Why study at TECH?

TECH provides you with a comprehensive update of your professional skills in the configuration of Virtual Machines and Snapshots through a complete online learning platform" 

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system. 
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives prepared each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent.
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.

TECH students represent more than 200 different nationalities.  
##IMAGE##
human icon

Learn with the best

In the classroom, TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (postgraduate learning methodology with the best international valuation) with the Case Study. Tradition and vanguard in a difficult balance, and in the context of the most demanding educational itinerary. 

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.   

At TECH, you will have access to the most rigorous and up-to-date case analyses in academia” 

Syllabus

The Postgraduate diploma in Red Team Cybersecurity is an educational program that specifically emphasizes knowledge related to the interpretation of file mapping tables. In this way, this university program is focused on a theoretical-practical structure, in addition to having the skills and experience of a fully qualified teacher staff.  

In this program you will have at your disposal innovative educational materials and the latest multimedia resources such as interactive summaries and infographics" 

Syllabus

This Postgraduate diploma incorporates 6 months of online learning, in which TECH through world-class education, will lead the student to the pinnacle of their professional career in the Cybersecurity sector. Likewise, the students will have important situations that they will have to face with rigor in the field of Computer Science. Therefore, this educational program provides the graduate with a variety of skills in the analysis and development of Malware, achieving success in the Pentesting sector. 

The teachers have provided a highly exclusive syllabus that integrates 3 modules, with the objective that students enhance their skills oriented to advanced phishing campaigns in a highly competitive area of knowledge. 

In this way, professionals who take this Postgraduate Diploma program will delve into areas such as firewall log analysis and network intrusion detection. Accordingly, students will achieve advanced learning by being specialists in the execution of Shellcode in memory and on disk. 

Likewise, TECH orients the education from excellence and comfort by providing the most innovative and exclusive material, being this, a program in which you will only need an electronic device with Internet access. In this way, you will be able to access the virtual platform from the comfort of wherever you are, and in this way you will be able to open your lessons without any scheduling problems.  
This Postgraduate Diploma takes place over 6 months and is divided into 3 modules: 

Module 1. Malware Analysis and Development
Module 2.
Forensic Fundamentals and DFIR
Module 3.
Advanced Red Team Exercises 

##IMAGE##

Where, When and How is it Taught?

TECH offers the possibility of developing this Postgraduate diploma in Red Team Cybersecurity completely online. Throughout the 6 months of the educational program, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time. 

Module 1. Malware Analysis and Development  

1.1. Malware Analysis and Development  

1.1.1. Malware History and Evolution  
1.1.2. Malware Classification and Types  
1.1.3. Malware Analysis 
1.1.4. Malware Development  

1.2. Preparing the Environment  

1.2.1. Configuration of Virtual Machines and Snapshots  
1.2.2. Malware Analysis Tools  
1.2.3. Malware Development Tools  

1.3. Windows Basics  

1.3.1. PE file format (Portable Executable)  
1.3.2. Processes and Threads  
1.3.3. File System and Registry  
1.3.4. Windows Defender  

1.4. Basic Malware Techniques  

1.4.1. Shellcode Generation  
1.4.2. Shellcode Execution on Disk  
1.4.3. Disk vs Memory  
1.4.4. Shellcode Execution in Memory  

1.5. Intermediate Malware Techniques  

1.5.1. Persistence in Windows   
1.5.2. Home Folder  
1.5.3. Registration Keys  
1.5.4. Screensaver  

1.6. Advanced Malware Techniques  

1.6. 1 Shellcode Encryption (XOR)  
1.6.2. Shellcode Encryption (RSA)  
1.6.3. String Obfuscation  
1.6.4. Process Injection  

1.7. Static Malware Analysis  

1.7.1. Analyzing Packers with DIE (Detect It Easy)  
1.7.2. Analyzing Sections with PE-Bear 
1.7.3. Decompilation with Ghidra  

1.8. Dynamic Malware Analysis  

1.8.1. Observing Behavior with Process Hacker  
1.8.2. Analyzing Calls with API Monitor  
1.8.3. Analyzing Registry Changes with Regshot  
1.8.4. Observing Network Requests with TCPView  

1.9. Analysis in .NET  

1.9.1. Introduction to .NET  
1.9.2. Decompiling with dnSpy  
1.9.3. Debugging with dnSpy  

1.10. Analyzing Real Malware  

1.10.1. Preparing the Environment  
1.10.2. Static Malware Analysis  
1.10.3. Dynamic Malware Analysis  
1.10.4. YARA Rule Creation  

Module 2. Forensic Fundamentals and DFIR  

2.1. Digital Forensics  

2.1.1. History and Evolution of Computer Forensics  
2.1.2. Importance of Computer Forensics in Cybersecurity  
2.1.3. History and Evolution of Computer Forensics

