Introduction to the Program

Acquire the skills of a Network Cybersecurity program in a few weeks with the most innovative Postgraduate certificate in online teaching"

##IMAGE##

We are currently in the information age, in the era of connectivity where we are all connected in both domestic and corporate environments.

The range of threats is very wide, from a Trojan with a built-in Keylogger that, through an email, manages to infect the computer only to obtain sensitive data that can be very lucrative, to a Trojan that turns the computer, or any other device within the network, into a Bot that communicates with a command & control server to perpetrate a large-scale denial of service attack. 

That is why security defence and monitoring systems must evolve. Because in a world where teleworking and Cloud services are becoming more and more common, a traditional perimeter firewall is not enough.  

Also, with the huge number of devices that will be generating alerts, it is necessary to have a team that is continuously reviewing them, a Security Operations Center or SOC that is able to detect from the simplest to the most complex threats thanks to the correlation of all events, and even in many cases to create automated responses in order to reduce containment and mitigation times of attacks. 

Technology and connectivity are advancing at the same time as cyber threats: Get up to date on all the latest developments in this field of intervention"

This Postgraduate certificate in Network Cybersecurity contains the most complete and up-to-date educational program on the market. The most important features include:

  • The development of case studies presented by cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where self-assessment can be used to improve learning
  • Its special emphasis on innovative methodologies in Advanced Practice Nursing
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

A higher education process created to be affordable and flexible, with the most interesting methodology of online teaching"

The program’s teaching staff includes professionals from the sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.  

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive specialization programmed to learn in real situations.  

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts.

Totally practice-focused, this Postgraduate certificate will boost your skills to the level of a specialist”

##IMAGE##

Focussed to be entirely practical, this Postgraduate certificate will boost your skills to the level of a specialist”

Syllabus

This Postgraduate Diploma is a complete analysis of each and every one of the fields of knowledge that the professional involved in cybersecurity should know in the field of Network Cybersecurity. To this end, it has been structured with a view to the efficient acquisition of summative knowledge, which will favor the absorption of learning and consolidate what has been studied, providing students with the capacity to intervene as quickly as possible. A high-intensity, high-quality course created to educate the best in the industry.

##IMAGE##

A dynamically developed Postgraduate certificate through a study approach focused on efficiency" 

Module 1. Network Security (Perimeter)

1.1. Threat Detection and Prevention Systems

1.1.1. General Framework for Security Incidents
1.1.2. Current Defence Systems: Defence in Depth and SOC
1.1.3. Current Network Architectures
1.1.4. Types of Tools for Incident Detection and Prevention

1.1.4.1. Network-Based Systems
1.1.4.2. Host-Based Systems
1.1.4.3. Centralized Systems

1.1.5. Instance/Hosts, Container and Serverless Communication and Detection

1.2. Firewall

1.2.1. Types of Firewalls
1.2.2. Attacks and Mitigation
1.2.3. Common Firewalls in Linux Kernel

1.2.3.1. UFW
1.2.3.2. Nftables and Iptables
1.2.3.3. Firewalld

1.2.4. Detection Systems Based on System Logs

1.2.4.1. TCP Wrappers
1.2.4.2. BlockHosts and DenyHosts
1.2.4.3. Fail2Ban

1.3. Intrusion Detection and Prevention Systems (IDS/IPS)

1.3.1. Attacks on IDS/IPS
1.3.2. IDS/IPS Systems

1.3.2.1. Snort
1.3.2.2. Suricata

1.4. Next Generation Firewalls (NGFW)

1.4.1. Differences between NGFW and Traditional Firewalls 
1.4.2. Main Capabilities
1.4.3. Commercial Solutions
1.4.4. Firewalls for Cloud Services

1.4.4.1. Architecture Cloud VPC
1.4.4.2. Cloud ACLs
1.4.4.3. Security Group

1.5. Proxy

1.5.1. Types of Proxy
1.5.2. Uses of Proxies. Advantages and Disadvantages

1.6.  Antivirus Engines

1.6.1. General Context of Malware and IOCs
1.6.2.  Antivirus Engine Problems

1.7. Email Protection Systems

1.7.1. Antispam

1.7.1.1. Black and White Lists
1.7.1.2. Bayesian Filters

1.7.2. Mail Gateway (MGW )

1.8. SIEM

1.8.1. Components and Architecture
1.8.2. Correlation Rules and Use Cases
1.8.3. Current Challenges of SIEM Systems

1.9. SOAR

1.9.1. SOAR and SIEM: Enemies or Allies
1.9.2. The Future of SOAR Systems

1.10. Others Network-based Systems

1.10.1. WAF
1.10.2. NAC
1.10.3. HoneyPots and HoneyNets
1.10.4. CAS

##IMAGE##

A high-impact education program that will help you understand the current threats, allowing you to act with agility and specialist resources"

Postgraduate Certificate in Network Cybersecurity

Network cybersecurity is an essential discipline in today's world. The dependence on technology and digital communications is increasing, which forces us to be prepared to face the risks that this entails. For this reason, TECH Global University developed the Postgraduate Certificate in Network Cybersecurity, focused on addressing the main challenges and solutions to protect information and critical systems. Here, you will deepen your knowledge of networks and explore the threats that can affect them. The different types of attacks (phishing, malware, ransomware) and the security measures that can be applied to prevent them or mitigate their effects will be studied. Finally, we will delve into regulatory compliance and cybersecurity frameworks such as the ISO 27001 standard; with special emphasis on security policies, procedures and tools used in the business environment to ensure the protection of information and business continuity. <>/p>

Master network cybersecurity.

In this program we focus on training students in the identification of vulnerabilities in networks and systems, as well as in the implementation of solutions to protect them. To this end, aspects such as access management, authentication and data encryption, among others, will be addressed. In addition, emphasis will be placed on the importance of constantly updating systems and on the need to carry out penetration tests to identify possible weaknesses. Finally, we will delve into the aspects of governance and risk management in the enterprise environment. This will help students to design and implement efficient cybersecurity strategies. All this will enable them to be prepared to face current and future challenges in the field of network cybersecurity.