Why study at TECH?

Enhance your skills in Cybersecurity Management thanks to 10 Masterclasses given by an internationally renowned specialist"

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class centre for intensive managerial skills training.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that combines the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.  
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives trained each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent. 
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea. 

TECH students represent more than 200 different nationalities.   
##IMAGE##
human icon

Learn with the best

In the classroom, TECH teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (a postgraduate learning methodology with the highest international rating) with the Case Study. A complex balance between tradition and state-of-the-art, within the context of the most demanding academic itinerary.  

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.  

At TECH, you will have access to the most rigorous and up-to-date case studies in the academic community”

Syllabus

This TECH program has been designed to meet the specialization needs of business professionals who wish to expand their knowledge of computer security, a fundamental qualification to protect from potential threats that can pose great risks to any company. Therefore, this MBA will allow them to acquire specific knowledge that they can immediately apply to their work practice. And, to do so, they will use a totally online methodology so they can balance their studies with the rest of their daily obligations.

This program will be essential to detect possible cyber-attacks in your company"  

Syllabus

TECH Global University's Cybersecurity Management (CISO , Chief Information Security Officer) is an intensive program designed to foster the development of managerial skills that will allow for decision making with greater rigor in uncertain environments.

Throughout 1,500 hours of study, students will acquire the necessary skills to develop successfully in their daily practice.  It is, therefore, an authentic immersion in real business situations.

This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective.

A plan designed for students, focused on their professional development, which prepares them to achieve excellence in the field of computer security management and administration. A program that understands their needs and those of their company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty. 

To all this, we must add 10 exclusive Masterclasses that are part of the didactic materials, at the forefront of technology and education. These lessons have been designed by an internationally renowned specialist in Intelligence, Cybersecurity and Disruptive Technologies. Useful resources that will help executive professionals to specialize in Cybersecurity Management and effectively manage the departments of their company dedicated to this important area.

The program takes place over 12 months and is divided into 15 modules:  

Module 1. Cyberintelligence and Cybersecurity
Module 2. Host Security
Module 3. Network Security (Perimeter)
Module 4. Smartphones Security
Module 5. IoT Security
Module 6. Ethical Hacking
Module 7. Inverse Engineering
Module 8. Secure Development
Module 9. Forensic Analysis
Module 10. Current and Future Challenges in Computer Security
Module 11. Leadership, Ethics and Social Responsibility in Companies
Module 12. People and Talent Management
Module 13. Economic and Financial Management 
Module 14. Commercial and  Strategic Marketing Management 
Module 15. Executive Management

##IMAGE##

Where, When and How is it Taught?

TECH offers its students the possibility of taking this program completely online. During the 12 months that the program lasts, you will be they can to access all the contents of this program at any time, which will allow them to self-manage their study time. 

Module 1. Cyberintelligence and Cybersecurity

1.1. Cyberintelligence

1.1.1. Cyberintelligence

1.1.1.1. Intelligence 

1.1.1.1.1. Intelligence Cycle 

1.1.1.2. Cyberintelligence 
1.1.1.3. Cyberintelligence and Cybersecurity

1.1.2. The Intelligence Analyst

1.1.2.1. The Role of the Intelligence Analyst
1.1.2.2. The Intelligence Analyst's Biases in Evaluative Activity

1.2. Cybersecurity 

1.2.1. Layers of Security
1.2.2. Identification of Cyber Threats

1.2.2.1. External Threats 
1.2.2.2. Internal Threats

1.2.3. Adverse Actions

1.2.3.1. Social Engineering 
1.2.3.2. Commonly Used Methods

1.3. Techniques and Tools of Intelligences

1.3.1. OSINT
1.3.2. SOCMINT
1.3.3. HUMIT
1.3.4. Linux Distributions and Tools
1.3.5. OWISAM
1.3.6. OWISAP
1.3.7. PTES
1.3.8. OSSTM

1.4. Evaluation Methodologies 

1.4.1. Intelligence Analysis
1.4.2. Techniques for Organizing Acquired Information
1.4.3. Reliability and Credibility of Information Sources
1.4.4. Analysis Methodologies 
1.4.5. Presentation of Intelligence Results

1.5. Audits and Documentation 

1.5.1. IT Security Audit 
1.5.2. Documentation and Permissions for Audit 
1.5.3. Types of Audits
1.5.4. Deliverables

1.5.4.1. Technical Report 
1.5.4.2. Executive Report

1.6. Anonymity in the Network

1.6.1. Use of Anonymity 
1.6.2. Anonymity Techniques (Proxy, VPN)
1.6.3. TOR, Freenet and IP2 Networks

1.7. Threats and Types of Security

1.7.1. Types of Threats
1.7.2. Physical Security
1.7.3. Network Security
1.7.4. Logical Security
1.7.5. Web Application Security
1.7.6. Security on Mobile Devices

