Introduction to the Program

With this training, you will achieve the professional success you so deserve because it is specially designed to way true experts in the field”

##IMAGE##

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system. 
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives prepared each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent.
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.

TECH students represent more than 200 different nationalities.  
##IMAGE##
human icon

Learn with the best

In the classroom, TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (postgraduate learning methodology with the best international valuation) with the Case Study. Tradition and vanguard in a difficult balance, and in the context of the most demanding educational itinerary. 

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.   

At TECH, you will have access to the most rigorous and up-to-date case analyses in academia” 

Syllabus

The Postgraduate diploma in Implementation of IT Security Policies is a flexible program designed to meet the specific needs of the executives who enroll in it. From the very first day, you will have access to all the multimedia content available on the platform, allowing you to distribute the teaching load according to your individual needs. In addition, it has a Relearning system, based on the reiteration of content, which will allow you to save hours of study.

The program offers video summaries for each topic, specialized readings, and an extensive library of resources to support your learning experience. All of these resources are available to you 24 hours a day”

Syllabus

The Postgraduate diploma in Implementation of IT Security Policies offered by TECH U is an intensive program designed to equip students with the knowledge and skills required to establish comprehensive plans and policies within their companies to effectively mitigate cyber-attacks of various types.

The program's content is specifically designed to empower managers with essential competencies, enabling them to make informed decisions in any department of the company that may be impacted by a computer attack.

Throughout 600 hours of education, students will engage in individual and team work, analyzing a wide range of practical cases to enhance their understanding and application of concepts. It is, therefore, an authentic immersion in real business situations.

This Postgraduate diploma covers in depth the security policies in software and hardware, in physical and environmental elements of the company, as well as the monitoring tools to be used for the detection of attacks and the application of more effective measures. The program is specifically designed to educate professionals in a rapidly evolving field.

This Postgraduate diploma takes place over six months and is divided into four modules:

Module 1. Practical Implementation of Software and Hardware Security Policies
Module 2. Implementation of Physical and Environmental Safety Policies in the Company
Module 3.
Secure communications policies in the company
Module 4. Monitoring tools for information system security policies

##IMAGE##

Where, When and How is it Taught?

TECH provides the opportunity to complete the Postgraduate diploma in Implementation of Computer Security Policy entirely through an online format. Throughout the six-month educational program, you will have unrestricted access to all program content, enabling you to manage your study time according to your preferences and schedule.

Module 1. Practical Implementation of Software and Hardware Security Policies

1.1. Practical Implementation of Software and Hardware Security Policies

1.1.1. Implementation of Identification and Authorization
1.1.2. Implementation of Identification Techniques
1.1.3. Technical Authorization Measures

1.2. Identification and Authorization Technologies

1.2.1. Identifier and OTP
1.2.2. USB Token or PKI Smart Card
1.2.3. The "Confidential Defense" Key
1.2.4. Active RFID

1.3. Software and Systems Access Security Policies

1.3.1. Implementation of Access Control Policies
1.3.2. Implementation of Communications Access Policies
1.3.3. Types of Security Tools for Access Control

1.4. User Access Management

1.4.1. Access Rights Management
1.4.2. Segregation of Roles and Access Functions
1.4.3. Implementation of Access Rights in Systems

1.5. Access Control to Systems and Applications

1.5.1. Minimum Access Rule
1.5.2. Secure Logon Technologies
1.5.3. Password Security Policies

1.6. Identification Systems Technologies

1.6.1. Active Directory
1.6.2. OTP
1.6.3. PAP, CHAP
1.6.4. KERBEROS, DIAMETER, NTLM

1.7. CIS Controls for Systems Hardening

1.7.1. Basic CIS Controls
1.7.2. Fundamental CIS Controls
1.7.3. Organizational CIS Controls

1.8. Operational Safet

1.8.1. Protection Against Malicious Code
1.8.2. Backup Copies
1.8.3. Activity Log and Supervision

1.9. Management of Technical Vulnerabilities

1.9.1. Technical Vulnerabilities
1.9.2. Technical Vulnerability Management
1.9.3. Restrictions on Software Installation

1.10. Implementation of Security Policy Practices

1.10.1. Logical Vulnerabilities
1.10.2. Implementation of Defense Policies

Module 2. Implementation of Physical and Environmental Safety Policies in the Company

2.1. Security Areas

2.1.1. Physical Security Perimeter
2.1.2. Working in Safe Areas
2.1.3. Security of Offices, Offices and Resources

2.2. Physical Input Controls

2.2.1. Physical Access Control Policies
2.2.2. Physical Input Control Systems

2.3. Physical Access Vulnerabilities

2.3.1. Main Physical Vulnerabilities
2.3.3. Implementation of Safeguards Measures

2.4. Physiological Biometric Systems

2.4.1. Fingerprint
2.4.2. Facial Recognition
2.4.3. Iris and Retinal Recognition
2.4.4. Other Physiological Biometric Systems

2.5. Biometric Behavioral Systems

2.5.1. Signature Recognition
2.5.2. Writer Recognition
2.5.3. Voice Recognition
2.5.4. Other Biometric Behavioral Systems

2.6. Biometrics Risk Management

2.6.1. Implementation of Biometric Systems
2.6.2. Vulnerabilities of Biometric Systems

2.7. Implementation of Policies in Hosts

2.7.1. Installation of Supply and Security Cabling
2.7.2. Equipment Location
2.7.3. Exit of the Equipment Outside the Premises
2.7.4. Unattended Computer Equipment and Clear Post Policy

