University certificate
The world's largest faculty of information technology”
Introduction to the Program
A multidisciplinary program that will mark a before and after in your career through the improvement of your professional skills as a specialist in Software and Computer Systems Engineering"
It could be said that the objective of software engineering is the creation of computer programs that meet the needs of society as a whole and of companies. However, it goes beyond this, since it allows, through database management, to save production costs, increase system security and raise the quality of the services offered. Thanks to the advance of technology and the development of programming, it is now possible to model applications with secure and stable structures through different languages and codes, which makes this branch of computer science a complex, but exciting and highly demanded profession in the digital society.
For this reason, and with the aim that the graduate finds in a single degree the content that allows him not only to catch up, but to specialize in this area in a multidisciplinary way, TECH has developed this blended Master in Software and Computer Systems Engineering. It is a program that combines 1,500 hours of the best theoretical content with 3 weeks of practical training in a leading software development company.
The degree includes a 100% online syllabus that delves into methodologies, development and quality in software engineering, project management, web computing, security management and server administration. All this, through information selected by a team of specialized engineers who have also developed additional material in different formats so that the graduate can get the most out of the content. of the content.Â
You will then have the opportunity to do practical training in a specialized software development center, where you will actively participate in the projects being developed at that time. During this period, a tutor will guide you through the experience, ensuring the completion of a plan of activities that will allow you not only to acquire a broad and specialized knowledge of the current profession, but also to improve your skills and abilities exponentially and based on the requirements of the current demand of the labor market.Â
You will be able to study all the theoretical content 100% online and with a fully customized schedule, so you can combine it with any other activity without any problem"
This Hybrid Master's Degree in Software and Computer Systems Engineering contains the most complete and up-to-date program on the market. The most important features include:
- Development of more than 100 case studies presented by computer engineering professionals with extensive experience in software project management
- Its graphic, schematic and practical contents with which they are conceived, gather CURRENT and assistance information on those disciplines that are essential for professional practice
- Assessment and detection of vulnerabilities in online applications, knowledge of security policies and standards, management of web services technologies, mitigation and containment of web services incidents, etc
- All of this will be complemented by theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
- In addition, you will be able to do a 3-week internship in a prestigious software development company
Web security has never been more important. With this Hybrid Master's Degree you will learn in detail the best tools to guarantee inviolable and stable applications"
This Master blended learning's program, which has a professionalizing nature and Communication Management blended learning modality, is aimed at updating computer engineering specialized in aesthetic units, and who require a high level of qualification. The contents are based on the latest scientific evidence, and oriented in an educational way to integrate theoretical knowledge into practice, and the theoretical-practical elements will facilitate knowledge update and decision-making in patient management.
Thanks to their multimedia content developed with the latest educational technology, they will allow the physiotherapy professional to obtain situated and contextual learning, i.e. a simulated environment that will provide immersive learning programmed to train in real situations. This program is designed around Problem-Based Learning, whereby the physician must try to solve the different professional practice situations that arise during the course. For this purpose, students will be assisted by an innovative interactive video system created by renowned and experienced experts.
You will have access to practical cases of risk assessment in IT auditing, so that you will know the most effective tests and the appropriate support tools for each type of project"
A multidisciplinary and intensive option to learn everything necessary to handle the HTTP protocol on multiple servers"
Syllabus
For the development of the content of this program, TECH has taken into account two fundamental aspects: on the one hand, the requirements and specifications of current Computer Engineering, and on the other hand, the recommendation of a team of experts in the sector. All the information gathered has been adapted to the Relearning methodology, in whose application this center is a pioneer. Thanks to the use of this pedagogical strategy, together with the exhaustiveness of its syllabus and the quality and variety of the additional material that the graduate will find in the Virtual Campus, this degree will mark a before and after in his or her professional career.