1.8. Regulations and Compliance 

1.8.1. The GDPR
1.8.2. ISO 27000 Family
1.8.3. NIST Cybersecurity Framework
1.8.4. PIC
1.8.5. ISO 27032
1.8.6. Cloud Regulations
1.8.7. SOX
1.8.8. ICP

1.9. Risk Analysis and Metrics 

1.9.1. Extent of Risk 
1.9.2. The Assets
1.9.3. Threats
1.9.4. Vulnerabilities 
1.9.5. Risk Evaluation 
1.9.6. Risk Treatment

1.10. Important Cybersecurity Agencies

1.10.1. NIST
1.10.2. OEA
1.10.3. UNASUR-PROSUR

Module 2. Host Security

2.1. Backup Copies

2.1.1. Backup Strategies 
2.1.2. Tools for Windows
2.1.3. Tools for Linux
2.1.4. Tools for MacOS

2.2. User Antivirus 

2.2.1. Types of Antivirus
2.2.2. Antivirus for Windows
2.2.3. Antivirus for Linux
2.2.4. Antivirus for MacOS
2.2.5. Antivirus for Smartphones

2.3. Intrusion Detection-HIDS 

2.3.1. Intrusion Detection Methods
2.3.2. Sagan
2.3.3. Aide
2.3.4. Rkhunter

2.4. Local Firewall 

2.4.1. Firewalls for Windows
2.4.2. Firewalls for Linux
2.4.3. Firewalls for MacOS 

2.5. Password Managers 

2.5.1. Password 
2.5.2. LastPass
2.5.3. KeePass
2.5.4. StickyPassword
2.5.5. RoboForm

2.6. Detectors for Phishing 

2.6.1. Manual Phishing Detection 
2.6.2. Antiphishing Tools

2.7. Spyware 

2.7.1. Avoidance Mechanisms 
2.7.2. Antispyware Tools

2.8. Trackers

2.8.1. Measures to Protect the System
2.8.2. Anti-tracking Tools

2.9. EDR- End point Detection and Response

2.9.1. EDR System Behavior 
2.9.2. Differences between EDR and Antivirus
2.9.3. The Future of EDR Systems

2.10. Control Over Software Installation

2.10.1. Repositories and Software Stores
2.10.2. Lists of Permitted or Prohibited Software
2.10.3. Update Criteria
2.10.4. Software Installation Privileges

Module 3. Network Security (Perimeter)  

3.1. Threat Detection and Prevention Systems

3.1.1. General Framework for Security Incidents
3.1.2. Current Defense Systems: Defense in Depth and SOC
3.1.3. Current Network Architectures
3.1.4. Types of Tools for Incident Detection and Prevention 

3.1.4.1. Network-based Systems 
3.1.4.2. Host-Based Systems 
3.1.4.3. Centralized Systems

3.1.5. Instance/Hosts, Container and Serverless Communication and Detection

3.2. Firewall 

3.2.1. Types of Firewalls
3.2.2. Attacks and Mitigation 
3.2.3. Common Firewalls in Linux Kernel

3.2.3.1. UFW 
3.2.3.2. Nftables and Iptables 
3.2.3.3. Firewalls 

3.2.4. Detection Systems Based on System Logs

3.2.4.1. TCP Wrappers 
3.2.4.2. BlockHosts and DenyHosts 
3.2.4.3. Fai2ban.

3.3. Intrusion Prevention and Detection Systems (IDS/ IPS)

3.3.1. Attacks on IDS/IPS
3.3.2. IDS/IPS Systems

3.3.2.1. Snort 
3.3.2.2. Suricata

3.4. Next Generation Firewalls (NGFW)

3.4.1. Differences between NGFW and Traditional Firewall 
3.4.2. Main Capabilities
3.4.3. Commercial Solutions
3.4.4. Firewalls for Cloud Services

