University certificate
The world's largest faculty of information technology”
Why study at TECH?
Specialize in computer systems with the help of professionals with extensive experience in the sector”
Completing this Professional Master's Degree will place software and computer systems engineering professionals at the forefront of the latest developments in the sector"
This Professional master’s degreein Software and Computer Systems Engineering contains the most complete and up-to-date program on the market. The most important features include:
- Practical cases presented by experts in Software and Computer Systems Engineering
- The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
- Practical exercises where self-assessment can be used to improve learning
- Special emphasis on innovative methodologies in Software and Computer Systems Engineering
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connectiontenidos desde cualquier dispositivo fijo o portátil con conexión a internet
This Professional master’s degree is the best investment you can make when selecting an up-to-date program in the field of Software and Computer Systems Engineering. We offer you quality and free access to content"
Its teaching staff includes professionals belonging to the field of Software and Computer Systems Engineering, who contribute their work experience to this training, as well as renowned specialists from reference societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive learning programmed to train in real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the professional will be assisted by an innovative interactive video system developed by renowned and experienced experts Software and Computer Systems Engineering.
This program comes with the best educational material, providing you with a contextual approach that will facilitate your learning”
This 100% online Professional master’s degree will allow you to combine your studies with your professional work. You choose where and when to study”
Syllabus
The structure of the contents has been designed by the best professionals in the Software and Computer Systems Engineering sector, with extensive experience and recognized prestige in the profession, and who aware of the benefits that the latest educational technology can bring to higher education.
We have the most complete and up-to-date scientific program on the market. We strive for excellence and for you to achieve it too"
