Introduction to the Program

The most complete tour through the dangers and vulnerabilities of mobile devices and their cyber protection"

##IMAGE##

Home and business security needs to be structured in layers, it is like a chain and will only be as strong as the weakest link in the chain. This Postgraduate diploma presents the main threats to users' computers and servers so that we are able to take the appropriate measures and be alert to any situation.  

The more new functionalities there are and the more we communicate with each other, the more our attack surface increases. In other words, the possibilities and ways for cybercriminals to achieve their goals are growing. That is why security defense and monitoring systems must evolve as well. Because in a world where teleworking and  Cloud services are becoming more and more common, a traditional perimeter firewall is not enough. For this reason, this Postgraduate diploma will also address the importance of designing a multi-layer defence, also known as “Defence in Depth” covering all aspects of a corporate network where some of the concepts and systems that will be discussed can also be used and applied in a domestic environment.  

There is no such thing as 100% security, but if you know the types of attacks you face, the risks you are exposed to and have the information you need to deal with them, you have taken an important step and added another layer of security to your information.

Start acting with the broadest knowledge of the types of risks currently existing and the means of defence applicable in each case"

This Postgraduate diploma in Defensive Cybersecurity contains the most complete and up-to-date educational program on the market. The most important features include:

  • Practical case studies presented by experts 
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice  
  • Practical exercises where the self-assessment process can be carried out to improve learning  
  • Its special emphasis on innovative methodologies in Advanced Practice Nursing  
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments  
  • Content that is accessible from any fixed or portable device with an Internet connection

A complete tour that will allow you to know what they are and how current cyber threats work as a basis for developing defensive strategies"

The program’s teaching staff includes professionals from the sector who contribute their work experience to this program, as well as renowned specialists from leading societies and prestigious universities.
 
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive specialization programmed to learn in real situations.  

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. This will be done with the help of an innovative system of interactive videos made by renowned experts.      

With a totally practice-focused approach, this Postgraduate diploma will boost your skills to the level of a specialist"

##IMAGE##

A highly educational process, created to be affordable and flexible, with the most interesting methodology of online teaching"

Syllabus

The agenda of this program covers each and every one of the areas of knowledge that the professional involved in cybersecurity must know in the context of defensive measures. To this end, it has been structured with a view to the efficient acquisition of summative knowledge, which will favor the absorption of learning and consolidate what has been studied, providing students with the capacity to intervene as quickly as possible. A high-intensity, high-quality course created to educate the best in the industry.

##IMAGE##

All aspects that Defensive Cybersecurity analysis and intervention requires, developed in a structured way in an efficiency-focused study approach" 

Module 1. Host Security

1.1. Backup Copies

1.1.1. Backup Strategies
1.1.2. Tools for Windows
1.1.3. Tools for Linux
1.1.4. Tools for MacOS

1.2. User Antivirus

1.2.1. Types of Antivirus
1.2.2. Antivirus for Windows
1.2.3. Antivirus for Linux
1.2.4. Antivirus for MacOS
1.2.5. Antivirus for Smartphones

1.3. Intrusion Detectors - HIDS

1.3.1. Intrusion Detection Methods
1.3.2. Sagan
1.3.3. Aide
1.3.4. Rkhunter

1.4. Local Firewall

1.4.1. Firewalls for Windows
1.4.2. Firewalls for Linux
1.4.3. Firewalls for MacOS

1.5. Password Managers

1.5.1. Password
1.5.2. LastPass
1.5.3. KeePass
1.5.4. Sticky Password
1.5.5. RoboForm

1.6. Phishing Detectors

1.6.1. Manual Detection of Phishing
1.6.2. AntiphishingTools

1.7. Spyware

1.7.1. Avoidance Mechanisms
1.7.2. Antispyware Tools

1.8. Trackers

1.8.1. Measures to Protect the System
1.8.2. Anti-tracking Tools

1.9. EDR - End point Detection and Response

1.9.1. EDR System Behavior
1.9.2. Differences between EDR and Antivirus
1.9.3. The Future of EDR Systems

1.10. Control Over Software Installation

1.10.1. Repositories and Software Stores
1.10.2. Lists of Permitted or Prohibited Software
1.10.3. Update Criteria
1.10.4. Software Installation Privileges