A study plan designed to offer you the most advanced and updated knowledge in Hepatology in only 12 months"
Módulo 1. Methodologies, Development and Quality in Software Engineering
1.1. Introduction to Software Engineering
1.1.1. Introduction
1.1.2. The Software Crisis
1.1.3. Differences between Software Engineering and Computer Science
1.1.4. Ethics and Professional Responsibility in Software Engineering
1.1.5. Software Factories
1.2. The Software Development Process
1.2.1. Definition
1.2.2. Software Process Model
1.2.3. The Unified Software Development Process
1.3. Object-Oriented Software Development
1.3.1. Introduction
1.3.2. Principles of Object Orientation
1.3.3. Object Definition
1.3.4. Class Definition
1.3.5. Object-Oriented Analysis vs. Object-Oriented Design
1.4. Model-Based Software Development
1.4.1. The Need to Model
1.4.2. Software Systems Modeling
1.4.3. Object Modeling
1.4.4. UML
1.4.5. CASE Tools
1.5. Application Modeling and Design Patterns with UML
1.5.1. Advanced Requirements Modeling
1.5.2. Advanced Static Modeling
1.5.3. Advanced Dynamic Modeling
1.5.4. Component Modeling
1.5.5. Introduction to Design Patterns with UML
1.5.6. Adapter
1.5.7. Factory
1.5.8. Singleton
1.5.9. Strategy
1.5.10. Composite
1.5.11. Facade
1.5.12. Observer
1.6. Model-Driven Engineering
1.6.1. Introduction
1.6.2. Metamodeling of Systems
1.6.3. MDA
1.6.4. DSL
1.6.5. Model Refinements with OCL
1.6.6. Model Transformations
1.7. Ontologies in Software Engineering
1.7.1. Introduction
1.7.2. Ontology Engineering
1.7.3. Application of Ontologies in Software Engineering
1.8. Agile Methodologies for Software Development, Scrum
1.8.1. What is Software Agility?
1.8.2. The Agile Manifesto
1.8.3. The Roadmap of an Agile Project
1.8.4. The Product Owner
1.8.5. User Stories
1.8.6. Agile Planning and Estimating
1.8.7. Measurements in Agile Development
1.8.8. Introduction to Scrum
1.8.9. The RolesÂ
1.8.10. The Product Backlog
1.8.11. The Sprint
1.8.12. Meetings
1.9. Lean Software Development Methodology
1.9.1. Introduction
1.9.2. Kanban
1.10. Quality and Software Process Improvement
1.10.1. Introduction
1.10.2. Software Measurement
1.10.3. Software Testing
1.10.4. Software Process Quality Model: CMMI
Módulo 2. Software Project Management
2.1. Fundamental Concepts of Project Management and the Project Management Lifecycle
2.1.1. What is a Project?
2.1.2. Common Methodology
2.1.3. What is Project Management?
2.1.4. What is a Project Plan?
2.1.5. Benefits
2.1.6. Project Life Cycle
2.1.7. Process Groups or Project Management Life Cycle
2.1.8. The Relationship between Process Groups and Knowledge Areas
2.1.9. Relationships between Product and Project Life Cycle
2.2. Start-Up and Planning
2.2.1. From the Idea to the Project
2.2.2. Development of the Project Record
2.2.3. Project Kick-Off Meeting
2.2.4. Tasks, Knowledge and Skills in the Startup Process
2.2.5. The Project Plan
2.2.6. Development of the Basic Plan. Steps
2.2.7. Tasks, Knowledge and Skills in the Planning Process
2.3. Stakeholders and Outreach Management
2.3.1. Identify Stakeholders
2.3.2. Develop Plan for Stakeholder Management
2.3.3. Manage Stakeholder Engagement
2.3.4. Control Stakeholder Engagement
2.3.5. The Objective of the Project
2.3.6. Scope Management and its Plan
2.3.7. Gathering Requirements
2.3.8. Define the Scope Statement
2.3.9. Create the WBS
2.3.10. Verify and Control the Scope
2.4. The Development of the Time-Schedule
2.4.1. Time Management and its Plan
2.4.2. Define Activities
2.4.3. Establishment of the Sequence of Activities
2.4.4. Estimated Resources for Activities
2.4.5. Estimated Duration of Activities
2.4.6. Development of the Time-Schedule and Calculation of the Critical Path
