational group of Guangxi Autonomous Region in “ Cyberspace Security ” Event module B analysis
- 2022 Guangxi autonomous region competition assignment of secondary vocational group
- modular A Infrastructure setting and security reinforcement (200 branch )
- modular B Network security event response 、 Digital forensics investigation and application security (400 branch )
- modular C CTF Flag capture - attack (200 branch )
- modular D CTF Flag capture - defense (200 branch )
- If you don't understand, you can send a private letter to the blogger !
2022 Guangxi autonomous region competition assignment of secondary vocational group
One 、 Competition time
A total of :360 minute
Module number Module name Competition time ( Hours ) A weight
A Infrastructure setting and security reinforcement 1.5 20%
B Network security event response 、 Digital forensics investigation and application security 1.5 40%
C CTF Flag capture - attack 1.5 20%
D CTF Flag capture - defense 1.5 20%
modular A Infrastructure setting and security reinforcement (200 branch )
One 、 Project and task description :
Suppose you are a network security engineer in an enterprise , For enterprise server system , Ensure the normal operation of all services according to the task requirements , And through the comprehensive use of login and password
边栏推荐
- Kotlin basics 1
- ADS-NPU芯片架构设计的五大挑战
- leetcode刷题_验证回文字符串 Ⅱ
- VMware Tools安装报错:无法自动安装VSock驱动程序
- Yii console method call, Yii console scheduled task
- 1791. Find the central node of the star diagram / 1790 Can two strings be equal by performing string exchange only once
- Unity VR solves the problem that the handle ray keeps flashing after touching the button of the UI
- Gartner发布2022-2023年八大网络安全趋势预测,零信任是起点,法规覆盖更广
- Redis' cache penetration, cache breakdown, cache avalanche
- Leetcode 208. Implement trie (prefix tree)
猜你喜欢
随机推荐
Four commonly used techniques for anti aliasing
Test de vulnérabilité de téléchargement de fichiers basé sur dvwa
Hcip---ipv6 experiment
Recursive method to realize the insertion operation in binary search tree
Questions about database: (5) query the barcode, location and reader number of each book in the inventory table
Ordinary people end up in Global trade, and a new round of structural opportunities emerge
Some features of ECMAScript
Obstacle detection
ADS-NPU芯片架构设计的五大挑战
Leetcode sword finger offer 59 - ii Maximum value of queue
Use of crawler manual 02 requests
Cglib dynamic agent -- example / principle
Redis' cache penetration, cache breakdown, cache avalanche
ThreeDPoseTracker项目解析
Remember that a version of @nestjs/typeorm^8.1.4 cannot be obtained Env option problem
Logstash clear sincedb_ Path upload records and retransmit log data
VMware Tools安装报错:无法自动安装VSock驱动程序
Distributed base theory
Dedecms plug-in free SEO plug-in summary
伦敦银走势中的假突破








