Free courses to build
a secure digital future
Start date: July 15, 2024.
Schedule: 09:00 a.m. to 2:00 p.m. or 4:00 p.m. to 9:00 p.m.
Modality: On-line.
Start date: October 4, 2024.
Schedule: 09:00 a.m. to 2:00 p.m. or 4:00 p.m. to 9:00 p.m.
Modality: On-line.
Cybersecurity incidents (60 hours). |
---|
Development of cybersecurity prevention and awareness plans. |
Audit of cybersecurity incidents. |
Investigation of cybersecurity incidents. |
Implementation of cybersecurity measures. |
Configuration of computer systems and their devices for installation (30 hours). |
---|
Precautions prior to installing a computer system: isolation, BIOS access control configuration, blocking the boot order of devices, among others. |
Security in booting the computer system, secure boot configuration. |
Security of file systems, encryption, partitioning, among others. |
Reduction in the number of services, Telnet, RSSH, TFTP, among others. |
Process hardening (removal of debugging information in case of errors, randomization of virtual memory to avoid exploits, etc.). |
Elimination of unnecessary network protocols (ICMP, among others). |
Securing remote administration systems. |
Prevention and protection systems against viruses and intrusions (antivirus, HIDS, etc.). |
Configuration of automatic updates and patches. |
Backup systems. |
Shadow IT and security policies in SaaS environments. |
Safe production start-up (60 hours). |
---|
Testing web and mobile applications. |
Determination of the security level required by applications. |
Detection and correction of web application vulnerabilities. |
Detection of security problems in applications for mobile devices. |
Implementation of secure software deployment systems. |
Ethical Hacking (60 hours). |
---|
Determination of monitoring tools to detect vulnerabilities. |
Attack and defense in a testing environment of wireless communications. |
Attack and defense in test, network and systems environments to access third-party systems. |
Consolidation and use of compromised systems. |
Attack and defense in testing environment, to web applications. |
Detection and documentation of cybersecurity incidents (30 hours). |
---|
Develop action procedures for incident notification. |
Internal incident notification. |
Notification of incidents to whom appropriate. |
Bastion of networks and systems (60 hours). |
---|
Design of security plans. |
Configuration of access control and person authentication systems. |
Administration of access credentials to computer systems. |
Design of secure computer networks. |
Configuration of computer devices and systems. |
Computer forensics (60 hours). |
---|
Application of forensic analysis methodologies. |
Performing forensic analysis on mobile devices. |
Performing forensic analysis in the Cloud. |
Performing forensic analysis in IoT. |
Documentation and preparation of forensic analysis reports. Sections of which the report is made up. |
Cybersecurity regulations (30 hours). |
---|
Main application points for correct regulatory compliance. |
Design of regulatory compliance systems. |
Legislation for compliance with criminal responsibility. |
Legislation and jurisprudence on data protection. |
National Security Scheme (ENS). |
PIC Law (Protection of critical infrastructures). |
Form Inscription