{"id":51764,"date":"2021-06-03T19:03:00","date_gmt":"2021-06-03T17:03:00","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=51764"},"modified":"2021-10-29T19:05:49","modified_gmt":"2021-10-29T17:05:49","slug":"eip-webinar-how-to-be-a-pentester","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/webinar-eip-como-ser-pentester\/","title":{"rendered":"EIP Webinar: How to be a Pentester"},"content":{"rendered":"<p>If you were not able to attend this interesting free Webinar on <strong>how to be a pentester<\/strong>, Don&#039;t worry. We bring you a summary of what topics were discussed during the Webinar and you can also watch the full video. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/pablo-gonz%C3%A1lez-p%C3%A9rez-46307122\/\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/in\/pablo-gonz%C3%A1lez-p%C3%A9rez-46307122\/\" target=\"_blank\" rel=\"noopener\">Pablo Gonz\u00e1lez P\u00e9rez<\/a>, Technical Manager &amp; Security Telef\u00f3nica Digital Espa\u00f1a \/ Speaker Conf \/ MVP Microsoft 2017-2021, was in charge of this Webinar on June 3 and tells us the<strong> most important aspects of cybersecurity.<\/strong><\/p>\n\n\n\n<p>The world of cybersecurity continues to grow. The <strong>high demand <\/strong>of professionals is taking over a lot of news. He <strong>ethical hacking and pentesting<\/strong>, in particular, is a specialization with strong demand and that usually arouses the interest of many people. <\/p>\n\n\n\n<p>Today, we talk about ethical hacking, Red Team, Pentesting, Auditing and we want to show you some of the things that differentiate them.<\/p>\n\n\n\n<p>Additionally, in this webinar guidelines will be given to start or progress in the <strong>world of pentesting<\/strong>. If you want to dedicate yourself to it, don&#039;t miss it. Here we leave you the video! <\/p>\n\n\n\n<p>If you were not able to attend this interesting free Webinar on <strong>how to be a pentester<\/strong>, Don&#039;t worry. We bring you a summary of what topics were discussed during the Webinar and you can also watch the full video. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/pablo-gonz%C3%A1lez-p%C3%A9rez-46307122\/\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/in\/pablo-gonz%C3%A1lez-p%C3%A9rez-46307122\/\" target=\"_blank\" rel=\"noopener\">Pablo Gonz\u00e1lez P\u00e9rez<\/a>, Technical Manager &amp; Security Telef\u00f3nica Digital Espa\u00f1a \/ Speaker Conf \/ MVP Microsoft 2017-2021, was in charge of this Webinar on June 3 and tells us the<strong> most important aspects of cybersecurity.<\/strong><\/p>\n\n\n\n<p>The world of cybersecurity continues to grow. The <strong>high demand <\/strong>of professionals is taking over a lot of news. He <strong>ethical hacking and pentesting<\/strong>, in particular, is a specialization with strong demand and that usually arouses the interest of many people. <\/p>\n\n\n\n<p>Today, we talk about ethical hacking, Red Team, Pentesting, Auditing and we want to show you some of the things that differentiate them.<\/p>\n\n\n\n<p>Additionally, in this webinar guidelines will be given to start or progress in the <strong>world of pentesting<\/strong>. If you want to dedicate yourself to it, don&#039;t miss it. Here we leave you the video! <\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Webinar How to be a pentester\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/-EU0NsmQC6o?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\"><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>If you are interested in the world of cybersecurity, this latest Webinar on how to be a Pentester is very interesting. Do not miss it!<\/p>","protected":false},"author":1,"featured_media":51765,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-51764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/51764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=51764"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/51764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/51765"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=51764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=51764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=51764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}