NIVEL 1 DE 3 - ESSENTIALS:OFICIAL DE CIBERSEGURIDADEN ATAQUE Y DEFENSA
Grupo 2 (Lunes y Miércoles)
Programa práctico y dinámico que ayuda a los alumnos a obtener conocimientos técnicos sólidos y habilidades fundamentales en diversas áreas de ciberseguridad y al mismo tiempo garantizar que el programa proporcione los conocimientos, para seguir escalando hasta convertirse en un experto en ciberseguridad.
Trainer: Miguel Camacho
Duración: 80 horas académicas
Inicio: 22 de Octubre 2024
Fin: 29 de Enero 2025
Lista de profesionales que aprobaron los examenes evaluativos y asistencia exitosa en el programa:
ADRIÁN JESÚS CONTRERAS RAMÍREZ
ANGEL DE JESUS MARTINEZ HIDALGO
ADRIAN RODRIGUEZ DÍAZ
ANGEL EDUARDO DELGADO
ANGEL JESÚS MARCANO TINEO
DANIEL MONSALVE GARCÍA
DAVID IGNACIO BLANCO PARRA
EMILIANO R. AZUAJE C.
ENDERSON LEONARDO CARDENAS GUERRERO
HÉCTOR ESTEBAN FLORES OJEDA
JACQUELINE UGLIATI BRACAMONTE
ANGEL DE JESUS MARTINEZ HIDALGO
ADRIAN RODRIGUEZ DÍAZ
ANGEL EDUARDO DELGADO
ANGEL JESÚS MARCANO TINEO
DANIEL MONSALVE GARCÍA
DAVID IGNACIO BLANCO PARRA
EMILIANO R. AZUAJE C.
ENDERSON LEONARDO CARDENAS GUERRERO
HÉCTOR ESTEBAN FLORES OJEDA
JACQUELINE UGLIATI BRACAMONTE
JAVIER A. SANCHEZ C.
JAVIER ANDRPES DURAN MATA
JORGE LUIS SÁNCHEZ RIVANEDEIRA
JOSE GERARDO DALIZ
LEONARDO ANDRES BAZAN ZAPATA
LUIS IVÁN ESTRADA GONZÁLEZ
MARGARITA J. AGUAYO BOLVARAN
MAURICIO IALEGGIO
MIGUEL ÁNGEL CAMACHO DUGARTE
RICARDO JOSÉ SÁNCHEZ RAMIREZ
JAVIER ANDRPES DURAN MATA
JORGE LUIS SÁNCHEZ RIVANEDEIRA
JOSE GERARDO DALIZ
LEONARDO ANDRES BAZAN ZAPATA
LUIS IVÁN ESTRADA GONZÁLEZ
MARGARITA J. AGUAYO BOLVARAN
MAURICIO IALEGGIO
MIGUEL ÁNGEL CAMACHO DUGARTE
RICARDO JOSÉ SÁNCHEZ RAMIREZ

Network Defender Essentials:
Module 01: Network Security Fundamentals
Module 02: Identification, Authentication and Authorization
Module 03: Network Security Controls - Administrative Controls
Module 04: Network Security Controls - Physical Controls
Module 05: Network Security Controls - Technical Controls
Module 06: Virtualization and Cloud Computing
Module 07: Wireless Network Security
Module 08: Mobile device security
Module 09: Internet of Things (IoT) Device Security
Module 10: Cryptography and PKI
Module 11: Data Security
Module 12: Network Traffic Monitoring
Module 02: Identification, Authentication and Authorization
Module 03: Network Security Controls - Administrative Controls
Module 04: Network Security Controls - Physical Controls
Module 05: Network Security Controls - Technical Controls
Module 06: Virtualization and Cloud Computing
Module 07: Wireless Network Security
Module 08: Mobile device security
Module 09: Internet of Things (IoT) Device Security
Module 10: Cryptography and PKI
Module 11: Data Security
Module 12: Network Traffic Monitoring
Ethical Hacking Essentials:
Module 01: Information Security Fundamentals
Module 02: Fundamentals of Ethical Hacking
Module 03: Threats to information security and vulnerability assessment
Module 04: Techniques and countermeasures to crack passwords
Module 05: Social engineering techniques and countermeasures
Module 06: Attacks and countermeasures at the network level
Module 07: Attacks and countermeasures on web applications
Module 08: Wireless attacks and countermeasures
Module 09: Mobile attacks and countermeasures
Module 10: IoT and OT attacks and countermeasures
Module 11: Cloud Computing Threats and Countermeasures
Module 02: Fundamentals of Ethical Hacking
Module 03: Threats to information security and vulnerability assessment
Module 04: Techniques and countermeasures to crack passwords
Module 05: Social engineering techniques and countermeasures
Module 06: Attacks and countermeasures at the network level
Module 07: Attacks and countermeasures on web applications
Module 08: Wireless attacks and countermeasures
Module 09: Mobile attacks and countermeasures
Module 10: IoT and OT attacks and countermeasures
Module 11: Cloud Computing Threats and Countermeasures
