Introduction to the Program

Thanks to this program, you will learn the best encryption methods to protect your clients' and employers' data"

##IMAGE##

Cryptography is a booming discipline for which professionals are increasingly in demand. This field makes it possible to protect all types of digital data and has applications in areas such as banking, online stores, databases of all kinds and is essential in the Blockchain. Thus, specializing in this area is a must for today's IT professional.

Many companies, not just technology companies, need cryptographic experts to make their information more secure, and this program responds to that demand. Throughout 3 modules, and in 450 hours of learning, the computer scientist will be able to delve into issues such as the mathematical foundations of cryptography, the methodology of analysis and risk management of information systems or the protection of algorithms against quantum computing.

The professional will be able to deepen in this discipline through a 100% online methodology, specially designed so that the student can combine their work with their studies. In addition, the program will be taught by a teaching staff of great prestige in the field of cryptography, who will teach this program using 
numerous multimedia resources.

Cryptography is basic to companies like Facebook, Paypal or Amazon, and Blockchain technology has given it a huge boost, so specializing in this area can give access to numerous career opportunities"

The Postgraduate diploma in Security and Cryptography is the most complete and up-to-date educational program on the market. Its most notable features are: 

  • The development of case studies presented by IT and cybersecurity experts
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice
  • Practical exercises where the self-assessment process can be carried out to improve learning
  • Its special emphasis on innovative methodologies
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection work
  • Content that is accessible from any fixed or portable device with an Internet connection

From the best multimedia materials, and with a teaching staff composed of working professionals, you will learn all the keys to cryptography applied to computer security"

The program includes, in its teaching staff, professionals from the sector who bring to this training the experience of their work, in addition to recognized specialists from prestigious reference societies and universities. 

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive training programmed to train in real situations. 

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the student will be assisted by an innovative interactive video system created by renowned and experienced experts. 

Cryptography is the big IT field of today: this program will allow you to specialize in it with the best online teaching on the market”

##IMAGE##

With this Postgraduate Diploma you will delve into aspects of cryptography such as the protection of algorithms against quantum computing”

Syllabus

This Postgraduate diploma in Security and Cryptography is developed over 6 months, in 450 hours of learning. In addition, it has been structured in 3 modules, with which the computer scientist will delve into issues such as the methodology of analysis and risk management of information systems, the development of IT risk maps based on agile methodologies, artificial intelligence applied to risk management or cryptography applied to the Blockchain.

##IMAGE##

With this program you will have access to the latest content in steganography" 

Module 1. Risk Analysis and IT Security Environment

1.1. Analysis of the environment

1.1.1. Analysis of the Economic Situation

1.1.1.1. VUCA Environment

1.1.1.1.1. Volatile
1.1.1.1.2. Unsure
1.1.1.1.3. Complex    

1.1.2.2. Economics
1.1.2.3. Social
1.1.2.4. Technological
1.1.2.5. Ecological/Environmental
1.1.2.6. Legal

1.1.3. Analysis of the Internal Situation SWOT Analysis

1.1.3.1. Objectives
1.1.3.2. Threats
1.1.3.3. Opportunities
1.1.3.4. Strengths

1.2. Risk and Uncertainty

1.2.1. Risk
1.2.2. Risk Management
1.2.3. Risk Management Standards

1.3. ISO 31.000:2018 Risk Management Guidelines

1.3.1. Object
1.3.2. Principles
1.3.3. Frame of Reference
1.3.4. Process

1.4. Methodology for Analysis and Management of Information Systems Risks (MAGERIT)

1.4.1. MAGERIT Methodology

1.4.1.1 Objectives
1.4.1.2 Method
1.4.1.3 Elements
1.4.1.4 Techniques
1.4.1.5 Available Tools (PILAR)

1.5. Cyber Risk Transfer

1.5.1. Risk Transfer
1.5.2. Cyber Risks Types
1.5.3. Cyber Risk Insurance

1.6. Agile Methodologies for Risk Management

1.6.1. Agile Methodologies
1.6.2. Scrum for Risk Management
1.6.3. Agile Risk Management

1.7. Technologies for Risk Management

1.7.1. Artificial Intelligence Applied to Risk Management
1.7.2. Blockchain and Cryptography Value Preservation Methods
1.7.3. Quantum Computing Opportunity or Risk

1.8. IT Risk Mapping Based on Agile Methodologies

1.8.1. Representation of Probability and Impact in Agile Environments
1.8.2. Risk as a Threat to Value
1.8.3. Re-Evolution in Project Management and Agile Processes Based on KRIs

1.9. Risk-Driven in Risk Management

1.9.1. Risk Driven
1.9.2. Risk-Driven in Risk Management
1.9.3. Development of a Risk-Driven Business Management Model

1.10. Innovation and Digital Transformation in IT Risk Management

1.10.1. Agile Risk Management as a Source of Business Innovation
1.10.2. Transforming Data into Useful Information for Decision Making
1.10.3. Holistic View of the Company through Risk

Module 2. Cryptography in IT

2.1. Cryptography

2.1.1. Cryptography
2.1.2. Fundamentals of Mathematics

2.2. Cryptology

2.2.1. Cryptology
2.2.2. Cryptanalysis
2.2.3. Steganography and Stegoanalysis

2.3. Cryptographic Protocols

2.3.1. Basic Blocks
2.3.2. Basic Protocols
2.3.3. Intermediate Protocols
2.3.4. Advanced Protocols
2.3.5. Exoteric Protocols

