Bootcamp Ciberseguridad

In partnership with:

Live online classes

March 2025

20 semanas (200h.) | 4 Sesiones semanales de clases en directo

Free access to complementary training:

  • Generative AI Course: Prompt Engineering and Productivity
  • Introductory programming course: Python
We prepare you to get certified in:
Cisco Certified CCST CybersecurityCisco Certified CCST NetworkingMicrosoft Certified FundamentalsIT Specialist Cybersecurity

Prework

Presentation of the curriculum, work tools, program operation and presentation of the group.

Study plan

Cybersecurity Fundamentals
Programming Fundamentals

In this module we will learn how to program in Python language. Python is a very popular and powerful programming language. It is used to do many different things, such as creating web applications, analysing data, creating artificial intelligence programs and even controlling robots. It is a very easy language to learn and has a clear and simple syntax, which means it is easy to read and write. We will learn the different fundamentals of Python such as control structures, lists, dictionaries or functions, so that at the end of the module we will have the basis to safely continue the rest of the bootcamp.

  1. Introduction to Programming:
    • Programming basics
    • Programming languages
    • Variables, data types and operators
    • Control structures (conditionals, loops)
    • Functions and modules
  2. Object Oriented Programming
    • OOP basics (classes, objects, inheritance)
    • Polymorphism and encapsulation
    • Class design and class diagrams
  3. Data Structures and Algorithms
    • Lists, dictionaries and sets
    • Search and sort algorithms
    • Efficiency and computational complexity
  4. Programming Security
    • Common vulnerabilities in web applications
    • SQL Injection, XSS and CSRF
    • Authentication and authorisation
    • Good security practices in programming
  5. Internships and Case Studies
    • Development of a simple Python program
    • Implementing a class in Python
    • Analysis of vulnerable code
    • Development of a secure web application project
    • Analysis of a real case of cyber-attack
Seguridad Y Sistemas

Aprenderás qué es y cómo diferenciar la seguridad de la información, la seguridad informática y la ciberseguridad. Además, conocerás los conceptos básicos y los principios de la auditoría.

  1. Introduction to cybersecurity:
    • Conceptos básicos de ciberseguridad.
    • Importancia de la seguridad de la información.
    • Main threats, vulnerabilities and cyber attacks.
  2. Fundamentals of Computer Security:
    • Principios de seguridad informática.
    • Criptografía y su aplicación en la protección de datos.
    • Políticas de seguridad y gestión de accesos.
    • Attack surface and attack vectors
    • Legal and regulatory framework
  3. Secure Operating Systems
    • Seguridad en sistemas operativos.
    • Configuración segura de sistemas.
    • Monitoreo y detección de intrusiones.
  4. Networking and Secure Communications:
    • Seguridad en redes informáticas.
    • Secure protocols and data encryption.
    • Firewalls y sistemas de detección/prevención de intrusiones.
  5. Practical and laboratory work:
    • Laboratorio Virtual: Configuración y aseguramiento de sistemas en un entorno virtual
    • Práctica 1: Implementación de un firewall
    • Práctica 2: Análisis de vulnerabilidades en un sistema operativo
    • Práctica 3: Pruebas de penetración en una aplicación web
    • Práctica 4: Cifrado de datos y gestión de claves
    • Práctica 5: Análisis de un caso real de ciberataque
Offensive Security
Basic Pentesting

You will learn the basic techniques for conducting attacks on different targets with technical approaches that will be adapted to the needs of each scenario. You begin by learning the techniques of target analysis, creating profiles to make decisions about the attack. In addition, you will assess the state of the target's infrastructures and systems. You will identify insecure configurations, vulnerabilities, etc.

  1. Introduction to Pentesting
    • Pentesting basics
    • Pentesting methodology
    • Phases of pentesting
    • Pentesting tools
  2. Acknowledgement
    • Recopilación de información
    • Asset identification
    • List of services and ports
    • Vulnerability analysis
  3. Exploitation
    • Network layer attacks
    • Attacks on the application layer
    • Social engineering attacks
    • Attacks on web systems
  4. Post-Exploitation
    • Escalation of privileges
    • Persistence in the system
    • Obtaining sensitive information
    • Footprint coverage
  5. Internships and Case Studies
    • Práctica 1: Reconocimiento de una red
    • Práctica 2: Explotación de una vulnerabilidad web
    • Práctica 3: Realización de un ataque de phishing
    • Práctica 4: Pentesting de una aplicación móvil
    • Práctica 5: Análisis de un caso real de pentesting
Advanced Pentesting

You will learn advanced pentesting techniques, applied once you have gained access to the target systems, to try to detect more advanced vulnerabilities.‍ In addition, you will learn different exploit techniques that will take advantage of existing vulnerabilities in the system by gaining access to confidential information, executing code on the attacked system or causing denial of service situations.

