(Ponce) Introduction to Ethical Hacking (PWHI 1010)
Class
The Introduction to Ethical Hacking course develops foundational understanding of cybersecurity and how it relates to information and network security. The course introduces students to characteristics of cybercrime, security principles, technologies, and procedure to defend networks. Through interactive, multimedia content, lab activities, and multi -industry case studies, students build technical and professional skills to pursue careers in cybersecurity.
/files/4223330/PWHI_1010-_Introduction_To_Ethical_Hacking.pdf
Objetives:
- Learn procedures to implement data confidentiality, integrity, availability and security controls on networks, servers and applications.
- Understand security principles and how to develop security policies that comply with cybersecurity laws.
- Apply skills through practice, using labs and Cisco Packet Tracer activities.
- Get immediate feedback on your work through built -in quizzes and tests.
- Connect with the global Cisco Networking Academy community.
Here is the class outline:
1. Reflection
Jun 21
"El progreso tecnológico se permite sólo cuando sus productos pueden aplicarse de algún modo a disminuir la libertad humana." George Orwell |
2. Honor Code
Jun 21
Leer Cuidadosamente las premisas |
3. Tutoriales
Jun 21
Como Manejar las plataformas que estamos utilizando al momento |
4. Presentation
Jun 21
Introduction to Ethical Hacking |
5. Grabaciones de Clases
Jun 1
Referencia de Clases en Go To Meeting |
6. Videos Explicativos Laboratorios
Jun 21
Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases |
7. Implementation a Mitigation
Jun 28
Is the process of developing options and actions to enhance opportunities and reduce threats to project objectives |
8. Linux Fundamentals
Jun 28
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. |
9. Cybercrime is a Big Business
Jun 28
How hackers and their methods are getting more sophisticated |
10. Threat, Vulnerability and Network Attacks
Jun 22
In other words, a threat is any bad thing that can happen to your assets. A vulnerability is a weakness that makes a threat possible. |
11. Intro to Ethical Hacking
Jun 26
covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls. |