|
|
CISCO ![Introduction to Ethical Hacking and Penetration Testing Introduction to Ethical Hacking and Penetration Testing](https://camo.githubusercontent.com/5e6ccdfa68399bcd5e1806560c1eb1aba0931b8d161dac4d0c29e8236aa3b6b9/68747470733a2f2f7777772e6e6574616361642e636f6d2f702f66663965343931632d343962652d343733342d383033652d6137396536653833646162312f6261646765732f62616467652d696d616765732f63393239656435372d656530372d343461642d613264342d3732323966633835653034332e706e67)
![Análisis de amenazas Análisis de amenazas](https://camo.githubusercontent.com/42b329c72f581a6a55dbd6bc3a2b7d48797703d86cb26c641135e18a148fa9d5/68747470733a2f2f7777772e6e6574616361642e636f6d2f702f66663965343931632d343962652d343733342d383033652d6137396536653833646162312f6261646765732f62616467652d696d616765732f637962657273656375726974795f61646d696e697374726174696f6e5f332e706e67)
In progress...
Cybersecurity Analyst Career Path
Networking Basics | Networking Devices and Initial Configuration | ||
---|---|---|---|
Network Basics | Hierarchical Design and Number systems | ||
Network Access Basics | Understanding Network Access | ||
Internet Protocol Basics | Transport Services Basics | ||
Network Communications Basics | Basic Cisco Configuration | ||
Networking Protocols Basic |
Endpoint Security | Network Defense | Cyber Threat Management | |||
---|---|---|---|---|---|
Network Security Basics | Network Defense | Vulnerability Assessment and Risk Management | |||
Operating System and Endpoint Security | Firewalls and Cloud Security | Incident Response | |||
Security Alerts |
1º 50d ago-oct 2024 2º 66d oct-dec 2024
3º +30d dec 2024 - current 2025