University certificate
The world's largest faculty of information technology”
Introduction to the Program
Deepen your knowledge in Cloud Infrastructures and become an expert in Security, with no time limits or need to travel"

Security services in Cloud environments, such as firewalls, SIEMS and protection against threats, to protect applications and services of companies, are a vital and booming sector. So that professionals in this field, who know how to supervise and optimize this security using different monitoring and auditing tools, are increasingly required and demanded by companies in all areas.
For this reason, TECH has designed a Postgraduate diploma in Security in Cloud Infrastructures, to develop the specialized knowledge of students on the specific risks and threats of cloud environments, required to apply the necessary solutions and efficiently. Therefore, it offers a complete syllabus that covers topics such as Threat Modeling, Cybersecurity Tools, Networking, Network Monitoring and Auditing or types of backup services, among others.
In this way, the student will be able to enjoy a convenient 100% online mode, without the need to dedicate excessive time to the syllabus, without time constraints or travel. All this, with a dynamic multimedia content, the most updated information and the most innovative teaching tools. In addition to the possibility of accessing all the content from the beginning and with any device that has an internet connection.
Stand out as a professional in one of the sectors with the highest growth potential in the field of Cloud Infrastructures"
This Postgraduate diploma in Security in Cloud Infrastructures contains the most complete and up-to-date program on the market. The most important features include:
- The development of practical cases presented by experts in Security in Cloud Infrastructure
- The graphic, schematic, and practical contents with which they are created, provide practical information on the disciplines that are essential for professional practice
- Practical exercises where self-assessment can be used to improve learning
- Its special emphasis on innovative methodologies
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
Acquire new skills in the field of Cloud Network Security and put them to the test with a wide variety of practical activities available on the Virtual Campus"
The program’s teaching staff includes professionals from the sector who contribute their work experience to this educational program, as well as renowned specialists from leading societies and prestigious universities.
Its multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide an immersive education programmed to learn in real situations.
The design of this program focuses on Problem-Based Learning, by means of which the professional must try to solve the different professional practice situations that are presented throughout the academic course. For this purpose, the student will be assisted by an innovative interactive video system created by renowned experts.
Enroll now and become an expert in Cybersecurity Tools at Code level"

Know in depth the Strategies and Management of backups in Cloud environments"
Syllabus
The syllabus and additional materials that make up this program have been designed by TECH team of renowned experts in the field. To the theoretical content, they have added practical activities and the most innovative tools, to create a degree with the most updated and complete information in the academic market. All this, based on the principles and fundamentals of the pedagogical methodology of Relearning, which facilitates the optimal assimilation of content by students.