2.4.7. Schedule Control
2.5. Budget Development and Risk Response
2.5.1. Estimate Costs
2.5.2. Develop Budget and S-Curve
2.5.3. Cost Control and Earned Value Method
2.5.4. Risk Concepts
2.5.5. How to Perform a Risk Analysis
2.5.6. The Development of the Response Plan
2.6. Quality Management
2.6.1. Quality Planning
2.6.2. Assuring Quality
2.6.3. Quality Control
2.6.4. Basic Statistical Concepts
2.6.5. Quality Management Tools
2.7. Communication and Human Resources
2.7.1. Planning Communications Management
2.7.2. Communications Requirements Analysis
2.7.3. Communication Technology
2.7.4. Communication Models
2.7.5. Communication Methods
2.7.6. Communications Management Plan
2.7.7. Manage Communications
2.7.8. Management of Human Resources
2.7.9. Main Stakeholders and their Roles in the Projects
2.7.10. Types of Organization
2.7.11. Project Organization
2.7.12. The Work Equipment
2.8. Procurement
2.8.1. The Procurement Process
2.8.2. Education
2.8.3. Search for Suppliers and Request for Quotations
2.8.4. Contract Allocation
2.8.5. Contract Administration
2.8.6. Contracts
2.8.7. Types of Contracts
2.8.8. Contract Negotiation
2.9. Execution, Monitoring and Control and Closure
2.9.1. Process Groups
2.9.2. Project Execution
2.9.3. Project Monitoring and Control
2.9.4. Project Closure
2.10. Professional Responsibility
2.10.1. Professional Responsibility
2.10.2. Characteristics of Social and Professional Responsibility
2.10.3. Project Leader Code of Ethics
2.10.4. Liability vs. PMP®
2.10.5. Examples of Liability
2.10.6. Benefits of Professionalization
Módulo 3. Software Development Platforms
3.1. Introduction to Application Development
3.1.1. Desktop Applications
3.1.2. Programming Language
3.1.3. Integrated Development Environments
3.1.4. Web Applications
3.1.5. Mobile Applications
3.1.6. Cloud Applications
3.2. Application Development and Graphical User Interface in Java
3.2.1. Integrated Development Environments for Java
3.2.2. Main IDE for Java
3.2.3. Introduction to the Eclipse Development Platform
3.2.4. Introduction to the NetBeans Development Platform
3.2.5. Controller View Model for Graphical User Interfaces
3.2.6. Design a Graphical Interface in Eclipse
3.2.7. Design a Graphical Interface in NetBeans
3.3. Debugging and Testing in Java
3.3.1. Testing and Debugging of Java programs
3.3.2. Debugging in Eclipse
3.3.3. Debugging in NetBeans
3.4. Application Development and Graphical User Interface in. NET
3.4.1. Net Framework
3.4.2. Components of the .NET Development Platform
3.4.3. Visual Studio .NET
3.4.4. .NET tools for GUI
3.4.5. The GUI with Windows Presentation Foundation
3.4.6. Debugging and Compiling a WPF Application
3.5. Programming for .NET Networks
3.5.1. Introduction to .NET Network Programming
3.5.2. Requests and Responses in .NET
3.5.3. Use of Application Protocols in .NET
3.5.4. Security in .NET Network Programming
3.6. Mobile Application Development Environments
3.6.1. Mobile Applications
3.6.2. Android Mobile Applications
3.6.3. Steps for Development in Android
3.6.4. The IDE Android Studio
3.7. Development of Applications in the Environment Android Studio
3.7.1. Install and Start Android Studio
3.7.2. Running an Android Application
3.7.3. Development of the Graphic Interface in Android Studio
3.7.4. Starting Activities in Android Studio
3.8. Debugging and Publishing of Android Applications
3.8.1. Debugging an Application in Android Studio
3.8.2. Memorizing Applications in Android Studio
3.8.3. Publishing an Application on Google Play
3.9. Cloud Application Development
3.9.1. Cloud Computing
3.9.2. Cloud Levels: SaaS, PaaS, IaaS