3.4.4.1. Virtual Private Cloud (VPC) Architecture 
3.4.4.2. ACLs Cloud 
3.4.4.3. Security Group

3.5. Proxy

3.5.1. Types of Proxy 
3.5.2. Uses of Proxies Advantages and Disadvantages 

3.6. Antivirus Engines 

3.6.1. General Context of Malware and IoCs 
3.6.2. Antivirus Engine Problems

3.7. Email Protection Systems

3.7.1. Antispam

3.7.1.1. Black and White Lists 
3.7.1.2. Bayesian Filters

3.7.2. Mail Gateway (MGW)

3.8. SIEM 

3.8.1. Components and Architecture
3.8.2. Correlation Rules and Use Cases
3.8.3. Current Challenges in SIEM Systems

3.9. SOAR

3.9.1. SOAR and SIEM: Friends or Foes
3.9.2. The Future of SOAR Systems

3.10. Other Network-Based Systems

3.10.1. WAF
3.10.2. NAC
3.10.3. HoneyPots and HoneyNets
3.10.4. CASB

Module 4. Smartphone Security   

4.1. The World of Mobile Devices 

4.1.1. Types of Mobile Platforms
4.1.2. IoS Devices 
4.1.3. Android Devices

4.2. Mobile Security Management

4.2.1. OWASP Mobile Security Projects

4.2.1.1. Top 10 Vulnerabilities

4.2.2. Communications, Networks and Connection Modes

4.3. Mobile Devices in Business Environments

4.3.1. Risk
4.3.2. Security Policies
4.3.3. Device Monitoring
4.3.4. Mobile Device Management (MDM)

4.4. User Privacy and Data Security

4.4.1. Statements of Information
4.4.2. Data Protection and Confidentiality

4.4.2.1. Licences 
4.4.2.2. Encryption 

4.4.3. Secure Data Storage

4.4.3.1. Secure Storage on iOS 
4.4.3.2. Secure Storage on Android

4.4.4. Best Practices in Application Development

4.5. Vulnerabilities and Attack Vectors 

4.5.1. Vulnerabilities 
4.5.2. Attack Vectors

4.5.2.1. Malware 
4.5.2.2. Data Exfiltration 
4.5.2.3. Data Manipulation

4.6. Main Threats

4.6.1. Unforced User
4.6.2. Malware

4.6.2.1. Types of Malware

4.6.3. Social Engineering 
4.6.4. Data Leakage
4.6.5. Information Theft
4.6.6. Unsecured Wi-Fi Networks
4.6.7. Outdated Software
4.6.8. Malicious Applications
4.6.9. Insecure Passwords
4.6.10 Weak or No Security Configuration
4.6.11. Physical Access
4.6.12. Loss or Theft of the Device
4.6.13. Identity Theft (Integrity)
4.6.14. Weak or Broken Cryptography
4.6.15. Denial of Service (DoS)

4.7. Main Attacks

4.7.1. Phishing Attacks
4.7.2. Attacks Related to Communication Modes 
4.7.3. Smishing Attacks
4.7.4. Criptojacking Attacks
4.7.5. Man in The Middle

4.8. Hacking

4.8.1. Rooting and Jailbreaking
4.8.2. Anatomy of a Mobile Attack

4.8.2.1. Threat Propagation 
4.8.2.2. Malware Installation on Devices 
4.8.2.3. Persistence 
4.8.2.4. Payload Execution and Information Extraction

4.8.3. Hacking on iOS Devices: Mechanisms and Tools
4.8.4. Hacking Android Devices: Mechanisms and Tools

4.9. Penetration Testing

4.9.1. iOS PenTesting  
4.9.2. Android PenTesting
4.9.3. Tools

4.10. Safety and Security 

4.10.1. Security Configuration

4.10.1.1. On iOS Devices 
4.10.1.2. On Android Devices

4.10.2. Safety Measures 
4.10.3. Protection Tools

Module 5. IoT Security

5.1. Devices

5.1.1. Types of Devices
5.1.2. Standardized Architectures

5.1.2.1. ONEM2M 
5.1.2.2. IoTWF

5.1.3. Application Protocols
5.1.4. Connectivity Technologies

5.2. IoT Devices. Areas of Application

5.2.1. SmartHome
5.2.2. SmartCity
5.2.3. Transportation
5.2.4. Wearables
5.2.5. Health Sector
5.2.6. IioT

5.3. Communication Protocols 

5.3.1. MQTT 
5.3.2. LWM2M.
5.3.3. OMA-DM
5.3.4. TR-069.

5.4. SmartHome 

5.4.1. Home Automation
5.4.2. Networks
5.4.3. Household Appliances
5.4.4. Surveillance and Security

5.5. SmartCity

5.5.1. Lighting
5.5.2. Meteorology 
5.5.3. Security

5.6. Transportation

5.6.1. Localization 
5.6.2. Making Payments and Obtaining Services
5.6.3. Connectivity

5.7. Wearables

5.7.1. Smart Clothing 
5.7.2. Smart Jewelry
5.7.3. Smart Watches

5.8. Health Sector 

5.8.1. Exercise/Heart Rate Monitoring 
5.8.2. Monitoring of Patients and Elderly People
5.8.3. Implantable 
5.8.4. Surgical Robots

