Skip to content
Computers

PWHE 1030: Ethical Hacking II


Class
Joel Vargas
Access code required
Enroll

This Course enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the student is able to understand how malware and destructive viruses function. In addition, the course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

Here is the class outline:

1. Reflection

Feb 9

"Si tu no trabajas por tus sueños alguien te contratará para que trabajes por los suyos" Steve Jobs

2. Honor Code

Feb 9

Leer Cuidadosamente las premisas

3. Tutoriales

Feb 9

Como Manejar las plataformas que estamos utilizando al momento

4. Comunicado

Dec 9

Comunicado de Parte de Password Technical College

5. Presentation

Feb 9

Ethical Hacking II

6. Videos Explicativos Laboratorios

Feb 14

Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases

7. Grabaciones de Clases

Jan 26

Referencia de Clases en Go To Meeting

8. Security Fundamentals

Feb 9

It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls.

9. Information Gathering

Feb 9

Information Gathering is the act of gathering different kinds of information against the targeted victim or system.

10. Vulnerability Assessment

Feb 14

Is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems

11. Hacking Web Application

Feb 14

This vulnerability allows the attacker to target other users on the application to gain their user data or perform unauthorised actions on their behalf.

12. Hacking Web Server

Feb 14

By using the same tools and methods that malicious attackers rely on, you can attempt to gain access to a server. If successful, you can identify necessary fixes and upgrades that must be performed to improve security and to detect and respond to malicious activity.

Back to top