Module 1. Methodologies, Development and Quality in Software Engineering
1.1. Introduction to Software Engineering
1.1.1. Introduction
1.1.2. The Software Crisis
1.1.3. Differences between Software Engineering and Computer Science
1.1.4. Ethics and Professional Responsibility in Software Engineering
1.1.5. Software Factories
1.2. The Software Development Process
1.2.1. Definition
1.2.2. Software Process Model
1.2.3. The Unified Software Development Process
1.3. Object-Oriented Software Development
1.3.1. Introduction
1.3.2. Principles of Object Orientation
1.3.3. Object Definition
1.3.4. Class Definition
1.3.5. Object-Oriented Analysis vs. Object-Oriented Design
1.4. Model-Based Software Development
1.4.1. The Need to Model
1.4.2. Software Systems Modeling
1.4.3. Object Modeling
1.4.4. UML
1.4.5. CASE Tools
1.5. Application Modeling and Design Patterns with UML
1.5.1. Advanced Requirements Modeling
1.5.2. Advanced Static Modeling
1.5.3. Advanced Dynamic Modeling
1.5.4. Component Modeling
1.5.5. Introduction to Design Patterns with UML
1.5.6. Adapter
1.5.7. Factory
1.5.8. Singleton
1.5.9. Strategy
1.5.10. Composite
1.5.11. Facade
1.5.12. Observer
1.6. Model-Driven Engineering
1.6.1. Introduction
1.6.2. Metamodeling of Systems
1.6.3. MDA
1.6.4. DSL
1.6.5. Model Refinements with OCL
1.6.6. Model Transformations
1.7. Ontologies in Software Engineering
1.7.1. Introduction
1.7.2. Ontology Engineering
1.7.3. Application of Ontologies in Software Engineering
1.8. Agile Methodologies for Software Development, Scrum
1.8.1. What is Software Agility?
1.8.2. The Agile Manifesto
1.8.3. The Roadmap of an Agile Project
1.8.4. The Product Owner
1.8.5. User Stories
1.8.6. Agile Planning and Estimating
1.8.7. Measurements in Agile Development
1.8.8. Introduction to Scrum
1.8.9. The Roles
1.8.10. The Product Backlog
1.8.11. The Sprint
1.8.12. Meetings.
1.9. Lean Software Development Methodology
1.9.1. Introduction
1.9.2. Kanban
1.10. Quality and Software Process Improvement
1.10.1. Introduction
1.10.2. Software Measurement
1.10.3. Software Testing
1.10.4. Software Processes Quality Model: CMMI
Module 2. Software Project Management
2.1. Fundamental Concepts of Project Management and the Project Management Lifecycle
2.1.1. What is a Project?
2.1.2. Common Methodology
2.1.3. What is Project Management?
2.1.4. What is a Project Plan?
2.1.5. Benefits
2.1.6. Project Life Cycle
2.1.7. Process Groups or Project Management Life Cycle
2.1.8. The Relationship between Process Groups and Knowledge Areas
2.1.9. Relationships between Product and Project Life Cycle
2.2. Start-Up and Planning
2.2.1. From the Idea to the Project
2.2.2. Development of the Project Record
2.2.3. Project Kick-Off Meeting
2.2.4. Tasks, Knowledge and Skills in the Startup Process
2.2.5. The Project Plan
2.2.6. Development of the Basic Plan. Steps
2.2.7. Tasks, Knowledge and Skills in the Planning Process
2.3. Stakeholders and Outreach Management
2.3.1. Identify Stakeholders
2.3.2. Develop Plan for Stakeholder Management
2.3.3. Manage Stakeholder Engagement
2.3.4. Control Stakeholder Engagement
2.3.5. The Objective of the Project
2.3.6. Scope Management and its Plan
2.3.7. Gathering Requirements
2.3.8. Define the Scope Statement
2.3.9. Create the WBS
2.3.10. Verify and Control the Scope
2.4. The Development of the Time-Schedule
2.4.1. Time Management and its Plan
2.4.2. Define Activities
2.4.3. Establishment of the Sequence of Activities
2.4.4. Estimated Resources for Activities
2.4.5. Estimated Duration of Activities
2.4.6. Development of the Time-Schedule and Calculation of the Critical Path