2.8. Environmental Protection

2.8.1. Fire Protection Systems
2.8.2. Earthquake Protection Systems
2.8.3. Earthquake Protection Systems

2.9. Data Processing Center Security

2.9.1. Security Doors
2.9.2. Video Surveillance Systems (CCTV)
2.9.3. Safety Control

2.10. International Physical Security Standards

2.10.1. IEC 62443-2-1 (European)
2.10.2. NERC CIP-005-5 (U.S. USA)
2.10.3. NERC CIP-014-2 (U.S. USA)

Module 3. Secure Communications Policies in the Company

3.1. Network Security Management

3.1.1. Network Control and Monitoring
3.1.2. Segregation of Networks
3.1.3. Network Security Systems

3.2. Secure Communication Protocols

3.2.1. TCP/IP Model
3.2.2. IPSEC Protocol
3.2.3. TLS Protocol

3.3. Protocol TLS 1.3

3.3.1. Phases of a TLS1.3 Process
3.3.2. Handshake Protocol
3.3.3. Registration Protocol
3.3.4. Differences with TLS 1.2

3.4. Cryptographic Algorithms

3.4.1. Cryptographic Algorithms Used in Communications
3.4.2. Cipher-Suites
3.4.3. Cryptographic Algorithms allowed for TLS 1.3

3.5. Digest Functions

3.5.1. Digest Functions
3.5.2. MD6
3.5.3. SHA

3.6. PKI. Public Key Infrastructure

3.6.1. PKI and its Entities
3.6.2. Digital Certificates
3.6.3. Types of Digital Certificates

3.7. Tunnel and Transport Communications

3.7.1. Tunnel Communications
3.7.2. Transport Communications
3.7.3. Encrypted Tunnel Implementation

3.8. SSH. Secure Shell

3.8.1. SSH. Safe Capsule
3.8.2. SSH Functions
3.8.3. SSH Tools

3.9. Audit of Cryptographic Systems

3.9.1. Integration Test
3.9.2. Cryptographic System Testing

3.10. Cryptographic Systems

3.10.1. Cryptographic Systems Vulnerabilities
3.10.2. Cryptographic Safeguards

Module 4. Information Systems Security Policy Monitoring Tools

4.1. Information Systems Monitoring Policies

4.1.1. System Monitoring
4.1.2. Metrics
4.1.3. Types of Metrics

4.2. Systems Auditing and Registration

4.2.1. Systems Auditing and Logging
4.2.2. Windows Auditing and Logging
4.2.3. Linux Auditing and Logging

4.3. SNMP Protocol. Simple Network Management Protocol

4.3.1. SNMP Protocol
4.3.2. SNMP Functions
4.3.3. SNMP Tools

4.4. Network Monitoring

4.4.1. Network Monitoring
4.4.2. Network Monitoring in Control Systems
4.4.3. Monitoring Tools for Control Systems

4.5. Nagios. Network Monitoring System

4.5.1. Nagios
4.5.2. Operation of Nagios
4.5.3. Nagios Installation

4.6. Zabbix. Network Monitoring System

4.6.1. Zabbix
4.6.2. How Zabbix Works
4.6.3. Zabbix Installation

4.7. Cacti. Network Monitoring System

4.7.1. Cacti
4.7.2. How Cacti Works
4.7.3. Installation of Cacti

4.8. Pandora. Network Monitoring System

4.8.1. Pandora
4.8.2. Operation of Pandora
4.8.3. Pandora Installation

4.9. SolarWinds. Network Monitoring System

4.9.1. SolarWinds
4.9.2. Operation of SolarWinds
4.9.3. Installation of SolarWinds

4.10. Monitoring Regulations

4.10.1. CIS Controls Over Auditing and Record Keeping
4.10.2. NIST 800-123 (U.S.) USA)

##IMAGE##

A unique, key, and decisive educational experience to boost your professional development and make the definitive leap"

Postgraduate Diploma in Implementation of IT Security Policies

The implementation of computer security policies is essential to protect an organization's systems and data against cyber threats. This aspect encompasses the creation and application of rules or procedures to ensure confidentiality, integrity and availability of information; as well as awareness and training of employees in good security practices. TECH Global University has developed a complete Postgraduate Diploma in Implementation of IT Security Policies, with the aim of providing the key tools for professionals to specialize in this new field. Here, we are known for providing an educational modality that is becoming a trend thanks to the efficiency of its online methodology. Through the program, you will learn the best practices and frameworks to identify or assess security risks, develop appropriate policies or procedures, and conduct security audits to ensure compliance with security standards and regulations.

Get to know the implementation of IT security policies

Today, IT security represents a critical concern for businesses and organizations of all sizes. With the growing threat of cyber-attacks, data breaches and vulnerabilities, implementing effective computer security policies are essential to protect sensitive information and maintain public and customer trust. By enrolling in this TECH program, you will learn about digital asset protection, identity or access management, security incident detection and response, and user education or awareness. You will also learn about the latest trends and technologies in IT security, including artificial intelligence, machine learning and cloud security; and how these tools can be used to strengthen security policies in an enterprise environment. Finally, you will master security in mobile devices, the internet of things and web application security. All of this, will enable you to meet current and future challenges in the field of IT security.