3.9.3. Main Development Platforms in the Cloud
3.9.4. Bibliographical References
3.10. Introduction to Google Cloud Platform
3.10.1. Basic Concepts of Google Cloud Platform
3.10.2. Google Cloud Platform Services
3.10.3. Tools in Google Cloud Platform
Módulo 4. Web-Client Computing
4.1. Introduction to HTML
4.1.1. Structure of the Document
4.1.2. Color
4.1.3. Text:Â
4.1.4. Hypertext LinksÂ
4.1.5. Images
4.1.6. Lists
4.1.7. TablesÂ
4.1.8. Frames
4.1.9. Forms
4.1.10. Specific Elements for Mobile TechnologiesÂ
4.1.11. Obsolete ElementsÂ
4.2. Cascading Style Sheets (CSS)
4.2.1. Elements and Structure of a Cascading Style Sheet
4.2.1.1. Creation of Style Sheets
4.2.1.2. Application of Styles Selectors
4.2.1.3. Style Inheritance and CascadingÂ
4.2.1.4. Page Formatting Using Styles
4.2.1.5. Page Structuring Using Styles. The Box Model
4.2.2. Style Design for different Devices
4.2.3. Types of Style Sheets: Static and Dynamic Pseudoclasses
4.2.4. Best Practices in the Use of Style Sheets
4.3. Introduction and History of JavaScript
4.3.1. Introduction
4.3.2. History of JavaScript
4.3.3. Development Environment to be Used
4.4. Basic Notions of Web Programming
4.4.1. Basic JavaScript Syntax
4.4.2. Primitive Data Types and Operators
4.4.3. Variables and Areas
4.4.4. Text Strings and Template Literals
4.4.5. Numbers and Booleans
4.4.6. Comparisons
4.5. Complex JavaScript Structures
4.5.1. Vectors or Arrays and Objects
4.5.2. Sets
4.5.3. Maps
4.5.4. Disjunctive
4.5.5. Loops
4.6. Functions and Objects
4.6.1. Function Definition and Invocation
4.6.2. Arguments
4.6.3. Arrow Functions
4.6.4. Callback Functions
4.6.5. Higher Order Functions
4.6.6. Literal Objects
4.6.7. The This Object
4.6.8. Objects as Namespaces: theMaths and Date Objects
4.7. The Document Object Model (DOM)
4.7.1. What is DOM?
4.7.2. A Bit of History
4.7.3. Navigation and Element Retrieval
4.7.4. A Virtual DOM with JSDOM
4.7.5. Query Selectors
4.7.6. Navigation using Properties
4.7.7. Assigning Attributes to Elements
4.7.8. Creation and Modification of Nodes
4.7.9. Updated Styling of the DOM Elements
4.8. Modern Web Development
4.8.1. Event-Driven Flow and Listeners
4.8.2. Modern Web Toolkits and Alignment Systems
4.8.3. Strict JavaScript Mode
4.8.4. More about Functions
4.8.5. Asynchronous Promises and Functions
4.8.6. Closures
4.8.7. Functional Programming
4.8.8. POO in JavaScript
4.9. Web Usability
4.9.1. Introduction to Usability
4.9.2. Definition of UsabilityÂ
4.9.3. Importance of User-Centered Web DesignÂ
4.9.4. Differences Between Accessibility and Usability
4.9.5. Advantages and Problems in Combining Accessibility and UsabilityÂ
4.9.6. Advantages and Difficulties in the Implementation of Usable Websites
4.9.7. Usability Methods
4.9.8. User Requirements Analysis
4.9.9. Conceptual Design Principles. User-Oriented Prototyping
4.9.10. Guidelines for the Creation of Usable Web Sites
4.9.10.1. Usability Guidelines of Jakob Nielsen
4.9.10.2. Usability Guidelines of Bruce Tognazzini
4.9.11. Usability Evaluation
4.10. Web Accessibility
4.10.1. Introduction
4.10.2. Definition of Web-Accessibility
4.10.3. Types of Disabilities
4.10.3.1. Temporary or Permanent DisabilitiesÂ
4.10.3.2. Visual Impairment
4.10.3.3. Hearing Impairment
4.10.3.4. Motor Impairment
4.10.3.5. Neurological or Cognitive DisabilitiesÂ
4.10.3.6. Difficulties Arising from Aging
4.10.3.7. Limitations Arising from the Environment
4.10.3.8. Barriers Preventing Access to the Web
4.10.4. Technical Aids and Support Products to Overcome Barriers
4.10.4.1. Aids for the Blind
4.10.4.2. Aids for Persons with Low VisionÂ
4.10.4.3. Aids for People with Color BlindnessÂ
4.10.4.4. Aids for the Hearing Impaired
