Introduction to the Program

You will be prepared to deal with any IT security incident that a company may suffer. Enroll in this Postgraduate diploma"

##IMAGE##

IT security is becoming increasingly necessary given the large volume of sensitive data held by companies and institutions. However, in many cases, bad practices on the part of the personnel or the lack of knowledge in this technological field cause cracks and incidents to occur. These can sometimes generate losses or seriously affect the image of an entity.

This Postgraduate diploma provides a specialized education that allows to analyze and manage incidents, from their detection through IDS/IPS systems and their subsequent treatment in SIEM, to the process of notification and escalation to the corresponding department. A whole process that requires expert IT professionals with knowledge of useful tools for monitoring information systems.

This program with an eminently practical approach will put the students in a situation before a Ransomware attack, to perfect their knowledge in the adoption of action measures and recovery protocols.

The 100% online mode of this program allows IT professionals to access quality multimedia content from day one without fixed schedules and from any device with internet access. TECH thus facilitates the learning of students who wish to combine their work and personal life with an education available to all.

Master to perfection with this Postgraduate diploma, network monitoring programs such as Nagios, Zabbix or Pandora and keep an eye on your equipment"

This Postgraduate diploma in Information Security Breach Management contains the most complete and up-to-date program on the market. The most important features include:

  • The development of practical cases presented by IT security experts
  • The graphic, schematic and practical contents of the book provide technical and practical information on those disciplines that are essential for professional practice
  • Practical exercises where self-assessment can be used to improve learning
  • Its special emphasis on innovative methodologies
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments
  • Content that is accessible from any fixed or portable device with an Internet connection

Take a leap in your professional career. Specialize and provide answers to the IT security failures of companies and institutions. Enroll now”

The program’s teaching team includes professionals from the sector who contribute their work experience to this educational program, as well as renowned specialists from leading societies and prestigious universities.

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive education programmed to learn in real situations.

This program is designed around Problem-Based Learning, whereby the professional must try to solve the different professional practice situations that arise throughout the program. For this purpose, the student will be assisted by an innovative interactive video system created by renowned and experienced experts.

Learn more about ISO 27035 standards and avoid security breaches that could threaten companies. Enroll in this qualification"

##IMAGE##

Manage SNM protocols and tools to perfection with this Postgraduate diploma"

Syllabus

The syllabus of this Postgraduate diploma has been planned to address in its three modules the key points for the management of computer security incidents. In this way, students will learn about management policies, detection systems and prevention of instructions, to deepen throughout this program in the tools, protocols and security audits. Likewise, practical security disaster recovery will play an important role in this qualification. The practical cases and the Relearning system, based on the reiteration of content, will make it easier and faster for students to build all the knowledge of this qualification.

##IMAGE##

The wide range of multimedia resources enriches this syllabus prepared by experts in the field of computer security"

Module 1. Security Breach Management Policies 

1.1. Information Security Incident Management Policies and Enhancements

1.1.1. Incident Management
1.1.2. Responsibilities and Procedures
1.1.3. Event Notification

1.2. Intrusion Detection and Prevention Systems (IDS/IPS)

1.2.1. System Operating Data
1.2.2. Types of Intrusion Detection Systems
1.2.3. Criteria for IDS/IPS Placement

1.3. Security Incident Response

1.3.1. Data Collection Procedure
1.3.2. Intrusion Verification Process
1.3.3. CERT Organizations

1.4. Intrusion Attempt Notification and Management Process

1.4.1. Responsibilities in the Notification Process
1.4.2. Classification of Incidents
1.4.3. Resolution and Recovery Process

1.5. Forensic Analysis as a Security Policy

1.5.1. Volatile and Non-Volatile Evidence
1.5.2. Analysis and Collection of Electronic Evidence

1.5.2.1. Analysis of Electronic Evidence
1.5.2.2. Collection of Electronic Evidence

1.6. Intrusion Detection and Prevention Systems (IDS/IPS) Tools

1.6.1. Snort
1.6.2. Suricata
1.6.3. SolarWinds

1.7. Event Centralizing Tools

1.7.1. SIM
1.7.2. SEM
1.7.3. SIEM

1.8. CCN-STIC Security Guide 817

1.8.1. Cyber Incident Management
1.8.2. Metrics and Indicators

1.9. NIST SP800-61

1.9.1. Computer Security Incident Response Capability
1.9.2. Handling an Incident
1.9.3. Coordination and Information Sharing

1.10. ISO 27035

1.10.1. ISO 27035 Standard. Incident Management Principles
1.10.2. Incident Management Plan Preparation Guidelines
1.10.3. Incident Response Operations Guides

