Description

Thanks to this program, you will learn the best encryption methods to protect your clients' and employers' data"

##IMAGE##

Cryptography is a booming discipline for which professionals are increasingly in demand. This field makes it possible to protect all types of digital data and has applications in areas such as banking, online stores, databases of all kinds and is essential in the Blockchain. Thus, specializing in this area is a must for today's IT professional.

Many companies, not just technology companies, need cryptographic experts to make their information more secure, and this program responds to that demand. Throughout 3 modules, and in 450 hours of learning, the computer scientist will be able to delve into issues such as the mathematical foundations of cryptography, the methodology of analysis and risk management of information systems or the protection of algorithms against quantum computing.

The professional will be able to deepen in this discipline through a 100% online methodology, specially designed so that the student can combine their work with their studies. In addition, the program will be taught by a teaching staff of great prestige in the field of cryptography, who will teach this program using 
numerous multimedia resources.

Cryptography is basic to companies like Facebook, Paypal or Amazon, and Blockchain technology has given it a huge boost, so specializing in this area can give access to numerous career opportunities"

The postgraduate diploma in Security and Cryptography is the most complete and up-to-date educational program on the market. Its most notable features are: 

  • The development of case studies presented by IT and cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where the self-assessment process can be carried out to improve learning
  • Its special emphasis on innovative methodologies
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection work
  • Content that is accessible from any fixed or portable device with an Internet connection

From the best multimedia materials, and with a teaching staff composed of working professionals, you will learn all the keys to cryptography applied to computer security"

The program includes, in its teaching staff, professionals from the sector who bring to this training the experience of their work, in addition to recognized specialists from prestigious reference societies and universities. 

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive training programmed to train in real situations. 

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the student will be assisted by an innovative interactive video system created by renowned and experienced experts. 

Cryptography is the big IT field of today: this program will allow you to specialize in it with the best online teaching on the market”

##IMAGE##

With this Postgraduate Diploma you will delve into aspects of cryptography such as the protection of algorithms against quantum computing”

Objectives

The main objective of this postgraduate diploma in Security and Cryptography is to offer professionals the latest developments in this area of cybersecurity, so that upon completion they can work in any company that needs a specialist in this field. And for this, TECH offers you the most complete and up-to-date contents, the most flexible teaching system, and teachers of great prestige in the field of cryptography.

##IMAGE##

This program will allow you to achieve all your professional goals, becoming, in the process, a great cryptography specialist" 

General Objectives

  • Analyze and develop the concept of risk and uncertainty within the environment in which we live
  • Examine the risk management model based on ISO 31.000
  • Apply the MAGERIT methodology to evolve the model and take it a step further
  • Design new risk management methodologies based on the agile risk management concept
  • Identify, analyze, assess and treat the risks to be faced from a new business perspective based on a risk-driven model that not only allows us to survive in our environment, but also to contribute value
  • Maximize the opportunities presented and eliminate exposure to all potential risks from the design itself
  • Examine the science of cryptology and the relationship to its branches: cryptography, cryptanalysis, steganography and stegoanalysis
  • Analyze the types of cryptography according to the type of algorithm and according to its use
  • Compile key management systems
  • Evaluate the different practical applications
  • Examine digital certificates
  • Examine the Public Key Infrastructure (PKI)
  • Analyze the latest trends and challenges
  • Determine the basic elements of a Business Continuity Plan (BCP) using the
  • ISO-22301 guidelines as a basis
  • Examine the risks arising from the non-existence of a Business Continuity Plan (BCP)   
  • Analyze the success criteria of a BCP and its integration into a company's overall risk management
  • Specify the implementation phases of a Business Continuity Plan

Specific Objectives

Module 1. Risk Analysis and IT Security Environment

  • Examine, with a holistic vision, the environment in which we move
  • Identify the main risks and opportunities that may affect the achievement of our objectives
  • Analyze risks based on the best practices available to us
  • Assessing the potential impact of these risks and opportunities
  • Develop techniques to deal with risks and opportunities in a way that maximizes value contribution
  • Examine in depth the different risk and value transfer techniques
  • Generate value from the design of proprietary models for agile risk management
  • Examine results to propose continuous improvements in project and process management based on risk-driven management models
  • Innovate and transform general data into relevant information for risk-based decision making

Module 2. Cryptography in IT

  • Compile the fundamental operations (XOR, large numbers, substitution and transposition) and the various components (One-Way functions, Hash, random number generators)
  • Analyze cryptographic techniques
  • Develop the different cryptographic algorithms
  • Demonstrate the use of digital signatures and their application in digital certificates
  • Assess key management systems and the importance of cryptographic key lengths
  • Examine key derivation algorithms
  • Analyze key life cycle
  • Evaluate block cipher and stream cipher modes
  • Determine pseudorandom number generators
  • Develop real-world cryptography application cases, such as Kerberos, PGP or smart cards
  • Examine related associations and organizations, such as ISO, NIST or NCSC
  • Determine the challenges in quantum computing cryptography

Module 3. Business Continuity Plan Associated with Security

  • Present the key elements of each phase and analyze the characteristics of the Business Continuity Plan (BCP)
  • Substantiate the need for a Business Continuity Plan
  • Determine the success and risk maps for each phase of the Business Continuity Plan
  • Specify how to establish an Action Plan for implementation
  • Assess the completeness of a Business Continuity Plan (BCP)
  • Develop a plan for the successful implementation of a Business Continuity Plan
##IMAGE##

Don't wait any longer: the professional progress you were looking for can be found in thispostgraduate diploma"

Postgraduate Diploma in Security and Cryptography

.

Information security is one of the major concerns of today's society, especially for companies and institutions that handle sensitive data. In this context, cryptography has become a fundamental pillar in cybersecurity, as it allows data to be protected through the encryption process and the use of tools such as algorithms. TECH's Postgraduate Diploma in Security and Cryptography focuses on symmetric cryptography, block ciphers, quantum algorithms and Blockchain technology. In addition, the program has a 100% online teaching system, which will allow you to combine your studies with your work.

An extensive library of specialized content in cybersecurity

.

The Postgraduate Diploma in Security and Cryptography will allow you to delve into the mathematical foundations of cryptography, the methodology of analysis and risk management of information systems, the protection of algorithms against quantum computing and many other essential issues in this area. In addition, you will have a teaching staff of great prestige in this sector, who will teach the program from numerous multimedia resources.