Description

Prepare yourself to specialize in cybersecurity applied to Cloud Computing, the Blockchain or the Internet of Things with this Postgraduate Diploma, which will make you a highly sought-after professional in the best technology companies” 

especializacion ciberseguridad tecnologias emergentes

Emerging Technologies are here to stay. They have appeared at a time when solutions to various problems were needed. Thus, for example, the internet of things is evolving to become an essential element in many people's lives. Likewise, the Blockchain is helping to decentralize numerous processes and Cloud Computing ensures the availability of resources of all kinds, especially data or applications, anywhere, with simple access to a network connection.

As they are very useful elements and services, their popularity is growing rapidly, and this produces a decompensation, since, in many cases, they do not have adequate security because they are technologies that have yet to be 100% developed. For this reason, more and more companies, both in the electronic field and in other areas, are looking for professionals specialized in cybersecurity applied to these tools.

This Postgraduate Diploma explores, therefore, all the possibilities of cybersecurity in this type of technology, guaranteeing the computer scientist an intensive and complete deepening in this field, giving them a decisive professional impulse in their career.

All this, through an online teaching system specially designed with the working professional in mind, who will be able to combine their work with their studies in a comfortable and a simple way. And, in addition, you will have at your disposal the best teaching staff made up of true specialists in this important area of cybersecurity.

Companies of all types need specialists to bring optimal security to their Blockchain or internet of things projects"

This Postgraduate Diploma in Cybersecurity in Emerging Technologies contains the most complete and up-to-date program on the market. Its most notable features are:

  • Case studies presented by IT and cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional development
  • Practical exercises where the self-assessment process can be carried out to improve learning
  • Its special emphasis on innovative methodologies
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Access to content from any fixed or portable device with an Internet connection

The best online teaching system will be at your disposal so that you can study at your own pace, without rigid schedules or interruptions in your work"

The program’s teaching staff includes professionals from sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive training programmed to train in real situations.

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the student will be assisted by an innovative interactive video system created by renowned and experienced experts.

Thanks to this program, you will be able to learn more about the best cryptographic methods or the existing types of Cloud infrastructure"

 experto universitario ciberseguridad tecnologias emergentes

Emerging technologies are the present and the future: specialize and improve your career prospects immediately"

Syllabus

This Postgraduate Diploma in Cybersecurity in Emerging Technologies is composed of 3 specialized modules that will be developed over 450 hours of intensive learning. And, from this structure, the computer scientist will be able to delve into relevant aspects of cybersecurity such as the mathematical foundations of cryptography, the use of algorithms in security, security in public clouds and the main security vulnerabilities of the IoT.

especializacion online ciberseguridad tecnologias emergentes

The most complete contents about cybersecurity applied to emerging technologies are in this program. Don't wait any longer and enroll"

Module 1. Cryptography in IT

1.1.  Cryptography

1.1.1.  Cryptography
1.1.2.  Fundamentals of Mathematics

1.2.  Cryptology

1.2.1.  Cryptology
1.2.2.  Cryptanalysis
1.2.3.  Steganography and Stegoanalysis

1.3.  Cryptographic Protocols

1.3.1.  Basic Blocks
1.3.2.  Basic Protocols
1.3.3.  Intermediate Protocols
1.3.4.  Advanced Protocols
1.3.5.  Exoteric Protocols

1.4.  Cryptographic Techniques

1.4.1.  Length of Passwords
1.4.2.  Password Management
1.4.3.  Types of Algorithms
1.4.4.  Summary of Functions Hash
1.4.5.  Pseudo-Random Number Generators
1.4.6.  Use of Algorithms

1.5.  Symmetric Cryptography

1.5.1.  Block Ciphers
1.5.2.  DES (Data Encryption Standard)
1.5.3.  RC4 Algorithm
1.5.4.  AES (Advanced Encryption Standard)
1.5.5.  Combination of Block Ciphers
1.5.6.  Password Derivation

1.6.  Asymmetric Cryptography

1.6.1.  Diffie-Hellman
1.6.2.  DSA (Digital Signature Algorithm)
1.6.3.  RSA (Rivest, Shamir and Adleman)
1.6.4.  Elliptic Curve
1.6.5.  Asymmetric Cryptography Types

1.7.  Digital Certificates

1.7.1.  Digital Signature
1.7.2.  X509 Certificates
1.7.3.  Public Key Infrastructure (PKI)
1.8.  Implementations
1.8.1.  Kerberos
1.8.2.  IBM CCA
1.8.3.  Pretty Good Privacy (PGP)
1.8.4.  ISO Authentication Framework
1.8.5.  SSL and TLS
1.8.6.  Europay, MasterCard, and Visa (EMV)
1.8.7.  Mobile Telephony Protocols
1.8.8.  Blockchain.

