Please use this identifier to cite or link to this item:
https://repository.unad.edu.co/handle/10596/69487Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.advisor | Zambrano, Luis | |
| dc.coverage.spatial | cead_-_barranquilla | |
| dc.creator | Joya, Camilo | |
| dc.date.accessioned | 2025-06-05T14:24:40Z | - |
| dc.date.available | 2025-06-05T14:24:40Z | - |
| dc.date.created | 2025-05-24 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/69487 | - |
| dc.description.abstract | Este informe presenta el análisis técnico de los escenarios abordados en los ejercicios de Blue Team y Red Team durante el seminario de Ciberseguridad. A través de la simulación de ataques reales como el exploit EternalBlue (MS17-010) y el despliegue de herramientas defensivas como Wireshark, Snort y hardening del sistema operativo Windows, se evaluaron vulnerabilidades críticas y se formularon estrategias de contención eficaces. El informe concluye con recomendaciones prácticas orientadas a mejorar la postura de seguridad de una organización desde un enfoque ofensivo y defensivo. | |
| dc.format | ||
| dc.title | Capacidades técnicas, legales y de gestión para equipos blue team y red team | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | Blue Team | |
| dc.subject.keywords | IDS | |
| dc.subject.keywords | Meterpreter | |
| dc.subject.keywords | Red Team | |
| dc.subject.keywords | SMBv1 | |
| dc.description.abstractenglish | This report presents the technical analysis of the scenarios addressed in the Blue Team and Red Team exercises during the Cybersecurity seminar. Through the simulation of real attacks such as the EternalBlue exploit (MS17-010) and the deployment of defensive tools such as Wireshark, Snort and Windows OS hardening, critical vulnerabilities were evaluated and effective containment strategies were formulated. The report concludes with practical recommendations aimed at improving an organization's security posture from both an offensive and defensive approach. | |
| dc.subject.category | Seminario Especializado: Equipos Estratégicos en Ciberseguridad: Red Team & Blue Team | |
| Appears in Collections: | Seminario Especializado: Equipos Estratégicos en Ciberseguridad: Red Team & Blue Team | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| cajoyag.pdf | 3.19 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
