FavouritesAdd to Wish List
FavouritesAdd to Wish List
from34.00EUR/ h

PROTECCIÓN PERSONAL PARA CEO, MEDIDAS DE SEGURIDAD Y CONTRAMEDIDAS ANTE AGRESORES.

Evaluación de riesgos generados por el crimen, enseñando las contra-medidas para evitar pérdidas o daños en vida, bienes, imagen, económicos, se tiene en cuenta que los ejecutivos deben conocer sus peligros causados por los delitos y las formas en las cuales debe procurar su defensa sin desbordar en actos ilegales.

Extra information

Educacion virtual (E learning)

Location

At teacher's location: FUMIGACIONES SUBA, Cra. #-, Bogotá, Colombia
Online via webcam

|
Use ⊞+wheel to zoom!
+

General info

suitcase iconSkills:
Age:
Adults (18-64 years old)
Seniors (65+ years old)
Student level:
Beginner
Intermediate
Advanced
Duration:
60 minutes
The class is taught in:English, Spanish

Ask a question

Send a message explaining your needs and Gustavo Rodriguez will reply soon:
The more detail, the better.
Ex. "Hi, when are you available to meet for a lesson?"

Availability of a typical week

(GMT -04:00) New York
MonTueWedThuFriSatSun
0              
1              
2              
3              
4              
5              
6              
7              
8              
9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  
10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  
11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  
12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  
13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  
14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00    
15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00    
16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00    
17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00    
18  Monday at 18:00  Tuesday at 18:00  Wednesday at 18:00  Thursday at 18:00  Friday at 18:00    
19  Monday at 19:00  Tuesday at 19:00  Wednesday at 19:00  Thursday at 19:00  Friday at 19:00    
20  Monday at 20:00  Tuesday at 20:00  Wednesday at 20:00  Thursday at 20:00  Friday at 20:00    
21  Monday at 21:00  Tuesday at 21:00  Wednesday at 21:00  Thursday at 21:00  Friday at 21:00    
22  Monday at 22:00  Tuesday at 22:00  Wednesday at 22:00  Thursday at 22:00  Friday at 22:00    
23              
from 34€At teacher's location
from 34€Online via webcam

Good-fit Instructor Guarantee


If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

Online reputation

  • Instructor since June 2019
  • Google connected

Availability of a typical week

(GMT -04:00) New York
MonTueWedThuFriSatSun
0              
1              
2              
3              
4              
5              
6              
7              
8              
9  Monday at 9:00  Tuesday at 9:00  Wednesday at 9:00  Thursday at 9:00  Friday at 9:00  Saturday at 9:00  
10  Monday at 10:00  Tuesday at 10:00  Wednesday at 10:00  Thursday at 10:00  Friday at 10:00  Saturday at 10:00  
11  Monday at 11:00  Tuesday at 11:00  Wednesday at 11:00  Thursday at 11:00  Friday at 11:00  Saturday at 11:00  
12  Monday at 12:00  Tuesday at 12:00  Wednesday at 12:00  Thursday at 12:00  Friday at 12:00  Saturday at 12:00  
13  Monday at 13:00  Tuesday at 13:00  Wednesday at 13:00  Thursday at 13:00  Friday at 13:00  Saturday at 13:00  
14  Monday at 14:00  Tuesday at 14:00  Wednesday at 14:00  Thursday at 14:00  Friday at 14:00    
15  Monday at 15:00  Tuesday at 15:00  Wednesday at 15:00  Thursday at 15:00  Friday at 15:00    
16  Monday at 16:00  Tuesday at 16:00  Wednesday at 16:00  Thursday at 16:00  Friday at 16:00    
17  Monday at 17:00  Tuesday at 17:00  Wednesday at 17:00  Thursday at 17:00  Friday at 17:00    
18  Monday at 18:00  Tuesday at 18:00  Wednesday at 18:00  Thursday at 18:00  Friday at 18:00    
19  Monday at 19:00  Tuesday at 19:00  Wednesday at 19:00  Thursday at 19:00  Friday at 19:00    
20  Monday at 20:00  Tuesday at 20:00  Wednesday at 20:00  Thursday at 20:00  Friday at 20:00    
21  Monday at 21:00  Tuesday at 21:00  Wednesday at 21:00  Thursday at 21:00  Friday at 21:00    
22  Monday at 22:00  Tuesday at 22:00  Wednesday at 22:00  Thursday at 22:00  Friday at 22:00    
23              
from 34€At teacher's location
from 34€Online via webcam

Good-fit Instructor Guarantee


If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.

