SEGURIDAD INFORMÁTICA Público

SEGURIDAD INFORMÁTICA

Enginers5 5
Curso por Enginers5 5, atualizado more than 1 year ago Colaboradores

Descrição

Entender los conceptos y definiciones entre hacker y cracker, tomar las medidas necesarias para evitar el robo de identidad .

Informações do módulo

Sem etiquetas

Slides

El Método Más Utilizado Por Los Hackers Para Usurpar La Información De Las Personas.
Mostrar menos
Sem etiquetas

Quiz

Emprende tu conocimiento mediante datos importantes sobre la seguridad informatica.
Mostrar menos
Sem etiquetas

Contexto

Autor: FTCVIDEOS Publicado el 13 feb. 2013 Video: https://www.youtube.com/watch?v=lskwU3kw29o
Mostrar menos
Sem etiquetas
Sem etiquetas
BIBLIOGRAFÍA Diapositivas https://definicion.de/seguridad-informatica/ http://computerhoy.com/noticias/software/que-es-hacker-que-tipos-hacker-existen-36027 https://as.com/betech/2017/04/04/portada/1491340019_511041.html https://www.infospyware.com/articulos/que-es-el-phishing/ https://es.wikipedia.org/wiki/Malware https://es.wikipedia.org/wiki/Metasploit http://www.cursodehackers.com/metasploit.html EL PHISHING "COMPLEMENTO" https://www.avast.com/es-es/c-phishing https://www.pandasecurity.com/spain/mediacenter/consejos/10-consejos-para-evitar-ataques-de-phishing/ Text Básico De Seguridad https://www.infospyware.com/articulos/que-es-el-phishing/ Datos Importantes http://blog.capacityacademy.com/2014/05/23/las-8-mejores-herramientas-de-hacking/ http://www.aprendeahackear.com/utilidades.html http://blog.capacityacademy.com/2012/07/11/las-8-mejores-herramientas-de-seguridad-y-hacking/ Guia Base Tomado De FTCVIDEOS  Canal: https://www.youtube.com/watch?v=lskwU3kw29o Tipos De Virus http://smarterworkspaces.kyocera.es/blog/8-tipos-virus-informaticos-debes-conocer/ https://www.informatica-hoy.com.ar/software-seguridad-virus-antivirus/Tipos-de-virus-de-computadoras.php https://es.wikipedia.org/wiki/Pirata_inform%C3%A1tico METASPLOIT "COMPLEMENTO" https://widrogo.wordpress.com/2014/01/24/metasploit-introduccion-lo-que-necesitas-saber-de-metasploit/ https://www.metasploit.com/ https://widrogo.wordpress.com/2014/01/24/metasploit-introduccion-lo-que-necesitas-saber-de-metasploit/ Recomendaciones Para Una Ma&or Seguridad En Internet https://www.informatica-hoy.com.ar/software-seguridad-virus-antivirus/Cual-fue-el-primer-virus-informatico.php https://www.vix.com/es/btg/tech/13581/6-consejos-de-un-hacker-para-evitar-ser-hackeado https://www.vix.com/es/btg/tech/13546/5-claves-basicas-para-salvaguardar-tu-privacidad-online?utm_source=techtear&utm_medium=linksinternos&utm_campaign=linksrelacionados
Mostrar menos
Sem etiquetas
Diapositivas https://www.timeshighereducation.com/sites/default/files/styles/the_breaking_news_image_style/public/online_fraud.jpg?itok=DnDISUS0 http://www.audienciaelectronica.net/wp-content/uploads/2016/12/seguridad-1068x801.jpg https://securizando.com/wp-content/uploads/2015/08/3-type-of-hackers-black-hat-grey-hat-white-hat-Hacking-point-1024x482.jpg http://pocketnow.com/wp-content/uploads/2014/09/incognito-mode.jpg http://cdn3.computerhoy.com/sites/computerhoy.com/files/styles/fullcontent/public/novedades/portada-modo-incognito-navegador.jpg?itok=i4e6Zm6t https://tr4.cbsistatic.com/hub/i/r/2017/06/05/e87e9a61-ae79-4c65-b4e5-669126cdc890/resize/770x/cf7726bb69ddddc12d2211080339406d/incognitohero.jpg https://lifars.com/wp-content/uploads/2016/06/PFISHING.jpg https://t2.uc.ltmcdn.com/images/7/0/9/img_como_iniciar_sesion_en_facebook_25907_600.jpg https://malwaretips.com/blogs/wp-content/uploads/2014/11/warning-your-computer-may-be-infected-virus.jpg https://i2.wp.com/upload.wikimedia.org/wikipedia/commons/2/26/You_Have_Been_Hacked!.jpg?resize=480%2C272&ssl=1 http://chousensha.github.io/images/tools/metasploit/msfbanner.png Phishing Complemento http://www.qweb.com.mx/wp-content/uploads/2016/12/Phishing-300x162.png http://cdn2.business2community.com/wp-content/uploads/2012/04/inbound-marketing-services-email-lists3.png https://www.muycomputerpro.com/movilidad-profesional/wp-content/uploads/2014/09/Seguridad_Mobilidad.jpg Text basico de seguridad https://www.muycomputer.com/wp-content/uploads/2016/02/virus-malware-840x473.jpg Tipos de virus https://hownot2code.files.wordpress.com/2017/07/to_err_is_windows_by_dracina.jpg http://www.lazarus.com.ve/wp-content/uploads/2015/01/VIRUS1.png  https://image.slidesharecdn.com/duartewarningstorytypestoguideyourteamthroughtransformation-160404203154/95/illuminate-insights-five-warning-story-plots-9-638.jpg?cb=1462221539 https://geeksroom.com/wp-content/uploads/2015/05/curso-de-programacion-basica-platzi.jpg https://userscontent2.emaze.com/images/4bf97b92-3d5d-4ad4-af2a-40d5149092ec/fa8968df-17e2-4624-bef2-952c12ec7cf6.png https://vignette.wikia.nocookie.net/horadeaventura/images/2/27/GusanoBMOExtraviadoPose1.png/revision/latest/scale-to-width-down/640?cb=20140710160618&path-prefix=es https://www.forosperu.net/proxy.php?image=http%3A%2F%2Fi.picasion.com%2Fpic85%2Feb4c3c46839ffd07cb53043eb7e6015f.gif&hash=1afde4e390c0d148347da1c1df2b3fe9 https://k60.kn3.net/taringa/1/5/5/7/4/4/76/lecp0256/8A7.jpg Metasploit Complemento https://www.offensive-security.com/wp-content/uploads/2015/04/metasploit-unleashed-add-module-path.png https://thehacktoday.com/wp-content/uploads/2016/01/1-19-654x336.jpg http://www.hackingtutorials.org/wp-content/uploads/2016/04/Metasploit-help-command-1.jpg Text Mediano http://www.shooter-szene.de/wp-content/uploads/2015/12/ddos2a-960x540.jpg https://fra.windscribe.com/v2/img/terminal.png https://static.noticiasaominuto.com/stockimages/1920/naom_57bd5a1d7e55a.jpg?1472027372 http://pm1.narvii.com/6449/36bdd3e6240f565b6f468c39fc804ef53205ddc1_hq.jpg https://lh3.googleusercontent.com/FmVEUKLVt66ZmZPgvj4q10NSjI0ldsUVmt5Fb0-4hwpiy4QZfZIeLsEaS9GLhqH94YNtd4w=s162
Mostrar menos