Dashboard » Sheyla Leacock » Mis artículos
Sheyla Leacock
@Sheyla_Leacock
Sheyla Leacock
Sheyla Leacock
Sheyla Leacock
Sheyla Leacock
Sheyla Leacock
Sheyla Leacock
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T030922Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8ad2b28b49eb8f8c0fe0761d1308e5e3180caa387dff3dd0806bac4ba9953736)
Sheyla Leacock
@Sheyla_Leacock
Especialista en Ciberseguridad Teacher
Especialista de Ciberseguridad en Sector Bancario (Panamá)
Escribe artículos para la comunidad
Implementación automatizada de SNORT IDS/IPS con snorter – PARTE II: WEBSNORT
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T030922Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=13d99e1da8d277a7b28bc33b15cf088202eda3d46c6a30cc1d3b939327d52322)
WEBSNORT es un servicio web que permite subir archivos pcap para ..
Implementación automatizada de Snort IDS/IPS con Snorter – Parte I
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T030922Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=13d99e1da8d277a7b28bc33b15cf088202eda3d46c6a30cc1d3b939327d52322)
Snorter es un script que facilita la puesta en marcha de Snort, u..
Introducción al escaneo de red y vulnerabilidades con Nmap – Parte 2
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T030922Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=13d99e1da8d277a7b28bc33b15cf088202eda3d46c6a30cc1d3b939327d52322)
ZENMAP Es la interfaz gráfica oficial para Nmap. Es Opensource y ..
Introducción al escaneo de red y vulnerabilidades con Nmap
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T030922Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=13d99e1da8d277a7b28bc33b15cf088202eda3d46c6a30cc1d3b939327d52322)
Nmap es una herramienta opensource utilizada para el escaneo de r..
Analizando la seguridad de la red con Snorby
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T030923Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=00c8ca3e6ae4688c342cd3f95a1394bebd7ebc3334adb1629b622b7e895c4288)
Una de las técnicas existentes para proteger los sistemas es la m..
Qué es un sistemas de detección y prevención de intrusos(IDS)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T030923Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=00c8ca3e6ae4688c342cd3f95a1394bebd7ebc3334adb1629b622b7e895c4288)
La protección de la información y las infraestructuras es uno de ..