SlideShare a Scribd company logo
INGEFORMA. Cybersecurity
Activity1-C1
Most important professional certifications in the professional and
international cybersecurity market
Speaker: Juan Antonio Lloret Egea
Test Administrator / TCA for
Pearson VUE and Prometric
Aims of the Project of cybersecurity developed
• The Main Aim of the Project: Developing innovative and technological
cybersecurity curriculum in vocational schools, giving educations and
increasing awareness-raising among people in cybersecurity.
• The Specific Aim of the Project: Giving education about cybersecurity to 20
people via distance education platform in order to create qualified and well-
educated work force who is educated in cybersecurity primarily in our city
and then in our country; giving face-to-face education to 12 IT teachers as a
part of their in-service education; giving awareness-raising seminars to 370
teachers, academicians, IT specialists and officers; distributing the book
about curriculum modules to the libraries of 81 cities and providing
multiplier effects through this way.
INGEFORMA. Cybersecurity
Activity1 C1
Speaker: Juan Antonio Lloret Egea
• The Main Aim of the Project
• According to the curriculum that our project team has
developed, we should start talking about Intermediate
cybersecurity certifications. It is the most appropriate, the
most adjusted to levels of Higher Education centers
associated with universities. And also for the first and
second year of the computer faculties. Our curriculum is
based mainly on certification:
CompTIA Security+
INGEFORMA. Cybersecurity
Activity1 C1
Speaker: Juan Antonio Lloret Egea
Why certify
• Let's look at the different profiles for which a certification is
recommended: Why Certify
Launch Your Career with CompTIA Certifications
INGEFORMA is an authorized CompTIA academy
CompTIA Security+ Exam Codes
SY0-401 or SY0-501
• CompTIA Security+ is a global certification
that validates the baseline skills you need to
perform core security functions and pursue an
IT security career.
Are there other security certifications in the
market?
Yes. We will present them in order of level of
difficulty, without forgetting that they all belong
to an intermediate level.
CCNA Security
Cisco CCNA Security is a job-role focused certification for engineers
who require the skills needed to develop a security infrastructure.
Overview CCNA Security
• Cisco Certified Network Associate Security (CCNA Security) validates
associate-level knowledge and skills required to secure Cisco networks.
With a CCNA Security certification, a network professional demonstrates
the skills required to develop a security infrastructure, recognize threats and
vulnerabilities to networks, and mitigate security threats. The CCNA
Security curriculum emphasizes core security technologies, the installation,
troubleshooting and monitoring of network devices to maintain integrity,
confidentiality and availability of data and devices, and competency in the
technologies that Cisco uses in its security structure.
Certified Ethical Hacker
CEH Certification | EC-Council
Overview Certified Ethical Hacker Certification
A Certified Ethical Hacker is a skilled professional who understands and knows
how to look for weaknesses and vulnerabilities in target systems and uses the
same knowledge and tools as a malicious hacker, but in a lawful and legitimate
manner to assess the security posture of a target system(s). The CEH credential
certifies individuals in the specific network security discipline of Ethical
Hacking from a vendor-neutral perspective.
GIAC Certified Intrusion Analyst
Overview GIAC Certified Intrusion Analyst
GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and
abilities to configure and monitor intrusion detection systems, and to read,
interpret, and analyze network traffic and related log files.
Other CompTIA cybersecurity certifications
CompTIA Certifications Cybersecurity
About the exam
CompTIA Security+ is the first security certification IT professionals should earn. It
establishes the core knowledge required of any cybersecurity role and provides a
springboard to intermediate-level cybersecurity jobs. Security+ incorporates best
practices in hands-on trouble-shooting to ensure security professionals have practical
security problem-solving skills. Cybersecurity professionals with Security+ know how
to address security incidents – not just identify them.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet
directive 8140/8570.01-M requirements.
The new CompTIA Security+ SY0-501 exam is available as of October 4, 2017.
More information on both versions of the exam is available in the Exam Details
below.
CompTIA Certification Testing
scheduling an exam
What to expect in a Pearson VUE test centre
Thank you very much for your time to
all the members of the project team.
And for the effort to move from other
countries to Spain.
October 17, 2017
INGEFORMA. Cybersecurity
Activity1 C1
Speaker: Juan Antonio Lloret Egea

