University certificate
The world's largest school of business”
Description
Learn about the main preventive network cybersecurity tools and become a highly efficient expert in the field”
Why Study at TECH?
TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education.
TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"
At TECH Global University
Innovation |
The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.
"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.
The Highest Standards |
Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...
95% of TECH students successfully complete their studies.
Networking |
Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.
100,000+ executives prepared each year, 200+ different nationalities.
Empowerment |
Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.
500+ collaborative agreements with leading companies.
Talent |
This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision.
After completing this program, TECH helps students show the world their talent.
Multicultural Context |
While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.
TECH students represent more than 200 different nationalities.
Learn with the best |
In the classroom, TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world.
Teachers representing 20 different nationalities.
TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:
Analysis |
TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.
Academic Excellence |
TECH offers students the best online learning methodology. The university combines the Relearning method (postgraduate learning methodology with the best international valuation) with the Case Study. Tradition and vanguard in a difficult balance, and in the context of the most demanding educational itinerary.
Economy of Scale |
TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.
At TECH, you will have access to the most rigorous and up-to-date case analyses in academia”
Syllabus
Business professionals in the Digital Age are accustomed to using networks and, therefore, are aware of the risks involved. In this context, academic programs on computer security for business professionals are needed, since the latter are increasingly expected to be able to apply techniques and tools aimed at preventing potential cyberattacks. Therefore, the structure of this program is oriented to facilitate the study of business professionals in a field that is becoming more and more relevant.
Improve your knowledge of cybersecurity and apply what you have learned to your company”
Syllabus
The Postgraduate diploma in Preventive Cybersecurity is an intensive program that prepares students to face challenges and business decisions in computer security. Its content is designed to promote the development of managerial skills that enable more rigorous decision-making in uncertain environments.
Throughout 450 hours of study, students will study a multitude of practical cases through individual work, which will allow them to acquire the necessary skills to successfully develop in their daily practice. It is, therefore, an authentic immersion in real business situations.
This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective.
A program designed especially for students, focused on their professional development, which prepares them to achieve excellence in the field of information security management and administration. A program that understands your needs and those of your company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty, which will provide you with the skills to solve critical situations in a creative and efficient way.
This Postgraduate diploma takes place over 6 months and is divided into 3 modules:
Module 1. Cyberintelligence and Cybersecurity
Module 2. Ethical Hacking
Module 3. Secure Development
Where, When and How is it Taught?
TECH offers students the opportunity to take this Postgraduate diploma in Preventive Cybersecurity entirely online. Throughout the 6 months of the educational program, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.
Module 1. Cyberintelligence and Cybersecurity
1.1. Cyberintelligence
1.1.1. Cyberintelligence
1.1.1.1. Intelligence
1.1.1.1.1. Intelligence Cycle
1.1.1.2. Cyberintelligence
1.1.1.3. Cyberintelligence and Cybersecurity
1.1.2. The Intelligence Analyst
1.2. Cybersecurity
1.2.1. Security Layers
1.2.2. Identification of Cyber Threats
1.2.2.1. External Threats
1.2.2.2. Internal Threats
1.2.3. Adverse Actions
1.2.3.1. Social Engineering
1.2.3.2. Commonly Used Methods
1.3. Intelligence Techniques and Tools
1.3.1. OSINT
1.3.2. SOCMINT
1.3.3. HUMIT
1.3.4. Linux Distributions and Tools
1.3.5. OWISAM
1.3.6. OWISAP
1.3.7. PTES
1.3.8. OSSTM
1.4. Evaluation Methodologies
1.4.1. Intelligence Analysis
1.4.2. Techniques for Organizing Acquired Information
1.4.3. Reliability and Credibility of Information Sources
1.4.4. Analysis Methodologies
1.4.5. Presentation of Intelligence Results
1.5. Audits and Documentation
1.5.1. Computer Security Auditing
1.5.2. Documentation and Permits for Auditing
1.5.3. Types of Audits
1.5.4. Deliverables
1.5.4.1. Technical Report
1.5.4.2. Executive Report
1.6. Anonymity in the Network
1.6.1. Use of Anonymity
1.6.2. Anonymity Techniques (Proxy, VPN)
1.6.3. TOR, Freenet and IP2 Networks
1.7. Threats and Types of Security
1.7.1. Types of Threats
1.7.2. Physical Security
1.7.3. Network Security
1.7.4. Logical Security
1.7.5. Web Application Security
1.7.6. Security on Mobile Devices
1.8. Regulations and Compliance
1.8.1. The GDPR
1.8.2. ISO 27000 Family
1.8.3. NIST Cybersecurity Framework
1.8.4. PIC 9
1.8.5. ISO 27032
1.8.6. Cloud Regulations
1.8.7. SOX
1.8.8. ICP
1.9. Risk Analysis and Metrics
1.9.1. Extent of Risk
1.9.2. The Assets
1.9.3. Threats
1.9.4. Vulnerabilities
1.9.5. Risk Evaluation