Module 2. Network Security (Perimeter)

2.1. Threat Detection and Prevention Systems

2.1.1. General Framework for Security Incidents
2.1.2. Current Defence Systems: Defence in Depth and SOC
2.1.3. Current Network Architectures
2.1.4. Types of Tools for Incident Detection and Prevention

2.1.4.1. Network-based Systems
2.1.4.2. Host-Based Systems
2.1.4.3. Centralized Systems

2.1.5. Instance/Hosts, Container and Serverless Communication and Detection

2.2. Firewall

2.2.1. Types of Firewalls
2.2.2. Attacks and Mitigation
2.2.3. Common Firewalls in Linux Kernel

2.2.3.1. UFW
2.2.3.2. Nftables and Iptables
2.2.3.3. Firewalls

2.2.4. Detection Systems Based on System Logs

2.2.4.1. TCP Wrappers
2.2.4.2. BlockHosts and DenyHosts
2.2.4.3. Fail2Ban

2.3. Intrusion Detection and Prevention Systems (IDS/IPS)

2.3.1. Attacks on IDS/IPS
2.3.2. IDS/IPS Systems

2.3.2.1. Snort
2.3.2.2. Suricata

2.4. Next Generation Firewalls (NGFW)

2.4.1. Differences between NGFW and Traditional Firewalls 
2.4.2. Main Capabilities
2.4.3. Commercial Solutions
2.4.4. Firewalls for Cloud Services

2.4.4.1. Architecture Cloud VPC
2.4.4.2. Cloud ACLs
2.4.4.3. Security Group

2.5. Proxy

2.5.1. Types of Proxy
2.5.2. Uses of Proxies. Advantages and Disadvantages

2.6. Antivirus Engines

2.6.1. General Context of Malware and IOCs
2.6.2. Antivirus Engine Problems

2.7. Email Protection Systems

2.7.1. Antispam

2.7.1.1. Black and White Lists
2.7.1.2. Bayesian Filters

2.7.2. Mail Gateway (MGW )

2.8. SIEM

2.8.1. Components and Architecture
2.8.2. Correlation Rules and Use Cases
2.8.3. Current Challenges of SIEM Systems

2.9. SOAR

2.9.1. SOAR and SIEM: Enemies or Allies
2.9.2. The Future of SOAR Systems

2.10. Others Network-based Systems

2.10.1. WAF
2.10.2. NAC
2.10.3. HoneyPots and HoneyNets
2.10.4. CASB

Module 3. Smartphone Security

3.1. The World of Mobile Devices

3.1.1. Types of Mobile Platforms
3.1.2. IOS Devices
3.1.3. Android DevicesDispositivos android

3.2. Mobile Security Management

3.2.1. OWASP Mobile Security Project

3.2.1.1. Top 10 Vulnerabilities

3.2.2. Communications, Networks and Connection Modes

3.3. The Mobile Device in the Enterprise Environment

3.3.1. Risk
3.3.2. Security Policies
3.3.3. Device Monitoring
3.3.4. Mobile Device Management (MDM)

3.4. User Privacy and Data Security

3.4.1. Statements of Information
3.4.2. Data Protection and Confidentiality

3.4.2.1. Licences
3.4.2.2. Encryption

3.4.3. Secure Data Storage

3.4.3.1. Secure Storage on iOS
3.4.3.2. Secure Storage on Android

3.4.4. Best Practices in Application Development

3.5. Vulnerabilities and Attack Vectors

3.5.1. Vulnerabilities
3.5.2. Attack Vectors

3.5.2.1. Malware
3.5.2.2. Data Exfiltration
3.5.2.3. Data Manipulation

3.6. Main Threats

3.6.1. Unforced User
3.6.2. Malware

3.6.2.1. Types of Malware

3.6.3. Social Engineering
3.6.4. Data Leakage
3.6.5. Information Theft
3.6.6. Unsecured Wi-Fi Networks
3.6.7. Outdated Software
3.6.8. Malicious Applications
3.6.9. Insecure Passwords
3.6.10. Weak or No Security Configuration
3.6.11. Physical Access
3.6.12. Loss or Theft of the Device
3.6.13. Identity Theft (Integrity)
3.6.14. Weak or Broken Cryptography
3.6.15. Denial of Service (DoS)

