
Certificate
The world's largest faculty of information technology”
Description
At TECH, we teach you to think like an attacker would think so that the security solutions proposed are 100% effective"

An example of the need for this professional profile can be found precisely in the banking sector. According to cybersecurity company Trend Micro, it is detecting a 1,318% year-on-year increase in ransomware attacks, a malware that hijacks information and demands payment of a ransom to recover the data. This explains the high demand for qualified professionals to deal with attacks.
For this reason, TECH's agenda covers cybersecurity from different angles. With the intention of offering optimal learning. The types of threats will be defined, providing the keys to perform risk analysis and security plans. In addition, specific topics have been set aside to address network, communications and data security.
The final part of the cybersecurity syllabus will focus on security in different operating systems, specifically Linux and Windows. As well as threat detection and response, and cloud security.
A topic related to software engineering has also been provided. It will deal with the application of software to IT, project management and IT methodologies, Big Data or IoT, among other concepts. Along with a specific module for IT governance, very useful for the corporate environment.
The program will be taught entirely online and without schedules, only a device with an internet connection will be required. In addition, students will have access to the syllabus in different formats, so that they can select the one that best suits their needs. Thus, promoting family and work reconciliation and facilitating the assimilation of learning.
Thanks to the techniques provided by our instructors you will learn how to create robust firewalls for files as sensitive as customer databases"
This Postgraduate Diploma in Security in Computer and Systems Engineering contains the most complete and up-to-date educational program on the market. Its features are:
- The development of case studies presented by security experts in systems engineering and computer science
- The graphic, schematic, and eminently practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
- Practical exercises where self-assessment can be used to improve learning
- Its special emphasis on innovative methodologies
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
In this University Expert you will learn how to use SIEM systems to centralize the storage and interpretation of safety data"
The program’s teaching staff includes professionals from the sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive training programmed to train in real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise during the academic year. This will be done with the help of an innovative system of interactive videos made by renowned experts.
The ability to detect an attack must be accompanied by the ability to repel it. In this program you will learn how to carry out both processes"

Learn the characteristics, types and possibilities of blockchain technology applied to software thanks to the specific topic raised by TECH"
Syllabus
The Postgraduate Diploma in Security in Computer and Systems Engineering focuses on IT security systems. It defines governance and management, analyzes cryptography and certificate technologies, and develops network, communications and data security. Not to mention such important elements as identity and permissions management, threat detection and incident response. In addition, content related to software engineering, such as the frontend and backend of applications, and IT governance has been developed.