Share

You are here


Brian
GCSE & A level Computer Science Revision Sessions.
Sometimes studying can be tough, I can help you improve your grades and enjoy your learning. As an advanced teaching practitioner I have substantial knowledge and expertise in helping students enjoy and achieve in their learning since my lessons are based around the individual needs of the student. I’ve taught in Colleges, Secondary Schools, Universities, I’ve been head of computer science and head of higher education in a number of educational establishments. I really enjoy teaching and helping students to realise their potential. I’m a grade 1 Outstanding teacher, and an advanced teaching practitioner. I've taught Computing/IT & Computer Science for over 25 years. I teach GCSE, A level and Degree courses in ICT and Computer Science. My specialist subjects cover the whole curriculum subject areas for A level and GCSE. I have experience of mentoring and coaching students from various backgrounds and nationalities. If you need help to get those grades in your GCSE or A level exams, book a lesson with me and I'll get you up to speed in the area you need help in.

Dr Zeeshan
Lesson 04: Command Injection & Brute Force Attack (Lesson 04 of Web Penetration Testing Series)
This lesson is the fourth lesson of the Web Penetration Testing series. This lesson consist of the following topics: - Command Injection - Code Injection - Blind Xpath Injection - Brute Force - Risk Factors and Examples - Frequency Analysis This lesson is followed by a two hours lab practical session.

Anik
CCNA Tutor - Having 16 years of experience in Netwroking Industry and working with one of corportate company as Netwrok Architect.
You will be learning below topics in order. Network Fundamentals Network IP connectivity IP Services Security Fundamentals Automation & Progrmmability The above topics are like to be included on the 200-301 CCNA exam. The topics are subject to change at any time to reflect the latest technolgies aligned to CISCO's products.

Issame
Ethical hacker: learn to think like a hacker to better secure your systems
CEH (Certified Ethical Hacker) training is an IT security training course that aims to teach participants how to think and act like an ethical hacker. It is intended for those who wish to understand the different methods used by hackers to access computer systems, in order to better protect themselves against these attacks. CEH training covers a wide range of topics, including vulnerability analysis, attack techniques, security management, cryptography, networking and operating systems. Participants will also learn how to use specific tools and technologies to assess the security of networks and systems.

Issamo
FIREWALL FORTIGATE ADMINISTRATION #fortinet (NSE4)
This course allows you to acquire the skills necessary to administer FORTIGATE UTM DE FORTINET including profit management antivirus, ips, ids, security policy, dns, dhcp, log, application control, web filter ... eg of other technologies that we will discover later ..

Javier Oncala
Computer science for students and for people who want to learn more
In this course you will learn things about programming, local networks and office applications. You also have the option of choosing the topic you want to learn and study. For all ages and all types of student courses, we will learn in a fun and easy way.

Vijay
Coding , project management and cyber security's etc.
Learning a computer language, project management tools, and cybersecurity collectively equips individuals with a comprehensive skill set that is invaluable in the contemporary professional landscape. Proficiency in a computer language enhances problem-solving skills, fostering innovation and efficiency in software development and technology-driven domains. Project management tools contribute to streamlined workflows, efficient resource allocation, and improved communication, ultimately ensuring project success and client satisfaction. Meanwhile, cybersecurity knowledge not only protects against evolving digital threats but also opens doors to diverse career opportunities and cultivates a heightened awareness of personal and organizational security. The synthesis of these skills empowers individuals to navigate the complexities of the digital age, bridging the gap between technical expertise, effective project execution, and robust cybersecurity practices.

