{"id":1778,"date":"2017-06-13T22:03:11","date_gmt":"2017-06-13T22:03:11","guid":{"rendered":"http:\/\/10.13.33.7\/?page_id=1778"},"modified":"2019-10-05T12:53:23","modified_gmt":"2019-10-05T12:53:23","slug":"hacking-seguridad-web","status":"publish","type":"page","link":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/","title":{"rendered":"Hacking and web security"},"content":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=\u00bbHacking y seguridad web\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The purpose of this Certificate course is to show students associated risks when creating and managing web applications, keeping in mind all aspects related to the security of the applications and the data they manage. Throughout the course, it will be detailed how to carry out a web audit process, showing in detail the different techniques needed to challenge security systems usually protecting these resources.<\/p>\n<p>The student will learn in the process how to deal with complications such as denial of service attacks, unauthorized access to databases and other inconveniences that compromise security, based on the experience of the American company KIMBERSYSTEMS that has been protecting the federal cybersecurity of the United States, the private and educational sector of this country for over 20 years making available to students the experiences in the most difficult engineering and information security challenges of such a powerful country.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbwsedes\u00bb][vc_column][vc_tta_tour active_section=\u00bb1&#8243; el_class=\u00bbwsedeg\u00bb][vc_tta_section title=\u00bbMedell\u00edn\u00bb tab_id=\u00bb1496311981022-aaf6caec-471d\u00bb el_class=\u00bbwsedes\u00bb][vc_row_inner][vc_column_inner el_class=\u00bbwleft\u00bb][vc_column_text]<strong>Study plan<\/strong><br \/>\n<strong>Length:<\/strong> 130 hours<br \/>\n<strong>Investment:<\/strong> $ 2.400.000<br \/>\n<strong>Addressed to: <\/strong> System Engineering, engineering students, electronics, system engineers, electronic engineers, systems technologists, IT auditors, security and technology consultants, analysts, security managers, pentesters, security directors, IT directors, IT managers, security managers, infrastructure analysts, IT managers and all those interested and passionate about vulnerability analysis in computer security.<br \/>\n<strong>Phones:<\/strong> 4025500 ext 143-102-160<\/p>\n<p><a href=\"\/directorio\" target=\"_blanck\">information<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row_content_no_spaces\u00bb el_class=\u00bbwheadingg\u00bb][vc_column][vc_cta h2=\u00bbWould you like to know more about this program?\u00bb txt_align=\u00bbcenter\u00bb shape=\u00bbsquare\u00bb][\/vc_cta][\/vc_column][\/vc_row][vc_row][vc_column]<div role=\"form\" class=\"wpcf7\" id=\"wpcf7-f1855-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/1778#wpcf7-f1855-o1\" method=\"post\" class=\"wpcf7-form init\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"1855\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.5.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1855-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<div class=\"vc_row wpb_row vc_row-fluid\">\n<div class=\"wpb_column vc_column_container vc_col-sm-12\">\n<div class=\"vc_column-inner \">\n<div class=\"wpb_wrapper\">\n<div class=\"vc_empty_space\" style=\"height: 32px\">\n\t\t\t\t\t<span class=\"vc_empty_space_inner\"><\/span>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>Full name<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtName\"><input type=\"text\" name=\"txtName\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>Email address<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtEmail\"><input type=\"email\" name=\"txtEmail\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email address\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>Telephone number<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtPhone\"><input type=\"text\" name=\"txtPhone\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Telephone number\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>City<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtCiudad\"><input type=\"text\" name=\"txtCiudad\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"City\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-12 col-md-12 col-lg-12\">\n<div class=\"form-group\">\n\t\t\t<label>Birth date<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtDate\"><input type=\"date\" name=\"txtDate\" value=\"\" class=\"wpcf7-form-control wpcf7-date wpcf7-validates-as-date form-control\" aria-invalid=\"false\" placeholder=\"Birth date\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-12 col-md-12 col-lg-12\">\n\t\t<input type=\"submit\" value=\"Submit\" class=\"wpcf7-form-control has-spinner wpcf7-submit btn btn-default\" \/><\/p>\n<input type=\"hidden\" name=\"txtProgram\" value=\"post_title\" class=\"wpcf7-form-control wpcf7-hidden\" \/>\n<\/div>\n<\/div>\n<div class=\"stm_colored_separator\">\n<div class=\"triangled_colored_separator\" style=\"background-color:#fdc735; \">\n<div class=\"triangle\" style=\"border-bottom-color:#fdc735;\"><\/div>\n<\/div>\n<\/div>\n<div class=\"vc_row wpb_row vc_row-fluid\">\n<div class=\"wpb_column vc_column_container vc_col-sm-12\">\n<div class=\"vc_column-inner \">\n<div class=\"wpb_wrapper\">\n<div class=\"vc_empty_space\" style=\"height: 32px\">\n\t\t\t\t\t<span class=\"vc_empty_space_inner\"><\/span>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div><\/form><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Objectives<\/h3>\n<p>To introduce the participant in the world of Web Pentesting or Hacking of Pages and Web Applications. Publicizing different attack techniques in a guided way against Web applications, as well as countermeasures and implementations to protect these resources.<br \/>\nTo know Advanced Pentest techniques, as well as the necessary protection measures against them. Among these advanced techniques of Pentest Web will be deepened in: SQL Injection, Blind SQL Injection, XSS Reflected, XSS Stored, CSRF, XML Injection, Session Fixation and Botnet DDOS HTML5, among others.