<\/div>\n<\/div>\n
[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n
Temario<\/h2>\n
Describing Information Security Concepts (Self-Study)<\/p>\n
Information Security Overview
\nManaging Risk
\nVulnerability Assessment
\nUnderstanding CVSS
\nDescribing Common TCP\/IP Attacks (Self-Study)<\/p>\n
Legacy TCP\/IP Vulnerabilities
\nIP Vulnerabilities
\nICMP Vulnerabilities
\nTCP Vulnerabilities
\nUDP Vulnerabilities
\nAttack Surface and Attack Vectors
\nReconnaissance Attacks
\nAccess Attacks
\nMan-In-The-Middle Attacks
\nDenial of Service and Distributed Denial of Service Attacks
\nReflection and Amplification Attacks
\nSpoofing Attacks
\nDHCP Attacks
\nDescribing Common Network Application Attacks (Self-Study)<\/p>\n
Password Attacks
\nDNS-Based Attacks
\nDNS Tunneling
\nWeb-Based Attacks
\nHTTP 302 Cushioning
\nCommand Injections
\nSQL Injections
\nCross-Site Scripting and Request Forgery
\nEmail-Based Attacks
\nDescribing Common Endpoint Attacks (Self-Study)<\/p>\n
Buffer Overflow
\nMalware
\nReconnaissance Attack
\nGaining Access and Control
\nGaining Access via Social Engineering
\nGaining Access via Web-Based Attacks
\nExploit Kits and Rootkits
\nPrivilege Escalation
\nPost-Exploitation Phase
\nAngler Exploit Kit
\nDescribing Network Security Technologies<\/p>\n
Defense-in-Depth Strategy
\nDefending Across the Attack Continuum
\nNetwork Segmentation and Virtualization Overview
\nStateful Firewall Overview
\nSecurity Intelligence Overview
\nThreat Information Standardization
\nNetwork-Based Malware Protection Overview
\nIPS Overview
\nNext Generation Firewall Overview
\nEmail Content Security Overview
\nWeb Content Security Overview
\nThreat Analytic Systems Overview
\nDNS Security Overview
\nAuthentication, Authorization, and Accounting Overview
\nIdentity and Access Management Overview
\nVirtual Private Network Technology Overview
\nNetwork Security Device Form Factors Overview
\nDeploying Cisco ASA Firewall<\/p>\n
Cisco ASA Deployment Types
\nCisco ASA Interface Security Levels
\nCisco ASA Objects and Object Groups
\nNetwork Address Translation
\nCisco ASA Interface ACLs
\nCisco ASA Global ACLs
\nCisco ASA Advanced Access Policies
\nCisco ASA High Availability Overview
\nDeploying Cisco Firepower Next-Generation Firewall<\/p>\n
Cisco Firepower NGFW Deployments
\nCisco Firepower NGFW Packet Processing and Policies
\nCisco Firepower NGFW Objects
\nCisco Firepower NGFW NAT
\nCisco Firepower NGFW Prefilter Policies
\nCisco Firepower NGFW Access Control Policies
\nCisco Firepower NGFW Security Intelligence
\nCisco Firepower NGFW Discovery Policies
\nCisco Firepower NGFW IPS Policies
\nCisco Firepower NGFW Malware and File Policies
\nDeploying Email Content Security<\/p>\n
Cisco Email Content Security Overview
\nSMTP Overview
\nEmail Pipeline Overview
\nPublic and Private Listeners
\nHost Access Table Overview
\nRecipient Access Table Overview
\nMail Policies Overview
\nProtection Against Spam and Graymail
\nAnti-virus and Anti-malware Protection
\nOutbreak Filters
\nContent Filters
\nData Loss Prevention
\nEmail Encryption
\nDeploying Web Content Security<\/p>\n
Cisco WSA Overview
\nDeployment Options
\nNetwork Users Authentication
\nHTTPS Traffic Decryption
\nAccess Policies and Identification Profiles
\nAcceptable Use Controls Settings
\nAnti-Malware Protection
\nDeploying Cisco Umbrella (Self-Study)<\/p>\n
Cisco Umbrella Architecture
\nDeploying Cisco Umbrella
\nCisco Umbrella Roaming Client
\nManaging Cisco Umbrella
\nCisco Umbrella Investigate Overview
\nExplaining VPN Technologies and Cryptography<\/p>\n
VPN Definition
\nVPN Types
\nSecure Communication and Cryptographic Services
\nKeys in Cryptography
\nPublic Key Infrastructure
\nIntroducing Cisco Secure Site-to-Site VPN Solutions<\/p>\n
Site-to-Site VPN Topologies
\nIPsec VPN Overview
\nIPsec Static Crypto Maps
\nIPsec Static Virtual Tunnel Interface
\nDynamic Multipoint VPN
\nCisco IOS FlexVPN
\nDeploying Cisco IOS VTI-Based Point-to-Point<\/p>\n
Cisco IOS VTIs
\nStatic VTI Point-to-Point IPsec IKEv2 VPN Configuration
\nDeploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW<\/p>\n
Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
\nCisco ASA Point-to-Point VPN Configuration