Pedro
[PT/EN] Master Student at EPFL & ETH Zurich and Tutor for 3 years who is looking to help Students with difficulties in Programming courses!
Hi and welcome to this posting! :D My name is Pedro and I've been tutoring students for the last 3 years. I have a BSc in Computer Science and Engineering and I am currently studying for a MSc in Cyber Security at EPFL & ETH Zurich. I love to learn and help others. For instance, one of the ways I prepared for the Math National Exam was actually by being a tutor to friends who were having many doubts. I would say my way of explaining is a bit different: I always try to keep people engaged and I don't stop until all the doubts are cleared! To explain something, I do it in a simple and intuitive way, and I like to come up with funny ways for people to understand the material. I also create a lot of drawings and figures to make it easier to understand! I take notes in a writing application and share them at the end of each class.

Rich
Internet security is the practice of protecting computers
Internet security is the practice of protecting computers, networks, and data from unauthorized access, manipulation, or damage. In this class, you will learn the basic concepts and principles of internet security, such as encryption, authentication, firewalls, malware, and cyber threats. You will also gain practical skills and knowledge on how to secure your devices, networks, and online accounts, as well as how to respond to cyber incidents and recover from them. This class is suitable for anyone who wants to learn more about internet security and how to protect themselves online. It is also a good preparation for those who want to pursue further studies or certifications in cyber security.

Lucas
Legal Frameworks tutoring (order and safety) security/enforcement
I give you extra text and explanation about the laws from the criminal code and criminal procedure. I do this by outlining examples or situations in which these laws could apply. This will give you a better understanding of what the rules mean and how they work.

امين
Diploma in cyber security, specializing in digital forensics
Objectives The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to: • Implement technical strategies, tools, and techniques to secure data and information for your organization • Adhere to ethical security behavior to analyze and mitigate risks • Understand security in cloud computing architecture in depth • Understand legal requirements, privacy issues, and audit methodologies within a cloud environment • Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework what will you learn 1. Inactive survey conduct Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing. 2. Take an active survey So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement. 3. Gathering information and identifying weaknesses Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle. 4. Application testing There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction. 5. Digital Forensics This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline. 6. Digital Forensics: Getting Started with File Systems Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level. 7. Kali Linux Digital Forensics Tools: Imaging and Hash Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful. 8. Practical coding using Python Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career. 9. Social Engineering with Social Engineering Toolkit The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently. 10. Penetration testing with Metasploit Framework Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.

Naseem Us
Blockchain for Absolute Beginners (A Guide to WHAT,WHY,HOW and WHEN to select BLOCKCHAIN)
Blockchain is getting attention in both academic and industrial sector. Basically if we say Blockchain is the future , that won't be wrong. In this class i will be teaching you what is Blockchain? why everyone is talking about it? How its different from cryptocurrency? What are the skills you can learn in Blockchain to get a good earning job and much more!!!!

Lionel
Engineer and doctor - Computer security course (Hacking / Attack detection) / Cybersecurity course (Hacking / Attack detection)
Course / Course ------------------------- - Introduction to computer security / Cybersecurity introduction - Ethical Hacking / Ethical Hacking - Intrusion Detection / Intrusion Detection - Investigation and prevention of cyber attacks / Forensics & Cyberattack Prevention Networking / Networking -------------------------------------------- - Canadian immigration procedure as a student or permanent resident - Position on some innovative projects with the University of Sherbrooke, Telecom SudParis, and Hydro-Quebec / Recruit on some innovating projects with University of Sherbrooke, Telecom SudParis, Hydro-Quebec

Anjula
Social media security - stay safe in social media platforms
Social media platforms have become an integral part of online lives. Social networks are a great way to stay connected with others, but you should be aware about dangers you will face when using social media platforms and how to stay safe. From this you will learn -Types of threats you face in social media -Privacy and security settings -What action to take -How to overcome most common issues

Saeed
Cisco certified network associated / Cisco Certified Network professional CCNA & CCNP
CCNA CCNP Metwork + OSI layer Foundational knowledge to support enterprise network infrastructures. It validates your ability to configure, operate, and troubleshoot medium-size routed and switched networks. Certified network administrators have the skills to operate LANs, make connections to remote sites via a WAN, and mitigate basic security threats.