5.9. Connectivity 

5.9.1. Wi-Fi/Gateway
5.9.2. Bluetooth
5.9.3. Built-in Connectivity 

5.10. Securitization 

5.10.1. Dedicated Networks
5.10.2. Password Managers
5.10.3. Use of Encrypted Protocols
5.10.4. Tips for Use

Module 6. Ethical Hacking

6.1. Work Environment

6.1.1. Linux Distributions

6.1.1.1. Kali Linux - Offensive Security 
6.1.1.2. Parrot OS 
6.1.1.3. Ubuntu

6.1.2. Virtualization Systems
6.1.3. Sandbox
6.1.4. Deployment of Laboratories 

6.2. Methods 

6.2.1. OSSTM
6.2.2. OWASP
6.2.3. NIST
6.2.4. PTES
6.2.5. ISSAF

6.3. Footprinting

6.3.1. Open-Source Intelligence (OSINT)
6.3.2. Search for Data Breaches and Vulnerabilities
6.3.3. Use of Passive Tools

6.4. Network Scanning

6.4.1. Scanning Tools

6.4.1.1. Nmap 
6.4.1.2. Hping3
6.4.1.3. Other Scanning Tools

6.4.2. Scanning Techniques
6.4.3. Firewall and IDS Evasion Techniques
6.4.4. Banner Grabbing
6.4.5. Network Diagrams

6.5. Enumeration

6.5.1. SMTP Enumeration
6.5.2. DNS Enumeration
6.5.3. NetBIOS and Samba Enumeration
6.5.4. LDAP Enumeration
6.5.5. SNMP Enumeration
6.5.6. Other Enumeration Techniques

6.6. Vulnerability Analysis

6.6.1. Vulnerability Scanning Solutions

6.6.1.1. Qualys 
6.6.1.2. Nessus 
6.6.1.3. CFI LanGuard

6.6.2. Vulnerability Scoring Systems

6.6.2.1. CVSS 
6.6.2.2. CVE 
6.6.2.3. NVD

6.7. Attacks on Wireless Networks

6.7.1. Methodology of Hacking in Wireless Networks

6.7.1.1. Wi-Fi Discovery 
6.7.1.2. Traffic Analysis 
6.7.1.3. Aircrack Attacks 

6.7.1.3.1. WEP Attacks 
6.7.1.3.2. WPA/WPA2 Attacks 

6.7.1.4. Evil Twin Attacks 
6.7.1.5. Attacks on WPS 
6.7.1.6. Jamming

6.7.2. Tools for Wireless Security

6.8. Hacking of Web Servers

6.8.1. Cross Site Scripting
6.8.2. CSRF
6.8.3. Session Hijacking 
6.8.4. SQLinjection

6.9. Exploiting Vulnerabilities

6.9.1. Use of Known Exploits
6.9.2. Use of Metasploit
6.9.3. Use of Malware

6.9.3.1. Definition and Scope 
6.9.3.2. Malware Generation 
6.9.3.3. Bypass of Antivirus Solutions

6.10. Persistence

6.10.1. Rootkits Installation
6.10.2. Use of Ncat
6.10.3. Use of Scheduled Tasks for Backdoors
6.10.4. User Creation
6.10.5. HIDS Detection

Module 7. Inverse Engineering

7.1. Compilers

7.1.1. Types of Codes
7.1.2. Phases of a Compiler
7.1.3. Table of Symbols
7.1.4. Error Manager
7.1.5. GCC Compiler

7.2. Types of Analysis in Compilers

7.2.1. Lexical Analysis

7.2.1.1. Terminology 
7.2.1.2. Lexical Components 
7.2.1.3. LEX Lexical Analyzer

7.2.2. Parsing

7.2.2.1. Context-free Grammars 
7.2.2.2. Types of Parsing

7.2.2.2.1. Top-down Analysis 
7.2.2.2.2. Bottom-up Analysis 

7.2.2.3. Syntactic Trees and Derivations 
7.2.2.4. Types of Parsers 

7.2.2.4.1. LR (Left To Right) Analyzers 
7.2.2.4.2. LALR Analyzers

7.2.3. Semantic Analysis

7.2.3.1. Attribute Grammars 
7.2.3.2. S-Attributed 
7.2.3.3. L-Attributed

7.3. Data Structures in Assembler 

7.3.1. Variables
7.3.2. Arrays
7.3.3. Pointers
7.3.4. Structures
7.3.5. Objects

7.4. Assembler Code Structures 

7.4.1. Selection Structures

7.4.1.1. If, else if, Else 
7.4.1.2. Switch

7.4.2. Iteration Structures

7.4.2.1. For 
7.4.2.2. While 
7.4.2.3. Use of Break

7.4.3. Functions

7.5. X86 Architecture Hardware

7.5.1. x86 Processor Architecture
7.5.2. x86 Data Structures
7.5.3. x86 Code Structures

7.6. ARM Hardware Architecture

7.6.1. ARM Processor Architecture
7.6.2. ARM Data Structures
7.6.3. ARM Code Structures

7.7. Static Code Analysis

7.7.1. Disassemblers
7.7.2. IDA
7.7.3. Code Rebuilders

7.8. Dynamic Code Analysis

7.8.1. Behavioral Analysis 

7.8.1.1. Communications 
7.8.1.2. Monitoring

7.8.2. Linux Code Debuggers
7.8.3. Windows Code Debuggers

7.9. Sandbox

7.9.1. Sandbox Architecture
7.9.2. Sandbox Evasion
7.9.3. Detection Techniques
7.9.4. Avoidance Techniques
7.9.5. Countermeasures
7.9.6. Sandbox in Linux
7.9.7. Sandbox in Windows
7.9.8. Sandbox in MacOS
7.9.9. Sandbox in android