Learn the peculiarities of security in operating systems such as Linux or Windows thanks to this Postgraduate Diploma"
Module 1. Security Systems
1.1. Information Technology Security Systems
1.1.1. Information Systems Security Challenges
1.1.2. Types of Threats
1.1.3. Network and Internet Systems
1.2. Information Security Governance and Management
1.2.1. Security Governance. Safety Regulations
1.2.2. Risk Analysis
1.2.3. Security Planning
1.3. Cryptography and Certificate Technologies
1.3.1. Cryptographic Techniques
1.3.2. Cryptographic Protocols
1.3.3. Digital Certificates. Applications
1.4. Network and Communications Security
1.4.1. Security in Communication Systems
1.4.2. Firewall Security
1.4.3. Intrusion Detection and Prevention Systems
1.5. Identity and Permission Management Systems
1.5.1. Authentication Management Systems
1.5.2. Authorization Management System: Access Policies
1.5.3. Key Management Systems
1.6. Data Security
1.6.1. Securitization of Storage Systems
1.6.2. Protection of Database Systems
1.6.3. Securing Data in Transit
1.7. Operating Systems Security
1.7.1. Linux
1.7.2. Windows
1.7.3. Vulnerability Scanning and Patching
1.8 Detection of Threats and Attacks
1.8.1. Auditing, Logging and Monitoring Systems
1.8.2. Event and Alarm Systems
1.8.3. SIEM Systems
1.9. Incident Response
1.9.1. Incident Response Plan
1.9.2. Ensuring Business Continuity
1.9.3. Forensic Analysis and Remediation of Incidents of the Same Nature.
1.10. Security in Cloud Environments
1.10.1. Security in Cloud Environments
1.10.2. Shared Management Model
1.10.3. Security Management Systems Application
Module 2. Software Engineering
2.1. Software Applications in Information Technology
2.1.1. Software Applications
2.1.2. Life Cycle
2.1.3. Architecture
2.1.4. Methods
2.2. Project Management and IT Methodologies
2.2.1. Project Management
2.2.2. Agile Methodologies
2.2.3. Tools
2.3. Front end Development and Mobile Applications
2.3.1. Front end Development and Mobile Applications
2.3.2. HTML, CSS
2.3.3. JavaScript, jQuery
2.3.4. Angular
2.3.5. React
2.4. Backend Development of Software Applications
2.4.1. Backend Development of Software Applications
2.4.2. Backend Architecture of Software Applications
2.4.3. Backend Programming Languages
2.4.4. Application Servers in Software Architecture
2.5. Data Storage, Databases and Caching
2.5.1. Data Management of Software Applications
2.5.2. File System
2.5.3. Relational Databases
2.5.4. Non-Relational Databases
2.5.5. Cache
2.6. Container Management in Cloud Computing
2.6.1. Container Technology
2.6.2. Containers with Docker and Docker-Compose Technology
2.6.3. Container Orchestration with Kubernetes
2.6.4. Containers in Cloud Computing
2.7. Testing and Continuous Integration
2.7.1. Testing and Continuous Integration
2.7.2. Unit Tests
2.7.3. Test e2e
2.7.4. Test Driven Development (TDD)
2.7.5. Continuous Integration
2.8. Software-Oriented Blockchain
2.8.1. Software-Oriented Blockchain
2.8.2. Cryptocurrencies
2.8.3. Types of Blockchain
2.9. Big Data Software, Artificial Intelligence, IoT
2.9.1. Big Data, Artificial Intelligence, IoT
2.9.2. Big Data
2.9.3. Artificial Intelligence
2.9.4. Neural Networks
2.10. IT Software Security
2.10.1. IT Software Security
2.10.2. Servers
2.10.3. Ethical Aspects
2.10.4. European Data Protection Regulation (GDPR)
2.10.5. Risk Analysis and Management
Module 3. IT (Information Technology) Governance and Management
3.1. IT Governance and Management
3.1.1. IT Governance and Management
3.1.2. Advanced IT Governance
3.1.3. IT Governance: Security and Risk
3.2. Reference Sources for IT Governance
3.2.1. Frameworks and Models
3.2.2. IT Governance Standards
3.2.3. IT Governance Quality Systems
3.3. IT Governance. Structures and Management
3.3.1. Role of IT Governance
3.3.2. IT Governance Structures
3.3.3. Implementation of IT Governance
3.4. Key Elements in IT Governance
3.4.1. Enterprise Architecture
3.4.2. Data Governance
3.4.3. Relationship of IT Governance and AI
3.5. COBIT. Control Objectives for Information and Related Technologies
3.5.1. COBIT. Control Objectives
3.5.2. Framework COBIT
3.5.3. Areas, Domains and Processes
3.6. ITIL v4 Framework
3.6.1. ITIL v4 Framework
3.6.2. Service Value System
3.6.3. Dimensions and Principles
3.7. IT Governance Performance Measurement
3.7.1. IT Governance Monitoring and Control Principles
3.7.2. IT Governance Control Metrics
3.7.3. Integral Control Panel
3.8. IT Management
3.8.1. IT Management
3.8.2. IT Service Provider Procurement and Management
3.8.3. IT Performance Monitoring
3.8.4. IT Quality Assurance
3.9. Acquisition and Development of Information Systems
3.9.1. Project Management Structure
3.9.2. Product Development Methodology
3.9.3. Implementation and Exploitation of Information Systems
3.10. Governance, IT Management and Cloud Computing
3.10.1. IT Governance and Management in Cloud Computing Environments
3.10.2. Shared Security Management Model
3.10.3. Enterprise Cloud Architectures

Learn more about the IT governance risks proposed by TECH to keep your company fully protected"