Description

Completing this program will enable business professionals to detect potential vulnerabilities in their IT systems and apply the most appropriate techniques to address them”

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class centre for intensive managerial skills training.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that combines the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.  
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives trained each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent. 
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea. 

TECH students represent more than 200 different nationalities.   
##IMAGE##
human icon

Learn with the best

In the classroom, TECH teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (a postgraduate learning methodology with the highest international rating) with the Case Study. A complex balance between tradition and state-of-the-art, within the context of the most demanding academic itinerary.  

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.  

At TECH, you will have access to the most rigorous and up-to-date case studies in the academic community”

Syllabus

The TECH Postgraduate certificate in Ethical Hacking is a state-of-the-art educational program designed for business professionals to straightforwardly understand how to detect and solve potential network vulnerabilities, effectively protecting company computer systems. A program that will teach students both theoretical and practical content, including the keys to work with ease in this field. 

This curriculum will make a difference in your qualification, providing you with the keys to stand out in the field”  

Syllabus

The Postgraduate certificate in Ethical Hacking is an intensive program that prepares students to face challenges and business decisions in computer security. Its content is designed to promote the development of managerial skills that enable more rigorous decision-making in uncertain environments. 

Over 150 hours of study, students will analyze a multitude of practical cases through individual work, which will allow them to acquire skills required to develop successfully in their daily practice. It is, therefore, an authentic immersion in real business situations.  

This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective. 

A study plan designed especially for students, focused on their professional development, which prepares them to achieve excellence in the field of information security management and administration. A program that understands your needs and those of your company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty, which will provide you with the competencies to solve critical situations in a creative and efficient way.  

The program is carried out in six weeks and is divided into one module: 

Module 1. Ethical Hacking

##IMAGE##

Where, When and How is it Taught?

TECH offers the possibility of developing this Postgraduate certificate in Ethical Hacking completely online. Over the course of 6 weeks, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.

Module 1. Ethical Hacking

1.1. Work Environment

1.1.1. Linux Distributions

1.1.1.1. Kali Linux - Offensive Security 
1.1.1.2. Parrot OS 
1.1.1.3. Ubuntu

1.1.2. Virtualization Systems
1.1.3. Sandboxes
1.1.4. Deployment of Laboratories 

1.2. Methods 

1.2.1. OSSTM
1.2.2. OWASP
1.2.3. NIST
1.2.4. PTES
1.2.5. ISSAF

1.3. Footprinting

1.3.1. Open-Source Intelligence (OSINT)
1.3.2. Search for Data Breaches and Vulnerabilities
1.3.3. Use of Passive Tools

1.4. Network Scanning

1.4.1. Scanning Tools

1.4.1.1. Nmap 
1.4.1.2. Hping3 
1.4.1.3. Other Scanning Tools

1.4.2. Scanning Techniques
1.4.3. Firewall and IDS Avoidance Techniques
1.4.4. Banner Grabbing
1.4.5. Network Diagrams

1.5. Enumeration

1.5.1. SMTP Enumeration
1.5.2. DNS Enumeration
1.5.3. NetBIOS and Samba Enumeration
1.5.4. LDAP Enumeration
1.5.5. SNMP Enumeration
1.5.6. Other Enumeration Techniques

1.6. Vulnerability Analysis

1.6.1. Vulnerability Scanning Solutions

1.6.1.1. Qualys 
1.6.1.2. Nessus 
1.6.1.3. CFI LanGuard

1.6.2. Vulnerability Scoring Systems

1.6.2.1. CVSS 
1.6.2.2. CVE 
1.6.2.3. NVD

1.7. Attacks on Wireless Networks

1.7.1. Hacking Methodology in Wireless Networks

1.7.1.1. Wi-Fi Discovery 
1.7.1.2. Traffic Analysis 
1.7.1.3. Aircrack Attacks 

1.7.1.3.1. WEP Attacks 
1.7.1.3.2. WPA/WPA2 Attacks 

1.7.1.4. Evil Twin Attacks 
1.7.1.5. Attacks on WPS 
1.7.1.6. Jamming

1.7.2. Tools for Wireless Security

1.8. Hacking of Web Servers

1.8.1. Cross Site Scripting
1.8.2. CSRF
1.8.3. Session Hijacking 
1.8.4. SQL Injection

1.9. Exploiting Vulnerabilities

1.9.1. Use of Known Exploits
1.9.2. Use of Metasploit
1.9.3. Use of Malware

1.9.3.1. Definition and Scope 
1.9.3.2. Malware Generation 
1.9.3.3. Bypass of Antivirus Solutions

1.10. Persistence

1.10.1. Rootkits Installation
1.10.2. Using Ncat
1.10.3. Use of Scheduled Tasks for Backdoors
1.10.4. User Creation
1.10.5. HIDS Detection

##IMAGE##

A high level program for professionals seeking excellence”

Postgraduate Certificate in Ethical Hacking

The massification of the use of technology in business environments has brought with it a set of disadvantages in the field of computer security that, in order to be overcome, require solid skills to be correctly introduced in computer systems. Taking into account the growing need for professionals in this area, TECH Global University has created this program focused on the use of different techniques oriented to the search and solution of vulnerabilities in programs, networks or web applications. Thanks to our comprehensive curriculum, students will be able to delve into Linux software distributions, virtualization structures, laboratory deployments, footprinting, user enumeration and measuring the levels of access allowed to a server. It also covers everything related to operational security methodologies, auditing, testing and risk assessment and mitigation. All this, in order to identify the targets of the attacks and to exploit the vulnerabilities. In this way, you will be able to master each of the stages of these processes, which will facilitate the understanding of the risk to which organizations are exposed.

Postgraduate Certificate in Ethical Hacking

Studying this TECH program is an interesting opportunity to specialize in the field of computer security, as it provides a series of strategies aimed at data protection, through the guarantee of good management of hacking techniques. The future expert in this area will have the necessary knowledge to mobilize the computational tools in cases of attack and to design action plans specifying the measures for the responsible custody of information. By strictly following the regulations and legislation in force governing data processing, the Postgraduate Certificate graduate will be able to passively intervene systems, to apply verification tests and to reinforce the tools to prevent leaks, while respecting the ethical criteria of confidentiality in companies. Therefore, we can affirm that our program enriches the professional development processes and ensures the quick insertion of the students in the labor market.