Skip to content
Computers

PWHE 1020: Ethical Hacking 1


Class
Joel Vargas
Access code required
Enroll

This Course enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the student is able to understand how malware and destructive viruses function. In addition, the course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

Here is the class outline:

1. Reflection

Dec 22

Los Medios no venden informacion a los ciudadanos, sino que venden ciudadanos a los patrocinadores. Ignacion Ramonet

2. Honor Code

Dec 22

Lee Cuidadosamente cada premia.

3. Comunicado

Dec 22

Comunicado de Parte de Password Technical College

4. Tutoriales

Dec 22

Como Manejar las plataformas que estamos utilizando al momento

5. Presentation

Dec 22

Ethical Hacking PPT

6. Videos Explicativos Laboratorios

Dec 22

En esta parte van a estar los videos explicando cualquier duda relacionada a los laboratorios

7. Grabaciones de Clases

Dec 22

Referencia de Clases en Go To Meeting

8. Penetration Testing

Dec 22

The Certified Professional Ethical Hacker vendor neutral certification course is the foundational training to mile2’s line of penetration testing courses, what is your place in the ladder?

9. What and Why?

Dec 22

This understanding will help you to “know the enemy” and prepare a better defense. Understanding the different types of hackers and their motivations will help you know what kind of information to protect and whom you have to watch.

10. ECCouncil Subscription

Jan 11

Subscripcion Gratuita para Estudiantes por 1 año

11. IT Security

Dec 29

covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls.

12. Linux Fundamentals

Jan 12

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.

13. Network Models & Protocols

Jan 11

A protocol is a set of rules that governs the communications between computers on a network.

14. Cryptography

Jan 25

Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

15. Password Cracking

Jan 25

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

16. Information Gathering

Jan 25

Information Gathering is the act of gathering different kinds of information against the targeted victim or system.

Back to top