University certificate
The world's largest faculty of information technology”
Description
The most complete tour through the dangers and vulnerabilities of mobile devices and their cyber protection"
Home and business security needs to be structured in layers, it is like a chain and will only be as strong as the weakest link in the chain. This postgraduate diploma presents the main threats to users' computers and servers so that we are able to take the appropriate measures and be alert to any situation.
The more new functionalities there are and the more we communicate with each other, the more our attack surface increases. In other words, the possibilities and ways for cybercriminals to achieve their goals are growing. That is why security defense and monitoring systems must evolve as well. Because in a world where teleworking and Cloud services are becoming more and more common, a traditional perimeter firewall is not enough. For this reason, this postgraduate diploma will also address the importance of designing a multi-layer defence, also known as “Defence in Depth” covering all aspects of a corporate network where some of the concepts and systems that will be discussed can also be used and applied in a domestic environment.
There is no such thing as 100% security, but if you know the types of attacks you face, the risks you are exposed to and have the information you need to deal with them, you have taken an important step and added another layer of security to your information.
Start acting with the broadest knowledge of the types of risks currently existing and the means of defence applicable in each case"
This postgraduate diploma in Defensive Cybersecurity contains the most complete and up-to-date educational program on the market. The most important features include:
- Practical case studies presented by experts
- The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
- Practical exercises where the self-assessment process can be carried out to improve learning
- Its special emphasis on innovative methodologies in Advanced Practice Nursing
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
A complete tour that will allow you to know what they are and how current cyber threats work as a basis for developing defensive strategies"
The program’s teaching staff includes professionals from the sector who contribute their work experience to this program, as well as renowned specialists from leading societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive specialization programmed to learn in real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts.
With a totally practice-focused approach, this postgraduate diploma will boost your skills to the level of a specialist"
A highly educational process, created to be affordable and flexible, with the most interesting methodology of online teaching"
Objectives
This postgraduate diploma will allow you to advance exponentially in your capacity to intervene in this field. With realistic and highly relevant objectives, this course of study is designed to progressively lead students to the acquisition of the theoretical and practical knowledge necessary to intervene with excellence and to develop transversal competencies that will allow them to face complex situations by developing appropriate and precise responses.
A complete update on all aspects in which defensive cybersecurity has developed in recent times"
General Objectives
- Assessing the security of user equipment and servers
- Examine potential threats based on the usage environment
- Analyze solutions for each threat
- Develop appropriate usage policies
- Analyze the general framework, the importance of multilayer defense and monitoring systems
- Examine the most important threat detection and prevention systems
- Develop firewall solutions on Host Linux and Cloud providers
- Evaluate new threat detection systems, as well as their evolution with respect to more traditional solutions
- Generate complete intelligent solutions to automate incident behaviors
- Analyze the main current mobile platforms, their characteristics and use
- Examine existing vulnerabilities and threats, as well as the main attack vectors
- Assess the risks associated with vulnerabilities both outside and inside the company
- Determine tools and best practice guidelines for securing mobile devices
- Analyze the IoT in different areas today
- Examining the evolution and impact of IoT
- Determine the parts of an IoT project
- Identify, analyze and assess security risks of the IoT project parts
Specific Objectives
Module 1. Host Security
- Specify the Backup policies for personal and professional data
- Assess the different tools to provide solutions to specific security problems
- Establish mechanisms to have an up-to-date system
- Scan equipment for Intruders
- Determine system access rules
- Screen and classify mails to avoid frauds
- Generate lists of permitted software
Module 2. Network Security (Perimeter)
- Analyze current network architectures to identify the perimeter to protect
- Develop specific firewall and Linux configurations to mitigate the most common attacks
- Compile the most commonly used solutions such as Snort and Suricata, as well as their configuration
- Examine the different additional layers provided by next-generation firewalls and networking capabilities in Cloud environments
- Determine the tools for network protection and demonstrate why they are fundamental to a multilayer defence
Module 3. Smartphone Security
- Examine the various attack vectors to avoid becoming an easy target
- Determine the main attacks and types of Malware to which mobile device users are exposed
- Analyze the most current devices to establish greater security in the configuration
- Specify the main steps to perform a penetration test on both iOS and Android platforms
- Develop specialized knowledge about the different protection and security tools
- Establish best practices in programming for mobile devices
Module 4. IoT Security
- Analyze the main IoT architectures
- Examine connectivity technologies
- Develop the main application protocols
- Specify the different types of existing devices
- Assessing risk levels and known vulnerabilities
- Develop safe use policies
- Establishing appropriate conditions of use for these devices
A unique specializacion program that will allow you to acquire advanced training in this field"
Postgraduate Diploma in Defensive Cybersecurity
The daily use of the Internet has become an essential part of life in the most advanced societies. Citizens use digital tools for various daily tasks, which has led to great advances in business. As a result, hackers have found in the network a new way to act, which endangers virtually all companies. As a result, company managers are obliged to acquire advanced knowledge in order to act defensively against possible attacks and to implement preventive measures to avoid these threats. To meet this need for specialization on the part of business professionals, TECH has designed the Postgraduate Diploma in Defensive Cybersecurity, which will provide you with top-level competencies in this field.
Specialize in Defensive Cybersecurity in just 6 months
Do you want to know the cutting-edge techniques to ensure security and prevent attacks on hosts, networks, smartphones or IoT? You're in luck! The Postgraduate Diploma in Defensive Cybersecurity has been developed to provide you with this very complete knowledge. Its fully online methodology will allow you to study 24 hours a day and from anywhere, with any electronic device with an Internet connection. In addition, the focus on multimedia formats such as video or interactive summary makes learning more attractive and effective. Also, the program is designed by the best experts in the field, who have created a comprehensive curriculum that will provide you with content applicable in real work situations.