  1. Advanced Web Application Pentesting
    • OWASP Top 10 Attacks
    • Exploitation of CER vulnerabilities
    • API attacks
    • Mobile application pentesting
  2. Cloud Infrastructure Pentesting
    • Attacks on cloud providers (AWS, Azure, GCP)
    • Exploiting vulnerabilities in containers
    • Serverless Computing Pentesting
    • Cloud security and hardening
  3. Network and Systems Pentesting
    • Advanced network attacks (ARP Spoofing, DNS Spoofing)
    • Exploitation of zero-day vulnerabilities
    • Attacks on operating systems and applications
    • Advanced malware scanning
  4. Social Pentesting and Social Engineering
    • Phishing and spear phishing attacks
    • Advanced social engineering (vishing, baiting)
    • Supply chain attacks
    • Physical security and facility analysis
  5. Internships and Case Studies
    • Práctica 1: Pentesting avanzado de una aplicación web
    • Práctica 2: Pentesting de una infraestructura en la nube
    • Práctica 3: Realización de un ataque de red avanzado
    • Práctica 4: Pentesting de un sistema operativo
    • Práctica 5: Análisis de un caso real de pentesting avanzado
Certification

An asynchronous module in which time will be provided to prepare for and take the certification exams included in the program. IMMUNE, in this case, acts as a facilitator in connecting the certifying entity and the student, easing the process but without having authority over the exam or the grades obtained by the students.

Capstone Project
  • Team building.
  • Choice of topic for final project.
  • Assignment of tutors.
  • Development of the project with an assigned tutor.
  • Project delivery.
Capstone Project Presentation

Presentation of the final project before a panel of experts.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.

We rub shoulders with the best

Miguel Rego

Miguel Rego

Cybersecurity Area Director | President of AI Cluster, General Manager | CEO

Javier Soria

Javier Soria

Cybersecurity Bootcamp Director | CTO Technical Director

Alejandro Corletti

Alejandro Corletti

CEO

Daniel Palomino

Daniel Palomino

Director of Corporate Security, Intelligence, Cyber Security, Digital Forensics

Juan Arce Luzuriaga

Juan Arce Luzuriaga

Computer Forensic Analyst, Data Protection, ENS, ISO27000, Security, R+D+i

Kiril Zemlyanov Petrov

Kiril Zemlyanov Petrov

SOC Analyst

Marta López Pardal

Marta López Pardal

CSIRT / L3

Certification training

With this program, you will acquire the skills needed to work in a professional environment. To help you showcase them, IMMUNE offers you these official certifications for free:

Cisco Certified CCST CybersecurityCisco Certified CCST NetworkingMicrosoft Certified FundamentalsIT Specialist CybersecurityCommunication Skills fot Business
ElizaCareer opportunities

Cloud Systems Administrator | DevOps Engineer | Cloud Architect | Automation Engineer | Cloud Computing and DevOps Consultant | Cloud Support Engineer | Cloud Engineer


Certifications
AWS

Cisco certified

Cybersecurity and Networking

Microsoft Azure

Microsoft Certified

CS-900

Pearson

IT Specialist

Cybersecurity

Communication Skills for Business

IMMUNE

IMMUNE Technology Institute

Cybersecurity & Artificial Intelligence Bootcamp

Academic information

In the Cybersecurity Bootcamp you will develop competencies and professional skills that will allow you to specialise in this sector in order to form part of a professional team of auditors, pentesters, forensic experts. You will learn through real cases in a specialised training platform to identify vulnerabilities, learn about malware, forensic analysis, cyberintelligence and much more.

Program aims
  • You will learn about the world of cybersecurity and its different branches.
  • Define and develop the organisation and processes related to corporate cybersecurity.
  • Design and propose secure network architectures and systems.
  • Learn how to investigate and respond to incidents and forensic systems techniques.
  • Know and put into practice attack and defence techniques for web applications.
  • Obtain the practical knowledge to carry out audits and penetration tests.
  • You will learn the secrets of network and system fortification.
Professional skills

The opportunities vary depending on your profile and experience, among others, you will be prepared to become:

  • Ethical hacker.
  • Cybersecurity auditor.
  • Forensic analyst.
  • Member of Red Team and Blue Team.
  • Indicent response team member.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Testimonials

Financing

IMMUNE financing

Full payment

Si realizas el pago en una sola cuota te beneficiarás de un 15% de descuento.

6 interest-free instalments

6 interest-free instalments

External financing

Sequra

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

ISA Bcas

ISA Bcas

Don't pay until you find a job in instalments adapted to your salary. Aimed at people with Spanish nationality or residence permit in Spain.

Fundae

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

FAQs
This program is for you if

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

What certification or qualification will I receive on completion of the course?

Once you have finished and passed the program, you will receive a diploma issued by IMMUNE Technology Institute in digital format and verifiable using blockchain technology.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application
2. Personal interview
3. Academic committee
4. Enrollment
Request informationStudy planCertificationsAcademic informationFinancingFAQs
IMMUNE Campus

Visita nuestro Campus en Madrid y conoce todo sobre nuestros programas

  • Orientación personalizada de lunes a viernes.
  • Convocatoria abierta para marzo, septiembre y octubre.

Diseñado para replicar un ecosistema de startups y empresas tecnológicas, hemos creado un oasis de Silicon Valley en el corazón de Madrid.

Solicitar visita
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio
Subscribe to our newsletter
menuchevron-down