More Related Content

What's hot

Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
PECB
 
[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)
Fortifier. IT Company
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
Infosec
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
Infosec
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
ShivamSharma909
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
TelecomValley
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
ITpreneurs
 
Spanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurementSpanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurement
Javier Tallón
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochureNick Serafimov
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)Jason Chapman
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Saud alardi 2021
Saud alardi 2021Saud alardi 2021
Saud alardi 2021
SaudAlmutairi8
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackers
technoxian
 
EL.MO. Spa presentation
EL.MO. Spa presentationEL.MO. Spa presentation
EL.MO. Spa presentation
EL.MO. SPA International
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
ITpreneurs
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
 

What's hot (20)

Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
 
[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)
 
Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Spanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurementSpanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurement
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochure
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
 
___2360_SP_VMAN---Screen
___2360_SP_VMAN---Screen___2360_SP_VMAN---Screen
___2360_SP_VMAN---Screen
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Saud alardi 2021
Saud alardi 2021Saud alardi 2021
Saud alardi 2021
 
Ethical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackersEthical Hacking Workshop is an essential for hackers
Ethical Hacking Workshop is an essential for hackers
 
EL.MO. Spa presentation
EL.MO. Spa presentationEL.MO. Spa presentation
EL.MO. Spa presentation
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 

Similar to Activity1 c1

Skillogic Cyber security Course in Pune
Skillogic Cyber security Course in  PuneSkillogic Cyber security Course in  Pune
Skillogic Cyber security Course in Pune
Skillogic Solutions
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
infosec train
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
Mercury Solutions Limited
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
Skillogic Solutions
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
Calvin Sam
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
Skillogic Solutions
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
infosec train
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
SagarNegi10
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Skillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
Skillogic Solutions
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
Skillogic Solutions
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
Skillogic Solutions
 
The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
Calvin Sam
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
Bill Nelson
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore January
Skillogic Solutions
 

Similar to Activity1 c1 (20)

Skillogic Cyber security Course in Pune
Skillogic Cyber security Course in  PuneSkillogic Cyber security Course in  Pune
Skillogic Cyber security Course in Pune
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Skillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in ChennaiSkillogic Cyber Security Course in Chennai
Skillogic Cyber Security Course in Chennai
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
 
The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore January
 

More from FORMAEMPLEO

Research programs
Research programsResearch programs
Research programs
FORMAEMPLEO
 
The bible of ai
The bible of aiThe bible of ai
The bible of ai
FORMAEMPLEO
 
El modelo snare cnn, red neuronal convolucional 2 d
El modelo snare cnn, red neuronal convolucional 2 dEl modelo snare cnn, red neuronal convolucional 2 d
El modelo snare cnn, red neuronal convolucional 2 d
FORMAEMPLEO
 
Artificial intelligence as a legal entity and its civil responsibility within...
Artificial intelligence as a legal entity and its civil responsibility within...Artificial intelligence as a legal entity and its civil responsibility within...
Artificial intelligence as a legal entity and its civil responsibility within...
FORMAEMPLEO
 
Guide for the publication of articles in the book and on the digital platform...
Guide for the publication of articles in the book and on the digital platform...Guide for the publication of articles in the book and on the digital platform...
Guide for the publication of articles in the book and on the digital platform...
FORMAEMPLEO
 