2.4.7. Schedule Control
2.5. Budget Development and Risk Response
2.5.1. Estimate Costs
2.5.2. Develop Budget and S-Curve
2.5.3. Cost Control and Earned Value Method
2.5.4. Risk Concepts
2.5.5. How to Perform a Risk Analysis
2.5.6. The Development of the Response Plan
2.6. Quality Management
2.6.1. Quality Planning
2.6.2. Assuring Quality
2.6.3. Quality Control
2.6.4. Basic Statistical Concepts
2.6.5. Quality Management Tools
2.7. Communication and Human Resources
2.7.1. Planning Communications Management
2.7.2. Communications Requirements Analysis
2.7.3. Communication Technology
2.7.4. Communication Models
2.7.5. Communication Methods
2.7.6. Communications Management Plan
2.7.7. Manage Communications
2.7.8. Management of Human Resources
2.7.9. Main Stakeholders and their Roles in the Projects
2.7.10. Types of Organization
2.7.11. Project Organization
2.7.12. The Work Equipment
2.8. Procurement
2.8.1. The Procurement Process
2.8.2. Planning
2.8.3. Search for Suppliers and Request for Quotations
2.8.4. Contract Allocation
2.8.5. Contract Administration
2.8.6. Contracts
2.8.7. Types of Contracts
2.8.8. Contract Negotiation
2.9. Execution, Monitoring and Control and Closure
2.9.1. Process groups
2.9.2. Project Execution
2.9.3. Project Monitoring and Control
2.9.4. Project closure
2.10. Professional Responsibility
2.10.1. Professional Responsibility
2.10.2. Characteristics of Social and Professional Responsibility
2.10.3. Project Leader Code of Ethics
2.10.4. Liability vs. PMP®
2.10.5. Examples of Liability
2.10.6. Benefits of Professionalization
Module 3. Software Development Platforms
3.1. Introduction to Application Development
3.1.1. Desktop Applications
3.1.2. Programming Language
3.1.3. Integrated Development Environments
3.1.4. Web Applications
3.1.5. Mobile Applications
3.1.6. Cloud Applications
3.2. Application Development and Graphical User Interface in Java
3.2.1. Integrated Development Environments for Java
3.2.2. Main IDE for Java
3.2.3. Introduction to the Eclipse Development Platform
3.2.4. Introduction to the NetBeans Development Platform
3.2.5. Controller View Model for Graphical User Interfaces
3.2.6. Design a Graphical Interface in Eclipse
3.2.7. Design a Graphical Interface in NetBeans
3.3. Debugging and Testing in Java
3.3.1. Testing and Debugging of Java programs
3.3.2. Debugging in Eclipse
3.3.3. Debugging in NetBeans
3.4. Application Development and Graphical User Interface in. NET
3.4.1. Net Framework
3.4.2. Components of the .NET Development Platform
3.4.3. Visual Studio .NET
3.4.4. .NET tools for GUI
3.4.5. The GUI with Windows Presentation Foundation
3.4.6. Debugging and Compiling a WPF Application
3.5. Programming for .NET Networks
3.5.1. Introduction to .NET Network Programming
3.5.2. Requests and Responses in .NET
3.5.3. Use of Application Protocols in .NET
3.5.4. Security in .NET Network Programming
3.6. Mobile Application Development Environments
3.6.1. Mobile Applications
3.6.2. Android Mobile Applications
3.6.3. Steps for Development in Android
3.6.4. The IDE Android Studio
3.7. Development of Applications in the Environment Android Studio
3.7.1. Install and Start Android Studio
3.7.2. Running an Android Application
3.7.3. Development of the Graphic Interface in Android Studio
3.7.4. Starting Activities in Android Studio
3.8. Debugging and Publishing of Android Applications
3.8.1. Debugging an Application in Android Studio
3.8.2. Memorizing Applications in Android Studio
3.8.3. Publishing an Application on Google Play
3.9. Cloud Application Development
3.9.1. Cloud Computing
3.9.2. Cloud Levels: SaaS, PaaS, IaaS
