University certificate
The world's largest faculty of information technology”
Introduction to the Program
Learn how to detect vulnerabilities in a system by performing pre-emptive attacks that demonstrate breaches and gain invaluable cybersecurity data"

Nowadays, no company is exempt from suffering a cyber-attack and, therefore, from the different consequences it entails. Regardless of the size of the company, it is exposed to information theft, blackmail, sabotage, etc.
It is necessary to carry out a vulnerability study and determine the attack surface, so periodic vulnerability and risk studies are increasingly being carried out. Each company will have to check whether it complies with the regulations and legislation of the country where it is located and be aware of the damages caused, both monetary and non-monetary, e.g. reputational.
This module presents the different tools and methodologies to address this need and therefore provides an extensive set of expertise to carry out this work.
The most innovative and efficient ways to create protection systems that ensure cybersecurity on devices"
This Postgraduate certificate in Ethical Hacking contains the most complete and up-to-date program on the market. The most important features include:
- The development of case studies presented by cybersecurity experts
- The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
- Practical exercises where the self-assessment process can be carried out to improve learning
- Its special emphasis on innovative methodologies in Advanced Practice Nursing
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
Study through a practice-focused Postgraduate certificate to boost your skills to the level of a specialist”
The program’s teaching staff includes professionals from sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive specialization programmed to learn in real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts.
Learn in depth about the main threats and the most innovative and up-to-date tools in the fight against cyber-attacks through this exceptional program"

A highly educational process created to be affordable and flexible, with the most interesting methodology of online teaching"
Syllabus
Throughout the development of the different units of this Postgraduate certificate the student will be able to acquire all the knowledge that the Ethical Hacking needs to be used as a tool. To this end, it has been structured with a view to the efficient acquisition of complementary learning, which will promote the acquisition of hands'on content and consolidate what has been studied, providing students with the capacity to intervene as quickly as possible. A high intensity, high quality course created to educate the best in the industry.

A Postgraduate certificate developed in a structured way through a study approach focused on efficiency"
Module 1. Ethical Hacking
1.1. Methods
1.1.1. OSSTMM
1.1.2. OWASP
1.1.3. NIST
1.1.4. PTES
1.1.5. ISSAF
1.2. Footprinting
1.2.1. Open-Source Intelligence (OSINT)
1.2.2. Search for Data Breaches and Vulnerabilities
1.2.3. Use of Passive Tools
1.3. Network Scanning
1.3.1. Scanning Tools
1.3.1.1. Nmap
1.3.1.2. Hping3
1.3.1.3. Other Scanning Tools
1.3.2. Scanning Techniques
1.3.3. Firewalland IDS Evasion Techniques
1.3.4. Banner Grabbing
1.3.5. Network Diagrams
1.4. Enumeration
1.4.1. SMTP Enumeration
1.4.2. DNS Enumeration
1.4.3. NetBIOS and Samba Enumeration
1.4.4. LDAP Enumeration
1.4.5. SNMP Enumeration
1.4.6. Other Enumeration Techniques
1.5. Vulnerability Analysis
1.5.1. Vulnerability Scanning Solutions
1.5.1.1. Qualys
1.5.1.2. Nessus
1.5.1.3. CFI LanGuard
1.5.2. Vulnerability Scoring Systems
1.5.2.1. CVSS
1.5.2.2. CVE
1.5.2.3. NVD
1.6. Attacks on Wireless Networks
1.6.1. Methodology of Hacking in Wireless Networks
1.6.1.1. Wi-Fi Discovery
1.6.1.2. Traffic Analysis
1.6.1.3. Aircrack Attacks
1.6.1.3.1. WEP Attacks
1.6.1.3.2. WPA/WPA2 Attacks
1.6.1.4. Evil Twin Attacks
1.6.1.5. Attacks on WPS
1.6.1.6. Jamming
1.6.2. Tools for Wireless Security
1.7. Hacking of Web Servers
1.7.1. Cross Site Scripting
1.7.2. CSRF
1.7.3. Session Hijacking
1.7.4. SQL Injection
1.8. Exploiting Vulnerabilities
1.8.1. Use of Known Exploits
1.8.2. Use of Metasploit
1.8.3. Use of Malware
1.8.3.1. Definition and Scope
1.8.3.2. Malware Generation
1.8.3.3. Bypass of Antivirus Solutions
1.9. Persistence
1.9.1. Rootkits Installation
1.9.2. Use of Ncat
1.9.3. Use of Scheduled Tasks for Backdoors
1.9.4. User Creation
1.9.5. HIDS Detection on

Everything the cybersecurity professional needs to know is organized into a comprehensive curriculum that will progressively and steadily boost your skills to the highest level"
Postgraduate Certificate in Ethical Hacking
This program includes a complete update, deepening and systematization of the most important aspects of data protection and digital media. In TECH Global University we developed the Postgraduate Certificate in Ethical Hacking that will allow you to specialize in the different systems and existing cyber threats, their characteristics, prevention mechanisms and counter response to possible attacks. In this way, you will perform successfully in the field of information technology.
Specialization in hacking and cyber protection
The main objective of this program is to provide IT professionals with the latest information on cybernetics and external factors that can compromise their operation. The curriculum will allow you to delve into the characteristics and classification of the different existing computer systems and programs; identify and develop prevention and resolution strategies in the face of the risks to which they are exposed. In addition to promoting cyberprotection of companies and individuals through periodic studies or latest technology tools, recognizing the legislation and the applicable regulatory framework for each of the cases that you must assume in this field of work.
Get certified in the largest School of Informatics
At TECH Global University you will be able to reach a new level of knowledge with the most updated academic content in the educational market. Our programs offer innovative methodologies for online education, complemented with the support of experts in the area, who will guide your process. You will be able to reinforce your competencies and boost your career growth while you study completely remotely, managing the pace that best suits your needs. Get your program at the university with the largest online computer science faculty in the world.