Description

We have highly qualified teachers and the most complete syllabus on the market, which allows us to offer you education of the highest academic level”  

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education. 

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system. 
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives prepared each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent.
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.

TECH students represent more than 200 different nationalities.  
##IMAGE##
human icon

Learn with the best

In the classroom, TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (postgraduate learning methodology with the best international valuation) with the Case Study. Tradition and vanguard in a difficult balance, and in the context of the most demanding educational itinerary. 

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.   

At TECH, you will have access to the most rigorous and up-to-date case analyses in academia” 

Syllabus

This TECH program has been designed to meet the specialization needs of business professionals who wish to expand their knowledge of computer security, a fundamental qualification to protect from potential threats that can pose great risks to any company. This Postgraduate diploma in Defensive Cybersecurity will allow them to acquire specific knowledge that can be applied to their work practice to prevent potential cyberattacks. 

A study plan oriented to favor your training in cybersecurity processes”  

Syllabus

The Postgraduate diploma in Defensive Cybersecurity is an intensive program that prepares students to face challenges and business decisions in computer security. Its content is designed to promote the development of managerial skills that enable more rigorous decision-making in uncertain environments. 

Throughout 600 hours of study, students will study a multitude of practical cases through individual work, which will allow them to acquire the necessary skills to successfully develop in their daily practice. It is, therefore, an authentic immersion in real business situations.  

This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective. 

A plan designed for students, focused on their professional development, which prepares them to achieve excellence in the field of computer security management and administration. A program that understands your needs and those of your company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty, which will provide you with the skills to solve critical situations in a creative and efficient way.

This Postgraduate diploma takes place over six months and is divided into four modules: 

Module 1. Host Security

Module 2. Network Security (Perimeter)

Module 3. Smartphone Security

Module 4. IoT Security

##IMAGE##

Where, When and How is it Taught?

TECH offers students the opportunity  to take this Postgraduate diploma in Defensive Cybersecurity entirely online. Throughout the 6 months of the educational program, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.

Module 1. Host Security 

1.1.Backup Copies  

1.1.1. Backup Strategies 
1.1.2. Tools for Windows 
1.1.3. Tools for Linux 
1.1.4. Tools for MacOS 

1.2. User Antivirus 

1.2.1. Types of Antivirus 
1.2.2. Antivirus for Windows 
1.2.3. Antivirus for Linux 
1.2.4. Antivirus for MacOS 
1.2.5. Antivirus for Smartphones 

1.3. Intrusion Detection-HIDS 

1.3.1. Intrusion Detection Methods 
1.3.2. Sagan 
1.3.3. Aide 
1.3.4. Rkhunter 

1.4. Local Firewall 

1.4.1. Firewalls for Windows 
1.4.2. Firewalls for Linux 
1.4.3. Firewalls for MacOS 

1.5. Password Managers 

1.5.1. Password 
1.5.2. LastPass 
1.5.3. KeePass 
1.5.4. StickyPassword 
1.5.5. RoboForm 

1.6. Phishing Detectors 

1.6.1. Manually Detecting Phishing 
1.6.2. Antiphishing Tools 

1.7. Spyware 

1.7.1. Avoidance Mechanisms 
1.7.2. Antispyware Tools 

1.8.Trackers 

1.8.1.Measures to Protect the System 
1.8.2.Anti-tracking Tools 

1.9. EDR - End Point Detection and Response 

1.9.1. EDR System Behavior 
1.9.2. Differences between EDR and Antivirus 
1.9.3. The Future of EDR Systems

1.10. Control over Software Installation 

1.10.1.Repositories and Software Stores 
1.10.2.Lists of Permitted or Prohibited Software 
1.10.3.Update Criteria 
1.10.4.Software Installation Privileges 

Module 2. Network Security (Perimeter)

2.1. Threat Detection and Prevention Systems 

2.1.1.General Framework for Security Incidents 
2.1.2.Current Defense Systems: Defense in Depth and SOC 
2.1.3.Current Network Architectures 
2.1.4.Types of Tools for Incident Detection and Prevention 

