Why study at TECH?

Register and access to a 100% online program that will allow you to address the main concepts in network architecture and security"

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system. 
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives prepared each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent.
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.

TECH students represent more than 200 different nationalities.  
##IMAGE##
human icon

Learn with the best

In the classroom, TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (postgraduate learning methodology with the best international valuation) with the Case Study. Tradition and vanguard in a difficult balance, and in the context of the most demanding educational itinerary. 

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.   

At TECH, you will have access to the most rigorous and up-to-date case analyses in academia” 

Syllabus

The Postgraduate diploma in Advanced Web Hacking is a degree that is primarily focused on specific skills related to session hijacking attacks and database injections. Thus, this academic program emphasizes a theoretical-practical line accompanied by the knowledge and robust experience of a highly specialized teaching staff.

You will master computer networks and IGP protocols with this Postgraduate diploma. Enroll now!”

Syllabus

This university program incorporates 450 hours of online learning, where TECH, through teaching of the highest standards, will guide the graduate towards a successful professional career. In this way, you will overcome the various obstacles imposed by the IT field. The program also provides a wide range of knowledge related to the tactics, techniques and procedures used by malicious actors, enabling the identification and simulation of threats.

Therefore, the teaching team has created a curriculum that contains 3 modules, in order for the student to acquire skills around the basic concepts of Routing and Switching reaching the top in the IT and business sector.

Thus, the students who take this Postgraduate diploma will be introduced to competencies related to NoSQLi injections. In this sense, the graduate will become a great specialist in promoting ethical and legal practices in the execution of attacks and tests on Windows systems.

For this academic program, negotiators will use the exclusive Relearning methodology. Through it, they will be able to examine complex concepts and assimilate their daily application in an instantaneous way. At the same time, the program is taught from an innovative 100% online learning platform that is not subject to fixed schedules or continuous evaluation chronograms.  

This Postgraduate diploma takes place over 6 months and is divided into 3 modules.

Module 1. Advanced Web Hacking
Module 2. Network Architecture and Security
Module 3. Technical and Executive Report

##IMAGE##

Where, When and How is it Taught?

TECH offers the possibility of developing this Postgraduate diploma in Advanced Web Hacking completely online. Throughout the 6 months of the educational program, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time. 

Module 1. Advanced Web Hacking

1.1. Operation of a Website 

1.1.1. The URL and Its Parts 
1.1.2. HTTP Methods 
1.1.3. The Headers
1.1.4. How to View Web Requests with Burp Suite

1.2. Session 

1.2.1. Cookies 
1.2.2. JWT Tokens 
1.2.3. Session Hijacking Attacks 
1.2.4. Attacks on JWT 

1.3. Cross Site Scripting (XSS) 

1.3.1. What is a XSS 
1.3.2. Types of XSS 
1.3.3. Exploiting an XSS 
1.3.4. Introduction to XSLeaks 

1.4. Database Injections 

1.4.1. What Is a SQL Injection 
1.4.2. Exfiltrating Information with SQLi 
1.4.3. SQLi Blind, Time-Based and Error-Based 
1.4.4. NoSQLi Injections 

1.5. Path Traversal and Local File Inclusion 

1.5.1. What They Are and Their Differences 
1.5.2. Common Filters and How to Bypass Them 
1.5.3. Log Poisoning 
1.5.4. LFIs in PHP 

1.6. Broken Authentication 

1.6.1. User Enumeration 
1.6.2. Password Bruteforce 
1.6.3. 2FA Bypass 
1.6.4. Cookies with Sensitive and Modifiable Information 

1.7. Remote Command Execution 

1.7.1. Command Injection 
1.7.2. Blind Command Injection 
1.7.3. Insecure Deserialization PHP 
1.7.4. Insecure Deserialization Java

1.8. File Uploads 

1.8.1. RCE through Webshells 
1.8.2. XSS in File Uploads 
1.8.3. XML External Entity (XXE) Injection 
1.8.4. Path traversal in File Uploads 

1.9. Broken Access Control 

1.9.1. Unrestricted Access to Panels 
1.9.2. Insecure Direct Object References (IDOR) 
1.9.3. Filter Bypass 
1.9.4. Insufficient Authorization Methods 

1.10. DOM Vulnerabilities and More Advanced Attacks 

1.10.1. Regex Denial of Service 
1.10.2. DOM Clobbering 
1.10.3. Prototype Pollution 
1.10.4. HTTP Request Smuggling

Module 2. Network Architecture and Security

2.1. Computer Networks 

2.1.1. Basic Concepts: LAN, WAN, CP, CC Protocols 
2.1.2. OSI and TCP/IP Model 
2.1.3. Switching: Basic Concepts 
2.1.4. Routing: Basic Concepts

