Description

More and more companies need specialists in security management applied to IT. This program will allow you to progress professionally, delving into issues such as business continuity planning associated with security"

##IMAGE##

It is a fact: there are hardly any companies that do not use digital and IT tools in their internal processes. Activities and operations such as employee identification, logistics systems or contact with suppliers and customers are now mainly carried out using information technology. But these technologies must be subject to proper design and monitoring, as they can be exploited to obtain data or to gain access to sensitive aspects of the company.

For this reason, the security management specialist is an increasingly in-demand position, and cannot be filled by just any IT specialist. Highly up-to-date knowledge that takes into account the latest developments in cybersecurity is required. Thus, this postgraduate diploma has been designed to offer the professional the latest advances in this area, delving into issues such as security audits, terminal equipment security, or the most effective response to different incidents.

This program is also developed in a 100% online format that adapts to the circumstances of the professional, allowing them to study when, where and however they want. It will also have a teaching staff of great prestige in the field of cybersecurity that will be supported by numerous multimedia resources to make the learning process comfortable, fast and effective.

This program will allow you to go deeper into aspects such as the life cycle of a business continuity plan or vulnerability management"

This postgraduate diploma in IT Security Management contains the most complete and up-to-date educational program on the market. Its most notable features are:

  • Case studies presented by IT and cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where the self-assessment process can be carried out to improve learning
  • Its special emphasis on innovative methodologies
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Access to content from any fixed or portable device with an Internet connection

TECH provides you with the best multimedia resources: case studies, theoretical and practical activities, videos, interactive summaries... Everything so that the learning process is agile and you can take advantage of every minute invested"

The program’s teaching staff includes professionals from sector who contribute their work experience to this training program, as well as renowned specialists from leading societies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive training programmed to train in real situations.

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the student will be assisted by an innovative interactive video system created by renowned and experienced experts.

You will be able to respond appropriately to all types of cybersecurity threats. Enroll and become a leading specialist"

##IMAGE##

Study at your own pace, without interruptions or rigid schedules: TECH's teaching method is that convenient"

Objectives

Taking into account the growing complexity of the cybersecurity field, the main goal of this postgraduate diploma in IT Security Management is to bring the professional closer to the most important developments in this field. In this way, you will be able to become a leading specialist in the field, being able to work managing and directing cybersecurity of companies in all types of sectors.

##IMAGE##

TECH helps you to achieve your goals thanks to this program, with which you can apply for important professional positions in the most important national and international companies"

General Objectives

  • Develop an Information Security Management System (ISMS)
  • Identify the key elements that make up an ISMS
  • Evaluate the different security architecture models to establish the most appropriate model for the organization
  • Identify the regulatory frameworks of application and their regulatory bases
  • Analyze the organizational and functional structure of an information security area (the CISO's office)
  • Establish an audit program that meets the organization's cybersecurity self-assessment needs
  • Develop a vulnerability scanning and monitoring program and a cybersecurity incident response plan
  • Determine the basic elements of a Business Continuity Plan (BCP) using the ISO-22301 guidelines as a basis
  • Examine the risks arising from the non-existence of a Business Continuity Plan (BCP)
  • Analyze the success criteria of a BCP and its integration into a company's overall Risk Management
  • Specify the implementation phases of a Business Continuity Plan

Specific Objectives

Module 1. Information Security Architectures and Models

  • Align the Safety Management Plan with the strategic objectives of the organization
  • Establish an ongoing risk management framework as an integral part of the Security Management Plan
  • Determine appropriate indicators for monitoring the implementation of the ISMS
  • Establish a policy-based security strategy
  • Analyze the objectives and procedures associated with the employee, supplier and partner awareness plan
  • Identify, within the regulatory framework, the regulations, certifications and laws applicable in each organization
  • Develop the fundamental elements required by the ISO 27001:2013 standard
  • Implement a privacy management model in line with the European GDPR/RGPD regulation

Module 2. IT Security Management

  • Identify the different structures that an information security area can have
  • Develop a security model based on three lines of defense
  • Present the different periodic and extraordinary committees in which the cybersecurity area is involved
  • Specify the technological tools that support the main functions of the security operations team (SOC)
  • Evaluate vulnerability control measures appropriate to each scenario
  • Develop the security operations framework based on the NIST CSF
  • Specify the scope of the different types of audits (Red Team, Pentesting, Bug Bounty, etc.)
  • Propose the activities to be carried out after a security incident
  • Set up an information security command center that encompasses all relevant stakeholders (authorities, customers, suppliers, etc.)

Module 3. Business Continuity Plan Associated with Security

  • Present the key elements of each phase and analyze the characteristics of the Business Continuity Plan (BCP)
  • Substantiate the need for a Business Continuity Plan
  • Determine the success and risk maps for each phase of the Business Continuity Plan
  • Specify how to establish an Action Plan for implementation
  • Assess the completeness of a Business Continuity Plan (BCP)
  • Develop a successful Business Continuity Plan Implementation for our Business
##IMAGE##

You will be the leading IT security specialist in your environment. Don't wait any longer: enroll now"

Postgraduate Diploma in IT Security Management

.

Information security is one of the main concerns of companies today. A company's information, its trade secrets, the privacy of its customers, among other aspects, must be safeguarded efficiently. For this reason, TECH's Postgraduate Diploma in IT Security Management is the answer to specialize in the field of cybersecurity, training you in the design and management of efficient and robust information security systems.

Specialize 100% online in cybersecurity

.

During this Postgraduate Diploma, you will delve into security auditing, protection of terminal equipment, incident response, risk management, among other relevant aspects of computer security. In addition, you will have a first-class teaching staff, composed of recognized experts in the field of cybersecurity. The program is taught in 100% online mode, which will allow you to study at your own pace and adapt your learning process to your personal and work situation.