3.9.3. Main Development Platforms in the Cloud
3.9.4. Bibliographical References
3.10. Introduction to Google Cloud Platform
3.10.1. Basic Concepts of Google Cloud Platform
3.10.2. Google Cloud Platform Services
3.10.3. Tools in Google Cloud Platform
Module 4. Web-Client Computing
4.1. Introduction to HTML
4.1.1. Structure of the Document
4.1.2. Color
4.1.3. Text:
4.1.4. Hypertext Links
4.1.5. Images
4.1.6. Lists
4.1.7. Tables
4.1.8. Frames
4.1.9. Forms.
4.1.10. Specific Elements for Mobile Technologies
4.1.11. Obsolete Elements
4.2. Cascading Style Sheets (CSS)
4.2.1. Elements and Structure of a Cascading Style Sheet
4.2.1.1. Creation of Style Sheets
4.2.1.2. Application of Styles Selectors
4.2.1.3. Style Inheritance and Cascading
4.2.1.4. Page Formatting Using Styles
4.2.1.5. Page Structuring Using Styles. The Box Model
4.2.2. Style Design for different Devices
4.2.3. Types of Style Sheets: Static and Dynamic Pseudoclasses
4.2.4. Best Practices in the Use of Style Sheets
4.3. Introduction and History of JavaScript
4.3.1. Introduction
4.3.2. History of JavaScript
4.3.3. Development Environment to be Used
4.4. Basic Notions of Web Programming
4.4.1. Basic JavaScript Syntax
4.4.2. Primitive Data Types and Operators
4.4.3. Variables and Areas
4.4.4. Text Strings and Template Literals
4.4.5. Numbers and Booleans
4.4.6. Comparisons
4.5. Complex JavaScript Structures
4.5.1. Vectors or Arrays and Objects
4.5.2. Sets
4.5.3. Maps
4.5.4. Disjunctive
4.5.5. Loops
4.6. Functions and Objects
4.6.1. Function Definition and Invocation
4.6.2. Arguments
4.6.3. Arrow Functions
4.6.4. Callback Functions
4.6.5. Higher Order Functions
4.6.6. Literal Objects
4.6.7. The This Object
4.6.8. Objects as Namespaces: theMaths and Date Objects
4.7. The Document Object Model (DOM)
4.7.1. What is DOM?
4.7.2. A Bit of History
4.7.3. Navigation and Element Retrieval
4.7.4. A Virtual DOM with JSDOM
4.7.5. Query Selectors
4.7.6. Navigation using Properties
4.7.7. Assigning Attributes to Elements
4.7.8. Creation and Modification of Nodes
4.7.9. Updated Styling of the DOM Elements
4.8. Modern Web Development
4.8.1. Event-Driven Flow and Listeners
4.8.2. Modern Web Toolkits and Alignment Systems
4.8.3. Strict JavaScript Mode
4.8.4. More about Functions
4.8.5. Asynchronous Promises and Functions
4.8.6. Closures
4.8.7. Functional Programming
4.8.8. POO in JavaScript
4.9. Web Usability
4.9.1. Introduction to Usability
4.9.2. Definition of Usability
4.9.3. Importance of User-Centered Web Design
4.9.4. Differences Between Accessibility and Usability
4.9.5. Advantages and Problems in Combining Accessibility and Usability
4.9.6. Advantages and Difficulties in the Implementation of Usable Websites
4.9.7. Usability Methods
4.9.8. User Requirements Analysis
4.9.9. Conceptual Design Principles. User-Oriented Prototyping
4.9.10. Guidelines for the Creation of Usable Web Sites
4.9.10.1. Usability Guidelines of Jakob Nielsen
4.9.10.2. Usability Guidelines of Bruce Tognazzini
4.9.11. Usability Evaluation
4.10. Web Accessibility
4.10.1. Introduction
4.10.2. Definition of Web-Accessibility
4.10.3. Types of Disabilities
4.10.3.1. Temporary or Permanent Disabilities
4.10.3.2. Visual Impairment
4.10.3.3. Hearing Impairment
4.10.3.4. Motor Impairment
4.10.3.5. Neurological or Cognitive Disabilities
4.10.3.6. Difficulties Arising from Aging
4.10.3.7. Limitations Arising from the Environment
4.10.3.8. Barriers Preventing Access to the Web
4.10.4. Technical Aids and Support Products to Overcome Barriers
4.10.4.1. Aids for the Blind
4.10.4.2. Aids for Persons with Low Vision