2.1.4.1.Network-Based Systems 
2.1.4.2.Host-Based Systems 
2.1.4.3.Centralized Systems 

2.1.5.Instance/Hosts, Container and Serverless Communication and Detection 

2.2. Firewall 

2.2.1.Types of Firewalls 
2.2.2.Attacks and Mitigation 
2.2.3.Common Firewalls in Linux Kernel 

2.2.3.1.UFW 
2.2.3.2.Nftables and Iptables 
2.2.3.3.Firewalls 

2.2.4.Detection Systems Based on System Logs 

2.2.4.1.TCP Wrappers 
2.2.4.2.BlockHosts and DenyHosts 
2.2.4.3.Fai2ban 

2.3.Intrusion Detection and Prevention Systems (IDS/IPS) 

2.3.1.Attacks on IDS/IPS 
2.3.2.IDS/IPS Systems 

2.3.2.1.Snort 
2.3.2.2.Suricata

2.4. Next Generation Firewalls (NGFW) 

2.4.1.Differences between NGFW and Traditional Firewalls 
2.4.2.Main Capabilities 
2.4.3.Commercial Solutions 
2.4.4.Firewalls for Cloud Services 

2.4.4.1.Virtual Private Cloud (VPC) Architecture 
2.4.4.2.ACLs Cloud 
2.4.4.3.Security Group 

2.5. Proxy 

2.5.1. Types of Proxy 
2.5.2. Uses of Proxies Advantages and Disadvantages 

 2.6. Antivirus Motors 

2.6.1. General Context of Malware and IOCs 
2.6.2. Antivirus Engine Problems

2.7. Email Protection Systems 

2.7.1.Antispam 

2.7.1.1.Black and White Lists 
2.7.1.2.Bayesian Filters 

2.7.2.Mail Gateway (MGW ) 

2.8. SIEM 

2.8.1. Components and Architecture 
2.8.2. Correlation Rules and Use Cases 
2.8.3. Current Challenges of SIEM Systems 

2.9. SOAR 

2.9.1. SOAR and SIEM: Enemies or Allies 
2.9.2. The Future of SOAR Systems 

2.10. Others Network-Based Systems 

2.10.1.WAF 
2.10.2.NAC 
2.10.3.HoneyPots and HoneyNets 
2.10.4.CASB 

Module 3. Smartphone Security

3.1. The World of Mobile Devices 

3.1.1. Types of Mobile Platforms 
3.1.2. IoS Devices 
3.1.3. Android Devices 

3.2.Mobile Security Management 

3.2.1.OWASP Mobile Security Projects 

3.2.1.1.Top 10 Vulnerabilities 
3.2.2.Communications, Networks and Connection Modes 

3.3. The Mobile Device in the Enterprise Environment 

3.3.1. Risk 
3.3.2. Security Policies 
3.3.3. Device Monitoring 
3.3.4. Mobile Device Management (MDM) 

3.4. User Privacy and Data Security 

3.4.1.Statements of Information 

3.4.1.1.Licences 
3.4.1.2.Encryption 

3.4.2.Secure Data Storage 

3.4.2.1.Secure Storage on iOS 
3.4.2.2.Secure Storage on Android 
3.4.3.Best Practices in Application Development

3.5.Vulnerabilities and Attack Vectors 

3.5.1.Vulnerabilities 
3.5.2.Attack Vectors 

3.5.2.1. Malware 
3.5.2.2. Data Exfiltration 
3.5.2.3. Data Manipulation 

3.6. Main Threats 

3.6.1. Unforced User 
3.6.2. Malware 

3.6.2.1. Types of Malware

3.6.3. Social Engineering 
3.6.4. Data Leakage 
3.6.5. Information Theft 
3.6.6. Unsecured Wi-Fi Networks 
3.6.7. Outdated Software 
3.6.8. Malicious Applications 
3.6.9. Insecure Passwords 
3.6.10. Weak or Non-Existent Security Configuration 
3.6.11. Physical Access 
3.6.12. Loss or Theft of the Device 
3.6.13. Identity Theft (Integrity) 
3.6.14. Weak or Broken Cryptography 
3.6.15. Denial of Service (DoS) 

