Skip to content
Computers

(Ponce) Introduction to Ethical Hacking (PWHI 1010)


Class
Joel Vargas
Access code required
Enroll

The Introduction to Ethical Hacking course develops foundational understanding of cybersecurity and how it relates to information and network security. The course introduces students to characteristics of cybercrime, security principles, technologies, and procedure to defend networks. Through interactive, multimedia content, lab activities, and multi -industry case studies, students build technical and professional skills to pursue careers in cybersecurity.

/files/4223330/PWHI_1010-_Introduction_To_Ethical_Hacking.pdf

 

Objetives:

 

  • Learn procedures to implement data confidentiality, integrity, availability and security controls on networks, servers and applications.
  • Understand security principles and how to develop security policies that comply with cybersecurity laws.
  • Apply skills through practice, using labs and Cisco Packet Tracer activities.
  • Get immediate feedback on your work through built -in quizzes and tests.
  • Connect with the global Cisco Networking Academy community.

Here is the class outline:

1. Reflection

Jun 21

"El progreso tecnológico se permite sólo cuando sus productos pueden aplicarse de algún modo a disminuir la libertad humana." George Orwell

2. Honor Code

Jun 21

Leer Cuidadosamente las premisas

3. Tutoriales

Jun 21

Como Manejar las plataformas que estamos utilizando al momento

4. Presentation

Jun 21

Introduction to Ethical Hacking

5. Grabaciones de Clases

Jun 1

Referencia de Clases en Go To Meeting

6. Videos Explicativos Laboratorios

Jun 21

Aqui van a encontrar todo lo relacionado a tutoriales de como realizar laboratorios de las clases

7. Implementation a Mitigation

Jun 28

Is the process of developing options and actions to enhance opportunities and reduce threats to project objectives

8. Linux Fundamentals

Jun 28

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.

9. Cybercrime is a Big Business

Jun 28

How hackers and their methods are getting more sophisticated

10. Threat, Vulnerability and Network Attacks

Jun 22

In other words, a threat is any bad thing that can happen to your assets. A vulnerability is a weakness that makes a threat possible.

11. Intro to Ethical Hacking

Jun 26

covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls.

Back to top