Cisco Certified Support Technician (CCST) Cybersecurity
!Enfoca tu carrera profesional en el mundo de la seguridad informática!
Obtener los conocimientos fundamentales de Ciberseguridad en disciplinas como ciberinteligencia, análisis de malware, análisis de sistemas y redes (hacking ético), análisis forense y gestión de incidentes de seguridad, así como monitorización y correlación de eventos de seguridad.
Inicio: 1a. o 2da semana del mes.
Horario: Lunes y Miércoles de 7.00 a 9.30 PM
Duración: 20 horas
Precio: $ 10,000.00 MN
Precio con 50 % Descuento: $ 5000.00 MN
Forma de pago: Una sola exhibición o 3,6,9 MSI
Incluye herramientas de preparación como son:
Exámen de certificación incluido:
Introduction to Computer Security
How Seriously Should You Take Threats to Network Security?
Identifying Types of Threats
Assessing the Likelihood of an Attack on Your Network
Basic Security Terminology
Concepts and Approaches
How Do Legal Issues Impact Network Security?
Online Security Resources
Networks and the Internet
Network Basics
How the Internet Works
History of the Internet
Basic Network Utilities
Other Network Devices
Advanced Network Communications Topics
Cyber Stalking, Fraud, and Abuse
How Internet Fraud Works
Identity Theft
Cyber Stalking
Denial of Service Attacks
DoS Attacks
Illustrating an Attack
Common Tools Used for DoS Attacks
DoS Weaknesses
Specific DoS Attacks
Real-World Examples of DoS Attacks
How to Defend Against DoS Attacks
Malware
Viruses
Trojan Horses
The Buffer-Overflow Attack
Spyware
Other Forms of Malware
Detecting and Eliminating Viruses and Spyware
Techniques Used by Hackers
Basic Terminology
The Reconnaissance Phase
Actual Attacks
Malware Creation
Penetration Testing
The Dark Web
Industrial Espionage in Cyberspace
What Is Industrial Espionage?
Information as an Asset
Real-World Examples of Industrial Espionage
How Does Espionage Occur?
Low-Tech Industrial Espionage
Spyware Used in Industrial Espionage
Steganography Used in Industrial Espionage
Phone Taps and Bugs
Protecting Against Industrial Espionage
The Industrial Espionage Act
Spear Phishing
Encryption
Cryptography Basics
History of Encryption
Modern Cryptography Methods
Public Key (Asymmetric) Encryption
PGP
Legitimate Versus Fraudulent Encryption Methods
Digital Signatures
Hashing
MAC and HMAC
Steganography
Cryptanalysis
Cryptography Used on the Internet
Quantum Computing Cryptography
Computer Security Technology
Virus Scanners
Firewalls
Antispyware
Digital Certificates
SSL/TLS
Virtual Private Networks
Wi-Fi Security
Security Policies
What Is a Policy?
Defining User Policies
Defining System Administration Policies
New Employees
Departing Employees
Change Requests
Copyright © Todos los derechos reservados.
Content & Trademarks
The information on this page is © 2015-2021 CertiProf®, LLC. and is protected by US and International copyright laws. Neither images nor text can be copied from this site without the express written permission of the copyright holder. SMPC, SPOPC, BCPC and CertiProf are registered trademarks of CertiProf®, LLC.