Please use this identifier to cite or link to this item:
https://repository.unad.edu.co/handle/10596/69441Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.advisor | Zambrano Hernandez, Luis Fernando | |
| dc.coverage.spatial | cead_-_santa Marta | |
| dc.creator | Garces Escobar, Andres Felipe | |
| dc.date.accessioned | 2025-06-04T18:28:59Z | - |
| dc.date.available | 2025-06-04T18:28:59Z | - |
| dc.date.created | 2025-05-28 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/69441 | - |
| dc.description.abstract | Este informe detalla las estrategias diseñadas y aplicadas por los equipos Red Team y Blue Team durante los ejercicios prácticos planteados en los distintos escenarios del curso, abordando componentes técnicos, éticos y legales. Se identifican vulnerabilidades críticas, se explican las técnicas de ataque y defensa, y se brindan recomendaciones concretas para fortalecer la postura de seguridad organizacional. | |
| dc.format | ||
| dc.title | Capacidades técnicas, legales y de gestión para equipos blue team y red team. | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | Acceso abusivo | |
| dc.subject.keywords | Alertas | |
| dc.subject.keywords | Ataques | |
| dc.subject.keywords | Auditoría | |
| dc.subject.keywords | Autenticación multifactor | |
| dc.subject.keywords | Blue Team | |
| dc.subject.keywords | CIS (Center for Internet Security) | |
| dc.subject.keywords | Código de Ética | |
| dc.subject.keywords | Código Penal | |
| dc.subject.keywords | Comunicación | |
| dc.subject.keywords | Confidencialidad | |
| dc.subject.keywords | Contrato | |
| dc.subject.keywords | Contención | |
| dc.subject.keywords | COPNIA | |
| dc.subject.keywords | CVE-2011-3192 | |
| dc.subject.keywords | CyberFort Technologies | |
| dc.subject.keywords | Datos personales | |
| dc.subject.keywords | Defensa | |
| dc.subject.keywords | Delito informático | |
| dc.subject.keywords | Detección | |
| dc.subject.keywords | Derechos | |
| dc.subject.keywords | Ética | |
| dc.subject.keywords | Encubrimiento | |
| dc.subject.keywords | Escaneo | |
| dc.subject.keywords | Estrategia | |
| dc.subject.keywords | Exploit | |
| dc.subject.keywords | Explotación | |
| dc.subject.keywords | Firewall | |
| dc.subject.keywords | GPO | |
| dc.subject.keywords | Hardenización | |
| dc.subject.keywords | IDS / IPS | |
| dc.subject.keywords | Incidentes | |
| dc.subject.keywords | Ingeniería | |
| dc.subject.keywords | Integridad | |
| dc.subject.keywords | Ley 1273 de 2009 | |
| dc.subject.keywords | Logs | |
| dc.subject.keywords | Malware | |
| dc.subject.keywords | Metasploit | |
| dc.subject.keywords | Mínimo privilegio | |
| dc.subject.keywords | Monitorización | |
| dc.subject.keywords | Nmap | |
| dc.subject.keywords | Payload | |
| dc.subject.keywords | Pentesting | |
| dc.subject.keywords | Política de contraseñas | |
| dc.subject.keywords | PoC | |
| dc.subject.keywords | Privilegios | |
| dc.subject.keywords | Puertos | |
| dc.subject.keywords | Recomendaciones | |
| dc.subject.keywords | Red Team | |
| dc.subject.keywords | Rejjeto | |
| dc.subject.keywords | Resiliencia | |
| dc.subject.keywords | Respuesta a incidentes | |
| dc.subject.keywords | Scripts | |
| dc.subject.keywords | Seguridad informática | |
| dc.subject.keywords | Shell | |
| dc.subject.keywords | SIEM | |
| dc.subject.keywords | Sistemas críticos | |
| dc.subject.keywords | Software malicioso | |
| dc.subject.keywords | Tácticas | |
| dc.subject.keywords | Tasklist | |
| dc.subject.keywords | Técnicas | |
| dc.subject.keywords | Usuario administrador | |
| dc.subject.keywords | Usuarios | |
| dc.subject.keywords | Vulnerabilidades | |
| dc.subject.keywords | Wazuh | |
| dc.subject.keywords | Wireshark | |
| dc.description.abstractenglish | This report details the strategies designed and implemented by the Red Team and Blue Team during practical exercises presented in the various course scenarios, addressing technical, ethical, and legal components. Critical vulnerabilities are identified, attack and defense techniques are explained, and concrete recommendations are provided to strengthen the organizational security posture. | |
| dc.subject.category | Ingenieria de sistemas | |
| Appears in Collections: | Seminario Especializado: Equipos Estratégicos en Ciberseguridad: Red Team & Blue Team | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| afgarcese.pdf | 1.64 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
