CSE-PMI Instructors
Juan Moreno
- Computer engineer
- Higher Education Management Specialist
- Master in Teaching and Management in Higher Education
- Internal Auditor Computer Security ISO 27001:2013 standard
- Scrum Master Professional Certificate (SMPC)
Who is it for
To professionals who have knowledge of computer infrastructure, with intermediate security schemes and who wish to start in the world of computer security, acquiring initial cybersecurity skills.
Pre requirements
Basic knowledge of computer networks, OSI model, protocols, ports and intermediate administration of Linux systems.
Summary
This course is focused on providing the concepts that allow interested parties to have the ability to determine possible security flaws that they may have in their business or personal environments.
In this sense, tools will be provided to confront or prevent a possible attack in a transversal way.
The course is not focused on making the interested party an expert because that implies having a lot of practice in cross-cutting cybersecurity topics, but it does give them some skills to act in time, under the premise of preventing an attack and proposing security measures in different environments.
Course Objectives
- Provide the concepts that allow interested parties to have the ability to determine possible security failures that they may have in their business or personal environments.
- Train in the use of basic cybersecurity tools, in a virtual environment with a native operating system for cybersecurity, based on Linux.
- Show functionality of some cybersecurity tools that allow scanning for vulnerabilities.
Chapter 1: General Cybersecurity Concepts
We start this training with the definition of cybersecurity and information security. Next, we offer you the answers to: What is a threat, a vulnerability and an attack?
Then, we delve into the surface and attack vector terrain, facilitating your understanding of how a cyber attack happens.
Likewise, you will discover the different types of hackers and the function of computers blue team, RedTeam y PurpleTeam.
To close this first chapter, we address the OSI model in relation to a cyberattack and offer you a look at the top 10 web vulnerabilities in OWASP.
Chapter 2: Vulnerabilities for a BlueTeam
Here the Pentesting Phases They will be the focal point, allowing you to understand how to evaluate the security of a system through simulations.
Chapter 3: Basic protection and concealment schemes
You will learn how to hide on the web, perform scans and other skills, and you will also use security techniques. steganography like spies do to send hidden information.
In this section, the Zero-Trust architecture takes center stage. You will learn how this security approach can protect organizations from internal and external threats.
By the end
Altogether, this course is designed to give you a solid understanding of cybersecurity. Thus, you will be able to prevent and mitigate cyberattacks, effectively protecting your digital assets.
Upcoming CSE-PMI Courses
- We could not find any results.
- We could not find any results.