Translated by Google
Cybersecurity, Networks, Hacking, and Security Event Management Systems
From 71.74 $ /h
1. Fundamentals of Networks and Systems
Before breaking something, you need to know how it works. In this stage you will learn:
The OSI Model: Understanding how data travels from an application to the physical cable.
Essential protocols: What TCP/IP, DNS, HTTP/S and FTP are and how they work.
Command line: Overcoming the fear of the Linux terminal and the Windows CMD.
2. The Security Triad (CIA)
This is the industry's "Lord's Prayer." A good course will teach you how to protect these three fronts:
Confidentiality: Ensure that only authorized people see the data (Encryption).
Integrity: Ensuring that the information is not altered (Hashing).
Availability: That the systems are active when needed (Mitigation of DoS attacks).
3. Types of Attacks and Threats
This is where the theory gets exciting. You will learn to identify:
Social Engineering: How attackers deceive people (Phishing, Vishing).
Malware: Differences between viruses, Trojans, ransomware and spyware.
Web Vulnerabilities: Basic concepts such as SQL Injection or Cross-Site Scripting (XSS).
4. Defense and Mitigation
It's not all about attack; most of the real work is about protecting:
Using Firewalls and Antivirus: Basic Configuration.
Identity Management: Two-factor authentication (2FA) and biometrics.
Basic cryptography: How public and private keys work.
SIEM Log event management.
Before breaking something, you need to know how it works. In this stage you will learn:
The OSI Model: Understanding how data travels from an application to the physical cable.
Essential protocols: What TCP/IP, DNS, HTTP/S and FTP are and how they work.
Command line: Overcoming the fear of the Linux terminal and the Windows CMD.
2. The Security Triad (CIA)
This is the industry's "Lord's Prayer." A good course will teach you how to protect these three fronts:
Confidentiality: Ensure that only authorized people see the data (Encryption).
Integrity: Ensuring that the information is not altered (Hashing).
Availability: That the systems are active when needed (Mitigation of DoS attacks).
3. Types of Attacks and Threats
This is where the theory gets exciting. You will learn to identify:
Social Engineering: How attackers deceive people (Phishing, Vishing).
Malware: Differences between viruses, Trojans, ransomware and spyware.
Web Vulnerabilities: Basic concepts such as SQL Injection or Cross-Site Scripting (XSS).
4. Defense and Mitigation
It's not all about attack; most of the real work is about protecting:
Using Firewalls and Antivirus: Basic Configuration.
Identity Management: Two-factor authentication (2FA) and biometrics.
Basic cryptography: How public and private keys work.
SIEM Log event management.
Extra information
Computer, virtual machines, basic computer skills
Location
Online from Spain
Age
Teenagers (13-17 years old)
Adults (18-64 years old)
Seniors (65+ years old)
Student level
Beginner
Intermediate
Advanced
Duration
60 minutes
The class is taught in
Spanish
English
Skills
Availability of a typical week
(GMT -04:00)
New York
Mon
Tue
Wed
Thu
Fri
Sat
Sun
00-04
04-08
08-12
12-16
16-20
20-24
Good-fit Instructor Guarantee