PWHE 1030: Ethical Hacking II
Class
This Course enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the student is able to understand how malware and destructive viruses function. In addition, the course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
Here is the class outline:
1. Reflection
Feb 9
"Si tu no trabajas por tus sueños alguien te contratará para que trabajes por los suyos" Steve Jobs |
2. Honor Code
Feb 9
Leer Cuidadosamente las premisas |
3. Tutoriales
Feb 9
Como Manejar las plataformas que estamos utilizando al momento |
4. Comunicado
Dec 9
Comunicado de Parte de Password Technical College |
5. Presentation
Feb 9
Ethical Hacking II |
6. Videos Explicativos Laboratorios
Feb 14
Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases |
7. Grabaciones de Clases
Jan 26
Referencia de Clases en Go To Meeting |
8. Security Fundamentals
Feb 9
It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls. |
9. Information Gathering
Feb 9
Information Gathering is the act of gathering different kinds of information against the targeted victim or system. |
10. Vulnerability Assessment
Feb 14
Is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems |
11. Hacking Web Application
Feb 14
This vulnerability allows the attacker to target other users on the application to gain their user data or perform unauthorised actions on their behalf. |
12. Hacking Web Server
Feb 14
By using the same tools and methods that malicious attackers rely on, you can attempt to gain access to a server. If successful, you can identify necessary fixes and upgrades that must be performed to improve security and to detect and respond to malicious activity. |