2.4. Cryptographic Techniques

2.4.1. Length of Passwords
2.4.2. Password Management
2.4.3. Types of Algorithms
2.4.4. Summary of Functions Hash
2.4.5. Pseudo-Random Number Generators
2.4.6. Use of Algorithms

2.5. Symmetric Cryptography

2.5.1. Block Ciphers
2.5.2. DES (Data Encryption Standard)
2.5.3. RC4 Algorithm
2.5.4. AES (Advanced Encryption Standard)
2.5.5. Combination of Block Ciphers
2.5.6. Password Derivation

2.6. Asymmetric Cryptography

2.6.1. Diffie-Hellman
2.6.2. DSA (Digital Signature Algorithm)
2.6.3. RSA (Rivest, Shamir and Adleman)
2.6.4. Elliptic Curve
2.6.5. Asymmetric Cryptography Types

2.7. Digital Certificates

2.7.1. Digital Signature
2.7.2. X509 Certificates
2.7.3. Public Key Infrastructure (PKI)

2.8. Implementations

2.8.1. Kerberos
2.8.2. IBM CCA
2.8.3. Pretty Good Privacy (PGP)
2.8.4. ISO Authentication Framework
2.8.5. SSL and TLS
2.8.6. Europay, MasterCard, and Visa (EMV)
2.8.7. Mobile Telephony Protocols
2.8.8. Blockchain.

2.9. Steganography

2.9.1. Steganography
2.9.2. Stegoanalysis
2.9.3. Applications and Uses

2.10. Quantum Cryptography

2.10.1. Quantum Algorithms
2.10.2. Algorithm Protection Against Quantum Computing
2.10.3. Quantum Key Distribution

Module 3. Business Continuity Plan Associated with Security

3.1. Business Continuity Plans

3.1.1. Business Continuity Plans (BCP)
3.1.2. Business Continuity Plans (BCP) Key Aspects
3.1.3. Business Continuity Plan (BCP) for Company Valuation

3.2. Metrics in Business Continuity Plans (BCP)

3.2.1. Recovery Time Objective (RTO) and Recovery Point Objective (RPO)
3.2.2. Maximum Tolerable Downtime (MTD)
3.2.3. Minimum Recovery Levels (ROL)
3.2.4. Recovery Point Objective (RPO)

3.3. Continuity Projects Types

3.3.1. Business Continuity Plans (BCP)
3.3.2. ICT Continuity Plan (ICTCP)
3.3.3. Disaster Recovery Plan (DRP)

3.4. Risk Management Associated with the BCP

3.4.1. Business Impact Analysis
3.4.2. Benefits of Implementing a BCP
3.4.3. Risk-Based Mentality

3.5. Life Cycle of a Business Continuity Plan

3.5.1. Phase 1: Analysis of the Organization
3.5.2. Phase 2: Determining the Continuity Strategy
3.5.3. Phase 3: Response to Contingency
3.5.4. Phase 4: Tests, Maintenance and Review

3.6. Organizational Analysis Phase of a BCP

3.6.1. Identification of Processes in the Scope of the BCP
3.6.2. Identification of Critical Business Areas
3.6.3. Identification of Dependencies between Areas and Processes
3.6.4. Determination of Appropriate BAT
3.6.5. Deliverables Creating a Plan

3.7. Phase of Determination of the Continuity Strategy in a BCP

3.7.1. Roles in the Strategy Determination Phase
3.7.2. Tasks of the Strategy Determination Phase
3.7.3. Deliverables

3.8. Contingency Response Phase in a BCP

3.8.1. Roles in the Response Phase
3.8.2. Tasks in this Phase
3.8.3. Deliverables

3.9. Testing, Maintenance and Revision Phase of a BCP

3.9.1. Roles in the Testing, Maintenance and Revision Phase
3.9.2. Tasks in the Testing, Maintenance and Revision Phase
3.9.3. Deliverables

3.10. ISO Standards Associated with Business Continuity Plans (BCP)

3.10.1. ISO 22301:2019
3.10.2. ISO 22313:2020
3.10.3. Other Related ISO and International Standards 

##IMAGE##

Companies in all industries will want to count on you to protect their most valuable data”

Postgraduate Diploma in Security and Cryptography

.

Information security is one of the major concerns of today's society, especially for companies and institutions that handle sensitive data. In this context, cryptography has become a fundamental pillar in cybersecurity, as it allows data to be protected through the encryption process and the use of tools such as algorithms. TECH's Postgraduate Diploma in Security and Cryptography focuses on symmetric cryptography, block ciphers, quantum algorithms and Blockchain technology. In addition, the program has a 100% online teaching system, which will allow you to combine your studies with your work.

An extensive library of specialized content in cybersecurity

.

The Postgraduate Diploma in Security and Cryptography will allow you to delve into the mathematical foundations of cryptography, the methodology of analysis and risk management of information systems, the protection of algorithms against quantum computing and many other essential issues in this area. In addition, you will have a teaching staff of great prestige in this sector, who will teach the program from numerous multimedia resources.