NIVEL 1 DE 3 - ESSENTIALS:OFICIAL DE CIBERSEGURIDADEN ATAQUE Y DEFENSA
Programa práctico y dinámico que ayuda a los alumnos a obtener conocimientos técnicos sólidos y habilidades fundamentales en diversas áreas de ciberseguridad y al mismo tiempo garantizar que el programa proporcione los conocimientos, para seguir escalando hasta convertirse en un experto en ciberseguridad.
Trainers: Antonio Villarroel.
Duración: 48 horas académicas
Inicio: 03 de Septiembre 2024
Fin: 31 de Octubre 2024
Lista de profesionales que aprobaron los examenes evaluativos y asistencia exitosa en el programa:
JHOAN LUIS ALVAREZ HERNANDEZ
VICTOR MANUEL CASTRO SANTOS
CARLOS EDUARDO ARDILA BRAVO
JONEIQUER ESPANOL
MAURICIO DE JESÚS MUÑOZ DÁVILA
WILMER EDUARDO SOLORZANO DELGADO
GABRIEL JOSE PALMA GONZALEZ
JUAN C. BAUTISTA
HANS P. DIAZ C.
MARLO JOSE MONTILLA MARQUEZ
DANY EDUARDO VIELMA VELASQUEZ
JOSÉ ANTONIO RODRÍGUEZ ALFONZO
MICHAEL ENRIQUE PAREJO ROSAL
ANGEL ANTONIO RAMIREZ ZAMBRANO
EDDY RAFAEL BETANCOURT SALAZAR
DAYHANA SYLENA DÍAZ FLORIAN
GABRIELA F. MARCANO R.
MARIA CAROLINA PATINO
NESTOR MORENO
HELYS SAMUEL NÚÑEZ MEJÍAS
MOISÉS BRAQUE
JOSÉ JAVIER VEGAS GONZÁLEZ
LEYDI MOJICA
TOMMY ALONSO PADRON MONCADA
CHARLY CHEN VERAS
DANIESCA SARAI IBARRA UGAS
MARI FRANCIS CASTILLO DE SOUSA
EDUARDO SOMOZA
FABIO AURELIO BOVANINI CASALENA
VICTOR MANUEL CASTRO SANTOS
CARLOS EDUARDO ARDILA BRAVO
JONEIQUER ESPANOL
MAURICIO DE JESÚS MUÑOZ DÁVILA
WILMER EDUARDO SOLORZANO DELGADO
GABRIEL JOSE PALMA GONZALEZ
JUAN C. BAUTISTA
HANS P. DIAZ C.
MARLO JOSE MONTILLA MARQUEZ
DANY EDUARDO VIELMA VELASQUEZ
JOSÉ ANTONIO RODRÍGUEZ ALFONZO
MICHAEL ENRIQUE PAREJO ROSAL
ANGEL ANTONIO RAMIREZ ZAMBRANO
EDDY RAFAEL BETANCOURT SALAZAR
DAYHANA SYLENA DÍAZ FLORIAN
GABRIELA F. MARCANO R.
MARIA CAROLINA PATINO
NESTOR MORENO
HELYS SAMUEL NÚÑEZ MEJÍAS
MOISÉS BRAQUE
JOSÉ JAVIER VEGAS GONZÁLEZ
LEYDI MOJICA
TOMMY ALONSO PADRON MONCADA
CHARLY CHEN VERAS
DANIESCA SARAI IBARRA UGAS
MARI FRANCIS CASTILLO DE SOUSA
EDUARDO SOMOZA
FABIO AURELIO BOVANINI CASALENA
WILSON ENRIQUE ALVAREZ NAVARRETE
JOHN HAROL SILVA VILLANUEVA
MARCO AURELIO RAMIREZ GARCIA
OSMER LUIS FIGUEROA BEJARANO
LUIS FELIPE GONZALEZ TORRES
OSMAR ENRIQUE TIMAURE DURÁN
JOSE PACHECO
VANESSA CAROLINA GÓMEZ MORENO
JOHAN JOEL MALDONADO MELENDEZ
MARÍA LEANDRA SANTANA JIMÉNEZ
NICKY SAMUEL CORRO MARTINEZ
RONALD ARGENIS MONTESINO PLAZA
JANNA PAOLA GUEVARA VELAZQUEZ
DIEGO ALEJANDRO CÁCERES VAZQUEZ
SERGIO MARCANO
AURA GONZALEZ
JUAN RAFAEL BANDES AZUAJE
MERCEDES LUCIA SALAZAR FIGUEROA
VICTOR ANIBAL BORJAS CASTILLO
ALFONSO ESTEBAN BARRAZA JORQUERA
JOSÉ LEONARDO MARCANO MUJICA
JUAN CARLOS GONZALEZ ESCALONA
SAMUEL VILORIA
CARLOS ARMANDO ROQUE ACOSTA
OCTAVIO VARGAS
JULIO VACACAMINO
GENESIS DUERTO
GERMAN JESUS ZAMBRANO LABRADOR
JOSE LUIS YDROGO RODRIGUEZ
EDWYN GONZALO BUITRAGO CAMARGO
JOHN HAROL SILVA VILLANUEVA
MARCO AURELIO RAMIREZ GARCIA
OSMER LUIS FIGUEROA BEJARANO
LUIS FELIPE GONZALEZ TORRES