7.10. Malware Analysis

7.10.1. Malware Analysis Methods
7.10.2. Malware Obfuscation Techniques

7.10.2.1. Executable Obfuscation 
7.10.2.2. Restriction of Execution Environments

7.10.3. Malware Analysis Tools

Module 8. Secure Development 

8.1. Secure Development

8.1.1. Quality, Functionality and Safety 
8.1.2. Confidentiality, Integrity and Availability
8.1.3. Software Development Life Cycle

8.2. Requirements Phase

8.2.1. Authentication Control
8.2.2. Role and Privilege Control
8.2.3. Risk-oriented Requirements
8.2.4. Privilege Approval

8.3. Analysis and Design Phases  

8.3.1. Component Access and System Administration
8.3.2. Audit Trails
8.3.3. Session Management
8.3.4. Historical data
8.3.5. Proper Error Handling
8.3.6. Separation of Functions

8.4. Implementation and Coding Phase

8.4.1. Ensuring the Development Environment
8.4.2. Preparation of Technical Documentation
8.4.3. Secure Codification
8.4.4. Communications Security

8.5. Good Secure Coding Practices

8.5.1. Input Data Validation
8.5.2. Coding of Output Data
8.5.3. Programming Style
8.5.4. Change Log Management
8.5.5. Cryptographic Practices
8.5.6. Error and Log Management
8.5.7. File Management
8.5.8. Memory Management
8.5.9. Standardization and Reuse of Security Functions

8.6. Server Preparation and Hardening 

8.6.1. Management of Users, Groups and Roles on the Server
8.6.2. Software Installation
8.6.3. Server Hardening
8.6.4. Robust Configuration of the Application Environment

8.7. DB Preparation and Hardening

8.7.1. DB Engine Optimization
8.7.2. Create Your Own User for the Application
8.7.3. Assigning the Required Privileges to the User
8.7.4. Hardening of the BBDD

8.8. Testing Phase

8.8.1. Quality Control in Security Controls 
8.8.2. Phased Code Inspection
8.8.3. Checking Configuration Management
8.8.4. Black Box Testing

8.9. Preparation of the Production Step 

8.9.1. Perform Change Control
8.9.2. Carry out Production Changeover Procedure
8.9.3. Perform Rollback Procedure 
8.9.4. Pre-production Testing 

8.10. Maintenance Phase

8.10.1. Risk-based Assurance
8.10.2. White Box Security Maintenance Testing
8.10.3. Black box Safety Maintenance Tests

Module 9. Forensic Analysis

9.1. Data Acquisition and Duplication

9.1.1. Volatile Data Acquisition

9.1.1.1. System Information 
9.1.1.2. Network Information 
9.1.1.3. Volatility Order

9.1.2. Static Data Acquisition

9.1.2.1. Creating a Duplicate Image 
9.1.2.2. Preparation of a Chain of Custody Document

9.1.3. Methods for Validation of Acquired Data

9.1.3.1. Methods for Linux 
9.1.3.2. Methods for Windows

9.2. Evaluation and Defeat of Anti-Forensic Techniques

9.2.1. Objectives of Anti-Forensic Techniques
9.2.2. Data Deletion

9.2.2.1. Deletion of Data and Files 
9.2.2.2. File Recovery 
9.2.2.3. Recovery of Deleted Partitions

9.2.3. Password Protection
9.2.4. Steganography
9.2.5. Secure Device Wiping
9.2.6. Encryption

9.3. Operating System Forensics

9.3.1. Windows Forensics
9.3.2. Linux Forensics
9.3.3. Mac Forensics

9.4. Network Forensics

9.4.1. Logs Analysis
9.4.2. Data Correlation
9.4.3. Network Research
9.4.4. Steps to Follow in Network Forensic Analysis

9.5. Web Forensics 

9.5.1. Investigation of Web Attacks 
9.5.2. Attack Detection 
9.5.3. IP Address Location

9.6. Forensic Database Analysis

9.6.1. Forensic Analysis in MSSQL
9.6.2. MySQL Forensic Analysis
9.6.3. PostgreSQL Forensic Analysis
9.6.4. Forensic Analysis in MongoDB

9.7. Cloud Forensic Analysis

9.7.1. Types of Crimes in the Cloud

9.7.1.1. Cloud as Subject 
9.7.1.2. Cloud as an Object 
9.7.1.3. Cloud as a Tool

9.7.2. Challenges of Cloud Forensics
9.7.3. Researching Storage Services on the Cloud
9.7.4. Forensic Analysis Tools for Cloud