Poster
PosterPoster
Poster
FORMAEMPLEO
 
Ciencia abierta y publicaciones en Inteligencia Artificial
Ciencia abierta y publicaciones en Inteligencia ArtificialCiencia abierta y publicaciones en Inteligencia Artificial
Ciencia abierta y publicaciones en Inteligencia Artificial
FORMAEMPLEO
 
Los 7 mandamientos de la IA | The 7 commandments of AI
Los 7 mandamientos de la IA | The 7 commandments of AILos 7 mandamientos de la IA | The 7 commandments of AI
Los 7 mandamientos de la IA | The 7 commandments of AI
FORMAEMPLEO
 
Los estados humanos de la inteligencia artificial
Los estados humanos de la inteligencia artificial Los estados humanos de la inteligencia artificial
Los estados humanos de la inteligencia artificial
FORMAEMPLEO
 
ESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIAL
ESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIALESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIAL
ESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIAL
FORMAEMPLEO
 
Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...
Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...
Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...
FORMAEMPLEO
 
Organizational change for Dummies & Cambio organizacional para dummies
Organizational change for Dummies & Cambio organizacional para dummiesOrganizational change for Dummies & Cambio organizacional para dummies
Organizational change for Dummies & Cambio organizacional para dummies
FORMAEMPLEO
 
The need for change
The need for changeThe need for change
The need for change
FORMAEMPLEO
 
Enabling Organizational Change
Enabling Organizational ChangeEnabling Organizational Change
Enabling Organizational Change
FORMAEMPLEO
 
Cómo hacer posible El Cambio Organizativo mediante iniciativas estratégicas
Cómo hacer posible El Cambio Organizativo mediante iniciativas estratégicasCómo hacer posible El Cambio Organizativo mediante iniciativas estratégicas
Cómo hacer posible El Cambio Organizativo mediante iniciativas estratégicas
FORMAEMPLEO
 
La necesidad de cambio
La necesidad de cambioLa necesidad de cambio
La necesidad de cambio
FORMAEMPLEO
 
Lab config guide (4)
Lab config guide (4)Lab config guide (4)
Lab config guide (4)
FORMAEMPLEO
 
ToTP
ToTPToTP

More from FORMAEMPLEO (18)

Research programs
Research programsResearch programs
Research programs
 
The bible of ai
The bible of aiThe bible of ai
The bible of ai
 
El modelo snare cnn, red neuronal convolucional 2 d
El modelo snare cnn, red neuronal convolucional 2 dEl modelo snare cnn, red neuronal convolucional 2 d
El modelo snare cnn, red neuronal convolucional 2 d
 
Artificial intelligence as a legal entity and its civil responsibility within...
Artificial intelligence as a legal entity and its civil responsibility within...Artificial intelligence as a legal entity and its civil responsibility within...
Artificial intelligence as a legal entity and its civil responsibility within...
 
Guide for the publication of articles in the book and on the digital platform...
Guide for the publication of articles in the book and on the digital platform...Guide for the publication of articles in the book and on the digital platform...
Guide for the publication of articles in the book and on the digital platform...
 
Poster
PosterPoster
Poster
 
Ciencia abierta y publicaciones en Inteligencia Artificial
Ciencia abierta y publicaciones en Inteligencia ArtificialCiencia abierta y publicaciones en Inteligencia Artificial
Ciencia abierta y publicaciones en Inteligencia Artificial
 
Los 7 mandamientos de la IA | The 7 commandments of AI
Los 7 mandamientos de la IA | The 7 commandments of AILos 7 mandamientos de la IA | The 7 commandments of AI
Los 7 mandamientos de la IA | The 7 commandments of AI
 
Los estados humanos de la inteligencia artificial
Los estados humanos de la inteligencia artificial Los estados humanos de la inteligencia artificial
Los estados humanos de la inteligencia artificial
 
ESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIAL
ESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIALESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIAL
ESTRATEGIA ESPAÑOLA DE I+D+I EN INTELIGENCIA ARTIFICIAL
 
Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...
Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...
Inconvenientes de los sistemas de gestion del conocimiento / Drawbacks of kno...
 