4.10.4.5. Aids for the Motor Impaired
4.10.4.6. Aids for the and Neurological Impaired
4.10.5. Advantages and Difficulties in the Implementation of Web Accessibility
4.10.6. Web Accessibility Regulations and Standards
4.10.7. Web Accessibility Regulatory Bodies
4.10.8. Comparison of Standards and Regulations
4.10.9. Guidelines for Compliance with Regulations and StandardsÂ
4.10.9.1. Description of the Main Guidelines (Images, links, videos, etc.)Â
4.10.9.2. Guidelines for Accessible NavigationÂ
4.10.9.2.1. Perceptibility
4.10.9.2.2. Operability
4.10.9.2.3. Comprehensibility
4.10.9.2.4. RobustnessÂ
4.10.10. Description of the Web Accessibility Compliance Process
4.10.11. Compliance Levels
4.10.12. Compliance Criteria
4.10.13. Compliance Requirements
Módulo 5. Web Server Computing
5.1. Introduction to Server-Side Programming: PHP
5.1.1. Server-Side Programming Basics
5.1.2. Basic PHP Syntax
5.1.3. HTML Content Generation with PHP
5.1.4. Development and Testing Environments: XAMPP
5.2. Advanced PHP
5.2.1. Control Structures with PHP
5.2.2. PHP Functions
5.2.3. Array Handling in PHP
5.2.4. String Handling with PHP
5.2.5. Object Orientation in PHP
5.3. Data Models
5.3.1. Concept of Data. Life Cycle of DataÂ
5.3.2. Types of Data
5.3.2.1. Basic
5.3.2.2. Records
5.3.2.3. Dynamics
5.4. Relational Model
5.4.1. Description
5.4.2. Entities and Types of Entities
5.4.3. Data Elements. Attributes
5.4.4. Relationships: Types, Subtypes, Cardinality
5.4.5. Keys Types of KeysÂ
5.4.6. Normalization. Normal Shapes
5.5. Construction of the Logical Data Model
5.5.1. Specification of Tables
5.5.2. Definition of Columns
5.5.3. Key SpecificationÂ
5.5.4. Conversion to Normal Shapes. DependencyÂ
5.8.3. Manejo de sesiones
5.6. The Physical Data Model. Data Files
5.6.1. Description of Data FilesÂ
5.6.2. Types of Files
5.6.3. Access ModesÂ
5.6.4. File Organization
5.7. Database Access from PHP
5.7.1. Introduction to MariaDB
5.7.2. Working with a MariaDB Database: the SQL Language
5.7.3. Accessing the MariaDB Database from PHP
5.7.4. Introduction to MySQL
5.7.5. Working with a MySQL Database: The SQL Language
5.7.6. Accessing MySQL Database from PHP
5.8. Client Interaction from PHP
5.8.1. PHP Forms
5.8.2. Cookies
5.8.3. Session Management
5.9. Web Application Architecture
5.9.1. The Controller View Model Pattern
5.9.2. Controller
5.9.3. Models
5.9.4. View
5.10. Introduction to Web Services
5.10.1. Introduction to XML
5.10.2. Service-Oriented Architecture (SOA): Web Services
5.10.3. Creation of SOAP and REST Web Services
5.10.4. The SOAP Protocol
5.10.5. The REST Protocol
Módulo 6. Safety Management
6.1. Information Security
6.1.1. Introduction
6.1.2. Information Security Involves Confidentiality, Integrity and Availability
6.1.3. Safety is an Economic Issue
6.1.4. Safety is a Process
6.1.5. Classification of Information
6.1.6. Information Security Involves Risk Management
6.1.7. Security is Articulated with Security Controls
6.1.8. Security is both Physical and Logical
6.1.9. Safety Involves People
6.2. The Information Security Professional
6.2.1. Introduction
6.2.2. Information Security as a Profession
6.2.3. Certifications (ISC)2
6.2.4. The ISO 27001 Standard
6.2.5. Best Security Practices in IT Service Management
6.2.6. Information Security Maturity Models
6.2.7. Other Certifications, Standards and Professional Resources
6.3. Access Control
6.3.1. Introduction
6.3.2. Access Control Requirements
6.3.3. Authentication Mechanisms
6.3.4. Authorization Methods
6.3.5. Access Accounting and Auditing
6.3.6. Triple A" Technologies
6.4. Information Security Programs, Processes and Policies
6.4.1. Introduction
6.4.2. Security Management Programs
