







Free courses to build
a secure digital future

Start date: July 15, 2024.
Schedule: 09:00 a.m. to 2:00 p.m. or 4:00 p.m. to 9:00 p.m.
Modality: On-line.

Start date: October 4, 2024.
Schedule: 09:00 a.m. to 2:00 p.m. or 4:00 p.m. to 9:00 p.m.
Modality: On-line.

| Cybersecurity incidents (60 hours). |
|---|
| Development of cybersecurity prevention and awareness plans. |
| Audit of cybersecurity incidents. |
| Investigation of cybersecurity incidents. |
| Implementation of cybersecurity measures. |
| Configuration of computer systems and their devices for installation (30 hours). |
|---|
| Precautions prior to installing a computer system: isolation, BIOS access control configuration, blocking the boot order of devices, among others. |
| Security in booting the computer system, secure boot configuration. |
| Security of file systems, encryption, partitioning, among others. |
| Reduction in the number of services, Telnet, RSSH, TFTP, among others. |
| Process hardening (removal of debugging information in case of errors, randomization of virtual memory to avoid exploits, etc.). |
| Elimination of unnecessary network protocols (ICMP, among others). |
| Securing remote administration systems. |
| Prevention and protection systems against viruses and intrusions (antivirus, HIDS, etc.). |
| Configuration of automatic updates and patches. |
| Backup systems. |
| Shadow IT and security policies in SaaS environments. |
| Safe production start-up (60 hours). |
|---|
| Testing web and mobile applications. |
| Determination of the security level required by applications. |
| Detection and correction of web application vulnerabilities. |
| Detection of security problems in applications for mobile devices. |
| Implementation of secure software deployment systems. |
| Ethical Hacking (60 hours). |
|---|
| Determination of monitoring tools to detect vulnerabilities. |
| Attack and defense in a testing environment of wireless communications. |
| Attack and defense in test, network and systems environments to access third-party systems. |
| Consolidation and use of compromised systems. |
| Attack and defense in testing environment, to web applications. |

| Detection and documentation of cybersecurity incidents (30 hours). |
|---|
| Develop action procedures for incident notification. |
| Internal incident notification. |
| Notification of incidents to whom appropriate. |
| Bastion of networks and systems (60 hours). |
|---|
| Design of security plans. |
| Configuration of access control and person authentication systems. |
| Administration of access credentials to computer systems. |
| Design of secure computer networks. |
| Configuration of computer devices and systems. |
| Computer forensics (60 hours). |
|---|
| Application of forensic analysis methodologies. |
| Performing forensic analysis on mobile devices. |
| Performing forensic analysis in the Cloud. |
| Performing forensic analysis in IoT. |
| Documentation and preparation of forensic analysis reports. Sections of which the report is made up. |
| Cybersecurity regulations (30 hours). |
|---|
| Main application points for correct regulatory compliance. |
| Design of regulatory compliance systems. |
| Legislation for compliance with criminal responsibility. |
| Legislation and jurisprudence on data protection. |
| National Security Scheme (ENS). |
| PIC Law (Protection of critical infrastructures). |
Form Inscription