A complete, dynamic and innovative content, which has been designed by renowned experts in Cloud Infrastructures’’
Module 1. Network DevOps and Network Architectures in Cloud infrastructures
1.1. Nerwork DevOps (NetOps)
1.1.1. Nerwork DevOps (NetOps)
1.1.2. NetOps Methology
1.1.3. NetOps Benefits
1.2. Network DevOps Fundamentals
1.2.1. Networking Fundamentals
1.2.2. OSI TCP/IP model, CIDR and Subnetting
1.2.3. Main Protocols
1.2.4. HTTP responses
1.3. Tools and software for Network DevOps
1.3.1. Network layer tools
1.3.2. Application layer tools
1.3.3. DNS Tools
1.4. Networking in Cloud Environments: Internal network services
1.4.1. Virtual Networks
1.4.2. Subnetworks
1.4.3. Routing tables
1.4.4. Availability zones
1.5. Networking in Cloud Environments: Borders network services
1.5.1. Internet Gateway
1.5.2. NAT Gateway
1.5.3. Load Balancing
1.6. Networking in Cloud Environments: DNS
1.6.1. DNS Fundamentals
1.6.2. Cloud DNS Services
1.6.3. HA / LB via DNS
1.7. Hybrid / Multitenant Network Connectivity
1.7.1. Site to Site VPN
1.7.2. VPC Peering
1.7.3. Transit Gateway / VPC Peering
1.8. Content Delivery Network Services
1.8.1. Content Delivery Services
1.8.2. AWS CLoudFront
1.8.3. Other CDNs
1.9. Security in Cloud Networks
1.9.1. Security Principles in Networks
1.9.2. Layer 3 and 4 protection
1.9.3. Layer 7 protection
1.10. Network Monitoring and Auditing
1.10.1. Monitoring and auditing
1.10.2. Flow Logs
1.10.3. Monitoring services: CloudWatch
Module 2. Cybersecurity in Cloud Infrastructures
2.1. Risk in Cloud Environments
2.1.1. Cybersecurity strategies
2.1.2. Risk-Based Approach
2.1.3. Risk categorization in Cloud environments
2.2. Security Frameworks in Cloud Environments
2.2.1. Cybersecurity Frameworks and Standards
2.2.2. Technical cybersecurity frameworks
2.2.3. Organization cybersecurity frameworks
2.3. Threat Modeling in Cloud Environments
2.3.1. Threat modeling process
2.3.2. Threat modeling phases
2.3.3. STRIDE
2.4. Cybersecurity tools at the code level
2.4.1. Classification of tools
2.4.2. Integrations:
2.4.3. Examples of use
2.5. Integrations of cybersecurity controls in cloud environments
2.5.1. Process security
2.5.2. Security controls in the different phases
2.5.3. Examples of integrations
2.6. ZAP Proxy Tool
2.6.1. ZAP Proxy
2.6.2. ZAP Proxy Features
2.6.3. ZAP Proxy Automation
2.7. Automated Vulnerability Scanning in Cloud Environments
2.7.1. Persistent and automated vulnerability scanning
2.7.2. OpenVAS
2.7.3. Vulnerability Scanning in Cloud Environments
2.8. Firewalls in Cloud Environments
2.8.1. Types of Firewalls
2.8.2. Importance of Firewalls
2.8.3. OnPremise firewalls and Cloud firewalls
2.9. Transport Layer Security in Cloud Environments
2.9.1. SSL/TLS and Certificates
2.9.2. SSL Audits
2.9.3. Certificate Automation
2.10. SIEM in Cloud Environments
2.10.1. SIEM as a Security Core
2.10.2. Cyberintelligence
2.10.3. Examples of SIEM Systems
Module 3. Monitoring and Backup of Cloud Infrastructures
3.1. Monitoring and Backup of Cloud Infrastructures
3.1.1. Benefits of Backup in Clouds
3.1.2. Backup Types
3.1.3. Benefits of cloud monitoring
3.1.4. Types of Monitoring
3.2. Availability and Security of systems in Cloud Infrastructures
3.2.1. Main Factors
3.2.2. Most demanded uses and services
3.2.3. Evolution
3.3. Types of backup services in Cloud Infrastructures
3.3.1. Full backup
3.3.2. Incremental backup
3.3.3. Differential Backup
3.3.4. Other Types of Backup
3.4. Strategy, planning and management of backups in Cloud Infrastructures
3.4.1. Establishing objectives and scope
3.4.2. Types of backups
3.4.3. Good Practices
3.5. Cloud infrastructure continuity plan
3.5.1. Strategy Continuity Plan
3.5.2. Types of Plans
3.5.3. . Creating a Continuity Plan
3.6. Types of Monitoring services in Cloud Infrastructures
3.6.1. Performance Monitoring
3.6.2. Availability monitoring
3.6.3. Event monitoring
3.6.4. Log monitoring
3.6.5. Network traffic monitoring
3.7. Monitoring Strategy, Tools and Techniques in Cloud Infrastructures
3.7.1. How to set objectives and scope
3.7.2. Types of Monitoring
3.7.3. Good Practices
3.8. Continuous Improvement in Cloud Infrastructures
3.8.1. Continuous improvement in the cloud
3.8.2. Key performance metrics (KPIs) in the cloud
3.8.3. Designing a continuous improvement plan in the cloud
3.9. Case studies in Cloud Infrastructures
3.9.1. Backup case study
3.9.2. Monitoring case study
3.9.3. Lessons learned and good practices
3.10. Case studies in Cloud Infrastructures
3.10.1. Lab 1
3.10.2. Lab 2
3.10.3. Lab 3

Access all content and a wide variety of additional material, from day one and with any device with an Internet connection"
Postgraduate Diploma in Security Cloud Infrastructures
In an increasingly digital world, security in Cloud infrastructures has become an indispensable need to protect sensitive information and data of organizations. The migration to the cloud has become a common trend in companies and organizations, but this implies new risks and challenges in terms of security. That is why at TECH Global University we have created our Postgraduate Diploma in Cloud Infrastructure Security program, focused on providing professionals with the necessary tools to ensure security in the cloud. This postgraduate course delves into the different security measures that must be implemented in the cloud infrastructure, as well as the identification and prevention of vulnerabilities in systems.
Cloud security management is a complex task that requires specialized knowledge and constant updating to keep up with new emerging threats. Our Postgraduate Diploma program will address topics such as authentication and authorization in the cloud, data encryption, identity management, security monitoring and incident management, among others. In addition, the adoption of best practices in cloud security and the implementation of effective security policies to ensure the protection of the organization's data will be discussed in depth. In short, TECH Global University’s Postgraduate Diploma in Cloud Infrastructure Security is the ideal program for those professionals interested in specializing in cloud security and contributing to the success of organizations in a constantly evolving digital world.