6.4.3. Risk Management
6.4.4. Design of Security Policies
6.5. Business Continuity Plans
6.5.1. Introduction to BCPs
6.5.2. Phase I and II
6.5.3. Phase III and IV
6.5.4. Maintenance of the BCP
6.6. Procedures for the Correct Protection of the Company
6.6.1. DMZ Networks
6.6.2. Intrusion Detection Systems
6.6.3. Access Control Lists
6.6.4. Learning from the Attacker: Honeypot
6.7. Security Architecture Prevention
6.7.1. Overview. Activities and Layer Model
6.7.2. Perimeter Defence (Firewalls, WAFs, WAFs, IPS,.
6.7.3. Endpoint Defence (Equipment, Servers and Services)
6.8. Security Architecture Detection
6.8.1. Overview Detection and Monitoring
6.8.2. Logs, Encrypted Traffic Breaking, Recording and Siems
6.8.3. Alerts and Intelligence
6.9. Security Architecture Reaction
6.9.1. Reaction Products, Services and Resources
6.9.2. Incident Management
6.9.3. CERTS and CSIRTs
6.10. Security Architecture Recovery
6.10.1. Resilience, Concepts, Business Requirements and Regulations
6.10.2. IT Resilience Solutions
6.10.3. Crisis Management and Governance
Módulo 7. Software Security
7.1. Problems of the Software Security
7.1.1. Introduction to the Problem of Software Safety
7.1.2. Vulnerabilities and their Classification
7.1.3. Secure Software Properties
7.1.4. References
7.2. Software Safety Design Principles
7.2.1. Introduction
7.2.2. Software Safety Design Principles
7.2.3. Types of S-SDLC
7.2.4. Software Safety in S-SDLC Phases
7.2.5. Methodologies and Standards
7.2.6. References
7.3. Software Lifecycle Safety in the Requirements and Design Phases
7.3.1. Introduction
7.3.2. Attack Modeling
7.3.3. Cases of Abuse
7.3.4. Safety Requirements Engineering
7.3.5. Risk Analysis Architectural
7.3.6. Design Patterns
7.3.7. References
7.4. Software Lifecycle Safety in the Coding, Testing and Operation Phases
7.4.1. Introduction
7.4.2. Risk-Based Safety Testing
7.4.3. Code Review
7.4.4. Penetration Test
7.4.5. Security Operations
7.4.6. External Review
7.4.7. References
7.5. Secure Coding Applications I
7.5.1. Introduction
7.5.2. Secure Coding Practices
7.5.3. Manipulation and Validation of Inputs
7.5.4. Memory Overflow
7.5.5. References
7.6. Secure Coding Applications II
7.6.1. Introduction
7.6.2. Integers Overflows, Truncation Errors and Problems with Type Conversions between Integers
7.6.3. Errors and Exceptions
7.6.4. Privacy and Confidentiality
7.6.5. Privileged Programs
7.6.6. References
7.7. Development and Cloud Security
7.7.1. Safety in Development; Methodology and Practice
7.7.2. PaaS, IaaS, CaaS and SaaS Models
7.7.3. Security in the Cloud and for Cloud Services
7.8. Encryption
7.8.1. Fundamentals of Cryptology
7.8.2. Symmetric and Asymmetric Encryption
7.8.3. Encryption at Rest and in Transit
7.9. Security Automation and Orchestration (SOAR)
7.9.1. Complexity of Manual Processing; Need to Automate Tasks
7.9.2. Products and Services
7.9.3. SOAR Architecture
7.10. Telework Safety
7.10.1. Need and Scenarios
7.10.2. Products and Services
7.10.3. Telework Safety
Módulo 8. Web Server Administration
8.1. Introduction to Web Servers
8.1.1. What is a Web Server?
8.1.2. Architecture and Operation of a Web Server
8.1.3. Resources and Contents on a Web Server
8.1.4. Application Servers
8.1.5. Proxy Servers
8.1.6. Main Web Servers on the Market
8.1.7. Web Server Usage Statistics
8.1.8. Web Server Security
8.1.9. Load Balancing on Web Servers
8.1.10. References
8.2. HTTP Protocol Handling
8.2.1. Operation and Structure
8.2.2. Request Methods
8.2.3. Status Codes
8.2.4. Headers
8.2.5. Content Coding Code Pages
8.2.6. Performing HTTP Requests on the Internet using a Proxy, Livehttpheadersor Similar Method, Analyzing the Protocol Used.
