{"id":23756,"date":"2024-09-24T10:26:02","date_gmt":"2024-09-24T03:26:02","guid":{"rendered":"https:\/\/doofydizee.com\/?p=23756"},"modified":"2024-10-11T10:31:57","modified_gmt":"2024-10-11T03:31:57","slug":"thong-bao-chuong-trinh-dao-tao-cybersecurity-cua-agest-tai-vku","status":"publish","type":"post","link":"https:\/\/doofydizee.com\/thong-bao-chuong-trinh-dao-tao-cybersecurity-cua-agest-tai-vku\/","title":{"rendered":"TH\u00d4NG B\u00c1O CH\u01af\u01a0NG TR\u00ccNH \u0110\u00c0O T\u1ea0O CYBERSECURITY C\u1ee6A AGEST T\u1ea0I VKU"},"content":{"rendered":"
<\/p>\n
Nh\u1eb1m m\u1ee5c ti\u00eau ph\u00e1t tri\u1ec3n ngu\u1ed3n nh\u00e2n l\u1ef1c cho ng\u00e0nh CyberSecurity<\/strong> t\u1ea1i \u0110\u00e0 N\u1eb5ng v\u00e0 v\u1edbi mong mu\u1ed1n \u0111em \u0111\u1ebfn cho c\u00e1c b\u1ea1n sinh vi\u00ean chuy\u00ean ng\u00e0nh CNTT, M\u1ea1ng v\u00e0 An to\u00e0n th\u00f4ng tin, C\u00f4ng ngh\u1ec7 k\u1ef9 thu\u1eadt m\u00e1y t\u00ednh nh\u1eefng ki\u1ebfn th\u1ee9c v\u1ec1 CyberSecurity, c\u00f4ng ty TNHH AGEST Vi\u1ec7t Nam ph\u1ed1i h\u1ee3p v\u1edbi khoa K\u1ef9 thu\u1eadt m\u00e1y t\u00ednh v\u00e0 \u0110i\u1ec7n t\u1eed, tr\u01b0\u1eddng \u0110\u1ea1i h\u1ecdc C\u00f4ng ngh\u1ec7 th\u00f4ng tin v\u00e0 Truy\u1ec1n th\u00f4ng Vi\u1ec7t H\u00e0n, \u0110\u1ea1i h\u1ecdc \u0110\u00e0 N\u1eb5ng t\u1ed5 ch\u1ee9c kh\u00f3a \u0111\u00e0o t\u1ea1o CyberSecurity<\/strong> do chuy\u00ean gia Nh\u1eadt B\u1ea3n \u0111\u1ebfn t\u1eeb T\u1eadp \u0110o\u00e0n AGEST tr\u1ef1c ti\u1ebfp gi\u1ea3ng d\u1ea1y. Kh\u00f3a h\u1ecdc \u0111\u1eb7c bi\u1ec7t n\u00e0y \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf b\u1edfi T\u1eadp \u0111o\u00e0n AGEST v\u00e0 \u0111\u01b0\u1ee3c t\u00e0i tr\u1ee3 to\u00e0n ph\u1ea7n b\u1edfi AOTS Japan, v\u1edbi s\u1ef1 tham gia gi\u1ea3ng d\u1ea1y tr\u1ef1c ti\u1ebfp c\u1ee7a \u00d4ng Shiratani Munehiro \u2013 Gi\u1ea3ng vi\u00ean ch\u01b0\u01a1ng tr\u00ecnh \u201cCertified Ethical Hacker Program<\/strong>\u201d t\u1ea1i Nh\u1eadt B\u1ea3n.<\/p>\n <\/p>\n N\u1ed9i dung kh\u00f3a h\u1ecdc<\/strong>:<\/p>\n \ud83d\udc49 Bu\u1ed5i 1<\/strong>: Hacker, Fundamentals of Information Security, Network, Hacking overview, Malware.<\/p>\n \ud83d\udc49 Bu\u1ed5i 2<\/strong>: Information Gathering overview, Reconnaissance, Scanning.<\/p>\n \ud83d\udc49 Bu\u1ed5i 3<\/strong>: Attack on Host, DoS (Denial of Service) Attack, Attack on Web Application, Maintain Access Rights.<\/p>\n \ud83d\udc49 Bu\u1ed5i 4<\/strong>: Erasing Traces, Network Eavesdropping, Social Engineering, Wireless Network, Cloud.