{"id":1779,"date":"2017-06-13T22:23:38","date_gmt":"2017-06-13T22:23:38","guid":{"rendered":"http:\/\/10.13.33.7\/?page_id=1779"},"modified":"2019-09-25T16:54:37","modified_gmt":"2019-09-25T16:54:37","slug":"hacking-etico-entornos-corporativos","status":"publish","type":"page","link":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/","title":{"rendered":"Diplomado en hacking \u00e9tico entornos corporativos"},"content":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=\u00bbCertificate in Ethical Hacking in Corporate Environments\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The digital era in which we live allows us to enjoy access to information any time, from any device and from anywhere, so that we can interact, contribute and exchange knowledge through different collaborative or relationship environments. This is leading organizations to define and enable mechanisms for the exchange of information, the completion of formalities and transactions and the interaction between the business, managers, customers and devices that are part of the Internet of Things, regardless of where they are and how they are used. This panorama demands new behaviors and ways of doing things from the organizations, and of course, new opportunities are offered, which in consequence generates new risks.<\/p>\n<p>The student will be learning how to identify and manage security events in the process such as denial of service attacks, impersonation, unauthorized access to computer systems, as well as weaknesses in the implementation of technological infrastructure that can lead to loss of confidentiality, availability and integrity of information, based on the experience of the American company KimberSystems, which for more than 20 years has been protecting the federal cybersecurity of the United States, the private sector and education of this country, making available for students to have the experiences in the most difficult challenges of engineering and information security of this world power.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbwsedes\u00bb][vc_column][vc_tta_tour active_section=\u00bb1&#8243; el_class=\u00bbwsedeg\u00bb][vc_tta_section title=\u00bbMedell\u00edn\u00bb tab_id=\u00bb1496311981022-aaf6caec-471d\u00bb el_class=\u00bbwsedes\u00bb][vc_row_inner][vc_column_inner el_class=\u00bbwleft\u00bb][vc_column_text]<strong>STUDY PLAN<\/strong><br \/>\n<strong>Duration:<\/strong> 130 Horas<br \/>\n<strong>Value:<\/strong> $ 2.400.000<br \/>\n<strong>Aimed to:<\/strong> Students of systems engineering, electronics, systems engineers, electronic engineers, systems technologists, IT auditors, security and technology consultants, analysts, security managers, pentesters, security directors, IT directors, IT managers, security managers, infrastructure analysts, IT head office and all those people interested and passionate about analyzing vulnerabilities in IT security.<br \/>\n<strong>Phone numbers:<\/strong> 4025500 ext 143-102-160<\/p>\n<p><a href=\"\/directorio\">Information<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row_content_no_spaces\u00bb el_class=\u00bbwheadingg\u00bb][vc_column][vc_cta h2=\u00bbDo you want more information about this program?\u00bb txt_align=\u00bbcenter\u00bb shape=\u00bbsquare\u00bb][\/vc_cta][\/vc_column][\/vc_row][vc_row][vc_column]<div role=\"form\" class=\"wpcf7\" id=\"wpcf7-f1855-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/1779#wpcf7-f1855-o1\" method=\"post\" class=\"wpcf7-form init\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"1855\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.5.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1855-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<div class=\"vc_row wpb_row vc_row-fluid\">\n<div class=\"wpb_column vc_column_container vc_col-sm-12\">\n<div class=\"vc_column-inner \">\n<div class=\"wpb_wrapper\">\n<div class=\"vc_empty_space\" style=\"height: 32px\">\n\t\t\t\t\t<span class=\"vc_empty_space_inner\"><\/span>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>Full name<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtName\"><input type=\"text\" name=\"txtName\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>Email address<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtEmail\"><input type=\"email\" name=\"txtEmail\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email address\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>Telephone number<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtPhone\"><input