8.3. Description of Distributed Multi-Server Architectures
8.3.1. 3-Layer Model
8.3.2. Fault Tolerance
8.3.3. Load Sharing
8.3.4. Session State Stores
8.3.5. Cache Stores
8.4. Internet Information Services (IIS)
8.4.1. What is IIS?
8.4.2. History and Evolution of IIS
8.4.3. Main Advantages and Features of IIS7 and Later Versions
8.4.4. IIS7 Architecture and Later Versions
8.5. IIS Installation, Administration and Configuration
8.5.1. Preamble
8.5.2. Internet Information Services (IIS) Installation
8.5.3. IIS Administration Tools
8.5.4. Web Site Creation, Configuration and Administration
8.5.5. Installation and Management of IIS Extensions
8.6. Advanced Security in IIS
8.6.1. Preamble
8.6.2. Authentication, Authorization, and Access Control in IIS
8.6.3. Configuring a Secure Website on IIS with SSL
8.6.4. Security Policies Implemented in IIS 8.x
8.7. Introduction to Apache
8.7.1. What is Apache?
8.7.2. Main Advantages of Apache
8.7.3. Main Features of Apache
8.7.4. Architecture
8.8. Apache Installation and Configuration
8.8.1. Initial Installation of Apache
8.8.2. Apache Configuration
8.9. Installation and Configuration of the Different Apache Modules
8.9.1. Apache Module Installation
8.9.2. Types of Modules
8.9.3. Secure Apache Configuration
8.10. Advanced Security
8.10.1. Authentication, Authorization and Access Control
8.10.2. Authentication Methods
8.10.3. Secure Apache Configuration with SSL
Módulo 9. Security Audit
9.1. Introduction to Information Systems in the Company
9.1.1. Introduction to Information Systems in the Company and the Role of IT Auditing
9.1.2. Definitions of "IT Audit" and "IT Internal Control"
9.1.3. Functions and Objectives of IT Auditing
9.1.4. Differences between Internal Control and IT Auditing
9.2. Internal Controls of Information Systems
9.2.1. Functional Flowchart of a Data Processing Center
9.2.2. Classification of Information Systems Controls
9.2.3. The Golden Rule
9.3. The Process and Phases of the Information Systems Audit
9.3.1. Risk Assessment and Other IT Auditing Methodologies
9.3.2. Execution of an Information Systems Audit. Phases of the Audit
9.3.3. Fundamental Skills of the Auditor of an IT System
9.4. Technical Audit of Security in Systems and Networks
9.4.1. Technical Security Audits. Intrusion Test. Previous Concepts
9.4.2. Security Audits in Systems. Support Tools
9.4.3. Security Audits in Networks. Support Tools
9.5. Technical Audit of Security on the Internet and in Mobile Devices
9.5.1. Internet Security Audit. Support Tools
9.5.2. Mobile Devices Security Audit. Support Tools
9.5.3. Annex 1. Structure of an Executive Report and Technical Report
9.5.4. Annex 2. Tools Inventory
9.5.5. Annex 3. Methods
9.6. Information Security Management System
9.6.1. Security of IS: Properties and Influential Factors
9.6.2. Business Risks and Risk Management: Implementing Controls
9.6.3. Information Security Management System (ISMS): Concept and Critical Success Factors
9.6.4. ISMS-PDCA Model
9.6.5. ISMS ISO-IEC 27001: Organizational Context
9.6.6. Annex 4. Context of the Organization
9.6.7. Annex 5. Leadership.
9.6.8. Annex 6. Education
9.6.9. Annex 7. Support
9.6.10. Annex 8. Operation
9.6.11. Annex 9. Performance Evaluation
9.6.12. Annex 10. Improvement
9.6.13. Annex to ISO 27001/ISO-IEC 27002: Objectives and Controls
9.6.14 ISMS Audit
9.7. Carrying Out the Audit
9.7.1. Procedures
9.7.2. Techniques
9.8. Traceability
9.8.1. Methods
9.8.2. Analysis
9.9. Copyright
9.9.1. Techniques
9.9.2. Results
9.10. Reports and Presenting Proof
9.10.1. Types of Reports
9.10.2. Analysis of Data
9.10.3. Presenting Proof
Módulo 10. Online Application Security
10.1. Vulnerabilities and Security Issues in Online Applications
10.1.1. Introduction to Online Application Security