1.9.  Steganography

1.9.1.  Steganography
1.9.2.  Stegoanalysis
1.9.3.  Applications and Uses

1.10.  Quantum Cryptography

1.10.1.  Quantum Algorithms
1.10.2.  Algorithm Protection Against Quantum Computing
1.10.3.  Quantum Key Distribution

Module 2. Security in Cloud Environments

2.1.  Security in Cloud Computing Environments

2.1.1.  Security in Cloud Computing Environments
2.1.2.  Security in Cloud Computing Security Threats and Risks
2.1.3.  Security in Cloud Computing Key Security Aspects

2.2.  Types of Cloud Infrastructure

2.2.1.  Public
2.2.2.  Private
2.2.3.  Hybrid

2.3.  Shared Management Model

2.3.1.  Security Elements Managed by Supplier
2.3.2.  Elements Managed by the Client
2.3.3.  Definition of the Security Strategy

2.4.  Prevention Mechanisms

2.4.1.  Authentication Management Systems
2.4.2.  Authorization Management System: Access Policies
2.4.3.  Key Management Systems

2.5.  Securing Systems

2.5.1.  Securing Storage Systems
2.5.2.  Protection of Database Systems
2.5.3.  Securing Data in Transit

2.6.  Infrastructure Protection

2.6.1.  Secure Network Design and Implementation
2.6.2.  Security in Computing Resources
2.6.3.  Tools and Resources to Protect the Infrastructure

2.7.  Detection of Threats and Attacks

2.7.1.  Auditing, Logging and Monitoring Systems
2.7.2.  Event and Alarm Systems
2.7.3.  SIEM Systems

2.8.  Incident Response

2.8.1.  Incident Response Plan
2.8.2.  Business Continuity
2.8.3.  Forensic Analysis and Remediation of Incidents of the Same Nature.

2.9.  Security in Public Clouds

2.9.1.  AWS (Amazon Web Services)
2.9.2.  Microsoft Azure
2.9.3.  Google GCP
2.9.4.  Oracle Cloud

2.10.  Regulations and Compliance

2.10.1.  Compliance with Safety Regulations
2.10.2.  Risk Management
2.10.3.  People and Process in the Organizations

Module 3. Security in IoT Device Communications

3.1.  From Telemetry to IoT

3.1.1.  Telemetry
3.1.2.  M2M Connectivity
3.1. 3 Democratization of Telemetry

3.2.  IoT Reference Models

3.2.1.  IoT Reference Models
3.2.2.  IoT Simplified Architecture

3.3.  IoT Security Vulnerabilities

3.3.1.  IoT Devices
3.3.2.  IoT Devices Usage Case Studies
3.3.3.  IoT Devices Vulnerabilities

3.4.  Connectivity to IoT

3.4.1.  PAN, LAN, WAN Networks
3.4.2.  Non IoT Wireless Technologies
3.4.3.  LPWAN Wireless Technologies

3.5.  LPWAN Technologies

3.5.1.  The Iron Triangle of LPWAN Networks
3.5.2.  Free Frequency Bands vs. Licensed Bands
3.5.3.  LPWAN Technology Options

3.6.  LoRaWAN Technology

3.6.1.  LoRaWAN Technology
3.6.2.  LoRaWAN Use Cases Ecosystem
3.6.3.  Security in LoRaWAN

3.7.  Sigfox Technology

3.7.1.  Sigfox Technology
3.7.2.  Sigfox Use Cases Ecosystem
3.7.3.  Security in Sigfox

3.8.  IoT Cellular Technology

3.8.1.  IoT Cellular Technology (NB-IoT and LTE-M)
3.8.2.  Cellular IoT Use Cases Ecosystem
3.8.3.  IoT Cellular Security

3.9.  WiSUN Technology

3.9.1.  WiSUN Technology
3.9.2.  WiSUN Use Cases Ecosystem
3.9.3.  Security in WiSUN

3.10.  Other IoT Technologies

3.10.1.  Other IoT Technologies
3.10.2.  Use Cases and Ecosystem of Other IoT Technologies
3.10.3.  Security in Other IoT Technologies

estudiar ciberseguridad tecnologias emergentes

The best faculty will bring you up to date on emerging technology security with the latest content"