4.10.4.3. Aids for People with Color Blindness
4.10.4.4. Aids for the Hearing Impaired
4.10.4.5. Aids for the Motor Impaired
4.10.4.6. Aids for the and Neurological Impaired
4.10.5. Advantages and Difficulties in the Implementation of Web Accessibility
4.10.6. Guidelines for Compliance with Regulations and Standards
4.10.6.1. Description of the Main Guidelines (Images, links, videos, etc.)
4.10.6.2. Guidelines for Accessible Navigation
4.10.6.2.1. Perceptibility
4.10.6.2.2. Operability
4.10.6.2.3. Comprehensibility
4.10.6.2.4. Robustness
4.10.7. Description of the Web Accessibility Compliance Process
4.10.8. Compliance Levels
4.10.9. Compliance Criteria
4.10.10. Compliance Requirements
4.10.11. Web Site Accessibility Evaluation Methodology
Module 5. Web Server Computing
5.1. Introduction to Server-Side Programming: PHP
5.1.1. Server-Side Programming Basics
5.1.2. Basic PHP Syntax
5.1.3. HTML Content Generation with PHP
5.1.4. Development and Testing Environments: XAMPP
5.2. Advanced PHP
5.2.1. Control Structures with PHP
5.2.2. PHP Functions
5.2.3. Array Handling in PHP
5.2.4. String Handling with PHP
5.2.5. Object Orientation in PHP
5.3. Data Models
5.3.1. Concept of Data. Life Cycle of Data
5.3.2. Types of Data
5.3.2.1. Basic
5.3.2.2. Records
5.3.2.3. Dynamics
5.4. Relational Model
5.4.1. Description
5.4.2. Entities and Types of Entities
5.4.3. Data Elements. Attributes
5.4.4. Relationships: Types, Subtypes, Cardinality
5.4.5. Keys Types of Keys
5.4.6. Normalization. Normal Shapes
5.5. Construction of the Logical Data Model
5.5.1. Specification of Tables
5.5.2. Definition of Columns
5.5.3. Key Specification
5.5.4. Conversion to Normal Shapes. Dependency
5.6. The Physical Data Model. Data Files
5.6.1. Description of Data Files
5.6.2. Types of Files
5.6.3. Access Modes
5.6.4. File Organization
5.7. Database Access from PHP
5.7.1. Introduction to MariaDB
5.7.2. Working with a MariaDB Database: the SQL Language
5.7.3. Accessing the MariaDB Database from PHP
5.7.4. Introduction to MySQL
5.7.5. Working with a MySQL Database: The SQL Language
5.7.6. Accessing MySQL Database from PHP
5.8. Client Interaction from PHP
5.8.1. PHP Forms
5.8.2. Cookies
5.8.3. Session Management
5.9. Web Application Architecture
5.9.1. The Controller View Model Pattern
5.9.2. Controller
5.9.3. Models
5.9.4. View
5.10. Introduction to Web Services
5.10.1. Introduction to XML
5.10.2. Service-Oriented Architecture (SOA): Web Services
5.10.3. Creation of SOAP and REST Web Services
5.10.4. The SOAP Protocol
5.10.5. The REST Protocol
Module 6. Safety Management
6.1. Information Security
6.1.1. Introduction
6.1.2. Information Security Involves Confidentiality, Integrity and Availability
6.1.3. Safety is an Economic Issue
6.1.4. Safety is a Process
6.1.5. Classification of Information
6.1.6. Information Security Involves Risk Management
6.1.7. Security is Articulated with Security Controls
6.1.8. Security is both Physical and Logical
6.1.9. Safety Involves People
6.2. The Information Security Professional
6.2.1. Introduction
6.2.2. Information Security as a Profession
6.2.3. Certifications (ISC)2
6.2.4. The ISO 27001 Standard
6.2.5. Best Security Practices in IT Service Management
6.2.6. Information Security Maturity Models
6.2.7. Other Certifications, Standards and Professional Resources
6.3. Access Control
6.3.1. Introduction
6.3.2. Access Control Requirements
6.3.3. Authentication Mechanisms
6.3.4. Authorization Methods
6.3.5. Access Accounting and Auditing
6.3.6. “Triple A" Technologies
6.4. Information Security Programs, Processes and Policies
6.4.1. Introduction