3.7. Main Attacks 

3.7.1. Phishing Attacks 
3.7.2. Attacks Related to Communication Modes 
3.7.3. Smishing Attacks 
3.7.4. Cryptojacking Attacks 
3.7.5. Man in the Middle 

3.8. Hacking 

3.8.1.Rooting and Jailbreaking 
3.8.2.Anatomy of a Mobile Attack 

3.8.2.1.Threat Propagation 
3.8.2.2.Malware Installation on Devices 
3.8.2.3.Persistence 
3.8.2.4.Payload Execution and Information Extraction 

3.8.3.Hacking on iOS Devices: Mechanisms and Tools 
3.8.4.Hacking on Android Devices: Mechanisms and Tools 

3.9. Penetration Testing 

3.9.1. iOS PenTesting 
3.9.2. Android PenTesting 
3.9.3. Tools 

3.10. Protections and Security 

3.10.1. Security Configuration 

3.10.1.1. On iOS Devices 
3.10.1.2. On Android Devices 

3.10.2. Safety Measures 
3.10.3. Protection Tools 

Module 4. IoT Security

4.1.Devices 

4.1.1.Types of Devices 
4.1.2.Standardized Architecture 

4.1.2.1. ONEM2M 
4.1.2.2. IoTWF 

4.1.3.Application Protocols 
4.1.4.Connectivity Technologies 

4.2. IoT Devices. Areas of Application 

4.2.1. SmartHome 
4.2.2. SmartCity 
4.2.3. Transportation 
4.2.4. Wearables 
4.2.5. Health Sector 
4.2.6. IioT 

4.3. Communication Protocols 

4.3.1. MQTT 
4.3.2. LWM2M 
4.3.3. OMA-DM 
4.3.4. TR-069 

4.4. SmartHome 

4.4.1. Home Automation 
4.4.2. Networks 
4.4.3. Household Appliances 
4.4.4. Surveillance and Security 

4.5. SmartCity

4.5.1. Lighting 
4.5.2. Meteorology 
4.5.3. Security/Safety 

4.6. Transportation 

4.6.1. Localization 
4.6.2. Making Payments and Obtaining Services 
4.6.3. Connectivity 

4.7. Wearables 

4.7.1. Smart Clothing 
4.7.2. Smart Jewelry 
4.7.3. Smart Watches 

4.8. Health Sector 

4.8.1. Exercise/Heart Rate Monitoring 
4.8.2. Monitoring of Patients and Elderly People 
4.8.3. Implantable 
4.8.4. Surgical Robots 

4.9. Connectivity 

4.9.1. Wi-Fi/Gateway 
4.9.2. Bluetooth 
4.9.3. Built-in Connectivity 

4.10. Securitization 

4.10.1. Dedicated Networks 
4.10.2. Password Manager 
4.10.3. Use of Encrypted Protocols 
4.10.4. Tips for Use 

##IMAGE##

With this program you will be aware of the most effective methods used for the prevention and elimination of bacteria in wines”

Postgraduate Diploma in Defensive Cybersecurity 

The daily use of the Internet has become an essential part of life in most advanced societies. Citizens use digital tools for various daily tasks, which has led to great advances in business. As a result, hackers have found in the network a new way to operate, which endangers virtually all companies. As a result, company managers are obliged to acquire advanced knowledge in order to act defensively against possible attacks and to implement preventive measures to avoid these threats. To meet this need for specialization on the part of business professionals, TECH has designed the Postgraduate Diploma in Defensive Cybersecurity, which will provide you with top-level skills in this field.

Specialize in Defensive Cybersecurity in just 6 months

Do you want to know the latest techniques to ensure security and prevent attacks on hosts, networks, smartphones or IoT? You're in luck! The Postgraduate Diploma in Defensive Cybersecurity has been developed to provide you with this comprehensive knowledge. Its fully online methodology will allow you to study 24 hours a day and from anywhere, with any electronic device with an Internet connection. In addition, the approach using multimedia formats such as video or interactive summary makes learning more attractive and effective. In addition, the program is designed by the best experts in the field, who have created a comprehensive syllabus that will provide you with content applicable in real work situations.