\nCisco Firepower NGFW Point-to-Point VPN Configuration
\nIntroducing Cisco Secure Remote Access VPN Solutions<\/p>\n
Remote Access VPN Components
\nRemote Access VPN Technologies
\nSSL Overview
\nDeploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW<\/p>\n
Remote Access Configuration Concepts
\nConnection Profiles
\nGroup Policies
\nCisco ASA Remote Access VPN Configuration
\nCisco Firepower NGFW Remote Access VPN Configuration
\nExplaining Cisco Secure Network Access Solutions<\/p>\n
Cisco Secure Network Access
\nCisco Secure Network Access Components
\nAAA Role in Cisco Secure Network Access Solution
\nCisco Identity Services Engine
\nCisco TrustSec
\nDescribing 802.1X Authentication<\/p>\n
802.1X and EAP
\nEAP Methods
\nRole of RADIUS in 802.1X Communications
\nRADIUS Change of Authorization
\nConfiguring 802.1X Authentication<\/p>\n
Cisco Catalyst Switch 802.1X Configuration
\nCisco WLC 802.1X Configuration
\nCisco ISE 802.1X Configuration
\nSupplicant 802.1x Configuration
\nCisco Central Web Authentication
\nDescribing Endpoint Security Technologies (Self-Study)<\/p>\n
Host-Based Personal Firewall
\nHost-Based Anti-Virus
\nHost-Based Intrusion Prevention System
\nApplication Whitelists and Blacklists
\nHost-Based Malware Protection
\nSandboxing Overview
\nFile Integrity Checking
\nDeploying Cisco AMP for Endpoints (Self-study)<\/p>\n
Cisco AMP for Endpoints Architecture
\nCisco AMP for Endpoints Engines
\nRetrospective Security with Cisco AMP
\nCisco AMP Device and File Trajectory
\nManaging Cisco AMP for Endpoints
\nIntroducing Network Infrastructure Protection (Self-Study)<\/p>\n
Identifying Network Device Planes
\nControl Plane Security Controls
\nManagement Plane Security Controls
\nNetwork Telemetry
\nLayer 2 Data Plane Security Controls
\nLayer 3 Data Plane Security Controls
\nDeploying Control Plane Security Controls (Self-Study)<\/p>\n
Infrastructure ACLs
\nControl Plane Policing
\nControl Plane Protection
\nRouting Protocol Security
\nDeploying Layer 2 Data Plane Security Controls (Self-Study)<\/p>\n
Overview of Layer 2 Data Plane Security Controls
\nVLAN-Based Attacks Mitigation
\nSTP Attacks Mitigation
\nPort Security
\nPrivate VLANs
\nDHCP Snooping
\nARP Inspection
\nStorm Control
\nMACsec Encryption
\nDeploying Layer 3 Data Plane Security Controls (Self-Study)<\/p>\n
Infrastructure Antispoofing ACLs
\nUnicast Reverse Path Forwarding
\nIP Source Guard
\nLabs<\/p>\n
Configure Network Settings And NAT On Cisco ASA
\nConfigure Cisco ASA Access Control Policies
\nConfigure Cisco Firepower NGFW NAT
\nConfigure Cisco Firepower NGFW Access Control Policy
\nConfigure Cisco Firepower NGFW Discovery and IPS Policy
\nConfigure Cisco NGFW Malware and File Policy
\nConfigure Listener, HAT, and RAT on Cisco ESA
\nConfigure Mail Policies
\nConfigure Proxy Services, Authentication, and HTTPS Decryption
\nEnforce Acceptable Use Control and Malware Protection
\nExamine the Umbrella Dashboard
\nExamine Cisco Umbrella Investigate
\nExplore DNS Ransomware Protection by Cisco Umbrella
\nConfigure Static VTI Point-to-Point IPsec IKEv2 Tunnel
\nConfigure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
\nConfigure Remote Access VPN on the Cisco Firepower NGFW
\nExplore Cisco AMP for Endpoints
\nPerform Endpoint Analysis Using AMP for Endpoints Console
\nExplore File Ransomware Protection by Cisco AMP for Endpoints Console
\nExplore Cisco Stealthwatch Enterprise v6.9.3
\nExplore CTA in Stealthwatch Enterprise v7.0
\nExplore the Cisco Cloudlock Dashboard and User Security
\nExplore Cisco Cloudlock Application and Data Security
\nExplore Cisco Stealthwatch Cloud
\nExplore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"
25 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[52,9,11],"tags":[],"class_list":["post-3978","post","type-post","status-publish","format-standard","hentry","category-ciberseguridad","category-cursos","category-cursos-de-it"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=3978"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3978\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=3978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=3978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=3978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}