Please use this identifier to cite or link to this item:
https://hdl.handle.net/11305/2585
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Silva, Renan | - |
dc.contributor.author | Camargo, Matheus | - |
dc.coverage.spatial | México | en_US |
dc.date.accessioned | 2024-06-13T08:45:10Z | - |
dc.date.available | 2024-06-13T08:45:10Z | - |
dc.date.issued | 2024-05-27 | - |
dc.identifier.other | https://5a-jornadaciberseguridad.cudi.edu.mx/evento/post-exploitation-attacks | en_US |
dc.identifier.uri | https://hdl.handle.net/11305/2585 | - |
dc.description | Sin agenda. | en_US |
dc.description.abstract | Se mostraron algunas técnicas de post explotación. | en_US |
dc.language.iso | es | en_US |
dc.publisher | Corporación Universitaria para el Desarrollo de Internet | en_US |
dc.relation.ispartof | Talleres/Seguridad/Talleres de Seguridad en el 2024 | en_US |
dc.rights | Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0) | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by-nc/4.0/ | en_US |
dc.title | Post-Exploitation Attacks | en_US |
dc.type | Foto | en_US |
dc.type | Póster | en_US |
dc.type | Video | en_US |
dc.activity | Taller | en_US |
dc.attendee | Romero, Eduardo | - |
dc.attendee | Souza, Rildo | - |
dc.attendee | Silva, Renan | - |
dc.attendee | Aranda, Fernando | - |
dc.attendee | Pérez, Wilberth De Jesús | - |
dc.attendee | González, María | - |
dc.attendee | Alvarez, Fredy | - |
dc.attendee | Gutierrez, Humberto | - |
dc.attendee | Ruiz, Alma | - |
dc.attendee | Mariel, Guillermo | - |
dc.attendee | Navarrete, Fabiola | - |
dc.attendee | García, Edgar | - |
dc.attendee | De Anda, Edgar | - |
dc.attendee | Rodríguez, Erick | - |
dc.attendee | Ortega, Juan | - |
dc.attendee | Baeza, Jorge | - |
dc.attendee | Contreras, Genaro | - |
dc.attendee | Martínez, Liset | - |
dc.attendee | Sánchez, Erika | - |
dc.attendee | Humberto, Jesús | - |
dc.attendee | Gómez, Lidia | - |
dc.attendee | Romero, Alexis | - |
dc.attendee | Marquez, Armando | - |
dc.attendee | Chávez, Silvia | - |
dc.attendee | Aguilar, José | - |
dc.attendee | Salazar, Rigo | - |
dc.attendee | Peraza, Moctezuma | - |
dc.institution.author | RNP - Brasil | en_US |
dc.institution.author | RNP - Brasil | en_US |
dc.subject.cudi | Seguridad | en_US |
dc.subject.keyword | Post explotación; Técnicas; Fases | en_US |
dc.backup | 240524_Taller_Jornada_de_Ciberseguridad_Post-Exploitation Attacks_OPTIMIZADO_1.mp4 https://drive.google.com/drive/u/2/folders/1-3AcJzWVSROqLCAneTIW3AgS-zdfuEj1 | en_US |
Appears in Collections: | Talleres de Seguridad en el 2024 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
240524_Taller_Jornada_de_Ciberseguridad_Post-Exploitation Attacks_OPTIMIZADO_1.mp4 | Video de la actividad. | 1,63 GB | Flv | View/Open |
240524_Taller_Jornada_de_Ciberseguridad_Post-Exploitation Attacks_AUDIO.mp3 | Audio de la Actividad. | 306,69 MB | mp3 | View/Open |
Post-Exploitation_Attacks.png | Poster de la actividad. | 669,2 kB | image/png | View/Open |
Foto Renan.png | Foto Renan. | 376,28 kB | image/png | View/Open |
Foto Mateus.png | Foto Mateus. | 315,78 kB | image/png | View/Open |
This item is licensed under a Creative Commons License