2.2. Fundamentals of Computer Forensics  

2.2.1. Chain of Custody and Its Application
2.2.2. Types of Digital Evidence  
2.2.3. Evidence Acquisition Processes  

2.3. File Systems and Data Structure  

2.3.1. Main File Systems  
2.3.2. Data Hiding Methods  
2.3.3. Analysis of File Metadata and Attributes 

2.4. Operating Systems Analysis  

2.4.1. Forensic Analysis of Windows Systems  
2.4.2. Forensic Analysis of Linux Systems  
2.4.3. Forensic Analysis of macOS Systems  

2.5. Data Recovery and Disk Analysis  

2.5.1. Data Recovery from Damaged Media  
2.5.2. Disk Analysis Tools  
2.5.3. Interpretation of File Allocation Tables  

2.6. Network and Traffic Analysis  

2.6.1. Network Packet Capture and Analysis  
2.6.2. Firewall Log Analysis  
2.6.3. Network Intrusion Detection  

2.7. Malware and Malicious Code Analysis  

2.7.1. Malware Classification and Its Characteristics  
2.7.2. Static and Dynamic Malware Analysis  
2.7.3. Disassembly and Debugging Techniques  

2.8. Log and Event Analysis  

2.8.1. Types of Logs in Systems and Applications  
2.8.2. Interpretation of Relevant Events  
2.8.3. Log Analysis Tools  

2.9. Respond to Security Incidents  

2.9.1. Incident Response Process  
2.9.2. Creating an Incident Response Plan  
2.9.3. Coordination with Security Teams  

2.10. Evidence and Legal Presentation  

2.10.1. Rules of Digital Evidence in the Legal Field  
2.10.2. Preparation of Forensic Reports  
2.10.3. Appearance at Trial as an Expert Witness  

Module 3. Advanced Red Team Exercises  

3.1. Advanced Recognition Techniques  

3.1.1. Advanced Subdomain Enumeration  
3.1.2. Advanced Google Dorking  
3.1.3. Social Networks and the Harvester  

3.2. Advanced Phishing Campaigns  

3.2.1. What is Reverse-Proxy Phishing?  
3.2.2. 2FA Bypass with Evilginx  
3.2.3. Data Exfiltration  

3.3. Advanced Persistence Techniques  

3.3.1. Golden Tickets  
3.3.2. Silver Tickets  
3.3.3. DCShadow Technique  

3.4. Advanced Avoidance Techniques  

3.4.1. AMSI Bypass  
3.4.2. Modification of Existing Tools  
3.4.3. Powershell Obfuscation  

3.5. Advanced Lateral Movement Techniques  

3.5.1. Pass-the-Ticket (PtT)  
3.5.2. Overpass-the-Hash (Pass-the-Key)  
3.5.3. NTLM Relay  

3.6. Advanced Post-Exploitation Techniques  

3.6.1. LSASS Dump  
3.6.2. SAM Dump  
3.6.3. DCSync Attack  

3.7. Advanced Pivoting Techniques   

3.7.1. What Is Pivoting  
3.7.2. Tunneling with SSH  
3.7.3. Pivoting with Chisel 

3.8. Physical Intrusions   

3.8.1. Surveillance and Reconnaissance  
3.8.2. Tailgating and Piggybacking  
3.8.3. Lock-Picking  

3.9. Wi-Fi Attacks   

3.9.1. WPA/WPA2 PSK Attacks  
3.9.2. AP Rogue Attacks 
3.9.3. Attacks on WPA2 Enterprise  

3.10. RFID Attacks  

3.10.1. RFID Card Reading  
3.10.2. RFID Card Manipulation  
3.10.3. Creation of Cloned Cards 

##IMAGE##

A unique training experience, key and decisive to boost your professional development"

Postgraduate Diploma in Red Team Cybersecurity

The importance of merging data protection with business lies in preserving the integrity and uninterrupted flow of vital information. Dive into TECH Global University's Postgraduate Diploma in Red Team Cybersecurity, an online program designed to propel your career to new heights. Imagine acquiring advanced skills that will make you a strategist, able to anticipate and counter threats in today's dynamic business environment. This carefully crafted program will immerse you in a unique educational journey, guided by an outstanding team of faculty who will provide you with cutting-edge knowledge. Would you like to learn how to identify and mitigate risks at the heart of operations? During the Postgraduate Certificate, you will explore techniques to assess the robustness of an organization's defenses, applying knowledge directly relevant to the business environment. Get ready to address real-world situations and strengthen security. All of this, broken down into self-regulated classes, reinforced with state-of-the-art multimedia material.

Strengthen your skills with the best online university in the world

Here, we offer you the opportunity to delve into a world-class online academic environment, with cutting-edge resources and the flexibility you need. The goal of this program is to equip you with the skills necessary to lead cyber defense in a business environment, making you an invaluable asset to any organization. Upon successful completion of the program, you will receive a recognized certificate that validates your acquired experience, providing you with access to exciting career opportunities. You will be prepared for crucial roles in companies in a variety of industries. From security consultancies to strategic positions in the corporate environment. Get ready to take on the challenge. Join TECH's Postgraduate Diploma in Cybersecurity Red Team and be the security architect that the business world demands. Your future is just a click away - enroll now!