Why study at TECH?

This specialization program will be essential to become an expert in Corrective Cybersecurity and Forensic Examination , and to be able to act against potential cyber attacks” 

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class centre for intensive managerial skills training.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that combines the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.  
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives trained each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent. 
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea. 

TECH students represent more than 200 different nationalities.   
##IMAGE##
human icon

Learn with the best

In the classroom, TECH teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (a postgraduate learning methodology with the highest international rating) with the Case Study. A complex balance between tradition and state-of-the-art, within the context of the most demanding academic itinerary.  

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.  

At TECH, you will have access to the most rigorous and up-to-date case studies in the academic community”

Syllabus

TECH has designed a specific curriculum on Corrective Cybersecurity and Forensic Examination aimed at business professionals who wish to complete their education so as to work more confidently in their daily practice. Thus, the program includes relevant aspects on this field of cybersecurity, and is structured in such a way that students can self-direct their study, following an academic path that favors learning. 

This curriculum has been designed with the need for specialization of business professionals in mind” 

Syllabus

The Postgraduate diploma in Corrective Cybersecurity and Forensic Examination is an intensive program that prepares students to face challenges and business decisions in computer security. Its content is designed to promote the development of managerial skills that enable more rigorous decision-making in uncertain environments. 

Over 450 hours of study, students will study a multitude of practical cases through individual work, which will allow them to acquire the necessary skills to successfully develop in their daily practice. It is, therefore, an authentic immersion in real business situations. 
This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective. 

A plan designed for students, focused on their professional development, which prepares them to achieve excellence in the field of computer security management and administration. A program that understands your needs and those of your company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty, which will provide you with the competencies to solve critical situations in a creative and efficient way. 

This Postgraduate diploma takes place over 6 months and is divided into 3 modules:  

Module 1. Reverse Engineering
Module 2. Forensic Analysis
Module 3. Current and Future Challenges in Computer Security

##IMAGE##

Where, When and How is it Taught?

TECH offers the possibility of developing this Postgraduate diploma in Corrective Cybersecurity and Forensic Examination completely online. Over the course of 6 months you will be able to access all the contents of this program at any time, allowing you to self-manage your study time. 

Module 1. Reverse Engineering

1.1. Compilers

1.1.1. Types of Codes
1.1.2. Phases of a Compiler
1.1.3. Table of Symbols
1.1.4. Error Manager
1.1.5. GCC Compiler

1.2. Types of Analysis in Compilers

1.2.1. Lexical Analysis

1.2.1.1. Terminology. 
1.2.1.2. Lexical Components 
1.2.1.3. LEX Lexical Analyzer

1.2.2. Parsing

1.2.2.1. Context-free Grammars 
1.2.2.2. Types of Parsing 

1.2.2.2.1. Top-down Analysis 
1.2.2.2.2. Bottom-up Analysis 

1.2.2.3. Syntactic Trees and Derivations 
1.2.2.4. Types of Parsers 

1.2.2.4.1. LR (Left To Right) Analyzers 
1.2.2.4.2. LALR Analyzers

1.2.3. Semantic Analysis

1.2.3.1. Attribute Grammars 
1.2.3.2. S-Attributed 
1.2.3.3. L-Attributed

1.3. Data Structures in Assembler 

1.3.1. Variables
1.3.2. Arrays
1.3.3. Pointers
1.3.4. Structures
1.3.5. Objects

1.4. Assembler Code Structures 

1.4.1. Selection Structures

1.4.1.1. If, else if, Else 
1.4.1.2. Switch

1.4.2. Iteration Structures

1.4.2.1. For 
1.4.2.2. While 
1.4.2.3. Use of Break

1.4.3. Functions

1.5. x86 Hardware Architecture

1.5.1. x86 Processor Architecture
1.5.2. x86 Data Structures
1.5.3. x86 Code Structures

