(CYSA 2) CyberOPS (CYOP 2010)
Class
Prontuario Clase 67.5 hrs.
/files/4223330/Prontuario_Mile2_CPEH_Exam_Review.pdf
Este curso está dirigido a preparar al estudiante para repasar, aclarar preguntas, a tomar exámenes de práctica con el objetivo de tomar y aprobar el examen Certified Professional Ethical Hacker (CPEH). Además, se demostrarán estrategia de estudios y técnicas efectivas para tomar el examen en un ambiente alineado con el ambiente de una administración de un examen real a través de un centro de examinación Pearson Vue. Este curso está dirigido a la obtención del examen requerido para la certificación CPEH de Mile2.
Here is the class outline:
| 1. Reflexion: Hacker Etico
                      Aug 29
                     El Perfil que necesita toda empresa digital | 
| 2. Honor Code
                      Aug 29
                     Leer Cuidadosamente las premisas | 
| 3. Presentaciones
                      Aug 29
                     | 
| 4. Malwares
                      Aug 31
                     The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess. | 
| 5. Hacking Web Technologies
                      Sep 1
                     Is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. | 
| 6. Social Engineering
                      Sep 6
                     Is the psychological manipulation of people into performing actions or divulging confidential information. | 
| 7. Hacking Wireless Network
                      Sep 12
                     Is a set of two or more devices connected with each other via radio waves within a limited space range. The devices in a wireless network have the freedom to be in motion, but be in connection with the network and share data with other devices in the network. | 
| 8. Vulnerability Assessment
                      Sep 14
                     Is a thorough evaluation of existing and potential threats, weaknesses and, indeed, vulnerabilities in your organization’s systems and networks. | 
| 9. Maintining Access and Covering Tracks
                      Sep 14
                     Its goal is to erase the digital signs left out by the pen tester during the earlier stages of the test. These digital signs, in essence, prove the pen tester’s presence in the targeted computer system. | 
| 10. Videos Explicativos Laboratorios
                      Oct 11
                     En esta parte van a estar los videos explicando cualquier duda relacionada a los laboratorios | 
 
         
         
         
        .png?lmsauth=b08081cc3917b608e27e99d9ce4b1d6b20ab9bee) 
          