<br \/>\nTo detect and know the operation of protective devices by taking necessary measures for their correct implementation.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row el_class=\u00bbwmalla wmallag\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text]<\/p>\n<h3 class=\"malla_curricular\">CURRICULUM<\/h3>\n<h2>Study plan<\/h2>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb3\/4&#8243;][vc_column_text]Content Program[\/vc_column_text][vc_tta_tabs active_section=\u00bb1&#8243; el_class=\u00bbwmalla\u00bb][vc_tta_section title=\u00bbModule I\u00bb tab_id=\u00bb1496310901735-bf3946d2-995e\u00bb el_class=\u00bbwsemestre\u00bb][vc_column_text][\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Introduction to the Pentest web<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule II\u00bb tab_id=\u00bb1496863949583-4995e6cc-d855&#8243; el_class=\u00bbwsemestre\u00bb][vc_column_text][\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>SQL injection attacks to database<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule III\u00bb tab_id=\u00bb1497120933796-7b0e9b41-93bf\u00bb el_class=\u00bbwsemestre\u00bb][vc_column_text][\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Cross site scripting<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule IV\u00bb tab_id=\u00bb1497391259183-aa85fea0-ab7b\u00bb el_class=\u00bbwsemestre\u00bb][vc_column_text][\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Other common attacks<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule V\u00bb tab_id=\u00bb1497391311316-d5a4056a-9509&#8243; el_class=\u00bbwsemestre\u00bb][vc_column_text][\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Hacking with HTML5 and web application firewall<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=\u00bbHacking y seguridad web\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The purpose of this Certificate course is to show students associated risks when creating and managing web applications, keeping in mind all aspects related to the security of the applications and the data they manage. Throughout the course, it will be detailed how to carry [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1923,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking and web security - Maria Cano - en<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking and web security - Maria Cano - en\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_custom_heading text=\u00bbHacking y seguridad web\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The purpose of this Certificate course is to show students associated risks when creating and managing web applications, keeping in mind all aspects related to the security of the applications and the data they manage. Throughout the course, it will be detailed how to carry [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/\" \/>\n<meta property=\"og:site_name\" content=\"Maria Cano - en\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-05T12:53:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fumc.edu.co\/en\/#website\",\"url\":\"https:\/\/www.fumc.edu.co\/en\/\",\"name\":\"Maria Cano - en\",\"description\":\"Otro sitio realizado con WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fumc.edu.co\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/#webpage\",\"url\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/\",\"name\":\"Hacking and web security - Maria Cano - en\",\"isPartOf\":{\"@id\":\"https:\/\/www.fumc.edu.co\/en\/#website\"},\"datePublished\":\"2017-06-13T22:03:11+00:00\",\"dateModified\":\"2019-10-05T12:53:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.fumc.edu.co\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Continuing education\",\"item\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacking and web security\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking and web security - Maria Cano - en","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/","og_locale":"es_ES","og_type":"article","og_title":"Hacking and web security - Maria Cano - en","og_description":"[vc_row][vc_column][vc_custom_heading text=\u00bbHacking y seguridad web\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The purpose of this Certificate course is to show students associated risks when creating and managing web applications, keeping in mind all aspects related to the security of the applications and the data they manage. Throughout the course, it will be detailed how to carry [&hellip;]","og_url":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/","og_site_name":"Maria Cano - en","article_modified_time":"2019-10-05T12:53:23+00:00","twitter_card":"summary","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.fumc.edu.co\/en\/#website","url":"https:\/\/www.fumc.edu.co\/en\/","name":"Maria Cano - en","description":"Otro sitio realizado con WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fumc.edu.co\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/#webpage","url":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/","name":"Hacking and web security - Maria Cano - en","isPartOf":{"@id":"https:\/\/www.fumc.edu.co\/en\/#website"},"datePublished":"2017-06-13T22:03:11+00:00","dateModified":"2019-10-05T12:53:23+00:00","breadcrumb":{"@id":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.fumc.edu.co\/en\/"},{"@type":"ListItem","position":2,"name":"Continuing education","item":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/"},{"@type":"ListItem","position":3,"name":"Hacking and web security"}]}]}},"_links":{"self":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages\/1778"}],"collection":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/comments?post=1778"}],"version-history":[{"count":0,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages\/1778\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages\/1923"}],"wp:attachment":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/media?parent=1778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}