1.6. ARM Hardware Architecture

1.6.1. ARM Processor Architecture
1.6.2. ARM Data Structures
1.6.3. ARM Code Structures

1.7. Static Code Analysis

1.7.1. Disassemblers
1.7.2. IDA
1.7.3. Code Rebuilders

1.8. Dynamic Code Analysis

1.8.1. Behavioral Analysis 

1.8.1.1. Communication 
1.8.1.2. Monitoring

1.8.2. Linux Code Debuggers
1.8.3. Windows Code Debuggers

1.9. Sandbox

1.9.1. Sandbox Architecture
1.9.2. Sandbox Evasion
1.9.3. Detection Techniques
1.9.4. Avoidance Techniques
1.9.5. Countermeasures
1.9.6. Sandbox on Linux
1.9.7. Sandbox on Windows
1.9.8. Sandbox on MacOS
1.9.9. Sandbox on Android

1.10. Malware Analysis

1.10.1. Malware Analysis Methods
1.10.2. Malware Obfuscation Techniques

1.10.2.1. Executable Obfuscation 
1.10.2.2. Restriction of Execution Environments

1.10.3. Malware Analysis Tools

Module 2. Forensic Analysis

2.1. Data Acquisition and Duplication

2.1.1. Volatile Data Acquisition

2.1.1.1. System Information 
2.1.1.2. Network Information 
2.1.1.3. Volatility Order

2.1.2. Static Data Acquisition

2.1.2.1. Creating a Duplicate Image 
2.1.2.2. Preparation of a Chain of Custody Document

2.1.3. Methods for Validation of Acquired Data

2.1.3.1. Methods for Linux 
2.1.3.2. Methods for Windows

2.2. Evaluation and Defeat of Anti-Forensic Techniques

2.2.1. Objectives of Anti-Forensic Techniques
2.2.2. Data Deletion

2.2.2.1. Deletion of Data and Files 
2.2.2.2. File Recovery 
2.2.2.3. Recovery of Deleted Partitions

2.2.3. Password Protection
2.2.4. Steganography
2.2.5. Secure Device Wiping
2.2.6. Encryption

2.3. Operating System Forensics

2.3.1. Windows Foren
2.3.2. Linux Foren
2.3.3. Mac Foren

2.4. Network Forensics

2.4.1. Logs Analysis
2.4.2. Data Correlation
2.4.3. Network Research
2.4.4. Steps to Follow in Network Forensic

2.5. Web Forensics 

2.5.1. Investigation of Web Attacks 
2.5.2. Attack Detection 
2.5.3. IP Address Location

2.6. Forensic Database Analysis

2.6.1. Forensic Analysis in MSSQL
2.6.2. MySQL Forensic Analysis
2.6.3. PostgreSQL Forensic Analysis
2.6.4. Forensic Analysis in MongoDB

2.7. Cloud Forensics

2.7.1. Types of Crimes in the Cloud

2.7.1.1. Cloud as Subject 
2.7.1.2. Cloud as an Object 
2.7.1.3. Cloud as a Tool

2.7.2. Challenges of Cloud Forensics
2.7.3. Researching Storage Services on the Cloud
2.7.4. Forensic Analysis Tools for Cloud

2.8. Investigation of Email Crimes

2.8.1. Mailing Systems

2.8.1.1. Mail Clients 
2.8.1.2. Mail Server 
2.8.1.3. SMTP Server 
2.8.1.4. POP3 Server 
2.8.1.5. IMAP4 Server

2.8.2. Mailing Crimes
2.8.3. Mail Message

2.8.3.1. Standard Headers 
2.8.3.2. Extended Headers

2.8.4. Steps for the Investigation of these Crimes
2.8.5. E-Mail Forensic Tools

2.9. Mobile Forensic Analysis 

2.9.1. Cellular Networks

2.9.1.1. Types of Networks 
2.9.1.2. CDR Contents

2.9.2. Subscriber Identity Module (SIM)
2.9.3. Logical Acquisition
2.9.4. Physical Acquisition
2.9.5. File System Acquisition

