{"id":59207,"date":"2022-03-09T10:22:25","date_gmt":"2022-03-09T09:22:25","guid":{"rendered":"https:\/\/eiposgrados.com\/?post_type=promocion&#038;p=59207"},"modified":"2024-02-19T10:19:36","modified_gmt":"2024-02-19T09:19:36","slug":"fundae-course-1","status":"publish","type":"promocion","link":"https:\/\/eiposgrados.com\/eng\/promocion\/fundae-curso-1\/","title":{"rendered":"Fundae course 1: Cybersecurity: Fundamentals of Ethical Hacking"},"content":{"rendered":"<div class=\"gb-container gb-container-5071449c\" id=\"Logotipos\">\n<div class=\"gb-container gb-container-679f798e\">\n\n<figure class=\"gb-block-image gb-block-image-400c0bac\"><img fetchpriority=\"high\" decoding=\"async\" width=\"481\" height=\"140\" class=\"gb-image gb-image-400c0bac is-resized\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/07\/cropped-logo-eip-blanco-logo-web.png\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/07\/cropped-logo-eip-blanco-logo-web.png 481w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/07\/cropped-logo-eip-blanco-logo-web-300x87.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/07\/cropped-logo-eip-blanco-logo-web-123x36.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/07\/cropped-logo-eip-blanco-logo-web-200x58.png 200w\" sizes=\"(max-width: 481px) 100vw, 481px\" alt=\"\" title=\"\"><\/figure>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-700b96b2\">\n<div class=\"gb-container gb-container-c4da8a4b\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-91a391ef\">\n<div class=\"gb-grid-column gb-grid-column-f2e72ebc\"><div class=\"gb-container gb-container-f2e72ebc\">\n\n<p class=\"gb-headline gb-headline-d84c4d56 gb-headline-text\"><strong>Fundamentals of Ethical Hacking<\/strong><\/p>\n\n\n<div class=\"gb-container gb-container-536b8cc3\"><\/div>\n\n\n<p class=\"gb-headline gb-headline-9784532c gb-headline-text degradado2\">Welcome to <strong>free online course<\/strong> of Cybersecurity on Ethical Hacking.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-9147f16d alignfull\">\n<div class=\"gb-container gb-container-22ed6a8e\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-e0f9ebb6\">\n<div class=\"gb-grid-column gb-grid-column-742eede6\"><div class=\"gb-container gb-container-742eede6\">\n<div class=\"gb-container gb-container-866a2a22\">\n\n<h2 class=\"gb-headline gb-headline-54328038 gb-headline-text\"><strong>What you will learn:<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-5920723\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>1.- First steps with Nmap<\/strong><\/h6><div id=\"ac-5920723\" class=\"c-accordion__content\">\n<ol class=\"wp-block-list\">\n<li>How to get NMAP<\/li>\n\n\n\n<li>Nmap Definitions<\/li>\n\n\n\n<li>Scan Types<\/li>\n\n\n\n<li>Scan statuses<\/li>\n\n\n\n<li>Commands<\/li>\n\n\n\n<li>Using Nmap<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-5920724\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>2.- <em>hacking<\/em> of systems<\/strong><\/h6><div id=\"ac-5920724\" class=\"c-accordion__content\">\n<ol class=\"wp-block-list\">\n<li>MAC\/CAM<\/li>\n\n\n\n<li>Vlan Hopping<\/li>\n\n\n\n<li><em>Man in the Middle<\/em><\/li>\n\n\n\n<li>ARP Spoofing<\/li>\n\n\n\n<li><em>Network Packet Manipulation<\/em><\/li>\n\n\n\n<li>DHCP attacks<\/li>\n\n\n\n<li>IP <em>Spoofing<\/em><\/li>\n\n\n\n<li>DNS <em>Spoofing<\/em><\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-5920725\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>3.- <em>hacking<\/em> web and applications<\/strong><\/h6><div id=\"ac-5920725\" class=\"c-accordion__content\">\n<ol class=\"wp-block-list\">\n<li>Types of vulnerabilities<\/li>\n\n\n\n<li>XSS: Cross-Site Scripting<\/li>\n\n\n\n<li>Authentication and session management<\/li>\n\n\n\n<li>Unsafe direct object reference<\/li>\n\n\n\n<li>CSRF: <em>Cross-Site Request Forgery<\/em><\/li>\n\n\n\n<li>Injection<\/li>\n\n\n\n<li>Local and Remote File Inclusion<\/li>\n\n\n\n<li>Insecure configurations<\/li>\n\n\n\n<li>Insecure Cryptographic Storage<\/li>\n\n\n\n<li>Use of <em>proxy<\/em><\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-5920726\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>4.- <em>hacking<\/em> Wifi<\/strong><\/h6><div id=\"ac-5920726\" class=\"c-accordion__content\">\n<ol class=\"wp-block-list\">\n<li>WIFI encryption<\/li>\n\n\n\n<li>W.E.P.<\/li>\n\n\n\n<li>WPA\/WPA2<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-5920727\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>5.- Social engineering<\/strong><\/h6><div id=\"ac-5920727\" class=\"c-accordion__content\">\n<ol class=\"wp-block-list\">\n<li>Phases of social engineering<\/li>\n\n\n\n<li><em>Phishing<\/em><\/li>\n\n\n\n<li>Evidence<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-5920728\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>6.- Cryptography and steganography<\/strong><\/h6><div id=\"ac-5920728\" class=\"c-accordion__content\">\n<ol class=\"wp-block-list\">\n<li>Steganography and steganalysis<\/li>\n\n\n\n<li>Masking techniques<\/li>\n\n\n\n<li>Attacks<\/li>\n\n\n\n<li>Fundamentals of Cryptography<\/li>\n\n\n\n<li>Steganography<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-5920729\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>7.- Anonymity, Deep web and Dark web<\/strong><\/h6><div id=\"ac-5920729\" class=\"c-accordion__content\">\n<ol class=\"wp-block-list\">\n<li>Anonymity<\/li>\n\n\n\n<li>Dark Web<\/li>\n\n\n\n<li>Surface Web<\/li>\n\n\n\n<li>Deep Web<\/li>\n<\/ol>\n<\/div><\/div>\n\n\n\n<a class=\"gb-button gb-button-5ab9aa10 gb-button-text degradado enlace-dinamico\" href=\"#formulario\"><strong><strong>I WANT TO REGISTER<\/strong><\/strong><\/a>\n\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-77e4756e\"><div class=\"gb-container gb-container-77e4756e\" id=\"formulario\">\n\n<h2 class=\"gb-headline gb-headline-a0e9d2e0 gb-headline-text\"><strong>Register to access<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-af2ccfa6 gb-headline-text landing-bf-negrita\">We will send you the credentials by email<\/p>\n\n\n<div class=\"gb-container gb-container-7f968cde\"><div class=\"gb-inside-container\">\n\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<style>\n\n.acordeon {\n  background-color: white;\n  box-shadow: 1px 0px 20px 0px #adadad36;\n  padding: 10px 20px;\n  border-radius: 15px;\n  margin-bottom: 15px;\n}\n\n.c-accordion__title {\n  margin: 0;\n}\n\n<\/style>","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"","class_list":["post-59207","promocion","type-promocion","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/promocion\/59207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/promocion"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/promocion"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/promocion\/59207\/revisions"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=59207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}