Introduction to the Program

This academic program offers you an exclusive content on offensive cybersecurity in only 6 months of continuous learning"

Why Study at TECH?

TECH is the world's largest 100% online business school. It is an elite business school, with a model based on the highest academic standards. A world-class center for intensive managerial skills education.   

TECH is a university at the forefront of technology, and puts all its resources at the student's disposal to help them achieve entrepreneurial success"

At TECH Global University

idea icon

Innovation

The university offers an online learning model that balances the latest educational technology with the most rigorous teaching methods. A unique method with the highest international recognition that will provide students with the keys to develop in a rapidly-evolving world, where innovation must be every entrepreneur’s focus.

"Microsoft Europe Success Story", for integrating the innovative, interactive multi-video system. 
head icon

The Highest Standards

Admissions criteria at TECH are not economic. Students don't need to make a large investment to study at this university. However, in order to obtain a qualification from TECH, the student's intelligence and ability will be tested to their limits. The institution's academic standards are exceptionally high...  

95% of TECH students successfully complete their studies.
neuronas icon

Networking

Professionals from countries all over the world attend TECH, allowing students to establish a large network of contacts that may prove useful to them in the future.  

100,000+ executives prepared each year, 200+ different nationalities.
hands icon

Empowerment

Students will grow hand in hand with the best companies and highly regarded and influential professionals. TECH has developed strategic partnerships and a valuable network of contacts with major economic players in 7 continents.  

500+ collaborative agreements with leading companies.
star icon

Talent

This program is a unique initiative to allow students to showcase their talent in the business world. An opportunity that will allow them to voice their concerns and share their business vision. 

After completing this program, TECH helps students show the world their talent.
earth icon

Multicultural Context 

While studying at TECH, students will enjoy a unique experience. Study in a multicultural context. In a program with a global vision, through which students can learn about the operating methods in different parts of the world, and gather the latest information that best adapts to their business idea.

TECH students represent more than 200 different nationalities.  
human icon

Learn with the best

In the classroom, TECH’s teaching staff discuss how they have achieved success in their companies, working in a real, lively, and dynamic context. Teachers who are fully committed to offering a quality specialization that will allow students to advance in their career and stand out in the business world. 

Teachers representing 20 different nationalities. 

TECH strives for excellence and, to this end, boasts a series of characteristics that make this university unique:   

brain icon

Analysis 

TECH explores the student’s critical side, their ability to question things, their problem-solving skills, as well as their interpersonal skills.  

micro icon

Academic Excellence 

TECH offers students the best online learning methodology. The university combines the Relearning method (postgraduate learning methodology with the best international valuation) with the Case Study. Tradition and vanguard in a difficult balance, and in the context of the most demanding educational itinerary. 

corazon icon

Economy of Scale 

TECH is the world’s largest online university. It currently boasts a portfolio of more than 10,000 university postgraduate programs. And in today's new economy, volume + technology = a ground-breaking price. This way, TECH ensures that studying is not as expensive for students as it would be at another university.   

At TECH, you will have access to the most rigorous and up-to-date case analyses in academia” 

Syllabus

The program in Offensive Cybersecurity is a qualification that is primarily focused on specific skills with a horizon towards roles and responsibilities in Offensive Cybersecurity. Therefore, this academic itinerary is guided from a theoretical-practical pillar together with the solid experience and the wide background of a teaching staff totally expert in the sector. 

Expert syllabus and quality content are the key to the success of your Offensive Cybersecurity learning"

Syllabus

This academic program consists of 450 classroom hours, in which TECH will put the professionals on the path to the top of their careers through an education that emphasizes excellence and efficiency. In this way, the graduates will be able to apply to the most important vacancies in the IT and business sector, addressing multiple challenges in the workplace. Therefore, this program provides a wide range of skills related to OSINT applications in offensive security.

In this way, the faculty has designed a prestigious syllabus that incorporates 3 modules, with the purpose that the graduates acquire relevant knowledge about the importance of cybersecurity today, its opportunities and challenges in the sector.

On the other hand, students of this Postgraduate diploma will delve into specific concepts related to common vulnerabilities in ADCS, attacks and exploitation techniques, defenses and mitigations, monitoring and auditing of ADCS. Graduates will also gain important skills related to cybersecurity in the modern era.

TECH prioritizes convenience and excellence, and that is why this program offers a complete and high quality education, while providing flexibility to pursue it. Graduates only need a device with an Internet connection to easily access the virtual platform, 24 hours a day and from anywhere in the world. 

