diff --git a/README.es.md b/README.es.md index 1dc7985..0b1cdcb 100644 --- a/README.es.md +++ b/README.es.md @@ -1,5 +1,5 @@ -# Informe de gesti贸n de incidentes que cumple con la norma ISO 27001 +# Informe de gesti贸n de incidentes que cumple con la norma ISO 27001 > By [@rosinni](https://github.com/rosinni) and [other contributors](https://github.com/4GeeksAcademy/deploying-wordpress-debian/graphs/contributors) at [4Geeks Academy](https://4geeksacademy.co/) @@ -7,11 +7,6 @@ [![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy) *These instructions are [available in english](https://github.com/breatheco-de/incident-report-management-exercise-project/blob/main/README.md)* - - - - - ### Antes de empezar... @@ -19,6 +14,8 @@ + + ## 馃尡 驴C贸mo empezar este proyecto? Este ejercicio tiene como objetivo ense帽ar a los estudiantes c贸mo identificar y reportar una vulnerabilidad de inyecci贸n SQL utilizando la aplicaci贸n web Damn Vulnerable Web Application (DVWA). El reporte se debe realizar de acuerdo a las normas ISO 27001 para la gesti贸n de incidentes de seguridad de la informaci贸n. @@ -28,6 +25,7 @@ Este ejercicio tiene como objetivo ense帽ar a los estudiantes c贸mo identificar * VirtualBox instalado en tu computadora. * Una m谩quina virtual Debian instalada en VirtualBox. (usaremos la m谩quina previamente configurada en clases anteriores). + #### Beneficios de Usar una M谩quina Virtual diff --git a/README.md b/README.md index 17e5c63..3df7a86 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ -# ISO 27001 Compliant Incident Management Report +# ISO 27001 Compliant Incident Management Report > By [@rosinni](https://github.com/rosinni) and [other contributors](https://github.com/4GeeksAcademy/deploying-wordpress-debian/graphs/contributors) at [4Geeks Academy](https://4geeksacademy.co/) @@ -7,9 +7,6 @@ [![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy) *Estas instrucciones est谩n [disponibles en espa帽ol](https://github.com/breatheco-de/incident-report-management-exercise-project/blob/main/README.es.md)* - - - ### Before Starting... @@ -17,6 +14,8 @@ + + ## 馃尡 How to start this project? This exercise aims to teach students how to identify and report an SQL injection vulnerability using the Damn Vulnerable Web Application (DVWA). The report should be made according to ISO 27001 standards for information security incident management. @@ -26,6 +25,8 @@ This exercise aims to teach students how to identify and report an SQL injection - VirtualBox installed on your computer. - A Debian virtual machine installed in VirtualBox. (We will use the machine previously configured in earlier classes). + + #### Benefits of Using a Virtual Machine - **Isolation:** Keeps the testing environment separate from your main operating system, protecting it from potential damage. diff --git a/learn.json b/learn.json index 97159dd..923a9a0 100644 --- a/learn.json +++ b/learn.json @@ -11,6 +11,7 @@ "preview": "https://github.com/breatheco-de//incident-report-management-exercise-project/blob/main/assets/preview-dvwa.jpg?raw=true", "repository": "https://github.com/breatheco-de/incident-report-management-exercise-project", "duration": 3, + "projectType": "project", "difficulty": "intermediate", "bugsLink": "https://github.com/learnpack/learnpack/issues/new", "technologies": ["linux", "cybersecurity", "ciberseguridad", "sql", "sql-injection"],