9.8. Investigation of Email Crimes

9.8.1. Mailing Systems

9.8.1.1. Mail Clients 
9.8.1.2. Mail Server 
9.8.1.3. SMTP Server 
9.8.1.4. POP3 Server 
9.8.1.5. IMAP4 Server

9.8.2. Mailing Crimes
9.8.3. Mail Message

9.8.3.1. Standard Headers 
9.8.3.2. Extended Headers

9.8.4. Steps for the Investigation of these Crimes
9.8.5. E-Mail Forensic Tools

9.9. Mobile Forensic Analysis 

9.9.1. Cellular Networks

9.9.1.1. Types of Networks 
9.9.1.2. CDR Contents

9.9.2. Subscriber Identity Module (SIM)
9.9.3. Logical Acquisition
9.9.4. Physical Acquisition
9.9.5. File System Acquisition

9.10. Forensic Report Writing and Reporting

9.10.1. Important Aspects of a Forensic Report
9.10.2. Classification and Types of Reports
9.10.3. Guide to Writing a Report
9.10.4. Presentation of the Report

9.10.4.1. Prior Preparation for Testifying 
9.10.4.2. Deposition 
9.10.4.3. Dealing with the Media

Module 10. Current and Future Challenges in Information Security

10.1. Blockchain Technology

10.1.1. Scope of Application
10.1.2. Confidentiality Guarantee
10.1.3. Non-Repudiation Guarantee

10.2. Digital Money 

10.2.1. Bitcoins
10.2.2. Cryptocurrencies
10.2.3. Cryptocurrency Mining
10.2.4. Pyramid Schemes
10.2.5. Other Potential Crimes and Problems

10.3. Deepfake

10.3.1. Media Impact 
10.3.2. Dangers to Society
10.3.3. Detection Mechanisms

10.4. The Future of Artificial Intelligence 

10.4.1. Artificial Intelligence and Cognitive Computing
10.4.2. Uses to Simplify Customer Service

10.5. Digital Privacy 

10.5.1. Value of Data in the Network
10.5.2. Use of Data in the Network
10.5.3. Privacy and Digital Identity Management

10.6. Cyberconflicts, Cybercriminals and Cyberattacks 

10.6.1. The Impact of Cybersecurity on International Conflicts
10.6.2. Consequences of Cyber-attacks on the General Population.
10.6.3. Types of Cybercriminals. Protective Measures

10.7. Telework

10.7.1. Remote Work Revolution during and post COVID-19
10.7.2. Access Bottlenecks
10.7.3. Variation of the Attacking Surface
10.7.4. Workers' Needs

10.8. Emerging Wireless Technologies

10.8.1. WPA3
10.8.2. 5G
10.8.3. Millimeter Waves
10.8.4. Trend in  Get Smart instead of Get more

10.9. Future Addressing in Networks

10.9.1. Current Problems with IP Addressing 
10.9.2. IPv6
10.9.3. IPv4+
10.9.4. Advantages of IPv4+ Over IPv4
10.9.5. Advantages of IPv6 Over IPv4

10.10. The Challenge of Raising Awareness of Early and Continuing Education in the Population

10.10.1. Current Government Strategies
10.10.2. Resistance of the Population to Learning  
10.10.3. Training Plans to be Adopted by Companies

Module 11. Leadership, Ethics and Social Responsibility in Companies

11.1. Globalization and Governance

11.1.1. Governance and Corporate Governance
11.1.2. The Fundamentals of Corporate Governance in Companies
11.1.3. The Role of the Board of Directors in  the Corporate Governance Framework

11.2. Leadership 

11.2.1. Leadership A Conceptual Approach  
11.2.2. Leadership in Companies   
11.2.3. The Importance of Leaders in Business Management 

11.3. Cross Cultural Management 

11.3.1. Cross Cultural Management Concept
11.3.2. Contributions to Knowledge of National Cultures
11.3.3. Diversity Management 

11.4. Management and Leadership Development

11.4.1. Concept of Management Development  
11.4.2. Concept of Leadership   
11.4.3. Leadership Theories   
11.4.4. Leadership Styles   
11.4.5. Intelligence in Leadership
11.4.6. The Challenges of Today's Leader

11.5. Business Ethics 

11.5.1. Ethics and Morality   
11.5.2. Business Ethics   
11.5.3. Leadership and Ethics in Companies

11.6. Sustainability

11.6.1. Sustainability and Sustainable Development 
11.6.2. The 2030 Agenda   
11.6.3. Sustainable Companies

11.7. Corporate Social Responsibility 

11.7.1. International Dimensions of Corporate Social Responsibility 
11.7.2. Implementing Corporate Social Responsibility 
11.7.3. The Impact and Measurement of Corporate Social Responsibility

1.8. Responsible Management Systems and Tools

10.8.1. CSR: Corporate Social Responsibility
11.8.2. Essential Aspects for Implementing a Responsible Management Strategy  
11.8.3. Steps for the Implementation of a Corporate Social Responsibility Management System 
11.8.4. CSR Tools and Standards 