6.4.2. Security Management Programs
6.4.3. Risk Management
6.5. Business Continuity Plans
6.5.1. Introduction to BCPs
6.5.2. Phase I and II
6.5.3. Phase III and IV
6.5.4. Maintenance of the BCP
6.6. Procedures for the Correct Protection of the Company
6.6.1. DMZ Networks
6.6.2. Intrusion Detection Systems
6.6.3. Access Control Lists
6.6.4. Learning from the Attacker: Honeypot
6.7. Security Architecture Prevention
6.7.1. Overview. Activities and Layer Model
6.7.2. Perimeter Defence (Firewalls, WAFs, WAFs, IPS
6.7.3. Endpoint Defence (Equipment, Servers and Services)
6.8. Security Architecture Detection
6.8.1. Overview Detection and Monitoring
6.8.2. Logs, Encrypted Traffic Breaking, Recording and Siems
6.8.3. Alerts and Intelligence
6.9. Security Architecture Reaction
6.9.1. Reaction Products, Services and Resources
6.9.2. Incident Management
6.9.3. CERTS y CSIRTs
6.10. Security Architecture Recuperation
6.10.1. IT Resilience Solutions
6.10.2. Crisis Management and Governance
Module 7. Software Security
7.1. Problems of the Software Security
7.1.1. Introduction to the Problem of Software Safety
7.1.2. Vulnerabilities and their Classification
7.1.3. Secure Software Properties
7.1.4. References
7.2. Software Safety Design Principles
7.2.1. Introduction
7.2.2. Software Safety Design Principles
7.2.3. Types of S-SDLC
7.2.4. Software Safety in S-SDLC Phases
7.2.5. Methodologies and Standards
7.2.6. References
7.3. Software Lifecycle Safety in the Requirements and Design Phases
7.3.1. Introduction
7.3.2. Attack Modeling
7.3.3. Cases of Abuse
7.3.4. Safety Requirements Engineering
7.3.5. Risk Analysis Architectural
7.3.6. Design Patterns
7.3.7. References
7.4. Software Lifecycle Safety in the Coding, Testing and Operation Phases
7.4.1. Introduction
7.4.2. Risk-Based Safety Testing
7.4.3. Code Review
7.4.4. Penetration Test
7.4.5. Security Operations
7.4.6. External Review
7.4.7. References
7.5. Secure Coding Applications I
7.5.1. Introduction
7.5.2. Secure Coding Practices
7.5.3. Manipulation and Validation of Inputs
7.5.4. Memory Overflow
7.5.5. References
7.6. Secure Coding Applications II
7.6.1. Introduction
7.6.2. Integers Overflows, Truncation Errors and Problems with Type Conversions between Integers
7.6.3. Errors and Exceptions
7.6.4. Privacy and Confidentiality
7.6.5. Privileged Programs
7.6.6. References
7.7. Development and Cloud Security
7.7.1. Safety in Development; Methodology and Practice
7.7.2. PaaS, IaaS, CaaS and SaaS Models
7.7.3. Security in the Cloud and for Cloud Services
7.8. Encryption
7.8.1. Fundamentals of Cryptology
7.8.2. Symmetric and Asymmetric Encryption
7.8.3. Encryption at Rest and in Transit
7.9. Security Automation and Orchestration (SOAR)
7.9.1. Complexity of Manual Processing; Need to Automate Tasks
7.9.2. Products and Services
7.9.3. SOAR Architecture
7.10. Telework Safety
7.10.1. Need and Scenarios
7.10.2. Products and Services
7.10.3. Telework Safety
Module 8. Web Server Administration
8.1. Introduction to Web Servers
8.1.1. What is a Web Server?
8.1.2. Architecture and Operation of a Web Server
8.1.3. Resources and Contents on a Web Server
8.1.4. Application Servers
8.1.5. Proxy Servers
8.1.6. Main Web Servers on the Market
8.1.7. Web Server Usage Statistics
8.1.8. Web Server Security
8.1.9. Load Balancing on Web Servers
8.1.10. References
8.2. HTTP Protocol Handling
8.2.1. Operation and Structure
8.2.2. Request Methods
8.2.3. Status Codes
8.2.4. Headers
8.2.5. Content Coding Code Pages
8.2.6. Performing HTTP Requests on the Internet using a Proxy, Livehttpheadersor Similar Method, Analyzing the Protocol Used
