Description

As technology and connectivity advance, so do the number and form of potential threats. It is therefore crucial that future Chief Information Security Officers update their knowledge to offer solutions that are more adapted to the company's idiosyncrasies"

##IMAGE##

Nowadays, the information and communication era is in full swing, as everyone is connected both at home and in corporate environments. Thereby, it is that you have access to a multitude of information with a single click, with a single search in any of the engines at our disposal, either from a smartphone, personal or work computer. In this context, "Time is money", but so is information. 

As technology advances for the average citizen and employee, so do threats and attack techniques. The more new functionalities there are, the more the world communicates and the more the attack surface increases. In other words, the possibilities and ways for cybercriminals to achieve their goals are growing. 

Given this worrying context, TECH launches this professional master’s degree in Cybersecurity Management (CISO, Chief Information Security Officer)which has been developed by a team with different professional profiles specialized in different sectors that combine international professional experience in the private sector in R+D+i and extensive teaching experience. Therefore, they are not only up to date in each of the technologies, but they also have a perspective towards the future needs of the sector and expose them in a didactic way. 

The Program encompasses the different core subjects in the area of Cybersecurity Management (CISO, Chief Information Security Officer), carefully selected to rigorously cover a broad spectrum of technologies applicable in different work areas. But it will also deal with another branch of subjects that are usually scarce in the academic catalog of other institutions and that will deeply nourish the professional's curriculum. 

Prepare yourself to work as Chief Information Security Officer, a key profile in the company for its role as protector and guarantor of information security"

This professional master’s degree in Cybersecurity Management (CISO, Chief Information Security Officer) contains the most complete and up-to-date program on the market. The most important features include:

  • The development of case studies presented by cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where self-assessment can be used to improve learning
  • Its special emphasis on innovative methodologies in Advanced Practice Nursing
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

Stand out in a booming sector and become an expert in cybersecurity with this professional master’s degree from TECH. It’s the most complete on the market”

The program’s teaching staff includes professionals from the sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.  

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive specialization programmed to learn in real situations.  

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts. 

The ways in which people exchange information are evolving rapidly. This demands new forms of cyber protection from professionals"

##IMAGE##

A 100% online program with an eminently practical approach that will lay the foundations for your professional growth"

Objectives

Being fully aware of the relevance of Cybersecurity Management (CISO, Chief Information Security Officer) for companies, TECH has developed this professional master’s degree that aims to nurture and update the knowledge of professionals in the detection, protection and prevention of cybercrime. In this way, the future graduate will become a key player in the care of data and information, minimizing the possibility of criminals taking advantage of possible existing security breaches. A professional competence that in TECH, in only 12 months, the professional will be able to acquire.

##IMAGE##

This is a unique opportunity to make your dreams and goals come true and become an expert in Cybersecurity Management (CISO, Chief Information Security Officer)" 

General Objectives

  • Analyze the role of the cybersecurity analyst
  • Study in depth on social engineering and its methods
  • Examine OSINT, HUMINT, OWASP, PTEC methodologies. OSSTM, OWISAM
  • Conduct a risk analysis and understand risk metrics
  • Determine the appropriate use of anonymity and use of networks such as TOR, I2P and Freenet
  • Generate specialized knowledge to perform a security audit
  • Develop appropriate usage policies
  • Examine the most important threat detection and prevention systems
  • Evaluate new threat detection systems, as well as their evolution with respect to more traditional solutions
  • Analyze the main current mobile platforms, their characteristics and use
  • Identify, analyze and assess security risks of the IoT project parts
  • Evaluate the information obtained and develop prevention and Hacking mechanisms
  • Apply reverse engineering to the cybersecurity environment
  • Specify the tests to be performed on the developed software
  • Collect all existing evidence and data to conduct a forensic report
  • Duly submit the forensic report
  • Analyze the current and future state of computer security
  • Examining the risks of new emerging technologies
  • Compile the different technologies in relation to computer security

Specific Objectives

Module 1. Cyberintelligence and Cybersecurity

  • Develop methodologies used in cybersecurity
  • Examine the intelligence cycle and establish its application in cyberintelligence
  • Determine the role of the intelligence analyst and the obstacles to evacuation activity
  • Analyze OSINT, OWISAM, OSSTM, PTES, OWASP Methodologies
  • Establishing the most common tools for intelligence production
  • Conduct a risk analysis and understand the metrics used
  • Concretize the options for anonymity and the use of networks such as TOR, I2P, FreeNet
  • Detail the current cybersecurity regulations

Module 2. Host Security

  • Specify the Backup policies for personal and professional data
  • Assess the different tools to provide solutions to specific security problems
  • Establish mechanisms to have an up-to-date system
  • Scan equipment for Intruders
  • Determine system access rules
  • Screen and classify mails to avoid frauds
  • Generate lists of allowed software

