Introduction to the Program

Transforma cualquier empresa en un entorno seguro, libre de amenazas cibernéticas con esta Postgraduate diploma”

La seguridad en internet se ha convertido en uno de los principales problemas para las grandes compañías y gobiernos que invierten grandes sumas de dinero para impedir el robo de datos e información especialmente sensible. Esta problemática es atendida por profesionales informáticos capaces de detectar y anticiparse a los hackers, aunque para ello, precisan de un conocimiento profundo, no sólo de la técnica, sino también de los conceptos más avanzados y aplicables en un SGSI.

Esta Postgraduate diploma en Information Security Threat Management facilita que el alumnado profundice en los pilares en los que se basa el SGSI, los documentos y modelos a implementar, además de las normativas y estándares aplicables actualmente. Un equipo docente, con experiencia en el área informática y de derecho orientado a la ciberseguridad, dará las pautas esenciales para gestionar la seguridad en una empresa en aplicación de la normativa ISO/IEC 27.000, la cual establece el marco de buenas prácticas para la seguridad de la información.

Una excelente oportunidad para los profesionales informáticos que deseen progresar en su carrera profesional dando la máxima seguridad a las empresas que soliciten sus servicios. El modelo online de TECH permite compaginar la vida laboral y personal, al facilitar el acceso a todo el temario del plan de estudio desde el primer día, sin horarios y con posibilidad de descargar el contenido para su visualización con un dispositivo con conexión a internet.

Profundiza en los beneficios de las normas ISO/IEC 27.000 y aplícalos para dar Seguridad Informática”

Esta Postgraduate diploma en Information Security Threat Management contiene el programa más completo y actualizado del mercado. Sus características más destacadas son:

  • El desarrollo de casos prácticos presentados por expertos en Seguridad Informática
  • Los contenidos gráficos, esquemáticos y eminentemente prácticos con los que está concebido recogen una información técnica y práctica sobre aquellas disciplinas indispensables para el ejercicio profesional
  • Los ejercicios prácticos donde realizar el proceso de autoevaluación para mejorar el aprendizaje
  • Su especial hincapié en metodologías innovadoras
  • Las lecciones teóricas, preguntas al experto, foros de discusión de temas controvertidos y trabajos de reflexión individual
  • La disponibilidad de acceso a los contenidos desde cualquier dispositivo fijo o portátil con conexión a internet

Avanza en el campo de la Seguridad Informática. Cada día millones de empresas se ven afectadas por ciberataques. Matricúlate en esta Postgraduate diploma"

El programa incluye, en su cuadro docente, a profesionales del sector que vierten en esta capacitación la experiencia de su trabajo, además de reconocidos especialistas de sociedades de referencia y universidades de prestigio.

Su contenido multimedia, elaborado con la última tecnología educativa, permitirá a los profesionales un aprendizaje situado y contextual, es decir, un entorno simulado que les proporcionará una capacitación inmersiva programada para entrenarse ante situaciones reales.

El diseño de este programa se centra en el Aprendizaje Basado en Problemas, mediante los profesionales deberán tratar de resolver las distintas situaciones de práctica profesional que se les plantee a lo largo del programa académico. Para ello, contará con la ayuda de un novedoso sistema de vídeos interactivos realizados por reconocidos expertos.

Planifica y diseña un SGSI sin fisuras para los negocios. Sé el profesional informático en seguridad que están buscando"

Las empresas reclaman profesionales informáticos que sean capaces de proteger sus datos más sensibles. Conviértete en un experto en Seguridad Informática”

Syllabus

The syllabus of this Postgraduate diploma has been elaborated with a wide multimedia content and essential readings that will provide a deep knowledge about information security management systems. In the development of this program will be given the main keys in Cybersecurity and progressively delve into the organizational aspects of the company to improve the protection of their data, to reach the analysis of threats in computer systems to be faced by professionals.experto online gestión de amenazas de seguridad informática

A curriculum that will give you the guidelines to implement effective security policies in any company"

Module 1. Information Security Management System (ISMS) 

1.1. Information Security. Key Aspects

1.1.1. Information Security

1.1.1.1. Confidentiality
1.1.1.2. Integrity
1.1.1.3. Availability
1.1.1.4. Information Security Measurements

1.2. Information Security Management Systems

1.2.1. Information Security Management Models
1.2.2. Documents to Implement an ISMS
1.2.3. Levels and Controls of an ISMS

1.3. International Norms and Standards

1.3.1. International Standards in Information Security
1.3.2. Origin and Evolution of the Standard
1.3.3. International Information Security Management Standards
1.3.4. Other Reference Standards

1.4. ISO/IEC 27,000 Standards

1.4.1. Purpose and Areas of Application
1.4.2. Structure of the Standard
1.4.3. Certification
1.4.4. Accreditation Phases
1.4.5. Benefits of ISO/IEC 27,000 Standards

1.5. Design and Implementation of a General Information Security System

1.5.1. Phases of Implementation of a General Information Security System
1.5.2. Business Continuity Plans

1.6. Phase I: Diagnosis

1.6.1. Preliminary Diagnosis
1.6.2. Identification of the Stratification Level
1.6.3. Level of Compliance with Standards/Norms

1.7. Phase II: Preparation

1.7.1. Context of the Organization
1.7.2. Analysis of Applicable Safety Regulations
1.7.3. Scope of the General Information Security System
1.7.4. General Information Security System Policy
1.7.5. Objectives of the General Information Security System

