| dc.contributor.advisor | Zambrano Hernandez, Luis Fernando | |
| dc.coverage.spatial | cead_-_santa Marta | |
| dc.creator | Garces Escobar, Andres Felipe | |
| dc.date.accessioned | 2025-06-04T18:28:59Z | |
| dc.date.available | 2025-06-04T18:28:59Z | |
| dc.date.created | 2025-05-28 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/69441 | |
| dc.description.abstract | Este informe detalla las estrategias diseñadas y aplicadas por los equipos Red Team y Blue Team durante los ejercicios prácticos planteados en los distintos escenarios del curso, abordando componentes técnicos, éticos y legales. Se identifican vulnerabilidades críticas, se explican las técnicas de ataque y defensa, y se brindan recomendaciones concretas para fortalecer la postura de seguridad organizacional. | |
| dc.format | pdf | |
| dc.title | Capacidades técnicas, legales y de gestión para equipos blue team y red team. | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | Acceso abusivo | |
| dc.subject.keywords | Alertas | |
| dc.subject.keywords | Ataques | |
| dc.subject.keywords | Auditoría | |
| dc.subject.keywords | Autenticación multifactor | |
| dc.subject.keywords | Blue Team | |
| dc.subject.keywords | CIS (Center for Internet Security) | |
| dc.subject.keywords | Código de Ética | |
| dc.subject.keywords | Código Penal | |
| dc.subject.keywords | Comunicación | |
| dc.subject.keywords | Confidencialidad | |
| dc.subject.keywords | Contrato | |
| dc.subject.keywords | Contención | |
| dc.subject.keywords | COPNIA | |
| dc.subject.keywords | CVE-2011-3192 | |
| dc.subject.keywords | CyberFort Technologies | |
| dc.subject.keywords | Datos personales | |
| dc.subject.keywords | Defensa | |
| dc.subject.keywords | Delito informático | |
| dc.subject.keywords | Detección | |
| dc.subject.keywords | Derechos | |
| dc.subject.keywords | Ética | |
| dc.subject.keywords | Encubrimiento | |
| dc.subject.keywords | Escaneo | |
| dc.subject.keywords | Estrategia | |
| dc.subject.keywords | Exploit | |
| dc.subject.keywords | Explotación | |
| dc.subject.keywords | Firewall | |
| dc.subject.keywords | GPO | |
| dc.subject.keywords | Hardenización | |
| dc.subject.keywords | IDS / IPS | |
| dc.subject.keywords | Incidentes | |
| dc.subject.keywords | Ingeniería | |
| dc.subject.keywords | Integridad | |
| dc.subject.keywords | Ley 1273 de 2009 | |
| dc.subject.keywords | Logs | |
| dc.subject.keywords | Malware | |
| dc.subject.keywords | Metasploit | |
| dc.subject.keywords | Mínimo privilegio | |
| dc.subject.keywords | Monitorización | |
| dc.subject.keywords | Nmap | |
| dc.subject.keywords | Payload | |
| dc.subject.keywords | Pentesting | |
| dc.subject.keywords | Política de contraseñas | |
| dc.subject.keywords | PoC | |
| dc.subject.keywords | Privilegios | |
| dc.subject.keywords | Puertos | |
| dc.subject.keywords | Recomendaciones | |
| dc.subject.keywords | Red Team | |
| dc.subject.keywords | Rejjeto | |
| dc.subject.keywords | Resiliencia | |
| dc.subject.keywords | Respuesta a incidentes | |
| dc.subject.keywords | Scripts | |
| dc.subject.keywords | Seguridad informática | |
| dc.subject.keywords | Shell | |
| dc.subject.keywords | SIEM | |
| dc.subject.keywords | Sistemas críticos | |
| dc.subject.keywords | Software malicioso | |
| dc.subject.keywords | Tácticas | |
| dc.subject.keywords | Tasklist | |
| dc.subject.keywords | Técnicas | |
| dc.subject.keywords | Usuario administrador | |
| dc.subject.keywords | Usuarios | |
| dc.subject.keywords | Vulnerabilidades | |
| dc.subject.keywords | Wazuh | |
| dc.subject.keywords | Wireshark | |
| dc.description.abstractenglish | This report details the strategies designed and implemented by the Red Team and Blue Team during practical exercises presented in the various course scenarios, addressing technical, ethical, and legal components. Critical vulnerabilities are identified, attack and defense techniques are explained, and concrete recommendations are provided to strengthen the organizational security posture. | |
| dc.subject.category | Ingenieria de sistemas | |