OSMAR ENRIQUE TIMAURE DURÁN
JOSE PACHECO
VANESSA CAROLINA GÓMEZ MORENO
JOHAN JOEL MALDONADO MELENDEZ
MARÍA LEANDRA SANTANA JIMÉNEZ
NICKY SAMUEL CORRO MARTINEZ
RONALD ARGENIS MONTESINO PLAZA
JANNA PAOLA GUEVARA VELAZQUEZ
DIEGO ALEJANDRO CÁCERES VAZQUEZ
SERGIO MARCANO
AURA GONZALEZ
JUAN RAFAEL BANDES AZUAJE
MERCEDES LUCIA SALAZAR FIGUEROA
VICTOR ANIBAL BORJAS CASTILLO
ALFONSO ESTEBAN BARRAZA JORQUERA
JOSÉ LEONARDO MARCANO MUJICA
JUAN CARLOS GONZALEZ ESCALONA
SAMUEL VILORIA
CARLOS ARMANDO ROQUE ACOSTA
OCTAVIO VARGAS
JULIO VACACAMINO
GENESIS DUERTO
GERMAN JESUS ZAMBRANO LABRADOR
JOSE LUIS YDROGO RODRIGUEZ
EDWYN GONZALO BUITRAGO CAMARGO
Network Defender Essentials:
Module 01: Network Security Fundamentals
Module 02: Identification, Authentication and Authorization
Module 03: Network Security Controls - Administrative Controls
Module 04: Network Security Controls - Physical Controls
Module 05: Network Security Controls - Technical Controls
Module 06: Virtualization and Cloud Computing
Module 07: Wireless Network Security
Module 08: Mobile device security
Module 09: Internet of Things (IoT) Device Security
Module 10: Cryptography and PKI
Module 11: Data Security
Module 12: Network Traffic Monitoring
Module 02: Identification, Authentication and Authorization
Module 03: Network Security Controls - Administrative Controls
Module 04: Network Security Controls - Physical Controls
Module 05: Network Security Controls - Technical Controls
Module 06: Virtualization and Cloud Computing
Module 07: Wireless Network Security
Module 08: Mobile device security
Module 09: Internet of Things (IoT) Device Security
Module 10: Cryptography and PKI
Module 11: Data Security
Module 12: Network Traffic Monitoring
Ethical Hacking Essentials:
Module 01: Information Security Fundamentals
Module 02: Fundamentals of Ethical Hacking
Module 03: Threats to information security and vulnerability assessment
Module 04: Techniques and countermeasures to crack passwords
Module 05: Social engineering techniques and countermeasures
Module 06: Attacks and countermeasures at the network level
Module 07: Attacks and countermeasures on web applications
Module 08: Wireless attacks and countermeasures
Module 09: Mobile attacks and countermeasures
Module 10: IoT and OT attacks and countermeasures
Module 11: Cloud Computing Threats and Countermeasures
Module 02: Fundamentals of Ethical Hacking
Module 03: Threats to information security and vulnerability assessment
Module 04: Techniques and countermeasures to crack passwords
Module 05: Social engineering techniques and countermeasures
Module 06: Attacks and countermeasures at the network level
Module 07: Attacks and countermeasures on web applications
Module 08: Wireless attacks and countermeasures
Module 09: Mobile attacks and countermeasures
Module 10: IoT and OT attacks and countermeasures
Module 11: Cloud Computing Threats and Countermeasures