This Postgraduate diploma takes place over 6 months and is divided into 3 modules:

Module 1. Offensive Security

Module 2. Network and Windows System Attacks

Module 3. Malware Analysis and Development

Where, When and How is it Taught?

TECH offers the possibility of developing this Postgraduate diploma in Offensive Cybersecurity completely online. Throughout the 6 months of the educational program, you will be able to access all the contents of this program at any time, allowing you to self-manage your study time.

Module 1. Offensive Security

1.1. Definition and Context 

1.1.1. Fundamental Concepts of Offensive Security 
1.1.2. Importance of Cybersecurity Today 
1.1.3. Offensive Security Challenges and Opportunities 

1.2. Basis of Cybersecurity 

1.2.1. Early Challenges and Evolving Threats 
1.2.2. Technological Milestones and Their Impact on Cybersecurity 
1.2.3. Cybersecurity in the Modern Era 

1.3. Basis of Offensive Security 

1.3.1. Key Concepts and Terminology 
1.3.2. Think Outside the Box 
1.3.3. Differences between Offensive and Defensive Hacking 

1.4. Offensive Security Methodologies 

1.4.1. PTES (Penetration Testing Execution Standard) 
1.4.2. OWASP (Open Web Application Security Project)
1.4.3. Cyber Security Kill Chain 

1.5. Offensive Security Roles and Responsibilities 

1.5.1. Main Profiles 
1.5.2. Bug Bounty Hunters 
1.5.3. The art of researching 

1.6. Offensive Auditor's Arsenal 

1.6.1. Operating Systems for Hacking 
1.6.2. Introduction to C2 
1.6.3. Metasploit: Fundamentals and Use 
1.6.4. Useful Resources 

1.7. OSINT Open Source Intelligence 

1.7.1. OSINT Fundamentals 
1.7.2. OSINT Tools and Techniques 
1.7.3. OSINT Applications in Offensive Security 

1.8. Scripting Introduction to Automation 

1.8.1. Scripting Fundamentals 
1.8.2. Scripting in Bash 
1.8.3. Scripting in Python 

1.9. Vulnerability Categorization 

1.9.1. CVE (Common Vulnerabilities and Exposure) 
1.9.2. CWE (Common Weakness Enumeration) 
1.9.3. CAPEC (Common Attack Pattern Enumeration and Classification) 
1.9.4. CVSS (Common Vulnerability Scoring System) 
1.9.5. MITRE ATT & CK 

1.10. Ethics and Hacking 

1.10.1. Principles of Hacker Ethics 
1.10.2. The Line between Ethical Hacking and Malicious Hacking 
1.10.3. Legal Implications and Consequences 
1.10.4. Case Studies: Ethical Situations in Cybersecurity 

Module 2. Network and Windows System Attacks 

2.1. Windows and Active Directory 

2.1.1. History and Evolution of Windows 
2.1.2. Active Directory Basics
2.1.3. Active Directory Functions and Services 
2.1.4. General Architecture of the Active Directory 

2.2. Networking in Active Directory Environments 

2.2.1. Network Protocols in Windows 
2.2.2. DNS and its Operation in the Active Directory
2.2.3. Network Diagnostic Tools
2.2.4. Implementation of Networks in Active Directory

2.3. Authentication and Authorization in Active Directory 

2.3.1. Authentication Process and Flow 
2.3.2. Credential Types
2.3.3. Credentials Storage and Management. 
2.3.4. Authentication Security

2.4. Permissions and Policies in Active Directory 

2.4.1.  GPOs
2.4.2. Application and Management of GPOs
2.4.3. Active Directory Permissions Management
2.4.4. Vulnerabilities and Mitigations in Permits

2.5. Kerberos Basics

2.5.1. What Is Kerberos? 
2.5.2. Components and Operation
2.5.3. Kerberos Tickets
2.5.4. Kerberos in the Context of Active Directory

2.6. Advanced Kerberos Techniques

2.6.1. Common Kerberos Attacks
2.6.2. Mitigations and Protections
2.6.3. Kerberos Traffic Monitoring
2.6.4. Advanced Kerberos Attacks

2.7. Active Directory Certificate Services (ADCS) 

2.7.1. PKI Basics
2.7.2. ADCS Roles and Components
2.7.3. ADCS Configuration and Deployment
2.7.4. Safety at ADCS

2.8. Attacks and Defenses in Active Directory Certificate Services (ADCS) 

2.8.1. Common ADCS Vulnerabilities
2.8.2. Attacks and Exploitation Techniques
2.8.3. Defenses and Mitigations
2.8.4. ADCS Monitoring and Auditing

