Ethical Hacking I
Class
Prontuario de la Clase y Laboratorio (Ethical Hacking I)
Here is the class outline:
1. Reflection
Mar 16
Los Medios no venden informacion a los ciudadanos, sino que venden ciudadanos a los patrocinadores. Ignacion Ramonet |
2. Honor Code
Apr 1
Lee Cuidadosamente cada premia. |
3. Tutoriales
Apr 4
Como Manejar las plataformas que estamos utilizando al momento |
4. Presentation
Mar 11
Ethical Hacking PPT |
5. Video Presentation
Apr 1
Video Explicativo de Cada modulo por capitulo |
6. Videos Explicativos Laboratorios
Apr 4
En esta parte van a estar los videos explicando cualquier duda relacionada a los laboratorios |
7. Penetration Testing
Mar 11
The Certified Professional Ethical Hacker vendor neutral certification course is the foundational training to mile2’s line of penetration testing courses, what is your place in the ladder? |
8. What and Why?
Mar 12
This understanding will help you to “know the enemy” and prepare a better defense. Understanding the different types of hackers and their motivations will help you know what kind of information to protect and whom you have to watch. |
9. IT Security
Mar 18
covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls. |
10. Linux Fundamentals
Apr 1
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. |
11. Network Models & Protocols
Apr 2
A protocol is a set of rules that governs the communications between computers on a network. |
12. Cryptography
Apr 14
Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called adversaries. |
13. Password Cracking
Apr 14
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. |
14. Information Gathering
Apr 14
Information Gathering is the act of gathering different kinds of information against the targeted victim or system. |