University certificate
The world's largest faculty of information technology”
Introduction to the Program
Transform any company into a secure environment, free from cyber threats with this Postgraduate diploma"

Internet security has become one of the main problems for large companies and governments that invest large sums of money to prevent the theft of particularly sensitive data and information. This problem is dealt with by IT professionals capable of detecting and anticipating hackers, although to do so, they require in-depth knowledge, not only of the technique, but also of the most advanced and applicable concepts in an ISMS.
This Postgraduate diploma in Information Security Threat Management provides students with an in-depth understanding of the pillars on which the ISMS is based, the documents and models to be implemented, as well as the regulations and standards currently applicable. A teaching team, with experience in IT and cybersecurity-oriented law, will provide the essential guidelines for managing security in a company in application of the ISO/ISO 27000 standard, which establishes the framework of good practices for information security.
An excellent opportunity for IT professionals who wish to advance their careers by providing maximum security to the companies that request their services. TECH's online model makes it possible to balance work and personal life by facilitating access to the entire syllabus from the first day, without schedules and with the possibility of downloading the content for viewing with a device with an internet connection.
Learn more about the benefits of ISO/IEC 27.000 standards and apply them to provide IT Security"
This Postgraduate diploma in Information Security Threat Management contains the most complete and up-to-date program on the market. The most important features include:
- The development of practical cases presented by IT security experts
- The graphic, schematic and practical contents of the book provide technical and practical information on those disciplines that are essential for professional practice
- Practical exercises where self-assessment can be used to improve learning
- Its special emphasis on innovative methodologies
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
Advance in the field of IT Security. Everyday, millions of companies are affected by cyber-attacks. Enroll in this Postgraduate diploma"
The program’s teaching team includes professionals from the sector who contribute their work experience to this educational program, as well as renowned specialists from leading societies and prestigious universities.
Its multimedia content, developed with the latest educational technology, will allow professionals to learn in a contextual and situated learning environment, i.e., a simulated environment that will provide them with immersive education programmed to learn them in real situations.
The design of this program is focused on Problem-Based Learning, through which professionals must try to solve the different professional practice situations that are presented to them throughout the educational program. This will be done with the help of an innovative system of interactive videos made by renowned experts.
Plan and design a seamless ISMS for business. Be the IT security professional they are looking for.

