Skip to content

Intro to Ethical Hacking (MILE 2)

Joel Vargas
Access code required

Prontuario de la clase PWHI 1010- Introduction to Ethical Hacking

Here is the class outline:

1. Reflection

May 13

"El progreso tecnológico se permite sólo cuando sus productos pueden aplicarse de algún modo a disminuir la libertad humana." George Orwell

2. Honor Code

May 13

Leer Cuidadosamente las premisas

3. Tutoriales

May 13

Como Manejar las plataformas que estamos utilizando al momento

4. Presentation

May 13

Introduction to Ethical Hacking

5. Videos Explicativos Laboratorios

May 13

Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases

6. Implementation a Mitigation

May 20

Is the process of developing options and actions to enhance opportunities and reduce threats to project objectives

7. Linux Fundamentals

May 20

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.

8. Cybercrime is a Big Business

May 20

How hackers and their methods are getting more sophisticated

9. Threat, Vulnerability and Network Attacks

May 14

In other words, a threat is any bad thing that can happen to your assets. A vulnerability is a weakness that makes a threat possible.

10. Intro to Ethical Hacking

May 18

covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls.

Back to top