type=\"text\" name=\"txtPhone\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Telephone number\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<div class=\"col-xs-12 col-sm-6 col-md-6 col-lg-6\">\n<div class=\"form-group\">\n\t\t\t<label>City<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtCiudad\"><input type=\"text\" name=\"txtCiudad\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"City\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-12 col-md-12 col-lg-12\">\n<div class=\"form-group\">\n\t\t\t<label>Birth date<\/label><br \/>\n\t\t\t<span class=\"wpcf7-form-control-wrap txtDate\"><input type=\"date\" name=\"txtDate\" value=\"\" class=\"wpcf7-form-control wpcf7-date wpcf7-validates-as-date form-control\" aria-invalid=\"false\" placeholder=\"Birth date\" \/><\/span>\n\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-12 col-md-12 col-lg-12\">\n\t\t<input type=\"submit\" value=\"Submit\" class=\"wpcf7-form-control has-spinner wpcf7-submit btn btn-default\" \/><\/p>\n<input type=\"hidden\" name=\"txtProgram\" value=\"post_title\" class=\"wpcf7-form-control wpcf7-hidden\" \/>\n<\/div>\n<\/div>\n<div class=\"stm_colored_separator\">\n<div class=\"triangled_colored_separator\" style=\"background-color:#fdc735; \">\n<div class=\"triangle\" style=\"border-bottom-color:#fdc735;\"><\/div>\n<\/div>\n<\/div>\n<div class=\"vc_row wpb_row vc_row-fluid\">\n<div class=\"wpb_column vc_column_container vc_col-sm-12\">\n<div class=\"vc_column-inner \">\n<div class=\"wpb_wrapper\">\n<div class=\"vc_empty_space\" style=\"height: 32px\">\n\t\t\t\t\t<span class=\"vc_empty_space_inner\"><\/span>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div><\/form><\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Objectives<\/h3>\n<p>Introduce the participant into the world of Ethical Hacking in Corporate Environments from the auditing perspective as an evaluator and value aggregator in organizational risk management.<br \/>\nKnow Advanced Pentest techniques to detect weaknesses in the business technological infrastructures that allow to generate the necessary plans to correct and minimize the impact in the materialization of information security risks.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row el_class=\u00bbwmalla wmallag\u00bb][vc_column width=\u00bb1\/4&#8243;][vc_column_text]<\/p>\n<h3 class=\"malla_curricular\">CURRICULUM<\/h3>\n<h2>Study Plan<\/h2>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb3\/4&#8243;][vc_column_text]Programmatic content[\/vc_column_text][vc_tta_tabs active_section=\u00bb1&#8243; el_class=\u00bbwmalla\u00bb][vc_tta_section title=\u00bbModule I\u00bb tab_id=\u00bb1496310901735-bf3946d2-995e\u00bb el_class=\u00bbwsemestre\u00bb][vc_column_text]<\/p>\n<p style=\"text-align: right;\">\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Linux<\/li>\n<\/ul>\n<p>Linux<br \/>\nLinux Commands<br \/>\nLinux File Structure<br \/>\nVirtual Machines<br \/>\nInstallation, configuration and use of Kali Linux[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule II\u00bb tab_id=\u00bb1496863949583-4995e6cc-d855&#8243; el_class=\u00bbwsemestre\u00bb][vc_column_text]<\/p>\n<p style=\"text-align: right;\">\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>System Hacking<\/li>\n<\/ul>\n<p>Information Gathering<br \/>\nScanning<br \/>\nEnumeration<br \/>\nAnalysis<br \/>\nOperation[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule III\u00bb tab_id=\u00bb1497120933796-7b0e9b41-93bf\u00bb el_class=\u00bbwsemestre\u00bb][vc_column_text]<\/p>\n<p style=\"text-align: right;\">\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Web Hacking<\/li>\n<\/ul>\n<p>3.1 Web Architecture<br \/>\n3.2 Sql Injection &#038; Blind Injection XSS<br \/>\n3.3 LFI &amp; RFI<br \/>\n3.4 Advanced Attacks<br \/>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule IV\u00bb tab_id=\u00bb1497391259183-aa85fea0-ab7b\u00bb el_class=\u00bbwsemestre\u00bb][vc_column_text]<\/p>\n<p style=\"text-align: right;\">\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Wireless Networks<\/li>\n<\/ul>\n<p>Firewalls and protections<br \/>\n4.1 Firewall<br \/>\n4.2 IPS<br \/>\n4.3 Evasion<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\u00bbModule V\u00bb tab_id=\u00bb1497391311316-d5a4056a-9509&#8243; el_class=\u00bbwsemestre\u00bb][vc_column_text]<\/p>\n<p style=\"text-align: right;\">\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>DS, Firewalls &#038; Honeypots<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=\u00bbCertificate in Ethical Hacking in Corporate Environments\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The