Module 3. Network Security (Perimeter)

  • Analyze current network architectures to identify the perimeter to protect
  • Develop specific firewall and Linux configurations to mitigate the most common attacks
  • Compile the most commonly used solutions such as Snort and Suricata, as well as their configuration
  • Examine the different additional layers provided by next-generation firewalls and networking capabilities in  Cloud environments
  • Determine the tools for network protection and demonstrate why they are fundamental to a multilayer defence

Module 4. Smartphone Security

  • Examine the various attack vectors to avoid becoming an easy target
  • Determine the main attacks and types of Malware to which mobile device users are exposed
  • Analyze the most current devices to establish greater security in the configuration
  • Specify the main steps to perform a penetration test on both iOS and Android platforms
  • Develop specialized knowledge about the different protection and security tools
  • Establish best practices in programming for mobile devices

Module 5. IoT Security

  • Analyze the main IoT architectures
  • Examine connectivity technologies
  • Develop the main application protocols
  • Specify the different types of existing devices
  • Assessing risk levels and known vulnerabilities
  • Develop safe use policies
  • Establishing appropriate conditions of use for these devices

Module 6. Ethical Hacking

  • Examine OSINT methods
  • Compile the information available in public media
  • Scan networks for active mode information
  • Develop testing laboratories
  • Analyze the tools for Pentesting performance
  • Catalog and assess the different vulnerabilities of the systems
  • Specify the different Hacking methodologies

Module 7. Inverse Engineering 

  • Analyze the phases of a compiler
  • Examining x86 processor architecture and ARM processor architecture
  • Determine the different types of analysis
  • Apply Sandboxing in different environments
  • Develop different Malware analysis techniques
  • Establish tools oriented to Malware analysis

Module 8. Secure Development

  • Establish the necessary requirements for the correct operation of an application in a secure manner
  • ExamineLog files to understand error messages
  • Analyze the different events and decide what to show to the user and what to save in the Logs
  • Generate a sanitized, easily verifiable, and quality code
  • Evaluate appropriate documentation for each phase of development
  • Specify the behavior of the server to optimize the system
  • Develop modular, reusable and maintainable code

Module 9: Forensic Analysis 

  • Identify the different elements that evidence a crime
  • Generate specialized knowledge to obtain data from different media before they are lost
  • Recovery of intentionally deleted data
  • Analyze system Logs and records
  • Determine how data is duplicated so as not to alter the originals
  • Substantiate the evidence for consistency
  • Generate a solid and seamless report
  • Present conclusions in a coherent manner
  • Establish how to defend the report before the competent authority
  • Specify strategies for safe teleworking

Module 10. Current and Future Challenges in Information Security

  • Know the syntactic principles of graphic language and apply its rules to clearly and accurately describe objects and ideas
  • Know the origin of letters and their historical importance
  • Recognize, study and consistently apply typography to graphic processes
  • Know and apply the aesthetic fundamentals of typography
  • Know how to analyze the layout of texts in the design object
  • Be able to carry out professional work starting from typesetting
##IMAGE##

A unique specialization program that will allow you to acquire advanced training in this field"

Professional Master's Degree in Cybersecurity Management (CISO, Chief Information Security Officer)

In recent decades, technology has been immersed in most areas of life, creating a hyperconnected world between people, companies and / or organizations. The ability to improve connections of any type of information has generated the need to establish completely secure links, since it is increasingly common to witness in these digital spaces cyber-attack techniques or threats to user information. Understanding this context, in TECH Technological University we designed a Professional Master's Degree in Cybersecurity Management (CISO, Chief Information Security Officer), which aims to understand the role of a cybersecurity analyst to recognize the systems, methods of threats and ways to avoid, reduce or solve the risks.

Study an online Professional Master's Degree in cybersecurity CISO

The program consists of ten modules in which you will delve into risk analysis, existing regulations on cybersecurity, development of threat detection systems, examination of risks in new technologies and social engineering, among many other specific and complementary topics created to have a comprehensive curriculum plan. In this way, the program aims to provide the necessary knowledge to be able to stand out in the working world and have the ability to find and solve the dangers generated in digital networks.

Study a Professional Master's Degree at the largest digital university in the world

TECH has created an innovative and rigorous method that brings together the development of case studies presented by professionals specialized in cybersecurity CISO (Chief Information Security Officer), with experience in teaching and creating e-learning content. The lessons are taught through a theoretical syllabus that can be taken to discussion forums, where there will be the participation of the participants, as well as the support of the experts. In addition, there will be individual assignments that will contribute to reflection and self-learning. The Professional Master's Degree will be available at any time you have available, this will allow you to develop the modules from any device with internet access.