2.9. Active Directory Audit 

2.9.1. Importance of Auditing in the Active Directory
2.9.2. Audit Tools
2.9.3. Detection of Anomalies and Suspicious Behaviors
2.9.4. Incident Response and Recovery

2.10. Azure AD 

2.10.1. Azure AD Basics 
2.10.2. Synchronization with Local Active Directory 
2.10.3. Identity Management in Azure AD 
2.10.4. Integration with Applications and Services

Module 3. Malware Analysis and Development

3.1. Malware Analysis and Development 

3.1.1. History and Evolution of Malware 
3.1.2. Classification and Types of Malware 
3.1.3. Malware Analysis 
3.1.4. Malware Development 

3.2. Preparing the Environment 

3.2.1. Configuration of Virtual Machines and Snapshots 
3.2.2. Malware Analysis Tools 
3.2.3. Malware Development Tools 

3.3. Windows Basics 

3.3.1. PE file format (Portable Executable) 
3.3.2. Processes and Threads 
3.3.3. Files System and Registry 
3.3.4. Windows Defender 

3.4. Basic Malware Techniques 

3.4.1. Shellcode Generation 
3.4.2. Shellcode Execution on Disk 
3.4.3. Disk vs Memory 
3.4.4. Execution of Shellcode in Memory 

3.5. Intermediate Malware Techniques 

3.5.1. Persistence in Windows 
3.5.2. Home Folder 
3.5.3. Registration Keys 
3.5.4. Screensaver 

3.6. Advanced Malware Techniques 

3.6.1. Shellcode Encryption (XOR) 
3.6.2. Shellcode Encryption (RSA) 
3.6.3. String Obfuscation 
3.6.4. Process Injection 

3.7. Static Malware Analysis 

3.7.1. Analyzing Packers with DIE (Detect It Easy) 
3.7.2. Analyzing Sections with PE-Bear 
3.7.3. Decompilation with Ghidra 

3.8. Dynamic Malware Analysis 

3.8.1. Observing Behavior with Process Hacker 
3.8.2. Analyzing Calls with API Monitor 
3.8.3. Analyzing Registry Changes with Regshot 
3.8.4. Observing Network Requests with TCPView 

3.9. Analysis in .NET 

3.9.1. Introduction to .NET 
3.9.2. Decompiling with dnSpy 
3.9.3. Debugging with dnSpy 

3.10. Analyzing Real Malware 

3.10.1. Preparing the Environment 
3.10.2. Static Malware Analysis 
3.10.3. Dynamic Malware Analysis 
3.10.4. YARA Rule Creation

Make the most of this opportunity to surround yourself with expert professionals and learn from their work methodology"

Postgraduate Diploma in Offensive Cybersecurity

Offensive cybersecurity is essential to safeguard the integrity and continuity of operations in an increasingly digital business environment. If you are looking to acquire key knowledge to perform in this field, TECH Global University has the ideal option for you: the Postgraduate Diploma in Offensive Cybersecurity, offered by the prestigious Business School. Designed for professionals and students with strategic vision, this program will immerse you in the complexities of offensive cybersecurity, providing you with the essential skills to protect organizations' digital assets. Delivered 100% online, this program goes beyond technical skills, focusing on strategic leadership in the realm of offensive cybersecurity. Here, you will learn to coordinate operations, manage resources and make strategic decisions that strengthen companies' digital defenses. From this, you will become an architect of digital defenses, capable of developing effective offensive cybersecurity strategies. From identifying vulnerabilities, to implementing proactive countermeasures, you'll acquire key skills to safeguard the integrity of enterprise systems.

From identifying vulnerabilities, to implementing proactive countermeasures, you'll acquire key skills to safeguard the integrity of enterprise systems.

Learn about offensive cybersecurity

To achieve our goal of being the best online university in the world, we employ innovative methodologies, classes supported by multimedia material and relearning teaching models that, together will achieve a dynamic and efficient educational process. Our program has an outstanding teaching staff made up of professionals with experience in both business and cybersecurity. You will gain knowledge from experts who understand the critical intersection between digital security and business success. With us, you will develop specific skills to address cyber challenges within the context of organizations and their business objectives. In addition, you'll learn how to apply offensive cybersecurity tactics within ethical boundaries, ensuring compliance with regulations and standards to protect business integrity and reputation. Upon completion, you will be prepared to lead at the forefront of offensive cybersecurity. You will develop skills that are highly valued in today's business world and actively contribute to the protection of organizations' digital assets. Enroll now and begin your journey to cybersecurity excellence!