Cibersecurity

https://www.infosecmatter.com/where-to-learn-ethical-hacking-and-penetration-testing/

Threat hunting

Threat hunting

Class1

https://go.kaspersky.com/rs/802-IJN-240/images/Common-TTPs-of-the-modern-ransomware_low-res.pdf

https://attack.mitre.org/


L34rn1ng!


slmgr.vbs /rearm


P4$$w0rd!

Business

https://www.ftc.gov/es/guia-para-negocios/protegiendo-pequenos-negocios/ciberseguridad

CEH

CEH

Intro

Basic cyber-security concepts

Confidentiality: Only the allowed people can access the information

Integrity: Data didn't change

Availability: The information is available at any time

 

Authorization:

Authentication: 

Teams:

Hacking: Using computers skills to manipulate a computer system

Hats:

Attacker motives, goals and objectives

Motives

Attack classification