8.3. Description of Distributed Multi-Server Architectures
8.3.1. 3-Layer Model
8.3.2. Fault Tolerance
8.3.3. Load Sharing
8.3.4. Session State Stores
8.3.5. Cache Stores
8.4. Internet Information Services (IIS)
8.4.1. What is IIS?
8.4.2. History and Evolution of IIS
8.4.3. Main Advantages and Features of IIS7 and Later Versions
8.4.4. IIS7 Architecture and Later Versions
8.5. IIS Installation, Administration and Configuration
8.5.1. Preamble
8.5.2. Internet Information Services (IIS) Installation
8.5.3. IIS Administration Tools
8.5.4. Web Site Creation, Configuration and Administration
8.5.5. Installation and Management of IIS Extensions
8.6. Advanced Security in IIS
8.6.1. Preamble
8.6.2. Authentication, Authorization, and Access Control in IIS
8.6.3. Configuring a Secure Website on IIS with SSL
8.6.4. Security Policies Implemented in IIS 8.x
8.7. Introduction to Apache
8.7.1. What is Apache?
8.7.2. Main Advantages of Apache
8.7.3. Main Features of Apache
8.7.4. Architecture
8.8. Apache Installation and Configuration
8.8.1. Initial Installation of Apache
8.8.2. Apache Configuration
8.9. Installation and Configuration of the Different Apache Modules
8.9.1. Apache Module Installation
8.9.2. Types of Modules
8.9.3. Secure Apache Configuration
8.10. Advanced Security
8.10.1. Authentication, Authorization and Access Control
8.10.2. Authentication Methods
8.10.3. Secure Apache Configuration with SSL
Module 9. Security Audit
9.1. Introduction to Information Systems in the Company
9.1.1. Introduction to Information Systems in the Company and the Role of IT Auditing
9.1.2. Definitions of "IT Audit" and "IT Internal Control"
9.1.3. Functions and Objectives of IT Auditing
9.1.4. Differences between Internal Control and IT Auditing
9.2. Internal Controls of Information Systems
9.2.1. Functional Flowchart of a Data Processing Center
9.2.2. Classification of Information Systems Controls
9.2.3. The Golden Rule
9.3. The Process and Phases of the Information Systems Audit
9.3.1. Risk Assessment and Other IT Auditing Methodologies
9.3.2. Execution of an Information Systems Audit. Phases of the Audit
9.3.3. Fundamental Skills of the Auditor of an IT System
9.4. Technical Audit of Security in Systems and Networks
9.4.1. Technical Security Audits. Intrusion Test. Previous Concepts
9.4.2. Security Audits in Systems. Support Tools
9.4.3. Security Audits in Networks. Support Tools
9.5. Technical Audit of Security on the Internet and in Mobile Devices
9.5.1. Internet Security Audit. Support Tools
9.5.2. Mobile Devices Security Audit. Support Tools
9.5.3. Annex 1. Structure of an Executive Report and Technical Report
9.5.4. Annex 2. Tools Inventory
9.5.5. Annex 3. Methods
9.6. Information Security Management System
9.6.1. Security of IS: Properties and Influential Factors
9.6.2. Business Risks and Risk Management: Implementing Controls
9.6.3. Information Security Management System (ISMS): Concept and Critical Success Factors
9.6.4. ISMS-PDCA Model
9.6.5. ISMS ISO-IEC 27001: Organizational Context
9.6.6. Annex 4. Context of the Organization
9.6.7. Annex 5. Leadership.
9.6.8. Annex 6. Planning
9.6.9. Annex 7. Support
9.6.10. Annex 8. Operation
9.6.11. Annex 9. Performance Evaluation
9.6.12. Annex 10. Improvement
9.6.13. Annex to ISO 27001/ISO-IEC 27002: Objectives and Controls
9.6.14. ISMS Audit
9.7. Carrying Out the Audit
9.7.1. Procedures
9.7.2. Techniques
9.8. Traceability
9.8.1. Methods
9.8.2. Analysis
9.9. Copyright
9.9.1. Techniques
9.9.2. Results
9.10. Reports and Presenting Proof
9.10.1. Types of Reports
9.10.2. Data Analysis
9.10.3. Presenting Proof
Module 10. Online Application Security
10.1. Vulnerabilities and Security Issues in Online Applications
10.1.1. Introduction to Online Application Security
10.1.2. Security Vulnerabilities in the Design of Web Applications
10.1.3. Security Vulnerabilities in the Implementation of Web Applications
10.1.4. Security Vulnerabilities in the Deployment of Web Applications
10.1.5. Official Lists of Security Vulnerabilities
10.2. Policies and Standards for Online Application Security
10.2.1. Pillars for the Security of Online Applications
10.2.2. Information Security Management System
10.2.3. Secure Software Development Life Cycle
10.2.4. Standards for Application Security
10.3. Security in the Design of Web Applications
10.3.1. Introduction to Web Application Security
10.3.2. Security in the Design of Web Applications
10.4. Testing the Online Safety and Security of Web Applications
10.4.1. Web Application Security Testing and Analysis
10.4.2. Web Application Deployment and Production Security
10.5. Web Services Security
10.5.1. Introduction to Web Services Security
10.5.2. Web Services Security Functions and Technologies
10.6. Testing the Online Safety and Security of Web Services
10.6.1. Evaluation of Web Services Security
10.6.2. Online Protection. Firewalls and XML Gateways
10.7. Ethical Hacking, Malware and Forensics
10.7.1. Ethical Hacking
10.7.2. Malware Analysis
10.7.3. Forensic Analysis
10.8. Incident Resolution on Web Services
10.8.1. Monitoring
10.8.2. Performance Measurement Tools
10.8.3. Containment Measures
10.8.4. Root Cause Analysis
10.8.5. Proactive Problem Management
10.9. Best Practices to ensure Application Security
10.9.1. Handbook of Best Practices in the Development of Online Applications
10.9.2. Handbook of Good Practices in the Implementation of Online Applications
10.10. Common Errors that Undermine Application Security
10.10.1. Common Errors in Development
10.10.2. Common Errors in Hosting
10.10.3. Common Production Errors
A unique, key, and decisive educational experience to boost your professional development”
Professional Master's Degree in Software Engineering and Computer Systems
.
The Professional Master's Degree created by TECH in Software Engineering and Computer Systems will grant the fundamental information of the area, as it refers to the processes of management and structuring of interactive programs, as well as delve into the new skills developed internationally, so that professionals fully embrace the competences of data organization and structuring. A practical perspective will be presented, delving into computer programming, fixing and planning of circuits; bearing in mind that training in specific knowledge with a fully structured and measurable approach is indispensable for the graduate to stand out in the labor market, thus being elements that will be incorporated in the academic course.
?
Study this Professional Master's Degree in Programming and Computer Science online
?
This program is developed over one year and consists of ten modules, in which methodologies, development and quality in software engineering, project management and security, programming platforms, computing on the web client, server administration, auditing, among other topics are studied in depth. All the above was designed with the objectives of acquiring new knowledge and skills in terms of new technologies on information systems, topics evidenced in the simulated cases, based on real situations in which you must investigate, establish one or more hypotheses and, finally, provide a solution to what was raised in principle.
Course this Professional Master's Degree online
?
In the academic course, a learning modality will be implemented in which it is intended to retain as long as possible what has been learned throughout the Professional Master's Degree, you will find study material, interactive summaries, lectures, the testing and retesting system and additional readings; methodology designed in a spiral and non-linear process of understanding where we learn, unlearn, forget and relearn. All of the above is carried out through the e-learning training strategy, where you can choose with greater flexibility the place and time of study, since there is asynchronous and offline content in the web classroom, it is only necessary to access from a digital device such as a computer, a tablet or a smartphone. Finally, the faculty is composed of experts in this area of knowledge and in the applied teaching of multimedia study.