Skip to content
Computers

(00) Introduction to Ethical Hacking (PWHI 1010)


Class
Joel Vargas
Access code required
Enroll

The Introduction to Ethical Hacking course develops foundational understanding of cybersecurity and how it relates to information and network security. The course introduces students to characteristics of cybercrime, security principles, technologies, and procedure to defend networks. Through interactive, multimedia content, lab activities, and multi -industry case studies, students build technical and professional skills to pursue careers in cybersecurity.

/files/4223330/PWHI_1010-_Introduction_To_Ethical_Hacking.pdf

 

Objetives:

 

  • Learn procedures to implement data confidentiality, integrity, availability and security controls on networks, servers and applications.
  • Understand security principles and how to develop security policies that comply with cybersecurity laws.
  • Apply skills through practice, using labs and Cisco Packet Tracer activities.
  • Get immediate feedback on your work through built -in quizzes and tests.
  • Connect with the global Cisco Networking Academy community.

Here is the class outline:

1. Reflection

Oct 1

"El progreso tecnológico se permite sólo cuando sus productos pueden aplicarse de algún modo a disminuir la libertad humana." George Orwell

2. Honor Code

Oct 1

Leer Cuidadosamente las premisas

3. Tutoriales

Oct 1

Como Manejar las plataformas que estamos utilizando al momento

4. Presentation

Oct 1

Introduction to Ethical Hacking

5. Implementation a Mitigation

Oct 8

Is the process of developing options and actions to enhance opportunities and reduce threats to project objectives

6. Linux Fundamentals

Oct 8

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.

7. Cybercrime is a Big Business

Oct 8

How hackers and their methods are getting more sophisticated

8. Threat, Vulnerability and Network Attacks

Oct 2

In other words, a threat is any bad thing that can happen to your assets. A vulnerability is a weakness that makes a threat possible.

9. Intro to Ethical Hacking

Oct 6

covering the fundamental concepts of network security. It enables students with the skills to identify information security threats which reflect on the security posture of the organization and implement general security controls.

Back to top