University certificate
The world's largest faculty of information technology”
Introduction to the Program
This Postgraduate certificate is the best investment you can make when selecting a refresher program in the field of Security and Auditing of Applications and Web Services. We offer you quality and free access to content"

Learn to design, evaluate and manage software engineering projects thanks to this high-quality program”
This Postgraduate certificate in Security and Auditing of Applications and Web Services contains the most complete and up-to-date educational program on the market. The most important features include:
- The development of case studies presented by experts in Security and Auditing of Applications and Web Services
- The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
- Practical exercises where self-assessment can be used to improve learning
- Special emphasis on innovative methodologies in Security and Auditing of Applications and Web Services
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
- Content that is accessible from any fixed or portable device with an Internet connection
Specialize in computer systems with the help of professionals with extensive experience in the sector”
The program includes in its teaching staff professionals from the field of Security and Auditing of Applications and Web Services, who contribute the experience of their work to this program, as well as renowned specialists from leading societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive learning programmed to study in real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the professional will be assisted by an innovative interactive video system developed by renowned and experienced experts in Security and Auditing of Applications and Web Services.
This program comes with the best educational material, providing you with a contextual approach that will facilitate your learning”

This 100% online Postgraduate certificate will allow you to combine your studies with your professional work. You choose where and when to study”
Syllabus
The structure of the contents has been designed by the best professionals in the sector, with extensive experience and recognized prestige in the profession, and aware of the benefits that the latest educational technology can bring to higher education.
We have the most complete and up-to-date program on the market. We strive for excellence and for you to achieve it too"
Module 1. Security Audit
1.1. Introduction to Information Systems in the Company
1.1.1. Introduction to Information Systems in the Company and the Role of IT Auditing
1.1.2. Definitions of "IT Audit" and "IT Internal Control"
1.1.3. Functions and Objectives of IT Auditing
1.1.4. Differences between Internal Control and IT Auditing
1.2. Internal Controls of Information Systems
1.2.1. Functional Flowchart of a Data Processing Center
1.2.2. Classification of Information Systems Controls
1.2.3. The Golden Rule
1.3. The Process and Phases of the Information Systems Audit
1.3.1. Risk Assessment and Other IT Auditing Methodologies
1.3.2. Execution of an Information Systems Audit. Phases of the Audit
1.3.3. Fundamental Skills of the Auditor of an IT System
1.4. Technical Audit of Security in Systems and Networks
1.4.1. Technical Security Audits. Intrusion Test. Previous Concepts
1.4.2. Security Audits in Systems. Support Tools
1.4.3. Security Audits in Networks. Support Tools
1.5. Technical Audit of Security on the Internet and in Mobile Devices
1.5.1. Internet Security Audit. Support Tools
1.5.2. Mobile Devices Security Audit. Support Tools
1.5.3. Annex 1. Structure of an Executive Report and Technical Report
1.5.4. Annex 2. Tools Inventory
1.5.5. Annex 3. Methods
1.6. Information Security Management System
1.6.1. Security of IS: Properties and Influential Factors
1.6.2. Business Risks and Risk Management: Implementing Controls
1.6.3. Information Security Management System (ISMS): Concept and Critical Success Factors
1.6.4. ISMS-PDCA Model
1.6.5. ISMS ISO-IEC 27001: Organizational Context
1.6.6. Annex 4. Context of the Organization
1.6.7. Annex 5. Leadership
1.6.8. Annex 6. Planning
1.6.9. Annex 7. Support
1.6.10. Annex 8. Operation
1.6.11. Annex 9. Performance Evaluation
1.6.12. Annex 10. Improvement
1.6.13. Annex to ISO 27001/ISO-IEC 27002: Objectives and Controls
1.6.14. ISMS Audit
1.7. Carrying Out the Audit
1.7.1. Procedures
1.7.2. Techniques
1.8. Traceability
1.8.1. Methods
1.8.2. Analysis
1.9. Copyright
1.9.1. Techniques
1.9.2. Results
1.10. Reports and Presenting Proof
1.10.1. Types of Reports
1.10.2. Data Analysis
1.10.3. Presenting Proof
Module 2. Online Application Security
2.1. Vulnerabilities and Security Issues in Online Applications
2.1.1. Introduction to Online Application Security
2.1.2. Security Vulnerabilities in the Design of Web Applications
2.1.3. Security Vulnerabilities in the Implementation of Web Applications
2.1.4. Security Vulnerabilities in the Deployment of Web Applications
2.1.5. Official Lists of Security Vulnerabilities
2.2. Policies and Standards for Online Application Security
2.2.1. Pillars for the Security of Online Applications
2.2.2. Security Policy
2.2.3. Information Security Management System
2.2.4. Secure Software Development Life Cycle
2.2.5. Standards for Application Security
2.3. Security in the Design of Web Applications
2.3.1. Introduction to Web Application Security
2.3.2. Security in the Design of Web Applications
2.4. Testing the Online Safety and Security of Web Applications
2.4.1. Web Application Security Testing and Analysis
2.4.2. Web Application Deployment and Production Security
2.5. Web Services Security
2.5.1. Introduction to Web Services Security
2.5.2. Web Services Security Functions and Technologies
2.6. Testing the Online Safety and Security of Web Services
2.6.1. Evaluation of Web Services Security
2.6.2. Online Protection. Firewalls and XML Gateways
2.7. Ethical Hacking, Malware and Forensics
2.7.1. Ethical Hacking
2.7.2. Malware Analysis
2.7.3. Forensic Analysis
2.8. Incident Resolution on Web Services
2.8.1. Monitoring
2.8.2. Performance Measurement Tools
2.8.3. Containment Measures
2.8.4. Root Cause Analysis
2.8.5. Proactive Problem Management
2.9. Best Practices to ensure Application Security
2.9.1. Handbook of Best Practices in the Development of Online Applications
2.9.2. Handbook of Good Practices in the Implementation of Online Applications
2.10. Common Errors that Undermine Application Security
2.10.1. Common Errors in Development
2.10.2. Common Errors in Hosting
2.10.3. Common Production Errors

A comprehensive and multidisciplinary program that will allow you to excel in your career, following the latest advances in the field of Security and Auditing of Applications and Web Services”
Postgraduate Certificate in Security and Auditing of Web Applications and Web Services
The constant advance of technology and the growing dependence of companies on web services has increased the need for professionals specialized in the cybersecurity of applications and websites. Aware of this demand, TECH offers the Postgraduate Certificate in Security and Auditing of Applications and Web Services, in its online modality. This Postgraduate Certificate provides students with the knowledge and skills necessary to ensure the protection of web applications and services against cyber attacks, as well as the identification of vulnerabilities and the implementation of effective security measures. In addition, students will learn how to perform security audits on web applications and services to ensure data integrity and confidentiality. One of the main advantages of studying at TECH is its online study methodology, which allows students to access content from anywhere and at any time, giving them the flexibility to adapt the Postgraduate Certificate to their needs. The curriculum is constantly updated, making it easy for students to stay current on the latest trends and technologies in web security.
Specialize in IT security for web applications and services
TECH is not only a global leader in distance education, but also has a teaching team with extensive experience in the field, which guarantees the quality of teaching and the transmission of updated and relevant knowledge. As for the structure of the course, it is composed of several units that address key topics such as web application security, web application security auditing, vulnerability analysis, risk management and web service security, among others. In addition, practical exercises and activities allow students to apply the knowledge acquired and reinforce their learning. Take advantage of this Postgraduate Certificate now: its online modality, the quality of the teaching and the access to exclusive multimedia, are factors that make it an excellent option for you to expand your skills and competencies in web security.