University certificate
The world's largest school of business”
Why study at TECH?
It brings incalculable value to your Cybersecurity Policies by providing you with advanced knowledge of all the nuances, from the security systems themselves to the procedures in threat analysis that will give you the keys to position yourself with an advantage in your organization"
Why Study at TECH?
TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education.
TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"
At TECH Global University
Innovation |
The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.
"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system.
The Highest Standards |
Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...
95% of TECH students successfully complete their studies.
Networking |
Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.
100,000+ executives prepared each year, 200+ different nationalities.
Empowerment |
Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.
500+ collaborative agreements with leading companies.
Talent |
This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision.
After completing this program, TECH helps students show the world their talent.
Multicultural Context |
While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.
TECH students represent more than 200 different nationalities.
Learn with the best |
In the classroom, TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world.
Teachers representing 20 different nationalities.
TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:
Analysis |
TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.
Academic Excellence |
TECH offers students the best online learning methodology. The university combines the Relearning method (postgraduate learning methodology with the best international valuation) with the Case Study. Tradition and vanguard in a difficult balance, and in the context of the most demanding educational itinerary.
Economy of Scale |
TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.
At TECH, you will have access to the most rigorous and up-to-date case analyses in academia”
Syllabus
Based on the Relearning methodology, all the contents of this program reiterate key concepts and important terms in a progressive manner. This makes the educational experience much smoother, easing the teaching load and saving numerous hours of study time for the manager, as knowledge is acquired naturally as each topic progresses. The virtual classroom will also be available 24 hours a day from any device with an Internet connection, being accessible even from the comfort of the Smartphone of your choice.
You will be able to download all the contents to review and study them whenever you want, without the pressure of presential classes or fixed schedules"
Syllabus
The Postgraduate diploma in Computer Security Threat Management is an intensive program that prepares the student to face the main cyber threats in high-level business fields.
The content of the Postgraduate diploma in Computer Security Threat Management is designed to promote the development of managerial skills that allow for more rigorous decision-making in uncertain environments.
This Postgraduate diploma deals in depth with the integral management of Information Security and the organizational aspects of policies in this same area. It is designed to train professionals who understand cyber threats and their management from a strategic, international and innovative perspective.
This Postgraduate diploma takes place over six months and is divided into three modules:
Module 1. Information Security Management System (ISMS)
Module 2. Organizational Aspects of Information Security Policy
Module 3. Security Policies for the Analysis of Threats in Computer Systems
Where, When and How is it Taught?
TECH offers the possibility of developing this Postgraduate diploma in Computer Security Threat Management completely online. Throughout the 6 months of the educational program, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.
Module 1. Information Security Management System (ISMS)
1.1. Information Security. Key Aspects
1.1.1. Information Security
1.1.1.1. Confidentiality
1.1.1.2. Integrity
1.1.1.3. Availability
1.1.1.4. Information Security Measurements
1.2. Information Security Management Systems
1.2.1. Information Security Management Models
1.2.2. Documents to Implement an ISMS
1.2.3. Levels and Controls of an ISMS
1.3. International Norms and Standards
1.3.1. International Standards in Information Security
1.3.2. Origin and Evolution of the Standard
1.3.3. International Information Security Management Standards
1.3.4. Other Reference Standards
1.4. ISO/IEC 27,000 Standards
1.4.1. Purpose and Areas of Application
1.4.2. Structure of the Standard
1.4.3. Certification
1.4.4. Accreditation Phases
1.4.5. Benefits of ISO/IEC 27,000 Standards
1.5. Design and Implementation of a General Information Security System
1.5.1. Phases of Implementation of a General Information Security System
1.5.2. Business Continuity Plans
1.6. Phase I: Diagnosis
1.6.1. Preliminary Diagnosis
1.6.2. Identification of the Stratification Level
1.6.3. Level of Compliance with Standards/Norms
1.7. Phase II: Preparation
1.7.1. Context of the Organization
1.7.2. Analysis of Applicable Safety Regulations
1.7.3. Scope of the General Information Security System
1.7.4. General Information Security System Policy
1.7.5. Objectives of the General Information Security System
1.8. Phase III: Planning
1.8.1. Asset Classification
1.8.2. Risk Assessment
1.8.3. Identification of Threats and Risks
1.9. Phase IV: Implementation and Follow-up
1.9.1. Analysis of Results
1.9.2. Assigning Responsibilities
1.9.3. Timing of the Action Plan
1.9.4. Monitoring and Audits
1.10. Incident Management Security Policies
1.10.1. Phases
1.10.2. Incident Categorization
1.10.3. Incident Management and Procedures
Module 2. Organizational Aspects of Information Security Policy
2.1. Internal Organization
2.1.1. Assigning Responsibilities
2.1.2. Segregation of Duties
2.1.3. Contacts with Authorities
2.1.4. Information Security in Project Management
2.2. Asset Management
2.2.1. Liability for Assets
2.2.2. Classification of Information
2.2.3. Handling of Storage Media
2.3. Security Policies in Business Processes
2.3.1. Analysis of the Vulnerabilities of Business Processes
2.3.2. Business Impact Analysis
2.3.3. Classification of Processes with Respect to Business Impact
2.4. Security Policies Linked to Human Resources
2.4.1. Before Hiring
2.4.2. During Contracting
2.4.3. Termination or Change of Position
2.5. Management Security Policies
2.5.1. Management Guidelines on Information Security
2.5.2. BIA - Analyzing the Impact
2.5.3. Recovery Plan as a Security Policy
2.6. Acquisition and Maintenance of Information Systems
2.6.1. Information Systems Security Requirements
2.6.2. Development and Support Data Security
2.6.3. Test Data
2.7. Security with Suppliers
2.7.1. IT Security with Suppliers
2.7.2. Management of Service Delivery with Assurance
2.7.3. Supply Chain Security
2.8. Operational Safety
2.8.1. Operational Responsibilities
2.8.2. Protection Against Malicious Code
2.8.3. Backup Copies
2.8.4. Activity and Supervision Records
2.9. Safety and Regulatory Management
2.9.1. Compliance with Legal Requirements
2.9.2. Information Security Reviews
2.10. Business Continuity Management Security
2.10.1. Continuity of Information Security
2.10.2. Redundancies
A unique, key, and decisive educational experience to boost your professional development and make the definitive leap"
Postgraduate Diploma in Computer Security Threat Management
Protect the integrity of your systems and become an expert in computer security threat management with this Postgraduate Diploma in Computer Security Threat Management from TECH Global University. In an increasingly interconnected digital world, information security is crucial. Our online classes will give you the flexibility to study from anywhere and at a time that suits you. Benefit from this opportunity and acquire specialized knowledge in information security threat management without interrupting your daily activities. Our institution is a leader in technology education and is committed to teaching highly skilled professionals in the field of computer security. In this program, you will immerse yourself in the theoretical and practical fundamentals of security threat management, learning the most effective techniques and strategies to protect information systems.
Manage all threats that can affect a company's computer security
Our experts will guide you through key topics such as vulnerability identification, risk analysis, implementation of security measures and cyber incident response. You will learn how to use advanced tools and methodologies to assess and mitigate security risks, and you will be prepared to face current and future challenges in the field of cybersecurity. Upon successful completion of this postgraduate course, you will be able to design and apply effective security policies, implement appropriate access controls and ensure business continuity in the face of potential threats. You will become a highly demanded professional in a constantly evolving job market, where information security is a strategic priority for organizations. Don't miss the opportunity to acquire cutting-edge skills in information security threat management. Enroll in the Postgradute Diploma in Computer Security Threat Management at TECH Global University and protect the future of information in the digital era.