Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Ethical Hacking
Intrusion test which examines whether the network or servers are vulnerable to hacker attacks. This study attempts to penetrate
the network and gain control over computers or servers. This study done internally or externally. As a result of this study is given
to the client a report with the threats found and action to mitigate them.
Security Assessment
A consultancy in which the configuration of your network and computer security controls implemented are analyzed.
The study will analyze the following:
1.
Network topology
2.
Configuring Routers.
3.
Configuring Firewalls
4.
Configuring servers
5.
6.
Configuring the IPS (Intrution Prevention System) their false positives and negatives
7.
8.
9.
Network segmentation
10.
Analysis of Logs
11.
12.
13.
14.