11.9. Multinationals and Human Rights 

11.9.1. Globalization, Multinational Companies and Human Rights 
11.9.2. Multinational Companies vs.International Law  
11.9.3. Legal Instruments for Multinationals in the Area of Human Rights 

11.10. Legal Environment and Corporate Governance

11.10.1. International Rules on Importation and Exportation   
11.10.2. Intellectual and Industrial Property 
11.10.3. International Labor Law

Module 12. People and Talent Management

12.1. Strategic People Management 

12.1.1. Strategic Human Resources Management
12.1.2. Strategic People Management

12.2. Human Resources Management by Competencies

12.2.1. Analysis of the Potential   
12.2.2. Remuneration Policy   
12.2.3. Career/Succession Planning

12.3. Performance Evaluation and Compliance Management

12.3.1. Performance Management   
12.3.2. Performance Management: Objectives and Process

12.4. Innovation in Talent and People Management

12.4.1. Strategic Talent Management Models  
12.4.2. Identification, Training and Development of Talent  
12.4.3. Loyalty and Retention
12.4.4. Proactivity and Innovation

12.5. Motivation

12.5.1. The Nature of Motivation
12.5.2. Expectations Theory
12.5.3. Needs Theory
12.5.4. Motivation and Financial Compensation

12.6. Developing High Performance Teams

12.6.1. High-Performance Teams: Self-Managed Teams
12.6.2. Methodologies for the Management of High Performance Self-Managed Teams

12.7. Change Management

12.7.1. Change Management
12.7.2. Type of Change Management Processes
12.7.3. Stages or Phases in the Change Management Process

12.8. Negotiation and Conflict Management

12.8.1. Negotiation
12.8.2. Conflict Management
12.8.3. Crisis Management

12.9. Executive Communication

12.9.1. Internal and External Communication in the Corporate Environment
12.9.2. Communication Departments
12.9.3. The Person in Charge of Communication of the Company The Profile of the Dircom

12.10. Productivity, Atraction, Retention and Talent Activation

12.10.1. Productivity 
12.10.2. Talent Attraction and Retention Levers

Módulo 13.Economic and Financial Management 

13.1. Economic Environment

13.1.1. Macroeconomic Environment and the National Financial System   
13.1.2. Financial Institutions   
13.1.3. Financial Markets   
13.1.4. Financial Assets   
13.1.5. Other Financial Sector Entities

13.2. Executive Accounting

13.2.1. Basic Concepts
13.2.2. The Company's Assets
13.2.3. The Company's Liabilities
13.2.4. The Company's Net Worth
13.2.5. The Income Statement

13.3. Information Systems and Business Intelligence

13.3.1. Fundamentals and Classification   
13.3.2. Cost Allocation Phases and Methods 
13.3.3. Choice of Cost Center and Impact

13.4. Budget and Management Control

13.4.1. The Budget Model
13.4.2. The Capital Budget   
13.4.3. The Operating Budget
13.4.5. Treasury Budget
13.4.6. Budget Monitoring 

13.5. Financial Management 

13.5.1. The Company's Financial Decisions  
13.5.2. Financial Department
13.5.3. Cash Surpluses
13.5.4. Risks Associated with Financial Management   
13.5.5. Financial Administration Risk Management

13.6. Financial Planning

13.6.1. Definition of Financial Planning 
13.6.2. Actions to be Taken in Financial Planning  
13.6.3. Creation and Establishment of the Business Strategy
13.6.4. The Cash Flow Table   
13.6.5. The Working Capital Table

13.7. Corporate Financial Strategy

13.7.1. Corporate Strategy and Sourcesof Financing   
13.7.2. Financial Products for Corporate Financing

13.8. Strategic Financing

13.8.1. Self-Financing
13.8.2. Increase in Equity
13.8.3. Hybrid Resources
13.8.4. Financing Through Intermediaries

13.9. Financial Analysis and Planning

13.9.1. Analysis of the Balance Sheet 
13.9.2. Analysis of the Income Statement
13.9.3. Profitability Analysis

13.10. Analyzing and Solving Cases/Problems

13.10.1. Financial Information on Industria de Diseño y Textil, S.A. (INDITEX)

Module 14. Commercial and  Strategic Marketing Management 

14.1. Commercial Management 

14.1.1. Conceptual Framework of Commercial Management 
14.1.2. Business Strategy and Planning  
14.1.3. The Role of Sales Managers

14.2. Marketing

14.2.1. The Concept of Marketing   
14.2.2. Basic Elements of Marketing   
14.2.3. Marketing Activities of the Company

14.3. Strategic Marketing Management

14.3.1. The Concept of Strategic Marketing 
14.3.2. Concept of Strategic Marketing Planning   
14.3.3. Stages in the Process of Strategic Marketing Planning