10.1.2. Security Vulnerabilities in the Design of Web Applications
10.1.3. Security Vulnerabilities in the Implementation of Web Applications
10.1.4. Security Vulnerabilities in the Deployment of Web Applications
10.1.5. Official Lists of Security Vulnerabilities
10.2. Policies and Standards for Online Application Security
10.2.1. Pillars for the Security of Online Applications
10.2.2. Security Policy
10.2.3. Information Security Management System
10.2.4. Secure Software Development Life Cycle
10.2.5. Standards for Application Security
10.3. Security in the Design of Web Applications
10.3.1. Introduction to Web Application Security
10.3.2. Security in the Design of Web Applications
10.4. Testing the Online Safety and Security of Web Applications
10.4.1. Web Application Security Testing and Analysis
10.4.2. Web Application Deployment and Production Security
10.5. Web Services Security
10.5.1. Introduction to Web Services Security
10.5.2. Web Services Security Functions and Technologies
10.6. Testing the Online Safety and Security of Web Services
10.6.1. Evaluation of Web Services Security
10.6.2. Online Protection. Firewalls and XML Gateways
10.7. Ethical Hacking, Malware and Forensics
10.7.1. Ethical Hacking
10.7.2. Malware Analysis
10.7.3. Forensic Analysis
10.8. Incident Resolution on Web Services
10.8.1. Monitoring
10.8.2. Performance Measurement Tools
10.8.3. Containment Measures
10.8.4. Root Cause Analysis
10.8.5. Proactive Problem Management
10.9. Best Practices to ensure Application Security
10.9.1. Handbook of Best Practices in the Development of Online Applications
10.9.2. Handbook of Good Practices in the Implementation of Online Applications
10.10. Common Errors that Undermine Application Security
10.10.1. Common Errors in Development
10.10.2. Common Errors in Hosting
10.10.3. Common Production Errors
After completing this program you will master all aspects of planning, managing and directing a software project"
Hybrid Master’s Degree in Software and Computer Systems Engineering
Technology is an ever-evolving field, and today, software engineering and computer systems have become essential tools for the growth and development of businesses across all sectors. Would you like to specialize in this field? Then the Hybrid Master's Degree in Software Engineering and Computer Systems created by TECH Global University is the best choice for you. In this innovative program, we will provide you with the skills and knowledge necessary to stand out in this high-demand job market. The qualification is designed to allow you to balance your training with your job, thanks to our hybrid classes, which enable you to access content from anywhere, at any time, with constant guidance from our instructors. Another advantage of the program is that you will be able to apply the knowledge acquired to real-life projects, which will help strengthen your professional profile and expand your career opportunities.
Earn your qualification as an expert in software engineering and computer systems
Would you like to master the latest technologies and methodologies for software and computer systems development? This Hybrid Master's Degree from TECH is definitely for you. Through the program, you will gain skills in the design, programming, testing, integration, and maintenance of software, as well as in the management and leadership of technology projects. You will receive the guidance of our expert instructors, who will support you throughout the learning process and resolve any questions you have. Another benefit of the program is that you will have access to a network of contacts with other professionals in the industry, which will allow you to expand your horizons and explore new job opportunities. Enroll now and start building your future in the tech world!