Diseño De Guias De Laboratorio De Ciberseguridad Para La Especialización En Teleinformática De La Universidad Francisco Jose De Caldas
Fecha
Autores
Autor corporativo
Título de la revista
ISSN de la revista
Título del volumen
Editor
Compartir
Altmetric
Resumen
This document presents the work of the design of the first phase of the cybersecurity laboratory of the Specialization in Teleinformatics of the Universidad Distrital Francisco José de Caldas; In the first instance a presentation of the work is given where the problem is contextualized, which basically focuses on the lack of a practical component in the specialization in teleinformatics in the area of cybersecurity, which impacts the learning and exploration of the students of the specialization and even more taking into account that it is in the field of teleinformatics which infers in a broad relationship with the computational, cybernetic, technological and technological use, cybernetic, technological and telecommunications, taking into account the guidelines of the CySA and CISSP certifications where the Security Assessment and Testing domain was mainly covered, using open source Python tools and then laboratory guides were elaborated for its understanding and development, where each one includes a space of explanation of how it is done and what the practice is for. The development of this work was based on chapter 10 of the book “Mastering Python for Networking and Security - Second Edition” by the author José Manuel Ortega, where he basically delivers the codes to run in PyCharm software. However, in addition to this, other literature was studied in order to understand what are the vulnerabilities of both XSS and SQL injection, which included the implementation of simulations in the GNS3 software where virtual machines were used that have the operating system Kali Linux and Ubuntu then to organize the subject in 4 practices. Each of the practices is composed of an objective, a description, prerequisites, a theoretical or explanatory part, the exemplification used by Jose Manuel Ortega in the book, the practice in GNS3, the analysis and how to mitigate the attack.