Organizational change for Dummies & Cambio organizacional para dummies
Organizational change for Dummies & Cambio organizacional para dummiesOrganizational change for Dummies & Cambio organizacional para dummies
Organizational change for Dummies & Cambio organizacional para dummies
 
The need for change
The need for changeThe need for change
The need for change
 
Enabling Organizational Change
Enabling Organizational ChangeEnabling Organizational Change
Enabling Organizational Change
 
Cómo hacer posible El Cambio Organizativo mediante iniciativas estratégicas
Cómo hacer posible El Cambio Organizativo mediante iniciativas estratégicasCómo hacer posible El Cambio Organizativo mediante iniciativas estratégicas
Cómo hacer posible El Cambio Organizativo mediante iniciativas estratégicas
 
La necesidad de cambio
La necesidad de cambioLa necesidad de cambio
La necesidad de cambio
 
Lab config guide (4)
Lab config guide (4)Lab config guide (4)
Lab config guide (4)
 
ToTP
ToTPToTP
ToTP
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

Activity1 c1

  • 1. INGEFORMA. Cybersecurity Activity1-C1 Most important professional certifications in the professional and international cybersecurity market Speaker: Juan Antonio Lloret Egea Test Administrator / TCA for Pearson VUE and Prometric
  • 2. Aims of the Project of cybersecurity developed • The Main Aim of the Project: Developing innovative and technological cybersecurity curriculum in vocational schools, giving educations and increasing awareness-raising among people in cybersecurity. • The Specific Aim of the Project: Giving education about cybersecurity to 20 people via distance education platform in order to create qualified and well- educated work force who is educated in cybersecurity primarily in our city and then in our country; giving face-to-face education to 12 IT teachers as a part of their in-service education; giving awareness-raising seminars to 370 teachers, academicians, IT specialists and officers; distributing the book about curriculum modules to the libraries of 81 cities and providing multiplier effects through this way.
  • 3. INGEFORMA. Cybersecurity Activity1 C1 Speaker: Juan Antonio Lloret Egea • The Main Aim of the Project • According to the curriculum that our project team has developed, we should start talking about Intermediate cybersecurity certifications. It is the most appropriate, the most adjusted to levels of Higher Education centers associated with universities. And also for the first and second year of the computer faculties. Our curriculum is based mainly on certification: CompTIA Security+
  • 4. INGEFORMA. Cybersecurity Activity1 C1 Speaker: Juan Antonio Lloret Egea Why certify • Let's look at the different profiles for which a certification is recommended: Why Certify
  • 5. Launch Your Career with CompTIA Certifications INGEFORMA is an authorized CompTIA academy
  • 6. CompTIA Security+ Exam Codes SY0-401 or SY0-501 • CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
  • 7. Are there other security certifications in the market? Yes. We will present them in order of level of difficulty, without forgetting that they all belong to an intermediate level.
  • 8. CCNA Security Cisco CCNA Security is a job-role focused certification for engineers who require the skills needed to develop a security infrastructure. Overview CCNA Security • Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.
  • 9.
  • 10. Certified Ethical Hacker CEH Certification | EC-Council Overview Certified Ethical Hacker Certification A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
  • 11.
  • 12. GIAC Certified Intrusion Analyst Overview GIAC Certified Intrusion Analyst GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.
  • 13. Other CompTIA cybersecurity certifications CompTIA Certifications Cybersecurity
  • 14. About the exam CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. The new CompTIA Security+ SY0-501 exam is available as of October 4, 2017. More information on both versions of the exam is available in the Exam Details below.
  • 17. What to expect in a Pearson VUE test centre
  • 18. Thank you very much for your time to all the members of the project team. And for the effort to move from other countries to Spain. October 17, 2017 INGEFORMA. Cybersecurity Activity1 C1 Speaker: Juan Antonio Lloret Egea