3.7. Main Attacks

3.7.1. Phishing Attacks
3.7.2. Attacks Related to Communication Modes
3.7.3. Smishing Attacks
3.7.4. Cryptojacking Attacks
3.7.5. Man in The Middle

3.8. Hacking

3.8.1. Rooting and Jailbreaking
3.8.2. Anatomy of a Mobile Attack

3.8.2.1. Threat Propagation
3.8.2.2. Malware Installation on the Device
3.8.2.3. Persistence
3.8.2.4. Payload Execution and Information Extraction

3.8.3. Hacking on IOS Devices: Mechanisms and Tools
3.8.4. Hacking on Android Devices: Mechanisms and Tools

3.9. Penetration Testing

3.9.1. iOS Pentesting
3.9.2. Android Pentesting
3.9.3. Tools

3.10. Safety and Security

3.10.1. Security Configuration

3.10.1.1. On iOS Devices
3.10.1.2. On Android Devices

3.10.2. Safety Measures
3.10.3. Protection Tools

Module 4. IoT Security

4.1. Devices

4.1.1. Types of Devices
4.1.2. Standardized Architectures

4.1.2.1. OneM2M
4.1.2.2. IoTWF

4.1.3. Application Protocols
4.1.4. Connectivity Technologies

4.2. IoT Devices. Areas of Application

4.2.1. SmartHome
4.2.2. SmartCity
4.2.3. Transportation
4.2.4. Wearables
4.2.5. Health Sector
4.2.6. IioT

4.3. Communication Protocols

4.3.1. MQTT
4.3.2. LWM2M
4.3.3. OMA-DM
4.3.4. TR-069

4.4. SmartHome

4.4.1. Home Automation
4.4.2. Networks
4.4.3. Household Appliances
4.4.4. Surveillance and Security

4.5. SmartCity

4.5.1. Lighting
4.5.2. Meteorology
4.5.3. Security/Safety

4.6. Transportation

4.6.1. Localisation
4.6.2. Making Payments and Obtaining Services
4.6.3. Connectivity

4.7. Wearables

4.7.1. Smart Clothing
4.7.2. Smart Jewelry
4.7.3. Smart Watches

4.8. Health Sector

4.8.1. Exercise/Heart Rate Monitoring
4.8.2. Monitoring of Patients and Elderly People
4.8.3. Implantable
4.8.4. Surgical Robots

4.9. Connectivity

4.9.1. Wi-Fi
4.9.2. Bluetooth
4.9.3. Built-in Connectivity

4.10. Securitization

4.10.1. Dedicated Networks
4.10.2. Password Managers
4.10.3. Use of Encrypted Protocols
4.10.4. Tips for Use

##IMAGE##

A unique specializacion program that will allow you to acquire advanced training in this field"

Postgraduate Diploma in Defensive Cybersecurity

The daily use of the Internet has become an essential part of life in the most advanced societies. Citizens use digital tools for various daily tasks, which has led to great advances in business. As a result, hackers have found in the network a new way to act, which endangers virtually all companies. As a result, company managers are obliged to acquire advanced knowledge in order to act defensively against possible attacks and to implement preventive measures to avoid these threats. To meet this need for specialization on the part of business professionals, TECH has designed the Postgraduate Diploma in Defensive Cybersecurity, which will provide you with top-level competencies in this field.

Specialize in Defensive Cybersecurity in just 6 months

Do you want to know the cutting-edge techniques to ensure security and prevent attacks on hosts, networks, smartphones or IoT? You're in luck! The Postgraduate Diploma in Defensive Cybersecurity has been developed to provide you with this very complete knowledge. Its fully online methodology will allow you to study 24 hours a day and from anywhere, with any electronic device with an Internet connection. In addition, the focus on multimedia formats such as video or interactive summary makes learning more attractive and effective. Also, the program is designed by the best experts in the field, who have created a comprehensive curriculum that will provide you with content applicable in real work situations.