- …
- …
Programa de Ciberseguridad:
aprende, protege y lidera
Explora nuestro programa de Ciberseguridad diseñado para formar a los futuros líderes en protección digital y conviértete en un profesional demandado en el sector tecnológico
¿Por qué entrenarse en ciberseguridad?
Alta demanda laboral por aumento de ciberataques
Empresas de todo el mundo buscan profesionales capacitados para proteger sus sistemas y datos críticos.
Oportunidades profesionales globales
Puedes trabajar desde cualquier parte del mundo, en sectores como finanzas, gobierno, salud, telecomunicaciones, tecnología, y muchos más.
Trabajo desafiante y dinámico
Aprender ciberseguridad te prepara para enfrentar estos retos, mantenerte actualizado y desarrollar soluciones innovadoras.
Conoce nuestro programa
11st Sprint
- Introduction To Cyber Security
- Networking Introduction - reading
- Linux Security Basics
- Passive Reconnaissance
- Active Reconnaissance
- Packets and Frames - reading
- Nmap Live Host Discovery
- Wireshark Basics
- Web Fundamentals
- OWASP Top 10
- BurpSuite-Fundamentals
- SQL,noSQL Injection
- Content Discovery
- Upload Vulnerability
- Cryptography Basics
- Permissions, SUD & SGID
- Mandatory Access Control
- Protocols & Servers
- Offensive vs Defensive Security
- Forensic Ethics & Methodologies
22nd Sprint
- Nmap Advanced Port Scans
- Insecure Direct Object Reference
- File Inclusion
- Command Injection (CVE-2021-44228
- Explained)
- Buffer Overflow
- Web Application Fast Incident Response
- Web Application Forensics
- Nmap Post Port Scan & Scripting
- Server-Side Request Forgery
- Understanding vulnerabilites-Reading
- Understanding vulnerabilites-Exploitation
- CVE, CWE, and NVD
- Nessus
- Ruby Scripting (Cyber)
- Metasploit-basics
- Metasploit-Scripting
- Advanced Web Attack Techniques
- Active Directory - Fundamentals
- Active Directory - Enumeration
- Active Directory - Exploitation
- Active Directory - Forensics
- Active Directory -Hardering
33rd Sprint
- What the shell?
- Linux Privilege Escalation
- Windows Privilege Escalation
- Acces Presistence Techniques
- Reverse Engineering Fundamentals
- Static Analysis in Reverse Engineering
- Dynamic Analysis in Reverse Engineering
- Malware Analysis in Reverse Engineering
- Mobile Application Fundamentals and
- Security
- Static Analysis In Mobile Security
- Dynamic analysis In Mobile Security
- Ethics in Cybersecurity
- ISO 2700X
- NIST
- General Data Protection & Privacy
Conoce las certificaciones que podrás obtener en cada módulo:
1st Sprint
Network Security Basics
CompTIASecurity+
/eJPT
Linux Security
CompTIA
Linux+
2nd Sprint
Certified Ethical Hacker
(CEH)
Network Security Advanced
CompTIA
Network+
Cisco
CCNA
Web Application Security Advanced
Certified Web
Application Penetration
Tester (GWAPT)
3rd Sprint
Offensive Security Certified Profession al (OSCP)
Offensive Security Certified Web (OSWE)
Windows Active Directory Security
GIAC Certified WindowsSecurity
Administrator (GCWN)
Reverse Engineering
Certified Reverse Engineering Analyst
(CREA)
Cybersecurity Laws & Ethics
Certified Information Privacy
Professional (CIPP)
Offensive Security Certified Expert (OSCE)
Certified Information Systems Security
Professional (CISSP)
Tu camino en la Ciberseguridad comienza aquí
Copyright © Coderise.org