University certificate
The world's largest faculty of information technology”
Introduction to the Program
This Postgraduate certificate will allow you to update your knowledge in IT Security in a practical way, 100% online, without renouncing to the maximum academic rigor”

This program is aimed at those interested in attaining a higher level of knowledge in IT Security. The main objective is for students to specialize their knowledge in simulated work environments and conditions in a rigorous and realistic manner so they can later apply it in the real world.
This program will prepare scientifically and technologically, as well as to develop the professional practice of IT engineering, with a transversal and versatile approach adapted to the new technologies and innovations in this field. Students will gain extensive knowledge of IT Security from professionals in the field.
The students will be able to take the opportunity and study this program in a 100% online format, without neglecting their obligations. Update your knowledge and obtain your Postgraduate certificate to continue growing personally and professionally.
Learn the latest techniques and strategies with this program and achieve the success as an IT Engineer”
This Postgraduate certificate in IT Security contains the most complete and up-to-date program on the market. The most important features include:
- Development of 100 simulated scenarios presented by experts in IT Security
- The graphic, schematic and practical contents with which they are conceived provide scientific and practical information on IT Security
- News on latest developments in IT Security
- It contains practical exercises where the self-assessment process can be carried out to improve learning
- Interactive learning system based on the case method and its application to real practice
- All of this will be complemented by theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
Learn about IT Security with this intensive program, from the comfort of your home”
It includes in its teaching staff professionals belonging to the field of education, who bring to this program their work experience, in addition to recognized specialists belonging to reference societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide an immersive program designed to learn in real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. To that end, they will be assisted by an innovative, interactive video system created by renowned experts in IT Security who have extensive teaching experience.
Take advantage of the latest educational technology to get up to date on IT Security without leaving your home"

Learn about the latest techniques in IT Security from experts in the field"
Syllabus

This Postgraduate certificate in IT Security contains the most complete and up-to-date educational program on the market”
Module 1. Information Systems Security
1.1. A Global Perspective on Security, Cryptography and Classical Cryptoanalysis
1.1.1. IT Security: Historical Perspective
1.1.2. But what exactly is meant by Security?
1.1.3. History of Cryptography
1.1.4. Substitution Ciphers
1.1.5. Case Study: The Enigma Machine
1.2. Symmetric Cryptography
1.2.1. Introduction and Basic Terminology
1.2.2. Symmetric Encryption
1.2.3. Modes of Operation
1.2.4. DES
1.2.5. The New AES Standard
1.2.6. Encryption in Flow
1.2.7. Cryptanalysis
1.3. Asymmetric Cryptography
1.3.1. Origins of Public Key Cryptography
1.3.2. Basic Concepts and Operation
1.3.3. The RSA Algorithm
1.3.4. Digital Certificates
1.3.5. Key Storage and Management
1.4. Network Attacks
1.4.1. Network Threats and Attacks
1.4.2. Enumeration
1.4.3. Traffic Interception: Sniffers
1.4.4. Denial of Service Attacks
1.4.5. ARP Poisoning Attacks
1.5. Security Architectures
1.5.1. Traditional Security Architectures
1.5.2. Secure Socket Layer: SSL
1.5.3. SSH Protocol
1.5.4. Virtual Private Networks (VPN)
1.5.5. External Storage Unit Protection Mechanisms
1.5.6. Hardware Protection Mechanisms
1.6. System Protection Techniques and Secure Code Development
1.6.1. Operational Security
1.6.2. Resources and Controls
1.6.3. Monitoring
1.6.4. Intrusion Detection Systems
1.6.5. Host IDS
1.6.6. Network IDS
1.6.7. Signature-Based IDS
1.6.8. Lure Systems
1.6.9. Basic Security Principles in Code Development
1.6.10. Failure Management
1.6.11. Public Enemy Number 1: Buffer Overflows
1.6.12. Cryptographic Botches
1.7. Botnets and Spam
1.7.1. Origin of the Problem
1.7.2. Spam Process
1.7.3. Sending Spam
1.7.4. Refinement of Mailing Lists
1.7.5. Protection Techniques
1.7.6. Third-Party Antispam Services
1.7.7. Study Cases
1.7.8. Exotic Spam
1.8. Web Auditing and Attacks
1.8.1. Information Gathering
1.8.2. Attack Techniques
1.8.3. Data Science
1.9. Malware and Malicious Code
1.9.1. What is Malware?
1.9.2. Types of Malware
1.9.3. Virus
1.9.4. Cryptovirus
1.9.5. Worms
1.9.6. Adware
1.9.7. Spyware
1.9.8. Hoaxes
1.9.9. Phishing
1.9.10. Trojans
1.9.11. The Economy of Malware
1.9.12. Possible Solutions
1.10. Forensic Analysis
1.10.1. Evidence Collection
1.10.2. Evidence Analysis
1.10.3. Antiforensic Techniques
1.10.4. Case Study

A unique, key, and decisive educational experience to boost your professional development”
Postgraduate Certificate in IT Security
IT Security has become an imperative need for companies and organizations, since most of the processes and activities are carried out through electronic devices and systems connected to the network. Therefore, studying TECH's Postgraduate Certificate in IT Security can be an excellent opportunity for those who wish to acquire skills and competencies in this area and therefore, have a more attractive and competitive professional profile. One of the advantages of the course is that it is taught 100% online, which allows students to adapt their study schedules and advance at their own pace, regardless of their geographical location. In addition, TECH's learning platform has state-of-the-art technology and high quality multimedia resources, which guarantee an enriching and effective educational experience. The teachers of the course are experts in computer security, with extensive experience in research and development of projects related to this area. Thanks to their experience and expertise, students will have the opportunity to acquire a deep and up-to-date understanding of the most relevant concepts and techniques in computer security, such as symmetric and asymmetric cryptography, system protection techniques and secure code development, forensic analysis and computer audits.
Expand your professional profile with this exclusive TECH program
As for the skills and competencies that students will acquire at the end of the course, the ability to gain a global perspective of security, cryptography and classical cryptanalysis, the ability to understand the basics of symmetric and asymmetric cryptography stand out. This is how studying TECH's Postgraduate Certificate in IT Security can be an excellent option for those who wish to acquire skills and competencies in this key area of technology, thanks to its online methodology, quality of content and expert teachers in computer security.