- Document3.1.3.4 Lab - Linux Serversuploaded by
Cristian
- Document1.1.1.5 Lab - Cybersecurity Case Studies.docxuploaded by
Cristian
- Document4.5.2.10 Lab - Exploring Nmap.docxuploaded by
Cristian
- Document4.6.6.5 Lab - Using Wireshark to Examine HTTP and HTTPS Traffic.docxuploaded by
Cristian
- DocumentGuía de actividades y rúbrica de evaluacion - Unidad 1 - Paso 2 - Actividad Colaborativa 1.pdfuploaded by
Cristian
- Document3.2.2.4 Lab - Navigating the Linux Filesystem and Permission Settings (1).pdfuploaded by
Cristian
- Document3.2.1.4 Lab - Locating Log Files.pdfuploaded by
Cristian
- DocumentGuía de actividades y rúbrica de evaluacion - Unidad 1 - Paso 2 - Actividad Colaborativa 1.pdfuploaded by
Cristian
- Document9.1.1.7 Lab - Encrypting and Decrypting Data Using a Hacker Tool.docxuploaded by
Cristian
- Document9.1.1.6 Lab - Encrypting and Decrypting Data Using OpenSSL.docxuploaded by
Cristian
- Document9.0.1.2 Class Activity - Creating Codesuploaded by
Cristian
- Document7.3.2.5 Lab - Reading Server Logs.docxuploaded by
Cristian
- Document7.3.2.4 Lab - Attacking a mySQL Database.docxuploaded by
Cristian
- Document7.3.1.6 Lab - Exploring DNS Traffic.docxuploaded by
Cristian
- Document7.1.2.7 Packet Tracer - Logging Network Activity.docxuploaded by
Cristian
- Document7.0.1.2 Class Activity - What's Going On.docxuploaded by
Cristian
- Document6.2.2.9 Lab - Social Engineering.docxuploaded by
Cristian
- Document6.2.1.11 Lab - Anatomy of Malware.docxuploaded by
Cristian
- Document5.3.1.10 Packet Tracer - Identify Packet Flow.docxuploaded by
Cristian
- Document5.2.2.4 Packet Tracer - ACL Demonstration.docxuploaded by
Cristian
- DocumentGrupo_2150521_16.pdfuploaded by
Cristian
- DocumentGuía de actividades y rúbrica de evaluacion - Unidad 2 - Paso 4 - Actividad Colaborativa 2uploaded by
Cristian
- DocumentGuía de actividades y rúbrica de evaluacion - Unidad 3 - Paso 6 - Actividad Colaborativa 3uploaded by
Cristian
- Document13.2.2.13 Lab - Incident Handling.docxuploaded by
Cristian
- Document12.4.1.1 Lab - Interpret HTTP and DNS Data to Isolate Threat Actor.docxuploaded by
Cristian
- Document12.4.1.1 Alt Lab - Interpret HTTP and DNS Data to Isolate Threat Actor.docxuploaded by
Cristian
- Document12.2.2.10 Lab - Extract an Executable from a PCAP.docxuploaded by
Cristian
- Document12.2.2.9 Lab - Regular Expression Tutorial.docxuploaded by
Cristian
- Document12.2.1.5 Lab - Convert Data into a Universal Format.docxuploaded by
Cristian
- Document12.1.1.7 Lab - Snort and Firewall Rules.docxuploaded by
Cristian
- Document11.3.1.1 Lab - Setup a Multi-VM Environment.docxuploaded by
Cristian
- Document11.2.3.11 Packet Tracer - Logging from Multiple Sourcesuploaded by
Cristian
- Document11.2.3.10 Packet Tracer - Explore a NetFlow Implementation.docxuploaded by
Cristian
- DocumentAnexo 4 - Evaluación final.pdfuploaded by
Cristian
- Documentatencion skypeuploaded by
Cristian
- Document110620 Creditos Posgrado ECBTIuploaded by
Cristian
- DocumentAnexo 4 - Evaluación finaluploaded by
Cristian
- DocumentAnexo 3 - Servicios, amenazas y ataquesuploaded by
Cristian
- DocumentGuía de actividades y rúbrica de evaluación - Tarea 1 - Reconocimiento de conceptos.pdfuploaded by
Cristian
- DocumentAnexo 1 - Presaberes seguridad informática.pdfuploaded by
Cristian
- DocumentAnexo 2 - Introducción a la seguridaduploaded by
Cristian
- Documentdumpuploaded by
Cristian
- DocumentLibro14uploaded by
Cristian
- DocumentDB2_Command_Lineuploaded by
Cristian
- DocumentQueryuploaded by
Cristian
- DocumentGuía para el desarrollo del componente práctico - Tarea 4 - Prácticas virtuales.docxuploaded by
Cristian
- Document7.1 Configuring Advanced EIGRP for IPv4 Features.docxuploaded by
Cristian
- Document7.1.3.6 Configuring Advanced EIGRP for IPv4 Features.docxuploaded by
Cristian
- Document7.1.3.6 Lab - Configuring Advanced EIGRP for IPv4 Features.docxuploaded by
Cristian