1.8. Phase III: Planning

1.8.1. Asset Classification
1.8.2. Risk Assessment
1.8.3. Identification of Threats and Risks

1.9. Phase IV: Implementation and Follow-up

1.9.1. Analysis of Results
1.9.2. Assigning Responsibilities
1.9.3. Timing of the Action Plan
1.9.4. Monitoring and Audits

1.10. Incident Management Security Policies

1.10.1. Phases
1.10.2. Incident Categorization
1.10.3. Incident Management and Procedures

Module 2. Organizational Aspects of Information Security Policy 

2.1. Internal Organization

2.1.1. Assigning Responsibilities 
2.1.2. Segregation of Duties 
2.1.3. Contacts with Authorities 
2.1.4. Information Security in Project Management

2.2. Asset Management

2.2.1. Liability for Assets
2.2.2. Classification of Information 
2.2.3. Handling of Storage Media

2.3. Security Policies in Business Processes

2.3.1. Analysis of the Vulnerabilities of Business Processes
2.3.2. Business Impact Analysis 
2.3.3. Classification of Processes with Respect to Business Impact

2.4. Security Policies Linked to Human Resources 

2.4.1. Before Hiring 
2.4.2. During Contracting
2.4.3. Termination or Change of Position

2.5. Management Security Policies

2.5.1. Management Guidelines on Information Security
2.5.2. BIA - Analyzing the Impact
2.5.3. Recovery Plan as a Security Policy

2.6. Acquisition and Maintenance of Information Systems

2.6.1. Information Systems Security Requirements
2.6.2. Development and Support Data Security
2.6.3. Test Data

2.7. Security with Suppliers

2.7.1. IT Security with Suppliers
2.7.2. Management of Service Delivery with Assurance
2.7.3. Supply Chain Security
2.8. Operational Safety

2.8.1. Operational Responsibilities

2.8.2. Protection Against Malicious Code
2.8.3. Backup Copies
2.8.4. Activity and Supervision Records

2.9. Safety and Regulatory Management

2.9.1. Compliance with Legal Requirements
2.9.2. Information Security Reviews

2.10. Business Continuity Management Security

2.10.1. Continuity of Information Security
2.10.2. Redundancies

Module 3. Security Policies for the Analysis of Threats in Computer Systems

3.1. Threat Management in Security Policies

3.1.1. Risk Management
3.1.2. Security Risk
3.1.3. Threat Management Methodologies
3.1.4. Implementation of Methodologies

3.2. Phases of Threat Management

3.2.1. Identification
3.2.2. Analysis
3.2.3. Localization
3.2.4. Safeguard Measures

3.3. Audit Systems for Threat Localization

3.3.1. Classification and Information Flow
3.3.2. Analysis of Vulnerable Processes

3.4. Risk Classification

3.4.1. Types of Risk
3.4.2. Calculation of Threat Probability
3.4.3. Residual Risk

3.5. Risk Treatment

3.5.1. Implementation of Safeguard Measures
3.5.2. Transfer or Assume

3.6. Control Risks

3.6.1. Continuous Risk Management Process
3.6.2. Implementation of Security Metrics
3.6.3. Strategic Model of Information Security Metrics

3.7. Practical Methodologies for Threat Analysis and Control

3.7.1. Threat Catalog
3.7.2. Catalog of Control Measures
3.7.3. Safeguards Catalog

3.8. ISO 27005

3.8.1. Risk Identification
3.8.2. Risk Analysis
3.8.3. Risk Evaluation

3.9. Risk, Impact and Threat Matrix

3.9.1. Data, Systems and Personnel
3.9.2. Threat Probability
3.9.3. Magnitude of Damage

3.10. Design of Phases and Processes in Threat Analysis

3.10.1. Identification of Critical Organizational Elements
3.10.2. Determination of Threats and Impacts
3.10.3.  Impact and Risk Analysis
3.10.4. Methods

The practical cases of this Postgraduate diploma will put you in real situations of cyber-attacks. The knowledge acquired will help you to deal with them"

Postgraduate Diploma in Information Security Threat Management

In an increasingly digitized world, information security has become a fundamental concern for companies and organizations. That is why at TECH Global University we have developed our Postgraduate Diploma in Information Security Threat Management, with the aim of qualifying professionals in the sector in the latest techniques and tools to ensure the protection of information. Our online classes offer quality education, taught by specialists in the field of information security, and allow students to learn at their own pace and at any time and place. The flexibility offered by the online modality allows students to balance their studies with their professional and personal life, without having to give up their professional career.

Specialize in computer security

Do you know why TECH is considered one of the best universities in the world? Because we have a catalog of more than ten thousand educational programs, presence in multiple countries, innovative methodologies, unique educational technology and a highly qualified teaching team; that's why you can't miss the opportunity to study with us. This Postgraduate Diploma in Information Security Threat Management focuses on the identification and management of IT security risks in companies, as well as the adoption of best practices for information protection and incident management. Students will have access to the latest cybersecurity tools and techniques, including vulnerability analysis, patch management and system monitoring, among others. Upon completion of this program, students will be qualified to identify and manage IT security threats in any type of organization, allowing them to stand out in an increasingly demanding job market in terms of information security. Don't wait any longer to boost your career in the field of information security. Enroll today in the TECH's Technological University Postgraduate Diploma!