Please use this identifier to cite or link to this item:
https://repository.unad.edu.co/handle/10596/65956Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.advisor | Arroyo Barón, Ever Luis | |
| dc.coverage.spatial | cead_-_barranquilla | |
| dc.creator | González, Matios Maury | |
| dc.date.accessioned | 2025-01-23T20:27:20Z | |
| dc.date.available | 2025-01-23T20:27:20Z | |
| dc.date.created | 2025-06-03 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/65956 | |
| dc.description.abstract | Este informe de ciberseguridad necesarias para proteger la información sensible de organizaciones frente a las crecientes amenazas cibernéticas. En el marco normativo colombiano, se analizan leyes clave como la Ley 1273 de 2009 y su importancia en la protección de los sistemas informáticos. Asimismo, se examina un caso práctico de Red Team, enfocado en identificar y explotar vulnerabilidades críticas mediante herramientas como Metasploit y Nmap, demostrando el impacto potencial de ataques exitosos y proponiendo mejoras de seguridad. | |
| dc.format | ||
| dc.title | Capacidades técnicas, legales y de gestión para equipos Blue Team y red Team | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | Análisis de Riesgos | |
| dc.subject.keywords | Ciberseguridad | |
| dc.subject.keywords | Defensa Cibernética | |
| dc.subject.keywords | Simulación | |
| dc.description.abstractenglish | This cybersecurity report examines the cybersecurity measures needed to protect organizations' sensitive information from growing cyber threats. Within the Colombian regulatory framework, key laws such as Law 1273 of 2009 and their importance in protecting computer systems are analyzed. A Red Team case study is also examined, focusing on identifying and exploiting critical vulnerabilities using tools such as Metasploit and Nmap, demonstrating the potential impact of successful attacks and proposing security improvements. | |
| Appears in Collections: | Especialización en Seguridad informática | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| mmauryg.pdf | 1.12 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