14.4. Digital Marketing and e-Commerce

14.4.1. Digital Marketing and E-commerce Objectives 
14.4.2. Digital Marketing and Media Used  
14.4.3. E-Commerce General Context  
14.4.4. Categories of E-commerce  
14.4.5. Advantages and Disadvantages of E-commerce Versus Traditional Commerce

14.5. Digital Marketing to Reinforce a Brand

14.5.1. Online Strategies to Improve Your Brand's Reputation   
14.5.2. Branded Content and Storytelling

14.6. Digital Marketing to Attract and Customer Loyalty

14.6.1. Loyalty and Engagement Strategies Through the Internet 
14.6.2. Visitor Relationship Management   
14.6.3. Hypersegmentation

14.7. Managing Digital Campaigns

14.7.1. What is a Digital Advertising Campaign?  
14.7.2. Steps to Launch an Online Marketing Campaign   
14.7.3. Mistakes in Digital Advertising Campaigns  

14.8. Sales Strategy

14.8.1. Sales Strategy 
14.8.2. Sales Methods

14.9. Corporate Communication

14.9.1. Concept   
14.9.2. The Importance of Communication in the Organization 
14.9.3. Type of Communication in the Organization
14.9.4. Functions of Communication in the Organization
14.9.5. Elements of Communication  
14.9.6. Communication Problems  
14.9.7. Communication Scenarios

14.10. Digital Communication and Reputation

14.10.1. Online Reputation
14.10.2. How to Measure Digital Reputation?  
14.10.3. Online Reputation Tools   
14.10.4. Online Reputation Report   
14.10.5. Online Branding

Module 15. Executive Management 

15.1. General Management 

15.1.1. The Concept of General Management   
15.1.2. The Role of the CEO   
15.1.3. The CEO and their Responsibilities   
15.1.4. Transforming the Work of Management

15.2. Manager Functions: Organizational Culture and Approaches

15.2.1. Manager Functions: Organizational Culture and Approaches

15.3. Operations Management

15.3.1. The Importance of Management   
15.3.2. Value Chain   
15.3.3. Quality Management

15.4. Public Speaking and Spokesperson Education

15.4.1. Interpersonal Communication  
15.4.2. Communication Skills and Influence  
15.4.3. Communication Barriers

15.5. Personal and Organizational  Communications Tools

15.5.1. Interpersonal Communication   
15.5.2. Interpersonal Communication Tools  
15.5.3. Communication in the Organization  
15.5.4. Tools in the Organization 

15.6. Communication in Crisis Situations

15.6.1. Crisis   
15.6.2. Phases of the Crisis   
15.6.3. Messages: Contents and Moments

15.7. Preparation of a Crisis Plan

15.7.1. Analysis of Possible Problems   
15.7.2. Planning   
15.7.3. Adequacy of Personnel 

15.8. Emotional Intelligence

15.8.1. Emotional Intelligence and Communication 
15.8.2. Assertiveness, Empathy, and Active Listening 
15.8.3. Self-Esteem and Emotional Communication

15.9. Personal Branding

15.9.1. Strategies to Develop Personal Branding
15.9.2. Personal Branding Laws 
15.9.3. Tools for Creating Personal Brands 

15.10. Leadership and Team Management

15.10.1. Leadership and Leadership Styles 
15.10.2. Leader Capabilities and Challenges  
15.10.3. Managing Change Processes  
15.10.4. Managing Multicultural Teams

##IMAGE##

This program will open doors to a new professional world”

Professional Master's Degree in Cybersecurity Management (CISO, Chief Information Security Officer)

In the corporate industry, information security is a pillar of utmost importance, since this system is responsible for gathering, storing and protecting the information of each person or organization. Specializing in this sector will allow you to prevent cyber attacks and take care of all the information stored on computers, servers, networks, mobile devices or electronic systems. In TECH we have a Professional Master's Degree in Cybersecurity Management (CISO, Chief Information Security Officer), in which you will learn the most updated techniques that will allow you to protect and secure information in digital spaces. We have the highest academic quality where you can update all your knowledge with a high-level online learning methodology.

Study a postgraduate course on cybersecurity

In TECH Global University we offer you a Professional Master's Degree in quality, designed by a team of highly trained professionals in the sector, who planned a curriculum that will meet your academic expectations. Certify yourself in the largest online university in the world and revalue your professional profile with this postgraduate course. You will strengthen your skills by acquiring new intellect in topics such as cyber-intelligence, reverse engineering and host and network security.

Obtain a Professional Master's Degree in IT Security

During 1500 hours distributed completely online, you will be able to specialize with the most updated program on the market; you will learn to design strategies to guarantee the protection of data and information stored on the network. In addition, this program has a problem-based methodology, i.e., you will study by simulating cases in real situations strategically raised. In addition, you will be accompanied by experts in the field, who will guide you in carrying out practical exercises, participatory forums and understanding of all the didactic study material.