ADVANCED CYBERSECURITY

BOOTCAMP

 

Become an expert in advanced cybersecurity in 2 months with an intensive program and boost your professional career.

 
Name *
Name
Name *
Name

Strengthen your skills, expand your versatility and stand out as an expert professional in this area and become a professional demanded by large companies around the world.

 

FOR

ects.png

>ANY TECHNICAL PROFILE



DURATION

clock.png

> 2 MONTHS

> 90 HOURS

PLACE

architecture.png

MADRID

 
NEGRO 90% IMMUNE.png
IMMUNE BOOTCAMP

DETAILS

 

This program covers all the important aspects of modern cybersecurity: from security systems, platforms and devices, through tools (cryptography), code (applications), and ending with future aspects, such as the application of machine learning techniques (machine learning) The methodology is based on the case study: each concept is introduced directly presented a practical assumption.

 

OBJECTIVE

 

Operational security, systems audits, security schemes, cryptography, etc.

 
Name *
Name
objetivo-immune.jpg
QUOTEEEEEEEEEEEEEEEEEEEE
 
NEGRO 90% IMMUNE.png
 
 

SYLLABUS

Número-IMMUNE.png

INTRODUCTION AND BASIC CONCEPTS

History, great hackers of history.

Professionalization, business figures.

Principles and basic rules.

2-IMMUNE.png

SECURITY IN NETWORKS


Network attacks: poisoning, denial of service.

Security architectures: firewalls, IDS

3-IMMUNE.png

AUDIT AND PENETRATION TESTS


Black and white box audits, penetration tests.

Attack and protection tools .

4-IMMUNE.png

CRYPTOGRAPHY

Encryption: symmetric, asymmetric, PKI, key establishment (DH)

Authentication and management of credentials: creation and safe storage of passwords, double factor.

5-IMMUNE.png

DEVELOPMENT OF SECURE CODE


Security in the design and coding phase.

Attack and defense of Web applications.

6-IMMUNE.png

MALWARE: TYPES AND COUNTERMEASURES

OWASP

ASVS

Key rules of secure programming

7-IMMUNE.png

INTRODUCTION TO FORENSIC SYSTEMS ANALYSIS


Safety in the life cycle.

Production environments.

Integration with agile methodologies.

8-IMMUNE.png

TRENDS AND THE FUTURE

Machine learning applied to cybersecurity.

 
9-IMMUNE.png

EVALUATION


Native applications: buffer overflow, parameter management

Web Applications: code injections (SQL, LDAP), XSS

 

OPEN ADMISSIONS - APPLY NOW!

NEGRO 90% IMMUNE.png
 

YOU MAY BE INTERESTED…

 

computer entrepreneurship program

executive management courses