digital era in which we live allows us to enjoy access to information any time, from any device and from anywhere, so that we can interact, contribute and exchange knowledge through different collaborative or relationship environments. This is leading organizations to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1923,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Diplomado en hacking \u00e9tico entornos corporativos - Maria Cano - en<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Diplomado en hacking \u00e9tico entornos corporativos - Maria Cano - en\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_custom_heading text=\u00bbCertificate in Ethical Hacking in Corporate Environments\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The digital era in which we live allows us to enjoy access to information any time, from any device and from anywhere, so that we can interact, contribute and exchange knowledge through different collaborative or relationship environments. This is leading organizations to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/\" \/>\n<meta property=\"og:site_name\" content=\"Maria Cano - en\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-25T16:54:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fumc.edu.co\/en\/#website\",\"url\":\"https:\/\/www.fumc.edu.co\/en\/\",\"name\":\"Maria Cano - en\",\"description\":\"Otro sitio realizado con WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fumc.edu.co\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/#webpage\",\"url\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/\",\"name\":\"Diplomado en hacking \u00e9tico entornos corporativos - Maria Cano - en\",\"isPartOf\":{\"@id\":\"https:\/\/www.fumc.edu.co\/en\/#website\"},\"datePublished\":\"2017-06-13T22:23:38+00:00\",\"dateModified\":\"2019-09-25T16:54:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.fumc.edu.co\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Continuing education\",\"item\":\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Diplomado en hacking \u00e9tico entornos corporativos\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Diplomado en hacking \u00e9tico entornos corporativos - Maria Cano - en","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/","og_locale":"es_ES","og_type":"article","og_title":"Diplomado en hacking \u00e9tico entornos corporativos - Maria Cano - en","og_description":"[vc_row][vc_column][vc_custom_heading text=\u00bbCertificate in Ethical Hacking in Corporate Environments\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The digital era in which we live allows us to enjoy access to information any time, from any device and from anywhere, so that we can interact, contribute and exchange knowledge through different collaborative or relationship environments. This is leading organizations to [&hellip;]","og_url":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/","og_site_name":"Maria Cano - en","article_modified_time":"2019-09-25T16:54:37+00:00","twitter_card":"summary","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.fumc.edu.co\/en\/#website","url":"https:\/\/www.fumc.edu.co\/en\/","name":"Maria Cano - en","description":"Otro sitio realizado con WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fumc.edu.co\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/#webpage","url":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/","name":"Diplomado en hacking \u00e9tico entornos corporativos - Maria Cano - en","isPartOf":{"@id":"https:\/\/www.fumc.edu.co\/en\/#website"},"datePublished":"2017-06-13T22:23:38+00:00","dateModified":"2019-09-25T16:54:37+00:00","breadcrumb":{"@id":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-etico-entornos-corporativos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.fumc.edu.co\/en\/"},{"@type":"ListItem","position":2,"name":"Continuing education","item":"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/"},{"@type":"ListItem","position":3,"name":"Diplomado en hacking \u00e9tico entornos corporativos"}]}]}},"_links":{"self":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages\/1779"}],"collection":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/comments?post=1779"}],"version-history":[{"count":0,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages\/1779\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/pages\/1923"}],"wp:attachment":[{"href":"https:\/\/www.fumc.edu.co\/en\/wp-json\/wp\/v2\/media?parent=1779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}