Intro to Ethical Hacking (MILE 2)
Class
Prontuario de la clase PWHI 1010- Introduction to Ethical Hacking
Here is the class outline:
1. Reflection
May 13
"El progreso tecnológico se permite sólo cuando sus productos pueden aplicarse de algún modo a disminuir la libertad humana." George Orwell |
2. Honor Code
May 13
Leer Cuidadosamente las premisas |
3. Tutoriales
May 13
Como Manejar las plataformas que estamos utilizando al momento |
4. Presentation
May 13
Introduction to Ethical Hacking |
5. Videos Explicativos Laboratorios
May 13
Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases |
6. Implementation a Mitigation
May 20
Is the process of developing options and actions to enhance opportunities and reduce threats to project objectives |
7. Linux Fundamentals
May 20
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. |
8. Cybercrime is a Big Business
May 20
How hackers and their methods are getting more sophisticated |
9. Threat, Vulnerability and Network Attacks
May 14
In other words, a threat is any bad thing that can happen to your assets. A vulnerability is a weakness that makes a threat possible. |
10. Intro to Ethical Hacking
May 18
covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls. |