Businesses are demanding IT professionals who are able to protect their most sensitive data. Become an expert in IT Security.
Syllabus
The syllabus of this Postgraduate diploma has been elaborated with a wide multimedia content and essential readings that will provide a deep knowledge about information security management systems. In the development of this program will be given the main keys in Cybersecurity and progressively delve into the organizational aspects of the company to improve the protection of their data, to reach the analysis of threats in computer systems to be faced by professionals.
A curriculum that will give you the guidelines to implement effective security policies in any company"
Module 1. Information Security Management System (ISMS)
1.1. Information Security. Key Aspects
1.1.1. Information Security
1.1.1.1. Confidentiality
1.1.1.2. Integrity
1.1.1.3. Availability
1.1.1.4. Information Security Measurements
1.2. Information Security Management Systems
1.2.1. Information Security Management Models
1.2.2. Documents to Implement an ISMS
1.2.3. Levels and Controls of an ISMS
1.3. International Norms and Standards
1.3.1. International Standards in Information Security
1.3.2. Origin and Evolution of the Standard
1.3.3. International Information Security Management Standards
1.3.4. Other Reference Standards
1.4. ISO/IEC 27,000 Standards
1.4.1. Purpose and Areas of Application
1.4.2. Structure of the Standard
1.4.3. Certification
1.4.4. Accreditation Phases
1.4.5. Benefits of ISO/IEC 27,000 Standards
1.5. Design and Implementation of a General Information Security System
1.5.1. Phases of Implementation of a General Information Security System
1.5.2. Business Continuity Plans
1.6. Phase I: Diagnosis
1.6.1. Preliminary Diagnosis
1.6.2. Identification of the Stratification Level
1.6.3. Level of Compliance with Standards/Norms
1.7. Phase II: Preparation
1.7.1. Context of the Organization
1.7.2. Analysis of Applicable Safety Regulations
1.7.3. Scope of the General Information Security System
1.7.4. General Information Security System Policy
1.7.5. Objectives of the General Information Security System
1.8. Phase III: Planning
1.8.1. Asset Classification
1.8.2. Risk Assessment
1.8.3. Identification of Threats and Risks
1.9. Phase IV: Implementation and Follow-up
1.9.1. Analysis of Results
1.9.2. Assigning Responsibilities
1.9.3. Timing of the Action Plan
1.9.4. Monitoring and Audits
1.10. Incident Management Security Policies
1.10.1. Phases
1.10.2. Incident Categorization
1.10.3. Incident Management and Procedures
Module 2. Organizational Aspects of Information Security Policy
2.1. Internal Organization
2.1.1. Assigning Responsibilities
2.1.2. Segregation of Duties
2.1.3. Contacts with Authorities
2.1.4. Information Security in Project Management
2.2. Asset Management
2.2.1. Liability for Assets
2.2.2. Classification of Information
2.2.3. Handling of Storage Media
2.3. Security Policies in Business Processes
2.3.1. Analysis of the Vulnerabilities of Business Processes
2.3.2. Business Impact Analysis
2.3.3. Classification of Processes with Respect to Business Impact
2.4. Security Policies Linked to Human Resources
2.4.1. Before Hiring
2.4.2. During Contracting
2.4.3. Termination or Change of Position
2.5. Management Security Policies
2.5.1. Management Guidelines on Information Security
2.5.2. BIA - Analyzing the Impact
2.5.3. Recovery Plan as a Security Policy
2.6. Acquisition and Maintenance of Information Systems
2.6.1. Information Systems Security Requirements
2.6.2. Development and Support Data Security
2.6.3. Test Data
2.7. Security with Suppliers
2.7.1. IT Security with Suppliers
2.7.2. Management of Service Delivery with Assurance
2.7.3. Supply Chain Security
2.8. Operational Safety
2.8.1. Operational Responsibilities
2.8.2. Protection Against Malicious Code
2.8.3. Backup Copies
2.8.4. Activity and Supervision Records
2.9. Safety and Regulatory Management
2.9.1. Compliance with Legal Requirements
2.9.2. Information Security Reviews
2.10. Business Continuity Management Security
2.10.1. Continuity of Information Security
2.10.2. Redundancies
Module 3. Security Policies for the Analysis of Threats in Computer Systems
3.1. Threat Management in Security Policies
3.1.1. Risk Management
3.1.2. Security Risk
3.1.3. Threat Management Methodologies
3.1.4. Implementation of Methodologies
3.2. Phases of Threat Management
3.2.1. Identification
3.2.2. Analysis
3.2.3. Localization
3.2.4. Safeguard Measures
3.3. Audit Systems for Threat Localization
3.3.1. Classification and Information Flow
3.3.2. Analysis of Vulnerable Processes
3.4. Risk Classification
3.4.1. Types of Risk
3.4.2. Calculation of Threat Probability
3.4.3. Residual Risk
3.5. Risk Treatment
3.5.1. Implementation of Safeguard Measures
3.5.2. Transfer or Assume
3.6. Control Risks
3.6.1. Continuous Risk Management Process
3.6.2. Implementation of Security Metrics
3.6.3. Strategic Model of Information Security Metrics
3.7. Practical Methodologies for Threat Analysis and Control
3.7.1. Threat Catalog
3.7.2. Catalog of Control Measures
3.7.3. Safeguards Catalog
3.8. ISO 27005
3.8.1. Risk Identification
3.8.2. Risk Analysis
3.8.3. Risk Evaluation
3.9. Risk, Impact and Threat Matrix
3.9.1. Data, Systems and Personnel
3.9.2. Threat Probability
3.9.3. Magnitude of Damage
3.10. Design of Phases and Processes in Threat Analysis
3.10.1. Identification of Critical Organizational Elements
3.10.2. Determination of Threats and Impacts
3.10.3. Impact and Risk Analysis
3.10.4. Methods

The practical cases of this Postgraduate diploma will put you in real situations of cyber-attacks. The knowledge acquired will help you to deal with them"
Postgraduate Diploma in Information Security Threat Management
In an increasingly digitized world, information security has become a fundamental concern for companies and organizations. That is why at TECH Global University we have developed our Postgraduate Diploma in Information Security Threat Management, with the aim of qualifying professionals in the sector in the latest techniques and tools to ensure the protection of information. Our online classes offer quality education, taught by specialists in the field of information security, and allow students to learn at their own pace and at any time and place. The flexibility offered by the online modality allows students to balance their studies with their professional and personal life, without having to give up their professional career.
Specialize in computer security
Do you know why TECH is considered one of the best universities in the world? Because we have a catalog of more than ten thousand educational programs, presence in multiple countries, innovative methodologies, unique educational technology and a highly qualified teaching team; that's why you can't miss the opportunity to study with us. This Postgraduate Diploma in Information Security Threat Management focuses on the identification and management of IT security risks in companies, as well as the adoption of best practices for information protection and incident management. Students will have access to the latest cybersecurity tools and techniques, including vulnerability analysis, patch management and system monitoring, among others. Upon completion of this program, students will be qualified to identify and manage IT security threats in any type of organization, allowing them to stand out in an increasingly demanding job market in terms of information security. Don't wait any longer to boost your career in the field of information security. Enroll today in the TECH's Technological University Postgraduate Diploma!