2.2. Switching 

2.2.1. Introduction to VLAN’ s 
2.2.2. STP 
2.2.3. EtherChannel 
2.2.4. Layer 2 Attacks

2.3. VLAN´s 

2.3.1. Importance of VLAN’s 
2.3.2. Vulnerabilities in VLAN’s 
2.3.3. Common Attacks on VLAN’s 
2.3.4. Mitigations

2.4. Routing 

2.4.1. IP Addressing - IPv4 and IPv6 
2.4.2. Routing: Key Concepts 
2.4.3. Static Routing 
2.4.4. Dynamic Routing: Introduction 

2.5. IGP Protocols 

2.5.1. RIP 
2.5.2. OSPF 
2.5.3. RIP vs OSPF 
2.5.4. Topology Needs Analysis

2.6. Perimeter Protection 

2.6.1. DMZs 
2.6.2. Firewalls 
2.6.3. Common Architectures 
2.6.4. Zero Trust Network Access

2.7. IDS and IPS 

2.7.1. Features 
2.7.2. Implementation 
2.7.3. SIEM and SIEM CLOUDS 
2.7.4. Detection based on HoneyPots 

2.8. TLS and VPN´s 

2.8.1. SSL/TLS
2.8.2. TLS: Common Attacks 
2.8.3. VPNs with TLS 
2.8.4. VPNs with IPSEC

2.9. Security in Wireless Networks 

2.9.1. Introduction to Wireless Networks 
2.9.2. Protocols 
2.9.3. Key Elements 
2.9.4. Common Attacks

2.10. Business Networks and How to Deal with Them 

2.10.1. Logical Segmentation 
2.10.2. Physical Segmentation 
2.10.3. Access Control 
2.10.4. Other Measures to Take into Account

Module 3. Technical and Executive Report

3.1. Report Process 

3.1.1. Report Structure 
3.1.2. Report Process 
3.1.3. Key Concepts 
3.1.4. Executive vs Technical 

3.2. Guidelines 

3.2.1. Introduction 
3.2.2. Guide Types 
3.2.3. National Guides 
3.2.4. Case Uses 

3.3. Methods 

3.3.1. Assessment  
3.3.2. Pentesting 
3.3.3. Common Methodologies Review 
3.3.4. Introduction to National Methodologies 

3.4. Technical Approach to the Reporting Phase 

3.4.1. Understanding the Limits of Pentester 
3.4.2. Language Usage and Clues 
3.4.3. Information Presentation
3.4.4. Common Errors 

3.5. Executive Approach to the Reporting Phase 

3.5.1. Adjusting the Report to the Context 
3.5.2. Language Usage and Clues 
3.5.3. Standardization 
3.5.4. Common Errors

3.6. OSSTMM 

3.6.1. Understanding the Methodology 
3.6.2. Assessment 
3.6.3. Documentation 
3.6.4. Creating a Report 

3.7. LINCE 

3.7.1. Understanding the Methodology 
3.7.2. Assessment 
3.7.3. Documentation 
3.7.4. Creating a Report 

3.8. Reporting Vulnerabilities 

3.8.1. Key Concepts 
3.8.2. Scope Quantification 
3.8.3. Vulnerabilities and Evidence 
3.8.4. Common Errors 

3.9. Focusing the Report on the Customer 

3.9.1. Importance of Job Testing 
3.9.2. Solutions and Mitigations 
3.9.3. Sensitive and Relevant Data 
3.9.4. Practical Examples and Cases

3.10. Reporting Retakes 

3.10.1. Key Concepts 
3.10.2. Understanding Legacy Information 
3.10.3. Error Checking 
3.10.4. Adding Information

##IMAGE##

A unique training experience, key and decisive to boost your professional development"

Postgraduate Diploma in Advanced Web Hacking

Live the TECH experience from anywhere in the world with just one click. The Postgraduate Diploma in Advanced Web Hacking, is a specialized academic program designed for those interested in deepening their knowledge in the field of computer security and ethical hacking. This Postgraduate Certificate provides students with the necessary tools and techniques to identify vulnerabilities in web applications and protect them from possible attacks. During the training, participants will learn about the fundamental concepts of ethical hacking and techniques for exploiting vulnerabilities in web applications. They will be taught how to identify and assess security risks in a website and how to use pentesting tools to perform thorough penetration testing. The program curriculum includes topics such as identifying and exploiting code injection attacks, discovering vulnerabilities in web servers and web applications, and more advanced hacking techniques such as XSS (Cross-Site Scripting), attack sequencing and SQL exploitation.

Certify yourself in web hacking with a hands-on approach

Students will also acquire practical skills in configuring firewalls, assessing the security of a network and implementing preventative measures to protect the integrity and confidentiality of online information. The postgraduate course is designed for those who already have basic knowledge in computer security and wish to take their skills to the next level. Participants will learn from experts in the field through interactive, hands-on teaching methodologies with real, immersive projects. At the end of the program, students will be prepared to face the challenges of web hacking in a professional environment. They will be able to work as security consultants, computer security analysts or vulnerability researchers, providing assessment and protection services to different organizations. If you are interested in preparing yourself as an advanced web hacking expert, this training will provide you with the tools and knowledge necessary to excel in the field of computer security and become a highly sought-after professional.