Introduction to the Program

Set yourself on the road to a future of maximum job competitiveness with this high-intensity program that we offer you with the quality of TECH"

##IMAGE##

The Postgraduate certificate in Cyberintelligence and Cybersecurity is an intensive program that compiles specialized knowledge in this field throughout a high-impact curriculum.

It addresses fundamental aspects such as the Intelligence Cycle, intelligence sources, social engineering, OSINT methodology, HUMINT, Anonymization, risk analysis, existing methodologies (OWASP, OWISAM, OSSTMM, PTES) and current cybersecurity regulations. These fields are taught with the most up to date vision that includes all the latest developments.

On the other hand, regulations play a fundamental role in cybersecurity and data privacy, we address the regulations concerning all data, whether health, economic, tax, etc. so this program also examines the most relevant international organizations in cybersecurity, exposing its scope of action and its position on different problems. 

With a totally practice-focused approach, this Postgraduate certificate will boost your skills to the level of a specialist"

This Postgraduate certificate in Cyberintelligence and Cybersecurity contains the most complete and up-to-date program on the market. The most important features include:

  • The development of case studies presented by cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where the self-assessment process can be carried out to improve learning
  • Its special emphasis on innovative methodologies in Advanced Practice Nursing
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

Specialize in a sector in constant growth and achieve the professional improvement you desire"

The program’s teaching staff includes professionals from sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive specialization programmed to learn in real situations.

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts.

A fast and efficient learning process that will allow you to advance with confidence in just a few weeks of stimulating work"

##IMAGE##

A higher education process created to be affordable and flexible, with the most interesting methodology of online teaching"

Syllabus

Throughout the study of the different units of this program the student will be able to acquire the latest developments that have been contributed to the field of Cyberintelligence and Cybersecurity . To this end, the syllabus has been structured with a view to the efficient acquisition of complementary learning, which will enable the ability to intervene as quickly as possible. A high-intensity course created for the best in the industry.

##IMAGE##

All concepts of Cyberintelligence and Cybersecurity developed in a structured way in a study approach focused on efficiency" 

Module 1. All concepts of Cyber Intelligence and Cybersecurity implemented in a structured way in a study approach focused on efficiency"

1.1. Cyberintelligence

1.1.1. Cyberintelligence

1.1.1.1. Intelligence

1.1.1.1.1. Intelligence Cycle

1.1.1.2. Cyberintelligence
1.1.1.3. Cyberintelligence and Cybersecurity

1.1.2. The Intelligence Analyst

1.1.2.1. The Role of the Intelligence Analyst
1.1.2.2. The Intelligence Analyst’s Biases in Evaluative Activity

1.2. Cybersecurity

1.2.1. Layers of Security
1.2.2. Identification of Cyber Threats

1.2.2.1. External Threats
1.2.2.2. Internal Threats

1.2.3. Adverse Actions

1.2.3.1. Social Engineering
1.2.3.2. Commonly Used Methods

1.3. Techniques and Tools of Intelligences

1.3.1. OSINT
1.3.2. SOCMINT
1.3.3. Humit
1.3.4. Linux Distributions and Tools
1.3.5. OWISAM
1.3.6. OWASP
1.3.7. PTES
1.3.8. OSSTMM

1.4. Evaluation Methodologies

1.4.1. Intelligence Analysis
1.4.2. Techniques for Organizing Acquired Information
1.4.3. Reliability and Credibility of Information Sources
1.4.4. Analysis Methodologies
1.4.5. Presentation of Intelligence Results

1.5. Audits and Documentation

1.5.1. Computer Security Auditing
1.5.2. Documentation and Permits for Auditing
1.5.3. Types of Audits
1.5.4. Deliverables

1.5.4.1. Technical Report+
1.5.4.2. Executive Report

1.6. Anonymity in the Network

1.6.1. Use of Anonymity
1.6.2. Anonymity Techniques (Proxy, VPN)
1.6.3. TOR, Freenet and IP2 Networks

1.7. Threats and Types of Security

1.7.1. Types of Threats
1.7.2. Physical Security
1.7.3. Network Security
1.7.4. Logical Security
1.7.5. Web Application Security
1.7.6. Security on Mobile Devices

1.8. Regulations and Compliance

1.8.1. The GDPR
1.8.2. The 2019 National Cybersecurity Strategy
1.8.3. ISO 27000 Family
1.8.4. NIST Cybersecurity Framework
1.8.5. PIC
1.8.6. ISO 27032
1.8.7. Cloud Regulations
1.8.8. SOX
1.8.9. PCI

1.9. Risk Analysis and Metrics

1.9.1. Extent of Risk
1.9.2. The Assets
1.9.3. Threats
1.9.4. Vulnerabilities
1.9.5. Risk Evaluation
1.9.6. Risk Treatment

1.10. Important Cybersecurity Agencies

1.10.1. NIST
1.10.2. ENISA
1.10.3. INCIBE
1.10.4. OEA
1.10.5. UNASUR PROSUR

##IMAGE##

A current agenda that includes each and every one of the aspects that a specialist in this field must master"

Postgraduate Certificate in Cyberintelligence and Cybersecurity

The Postgraduate Certificate in Cyber Intelligence and Cybersecurity is a program designed to meet the academic needs of business professionals looking to specialize in the field of cybersecurity and data privacy in today's digital age. Most companies operate in digital environments and store their confidential information on the network, so it is essential to have effective security systems in place to prevent any potential threats. This program addresses key aspects to understand cybersecurity, such as the intelligence cycle, intelligence sources, social engineering, risk analysis and current cybersecurity regulations. Importantly, regulations play a key role in cybersecurity and data privacy, as they establish clear rules to protect health, economic or tax data, for example.

Delve into Online Network Security

The IT team of a company is responsible for cyber security, but more and more managers are deciding to specialize in this field to control themselves the strategies to be applied. The Postgraduate Certificate in Cyber Intelligence and Cybersecurity is a comprehensive program that provides students with the skills and knowledge necessary to protect their organizations from cyber threats. In addition, students will be able to apply the knowledge acquired in real situations to ensure the security of the company's information. In summary, the Postgraduate Certificate in Cyber Intelligence and Cybersecurity is an essential program for business professionals who wish to specialize in cybersecurity and data privacy. With a comprehensive curriculum that addresses the fundamentals of cybersecurity and current regulations, students will be able to understand international cybersecurity standards and regulations and apply them in their daily work. This program is instrumental in ensuring information security in any company and excelling in a constantly evolving field.