2.10. Forensic Report Writing and Reporting

2.10.1. Important Aspects of a Forensic Report
2.10.2. Classification and Types of Reports
2.10.3. Guide to Writing a Report
2.10.4. Presentation of the Report

2.10.4.1. Prior Preparation for Testifying 
2.10.4.2. Deposition 
2.10.4.3. Dealing with the Media

Module 3. Current and Future Challenges in Information Security

3.1. Blockchain Technology

3.1.1. Scope of Application
3.1.2. Confidentiality Guarantee
3.1.3. Non-Repudiation Guarantee

3.2. Digital Money 

3.2.1. Bitcoins
3.2.2. Cryptocurrencies
3.2.3. Cryptocurrency Mining
3.2.4. Pyramid Schemes
3.2.5. Other Potential Crimes and Problems

3.3. Deepfake

3.3.1. Media Impact 
3.3.2. Dangers to Society
3.3.3. Detection Mechanisms

3.4. The Future of Artificial Intelligence 

3.4.1. Artificial Intelligence and Cognitive Computing
3.4.2. Uses to Simplify Customer Service

3.5. Digital Privacy 

3.5.1. Value of Data in the Network
3.5.2. Use of Data in the Network
3.5.3. Privacy and Digital Identity Management

3.6. Cyberconflicts, Cybercriminals and Cyberattacks 

3.6.1. The Impact of Cybersecurity on International Conflicts
3.6.2. Consequences of Cyber-attacks on the General Population
3.6.3. Types of Cybercriminals. Protective Measures

3.7. Telework

3.7.1. Remote Work Revolution during and post COVID-19
3.7.2. Access Bottlenecks
3.7.3. Variation of the Attacking Surface
3.7.4. Workers' Needs

3.8. Emerging Wireless Technologies

3.8.1. WPA3
3.8.2. 5G 
3.8.3. Millimeter Waves
3.8.4. Trend in  “Get Smart” instead of “Get More”

3.9. Future Addressing in Networks

3.9.1. Current Problems with IP Addressing 
3.9.2. IPv6
3.9.3. IPv4+
3.9.4. Advantages of IPv4+ Over IPv4
3.9.5. Advantages of IPv6 Over IPv4

3.10. The Challenge of Raising Awareness of Early and Continuing Education in the Population

3.10.1. Current Government Strategies
3.10.2. Resistance of the Population to on to Learning  
3.10.3. Training Plans to be Adopted by Companies

##IMAGE##

A unique, key, and decisive educational experience to boost your professional development and make the definitive leap"

Postgraduate Diploma in Corrective Cybersecurity and Forensic Examination

In a world that changes and evolves every day, with technologies that appear and are adopted quickly without being sufficiently mature, it is important to be prepared to face many challenges and predict the impact they will have on society. Therefore, the objective of the Postgraduate Diploma in Corrective Cybersecurity and Forensic Examination is to provide professionals with the necessary skills and tools to carry out the investigation of a cybersecurity incident after it has occurred. As such, the program seeks to provide a complete specialization that allows to obtain, analyze and present in a report all the relevant findings related to the incident. Not surprisingly, from the moment an attack scenario is identified, the professional must have the ability to acquire evidence in a non-destructive manner and apply data analysis techniques to relate and connect the information obtained from various sources.

Protect your company with the latest advances in Corrective Cybersecurity and Forensic Examination

It is common to use various reverse engineering techniques to master in depth the operation of a software, communication protocol or algorithm. One of the best known applications is Malware analysis, which allows to understand and know the malicious software and to develop one capable of detecting and counteracting it. In some cases, the vulnerability may be introduced by the compiler that generates the machine code, which makes it necessary to handle the different technologies and explain them in an appropriate way according to the target audience of the report. The forensic expert in this field must have a broad vision to detect both the benefits and possible harms of technologies, as well as be able to face various crimes and situations with expertise, insight and serenity. In fact, this program seeks to prepare the professional to understand and face these challenges, as well as to foresee their impact in the future. All of this is delivered 100% online.