Skip to content
Computers

PWHI 1010: Intro to Ethical Hacking


Class
Javier Irizarry Riveiro
Contact us for the class schedule.
Contact us

This Course enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the student is able to understand how malware and destructive viruses function. In addition, the course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

Here is the class outline:

1. Reflection

Feb 24

" El Unico sistema completamente seguro es aquel que está apagdo, encerrado en un bloque de cemento y sellado en una habitación rodeada de alambradas y guardias armados". Gene Spafford

2. Honor Code

Feb 25

Leer Cuidadosamente las premisas

3. Comunicado

Feb 25

Comunicado de Parte de Password Technical College

4. Tutoriales

Feb 25

Como Manejar las plataformas que estamos utilizando al momento

5. Presentation

Feb 25

Introduction to Ethical Hacking

6. Videos Explicativos Laboratorios

Feb 25

Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases

7. Grabaciones de Clases

Oct 29

Referencia de Clases en Go To Meeting

8. Intro to Ethical Hacking

Mar 2

covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls.

9. Cybercrime is a Big Business

Mar 4

How hackers and their methods are getting more sophisticated

10. OWASP TOP 10

Mar 9

is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

11. Injection Attack

Feb 25

In other words, a threat is any bad thing that can happen to your assets. A vulnerability is a weakness that makes a threat possible.

12. Linux Fundamentals

Mar 4

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.

13. WPA 3

El protocolo de seguridad de redes inalámbricas pretende mejorar aspectos de la autenticación y encriptación, para proteger a los usuarios contra ciberataques.

Back to top