Skip to content
Computers

(CYSA) CyberOPS (CYOP 2010)


Class
Joel Vargas
Access code required
Enroll

Prontuario Clase 67.5 hrs.

/files/4223330/Prontuario_Mile2_CPEH_Exam_Review.pdf

Este curso está dirigido a preparar al estudiante para repasar, aclarar preguntas, a tomar exámenes de práctica con el objetivo de tomar y aprobar el examen Certified Professional Ethical Hacker (CPEH). Además, se demostrarán estrategia de estudios y técnicas efectivas para tomar el examen en un ambiente alineado con el ambiente de una administración de un examen real a través de un centro de examinación Pearson Vue. Este curso está dirigido a la obtención del examen requerido para la certificación CPEH de Mile2.

Here is the class outline:

1. Reflexion: Hacker Etico

Nov 9

El Perfil que necesita toda empresa digital

2. Honor Code

Nov 9

Leer Cuidadosamente las premisas

3. Presentaciones

Nov 9

4. Malwares

Nov 11

The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess.

5. Hacking Web Technologies

Nov 12

Is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

6. Social Engineering

Nov 17

Is the psychological manipulation of people into performing actions or divulging confidential information.

7. Hacking Wireless Network

Nov 23

Is a set of two or more devices connected with each other via radio waves within a limited space range. The devices in a wireless network have the freedom to be in motion, but be in connection with the network and share data with other devices in the network.

8. Vulnerability Assessment

Nov 25

Is a thorough evaluation of existing and potential threats, weaknesses and, indeed, vulnerabilities in your organization’s systems and networks.

9. Maintining Access and Covering Tracks

Nov 25

Its goal is to erase the digital signs left out by the pen tester during the earlier stages of the test. These digital signs, in essence, prove the pen tester’s presence in the targeted computer system.

10. Videos Explicativos Laboratorios

Dec 22

En esta parte van a estar los videos explicando cualquier duda relacionada a los laboratorios

Back to top