Module 2. Information Systems Security Policy Monitoring Tools

2.1. Information Systems Monitoring Policies

2.1.1. System Monitoring
2.1.2. Metrics
2.1.3. Types of Metrics

2.2. System Audit and Logging

2.2.1. System Audit and Logging
2.2.2. Windows Audit and Logging
2.2.3. Linux Audit and Logging

2.3. SNMP Protocol. Simple Network Management Protocol

2.3.1. SNMP Protocol
2.3.2. SNMP Functions
2.3.3. SNMP Tools

2.4. Network Monitoring

2.4.1. Network Monitoring in Control Systems
2.4.2. Monitoring Tools for Control Systems

2.5. Nagios. Network Monitoring System

2.5.1. Nagios
2.5.2. Operation of Nagios
2.5.3. Nagios Installation

2.6. Zabbix. Network Monitoring System

2.6.1. Zabbix
2.6.2. How Zabbix Works
2.6.3. Zabbix Installation

2.7. Cacti. Network Monitoring System

2.7.1. Cacti
2.7.2. How Cacti Works
2.7.3. Installation of Cacti

2.8. Pandora. Network Monitoring System

2.8.1. Pandora
2.8.2. Operation of Pandora
2.8.3. Pandora Installation

2.9. SolarWinds. Network Monitoring System

2.9.1. SolarWinds
2.9.2. Operation of SolarWinds
2.9.3. Installation of SolarWinds

2.10. Monitoring Regulations

2.10.1. CIS Controls Over Auditing and Record Keeping
2.10.2. NIST 800-123 (U.S.) USA

Module 3. Practical Security Disaster Recovery Policy

3.1. DRP. Disaster Recovery Plan

3.1.1. Objective of a DRP
3.1.2. Benefits of a DRP
3.1.3. Consequences of a Missing and Not Up-To-Date DRP

3.2. Guidance for Defining a DRP (Disaster Recovery Plan)

3.2.1. Scope and Objectives
3.2.2. Recuperation Strategy Design
3.2.3. Assignment of Roles and Responsibilities
3.2.4. Inventory of Hardware, Software and Services
3.2.5. Tolerance for Downtime and Data Loss
3.2.6. Establishment of the Specific Types of DRP Required
3.2.7. Implementation of a Training, Awareness and Communication Plan

3.3. Scope and Objectives of a DRP (Disaster Recovery Plan)

3.3.1. Response Guarantee
3.3.2. Technological Components
3.3.3. Scope of the Continuity Policy

3.4. Designing a DRP (Disaster Recovery Plan) Strategy

3.4.1. Disaster Recovery Strategy
3.4.2. Budget
3.4.3. Human and Physical Resources
3.4.4. Management Positions at Risk
3.4.5. Technology
3.4.6. Date:

3.5. Continuity of Information Processes

3.5.1. Continuity Planning
3.5.2. Continuity Implementation
3.5.3. Verification of Continuity Assessment

3.6. Scope of a BCP (Business Continuity Plan)

3.6.1. Determination of the Most Critical Processes
3.6.2. Asset-Based Approach
3.6.3. Process Approach

3.7. Implementation of Guaranteed Business Processes

3.7.1. Priority Activities (PA)
3.7.2. Ideal Recovery Times (IRT)
3.7.3. Survival Strategies

3.8. Organizational Analysis

3.8.1. Acquisition of information
3.8.2. Business Impact Analysis (BIA)
3.8.3. Risk Analysis in the Organization

3.9. Response to Contingency

3.9.1. Crisis Plan
3.9.2. Operational Environment Recovery Plans
3.9.3. Technical Work or Incident Procedures

3.10. International Standard ISO 27031 BCP

3.10.1. Objectives
3.10.2. Terms and Definitions
3.10.3. Operation

##IMAGE##

The Relearning system and the 100% online format will be your allies to achieve a very useful learning in your professional field"

Postgraduate Diploma in Information Security Breach Management

With the large volume of sensitive data handled by companies and institutions, computer security has become increasingly crucial. However, on numerous occasions, security breaches and other incidents occur due to poor practices or lack of knowledge on the part of personnel. These problems can lead to financial losses or seriously damage an organization's reputation. Therefore, it is necessary to have the optimal strategies to address these situations with maximum agility, in order to prevent the theft of private business information. To undertake this task, organizations need the most qualified IT specialists in this field. Given this situation, TECH has designed the Postgraduate Diploma in Information Security Breach Management, which will provide you with excellent knowledge in this area to promote your professional growth.

Specialize in this field of cybersecurity in just 6 months

The Postgraduate Diploma in Information Security Breach Management offers specialized training in the detection of vulnerabilities through IDS/IPS systems, their treatment through SIEM and their notification and escalation to the corresponding department. You will also enjoy the simulation of a Ransomware attack that will allow you to perfect your skills in the adoption of response measures and data recovery. Delivered online, this program offers you the flexibility to access quality multimedia content from any device with an Internet connection and no fixed schedule. This supports you to balance your professional and personal life with high-quality teaching, optimizing your learning with the best study facilities.