06-22 PWHI 1010: Intro to Ethical Hacking
Class

This Course enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the student is able to understand how malware and destructive viruses function. In addition, the course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
Here is the class outline:
1. Reflection
Feb 24
" El Unico sistema completamente seguro es aquel que está apagdo, encerrado en un bloque de cemento y sellado en una habitación rodeada de alambradas y guardias armados". Gene Spafford |
2. Honor Code
Feb 25
Leer Cuidadosamente las premisas |
3. Tutoriales
Feb 25
Como Manejar las plataformas que estamos utilizando al momento |
4. Presentation
Feb 25
Introduction to Ethical Hacking |
5. Videos Explicativos Laboratorios
Feb 25
Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases |
6. Grabaciones de Clases
Oct 29
Referencia de Clases en Go To Meeting |
7. Intro to Ethical Hacking
Mar 2
covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls. |
8. Cybercrime is a Big Business
Mar 4
How hackers and their methods are getting more sophisticated |
9. OWASP TOP 10
Mar 9
is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. |
10. Injection Attack
Feb 25
In other words, a threat is any bad thing that can happen to your assets. A vulnerability is a weakness that makes a threat possible. |
11. Linux Fundamentals
Mar 4
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. |
12. WPA 3El protocolo de seguridad de redes inalámbricas pretende mejorar aspectos de la autenticación y encriptación, para proteger a los usuarios contra ciberataques. |