Syllabus

This TECH Global University Postgraduate certificate has been designed to meet the academic needs of business professionals, who, though extensively experienced and qualified in different business areas: finance, accounting, logistics, communication, etc., have neglected the study of more computerized subjects, which are absolutely necessary for Chief Revenue Officers or other managers, as they aid in applying security techniques to protect the digital information they handle. Therefore, this program provides the latest information on Network Cybersecurity.

A very well-structured curriculum that will allow you to advance in your study in a self-directed manner”  

Syllabus

The Postgraduate certificate in Network Cybersecurity is an intensive program that prepares students to face challenges and business decisions in computer security. Its content is designed to promote the development of managerial skills that enable more rigorous decision-making in uncertain environments. 

Over 150 hours of study, students will analyze a multitude of practical cases through individual work, which will allow them to acquire skills required to develop successfully in their daily practice. It is, therefore, an authentic immersion in real business situations.  

This program deals with the different areas of a company in depth, and it is designed for managers to understand cybersecurity from a strategic, international and innovative perspective. 

A study plan designed especially for students, focused on their professional development, which prepares them to achieve excellence in the field of information security management and administration. A program that understands your needs and those of your company through innovative content based on the latest trends, and supported by the best educational methodology and an exceptional faculty, which will provide you with the competencies to solve critical situations in a creative and efficient way.  

The program is developed over six weeks and is divided into one module: 

Module 1. (Perimeter) Network Security

Where, When and How is it Taught?

TECH offers the possibility of developing this Postgraduate certificate in Network Cybersecurity completely online. Over the course of 6 weeks, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.

Module 1. Network Security (Perimeter)  

1.1. Threat Detection and Prevention Systems

1.1.1. General Framework for Security Incidents
1.1.2. Current Defence Systems: Defence in Depth and SOC
1.1.3. Current Network Architectures
1.1.4. Types of Tools for Incident Detection and Prevention

1.1.4.1. Network-based Systems
1.1.4.2. Host-Based Systems
1.1.4.3. Centralized Systems

1.1.5. Instance/Hosts, Container and Serverless Communication and Detection

1.2. Firewall

1.2.1. Types of Firewalls
1.2.2. Attacks and Mitigation
1.2.3. Common Firewalls in Linux Kernel

1.2.3.1. UFW
1.2.3.2. Nftables and Iptables
1.2.3.3. Firewalld 

1.2.4. Detection Systems Based on System Logs

1.2.4.1. TCP Wrappers
1.2.4.2. BlockHosts and DenyHosts
1.2.4.3. Fai2ban

1.3. Intrusion Prevention and Detection Systems (IDS/ IPS)

1.3.1. IDS/IPS Attacks 
1.3.2. IDS/IPS Systems

1.3.2.1. Snort
1.3.2.2. Suricata

1.4. Next Generation Firewalls (NGFW)

1.4.1. Differences between NGFW and Traditional Firewall
1.4.2. Main Capabilities
1.4.3. Commercial Solutions
1.4.4. Firewalls for Cloud Services

1.4.4.1. Cloud VPC Architecture
1.4.4.2. Cloud ACLs 
1.4.4.3. Cloud Security Group 

1.5. Proxy

1.5.1. Types of Proxy
1.5.2. Use of proxy. Advantages and disadvantages

1.6. Antivirus Engines

1.6.1. General Context of Malware and IoCs
1.6.2. Antivirus Engine Problems

1.7. Email Protection Sys

1.7.1. Antispam

1.7.1.1. Black and White Lists 
1.7.1.2. Bayesian Filters

1.7.2. Mail Gateway (MGW)

1.8. SIEM

1.8.1. Components and Architecture
1.8.2. Correlation Rules and Use Cases
1.8.3. Current Challenges of SIEM Systems

1.9. SOAR

1.9.1. SOAR and SIEM: Friends or Foes
1.9.2. The Future of SOAR Systems

1.10. Other Network-Based Systems

1.10.1. WAF
1.10.2. NAC
1.10.3. HoneyPots and HoneyNets
1.10.4. CASB

A complete tour of the most innovative concepts in Network Cybersecurity”  

Teaching Objectives

This program seeks to meet the qualification needs of business professionals in the field of cybersecurity. More and more managers are demanding further training in this field that can be adapted to the needs of their companies, so TECH has devised a complete and easy to understand syllabus for such professionals, those who seek to acquire multidisciplinary knowledge they can put to use in their daily practice.

Improve your cybersecurity skills and apply the most appropriate techniques to your daily work”

TECH makes the goals of their students their own goals too.  
Working together to achieve them.

The Postgraduate certificate in Network Cybersecurity qualifies students to:

  1. Analyze the general framework, the importance of multilayer defence and monitoring systems
  2. Examine the most important threat prevention and detection systems
  3. Develop Firewall solutions on Linux Host and Cloud providers
  4. Assess new threat detection systems and their evolution from more traditional solutions
  5. Generate comprehensive intelligent solutions to automate behavior in case of incidents
  6. Analyze current network architectures to identify perimeters to be protected
  7. Develop specific Firewall and Linux configurations to mitigate the most common attacks
  8. Compile the most commonly used solutions such as Snort and Suricata, and their configuration
  9. Examine the different additional layers provided by Next-Generation Firewalls and network functionalities in Cloud environments
  10. Determine the tools used in network protection and demonstrate why they are fundamental to a multi-layered defence
  11. Develop current SIEM architectures and work methods using these tools
  12. Present SOAR systems as the current system defence alongside SIEMs, and assess future challenges

Postgraduate Certificate in Network Cybersecurity.

Nowadays, cybersecurity has become a crucial aspect in any company or entity that handles online information. Cybercriminals use increasingly sophisticated techniques to access corporate systems and networks with the aim of stealing confidential information or damaging the technological infrastructure. For this reason, it is essential to have professionals specialized in cybersecurity.

TECH offers a complete program in Network Cybersecurity that will allow the student to acquire the necessary skills to ensure the security of the network and computer systems of any organization. Throughout the program, the student will go through the main threats and vulnerabilities existing in the network, and will learn to identify them and apply effective prevention and protection measures. This Postgraduate Certificate includes theoretical and practical training with a multidisciplinary approach, addressing legal, technical and management aspects of network cybersecurity. The program is designed to enable students to acquire specific knowledge and skills to work in cybersecurity teams and to improve security in the company or entity in which they work.

Update your knowledge of security systems

Students will have access to a wide variety of didactic resources, such as multimedia materials, discussion forums, follow-up tools and personalized tutorials, which will allow them to follow the program from anywhere and at any time. In addition, the program is supported by a team of cybersecurity experts, who will provide all the necessary support during the Postgraduate Certificate. In short, TECH's Postgraduate Certificate in Network Cybersecurity is a unique opportunity for those professionals who want to specialize in one of the most demanded fields in the world of technology and computer security.