<\/p>\n Th\u1eddi gian v\u00e0 \u0110\u1ecba \u0111i\u1ec3m:<\/strong><\/p>\n \ud83d\udc49 Th\u1eddi gian:<\/strong> 25 v\u00e0 26\/09\/2024, t\u1eeb 8h00 ~ 17h00.<\/p>\n \ud83d\udc49 \u0110\u1ecba \u0111i\u1ec3m:<\/strong> H\u1ed9i tr\u01b0\u1eddng tr\u00f2n khu V, Tr\u01b0\u1eddng \u0110\u1ea1i h\u1ecdc C\u00f4ng ngh\u1ec7 th\u00f4ng tin v\u00e0 Truy\u1ec1n th\u00f4ng Vi\u1ec7t H\u00e0n, \u0110\u1ea1i h\u1ecdc \u0110\u00e0 N\u1eb5ng, 470 Tr\u1ea7n \u0110\u1ea1i Ngh\u0129a, H\u00f2a Qu\u00fd, Ng\u0169 H\u00e0nh S\u01a1n, \u0110\u00e0 N\u1eb5ng.<\/p>\n \ud83c\udff5\ufe0f K\u1ebft th\u00fac kh\u00f3a h\u1ecdc, sinh vi\u00ean \u0111\u01b0\u1ee3c nh\u1eadn ch\u1ee9ng nh\u1eadn ho\u00e0n th\u00e0nh kh\u00f3a h\u1ecdc. Ngo\u00e0i ra, c\u00f4ng ty AGEST Vi\u1ec7t Nam s\u1ebd cung c\u1ea5p c\u01a1 h\u1ed9i th\u1ef1c t\u1eadp h\u1ea5p d\u1eabn cho c\u00e1c sinh vi\u00ean c\u00f3 \u0111am m\u00ea v\u00e0 mong mu\u1ed1n ph\u00e1t tri\u1ec3n trong l\u0129nh v\u1ef1c An to\u00e0n th\u00f4ng tin.<\/p>\n #VKU Nh\u00e2n b\u1ea3n – Ph\u1ee5ng s\u1ef1 – Khai ph\u00f3ng!!!<\/p>\n #VKU \u0110\u1ee9c – Tr\u00ed – Th\u1ec3 – M\u1ef9!!!<\/p>\n #KhoaKyThuatMayTinh&DienTu<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" CH\u01af\u01a0NG TR\u00ccNH \u0110\u00c0O T\u1ea0O CYBERSECURITY C\u1ee6A AGEST T\u1ea0I VKU Nh\u1eb1m m\u1ee5c ti\u00eau ph\u00e1t tri\u1ec3n ngu\u1ed3n nh\u00e2n l\u1ef1c cho ng\u00e0nh CyberSecurity t\u1ea1i \u0110\u00e0 N\u1eb5ng v\u00e0 v\u1edbi mong mu\u1ed1n \u0111em \u0111\u1ebfn cho c\u00e1c b\u1ea1n sinh vi\u00ean chuy\u00ean ng\u00e0nh CNTT, M\u1ea1ng v\u00e0 An to\u00e0n th\u00f4ng tin, C\u00f4ng ngh\u1ec7 k\u1ef9 thu\u1eadt m\u00e1y t\u00ednh nh\u1eefng ki\u1ebfn th\u1ee9c v\u1ec1 CyberSecurity, […]<\/p>\n","protected":false},"author":12,"featured_media":23757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[236],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/posts\/23756"}],"collection":[{"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/comments?post=23756"}],"version-history":[{"count":4,"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/posts\/23756\/revisions"}],"predecessor-version":[{"id":23761,"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/posts\/23756\/revisions\/23761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/media\/23757"}],"wp:attachment":[{"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/media?parent=23756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/categories?post=23756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/doofydizee.com\/wp-json\/wp\/v2\/tags?post=23756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}