1.9.6. Risk Treatment
1.10. Important Cybersecurity Agencies
1.10.1. NIST
1.10.2. OEA
1.10.3. UNASUR-PROSUR
Module 2. Ethical Hacking
2.1. Work Environment
2.1.1. Linux Distributions
2.1.1.1. Kali Linux - Offensive Security
2.1.1.2. Parrot OS
2.1.1.3. Ubuntu
2.1.2. Virtualization Systems
2.1.3. Sandboxes
2.1.4. Deployment of Laboratories
2.2. Methods
2.2.1. OSSTM
2.2.2. OWASP
2.2.3. NIST
2.2.4. PTES
2.2.5. ISSAF
2.3. Footprinting
2.3.1. Open-Source Intelligence (OSINT)
2.3.2. Search for Data Breaches and Vulnerabilities
2.3.3. Use of Passive Tools
2.4. Network Scanning
2.4.1. Scanning Tools
2.4.1.1. Nmap
2.4.1.2. Hping3
2.4.1.3. Other Scanning Tools
2.4.2. Scanning Techniques
2.4.3. Firewall and IDS Avoidance Techniques
2.4.4. Banner Grabbing
2.4.5. Network Diagrams
2.5. Enumeration
2.5.1. SMTP Enumeration
2.5.2. DNS Enumeration
2.5.3. NetBIOS and Samba Enumeration
2.5.4. LDAP Enumeration
2.5.5. SNMP Enumeration
2.5.6. Other Enumeration Techniques
2.6. Vulnerability Analysis
2.6.1. Vulnerability Scanning Solutions
2.6.1.1. Qualys
2.6.1.2. Nessus
2.6.1.3. CFI LanGuard
2.6.2. Vulnerability Scoring Systems
2.6.2.1. CVSS
2.6.2.2. CVE
2.6.2.3. NVD
2.7. Attacks on Wireless Networks
2.7.1. Hacking Methodology in Wireless Networks
2.7.1.1. Wi-Fi Discovery
2.7.1.2. Traffic Analysis
2.7.1.3. Aircrack Attacks
2.7.1.3.1. WEP Attacks
2.7.1.3.2. WPA/WPA2 Attacks
2.7.1.4. Evil Twin Attacks
2.7.1.5. Attacks on WPS
2.7.1.6. Jamming
2.7.2. Tools for Wireless Security
2.8. Hacking of Web Servers
2.8.1. Cross Site Scripting
2.8.2. CSRF
2.8.3. Session Hijacking
2.8.4. SQL Injection
2.9. Exploiting Vulnerabilities
2.9.1. Use of Known Exploits
2.9.2. Use of Metasploit
2.9.3. Use of Malware
2.9.3.1. Definition and Scope
2.9.3.2. Malware Generation
2.9.3.3. Bypass of Antivirus Solutions
2.10. Persistence
2.10.1. Rootkits Installation
2.10.2. Using Ncat
2.10.3. Use of Scheduled Tasks for Backdoors
2.10.4. User Creation
2.10.5. HIDS Detection
Module 3. Secure Development
3.1. Secure Development
3.1.1. Quality, Functionality and Safety
3.1.2. Confidentiality, Integrity and Availability
3.1.3. Software Development Life Cycle
3.2. Requirements Phase
3.2.1. Authentication Control
3.2.2. Role and Privilege Control
3.2.3. Risk-oriented Requirements
3.2.4. Privilege Approval
3.3. Analysis and Design Phases
3.3.1. Component Access and System Administration
3.3.2. Audit Trails
3.3.3. Session Management
3.3.4. Historical Data
3.3.5. Proper Error Handling
3.3.6. Separation of Functions
3.4. Implementation and Coding Phase
3.4.1. Ensuring the Development Environment
3.4.2. Preparation of Technical Documentation
3.4.3. Secure Codification
3.4.4. Communications Security
3.5. Good Secure Coding Practices
3.5.1. Input Data Validation
3.5.2. Coding of Output Data
3.5.3. Programming Style
3.5.4. Change Log Management
3.5.5. Cryptographic Practices
3.5.6. Error and Log Management
3.5.7. File Management
3.5.8. Memory Management
3.5.9. Standardization and Reuse of Security Functions
3.6. Server Preparation and Hardening
3.6.1. Management of Users, Groups and Roles on the Server
3.6.2. Software Installation
3.6.3. Server Hardening
3.6.4. Robust Configuration of the Application Environment
3.7. Database Preparation and Hardening
3.7.1. Database Engine DD
3.7.2. Create Your Own User for the Application
3.7.3. Assigning the Required Privileges to the User
3.7.4. Database Hardening DD
3.8. Testing Phase
3.8.1. Quality Control in Security Controls
3.8.2. Phased Code Inspection
3.8.3. Checking Configuration Management
3.8.4. Black Box Testing
3.9. Preparing the Transition to Production
3.9.1. Perform Change Control
3.9.2. Carry out Production Changeover Procedure
3.9.3. Rollback Procedure
3.9.4. Pre-production Testing
3.10. Maintenance Phase
3.10.1. Risk-based Assurance
3.10.2. White Box Security Maintenance Testing
3.10.3. Black box Safety Maintenance Tests
With this program you will be aware of the most effective methods used for the prevention and elimination of bacteria in wines”
Postgraduate Diploma in Preventive Cybersecurity
Nowadays, cybersecurity has become a vitally important issue due to the increasing use of technology and digital information. Companies and organizations around the world are falling victim to cyber attacks, which can jeopardize their reputation and, in some cases, even their survival. In this context, the need for professionals trained in the prevention of these threats has become increasingly critical. For this reason, TECH has created the Postgraduate Diploma in Preventive Cybersecurity, which is positioned as an excellent option for those seeking to expand their skills and knowledge in this area. This program offers a complete and up-to-date education on the latest trends and techniques in preventive computer security, giving you the best knowledge to prevent cyber-attacks within the company.
Increase your skills in Cybersecurity with this program
The Postgraduate Diploma in Preventive Cybersecurity is a program that will enable you to develop skills in the prevention and protection of cyber attacks. Throughout the program, you will handle risk assessment methodologies in the network, you will delve into the most relevant aspects of Ethical Hacking or you will know in depth the design phase of secure software development. All this, enjoying a 100% modern and effective online methodology, with teaching materials in multimedia formats that will facilitate learning and ensure the understanding of key concepts. As a result, you will have access to videos, exercises and interactive activities, encouraging you to learn independently and at your own pace. In addition, its practical approach will allow you to take all the knowledge acquired during the duration of the program to the professional environment.