Skip to content
Computers

(CYSA 2) CyberOPS (CYOP 2010)


Class
Joel Vargas
Access code required
Enroll

Prontuario Clase 67.5 hrs.

/files/4223330/Prontuario_Mile2_CPEH_Exam_Review.pdf

Este curso está dirigido a preparar al estudiante para repasar, aclarar preguntas, a tomar exámenes de práctica con el objetivo de tomar y aprobar el examen Certified Professional Ethical Hacker (CPEH). Además, se demostrarán estrategia de estudios y técnicas efectivas para tomar el examen en un ambiente alineado con el ambiente de una administración de un examen real a través de un centro de examinación Pearson Vue. Este curso está dirigido a la obtención del examen requerido para la certificación CPEH de Mile2.

Here is the class outline:

1. Reflexion: Hacker Etico

Aug 29

El Perfil que necesita toda empresa digital

2. Honor Code

Aug 29

Leer Cuidadosamente las premisas

3. Presentaciones

Aug 29

4. Malwares

Aug 31

The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess.

5. Hacking Web Technologies

Sep 1

Is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

6. Social Engineering

Sep 6

Is the psychological manipulation of people into performing actions or divulging confidential information.

7. Hacking Wireless Network

Sep 12

Is a set of two or more devices connected with each other via radio waves within a limited space range. The devices in a wireless network have the freedom to be in motion, but be in connection with the network and share data with other devices in the network.

8. Vulnerability Assessment

Sep 14

Is a thorough evaluation of existing and potential threats, weaknesses and, indeed, vulnerabilities in your organization’s systems and networks.

9. Maintining Access and Covering Tracks

Sep 14

Its goal is to erase the digital signs left out by the pen tester during the earlier stages of the test. These digital signs, in essence, prove the pen tester’s presence in the targeted computer system.

10. Videos Explicativos Laboratorios

Oct 11

En esta parte van a estar los videos explicando cualquier duda relacionada a los laboratorios

Back to top