Menu

Cybersecurity Bootcamp

Live online classes

20 weeks (200 hours) | 4 live classes per week

We prepare you for certification

Learning pathsLearning paths

Prework

Presentation of the curriculum, work tools, and how the programme and group operate.

Generative AI Course: Prompt Engineering and Productivity
Introductory programming course: Python

Free access to further training

UMECIT

Our cybersecurity programmes are conducted in collaboration with Santander

Learn how to use industry-leading tools

Study plan

Cybersecurity Fundamentals
Programming Fundamentals

In this module we will learn how to program in Python language. Python is a very popular and powerful programming language. It is used to do many different things, such as creating web applications, analysing data, creating artificial intelligence programs and even controlling robots. It is a very easy language to learn and has a clear and simple syntax, which means it is easy to read and write. We will learn the different fundamentals of Python such as control structures, lists, dictionaries or functions, so that at the end of the module we will have the basis to safely continue the rest of the bootcamp.

  1. Introduction to Programming:
    • Programming basics
    • Programming languages
    • Variables, data types and operators
    • Control structures (conditionals, loops)
    • Functions and modules
  2. Object Oriented Programming
    • OOP basics (classes, objects, inheritance)
    • Polymorphism and encapsulation
    • Class design and class diagrams
  3. Data Structures and Algorithms
    • Lists, dictionaries and sets
    • Search and sort algorithms
    • Efficiency and computational complexity
  4. Programming Security
    • Common vulnerabilities in web applications
    • SQL Injection, XSS and CSRF
    • Authentication and authorisation
    • Good security practices in programming
  5. Internships and Case Studies
    • Development of a simple Python program
    • Implementing a class in Python
    • Analysis of vulnerable code
    • Development of a secure web application project
    • Analysis of a real case of cyber-attack
Security and Systems

You will learn what information security, IT security and cybersecurity are and how to differentiate between them. You will also learn the basic concepts and principles of auditing.

  1. Introduction to cybersecurity:
    • Basic concepts of cybersecurity.
    • Importance of information security.
    • Main threats, vulnerabilities and cyber attacks.
  2. Fundamentals of Computer Security:
    • Principles of computer security.
    • Cryptography and its application in data protection.
    • Security policies and access management.
    • Attack surface and attack vectors
    • Legal and regulatory framework
  3. Secure Operating Systems
    • Security in operating systems.
    • Secure system configuration.
    • Monitoring and intrusion detection.
  4. Networking and Secure Communications:
    • Computer network security.
    • Secure protocols and data encryption.
    • Firewalls and intrusion detection/prevention systems.
  5. Practical and laboratory work:
    • Virtual Lab: Configuring and securing systems in a virtual environment
    • Practice 1: Implementing a firewall
    • Practical 2: Vulnerability analysis in an operating system
    • Practice 3: Penetration testing of a web application
    • Practice 4: Data encryption and key management
    • Practice 5: Analysis of a real case of cyber-attack
Offensive Security
Basic Pentesting

You will learn the basic techniques for conducting attacks on different targets with technical approaches that will be adapted to the needs of each scenario. You begin by learning the techniques of target analysis, creating profiles to make decisions about the attack. In addition, you will assess the state of the target's infrastructures and systems. You will identify insecure configurations, vulnerabilities, etc.

  1. Introduction to Pentesting
    • Pentesting basics
    • Pentesting methodology
    • Phases of pentesting
    • Pentesting tools
  2. Acknowledgement
    • Information gathering
    • Asset identification
    • List of services and ports
    • Vulnerability analysis
  3. Exploitation
    • Network layer attacks
    • Attacks on the application layer
    • Social engineering attacks
    • Attacks on web systems
  4. Post-Exploitation
    • Escalation of privileges
    • Persistence in the system
    • Obtaining sensitive information
    • Footprint coverage
  5. Internships and Case Studies
    • Practice 1: Network recognition
    • Practice 2: Exploiting a web vulnerability
    • Practice 3: Carrying out a phishing attack
    • Practice 4: Pentesting a mobile application
    • Practice 5: Analysis of a real case of pentesting
Advanced Pentesting

You will learn advanced pentesting techniques, applied once you have gained access to the target systems, to try to detect more advanced vulnerabilities.‍ In addition, you will learn different exploit techniques that will take advantage of existing vulnerabilities in the system by gaining access to confidential information, executing code on the attacked system or causing denial of service situations.

  1. Advanced Web Application Pentesting
    • OWASP Top 10 Attacks
    • Exploitation of CER vulnerabilities
    • API attacks
    • Mobile application pentesting
  2. Cloud Infrastructure Pentesting
    • Attacks on cloud providers (AWS, Azure, GCP)
    • Exploiting vulnerabilities in containers
    • Serverless Computing Pentesting
    • Cloud security and hardening
  3. Network and Systems Pentesting
    • Advanced network attacks (ARP Spoofing, DNS Spoofing)
    • Exploitation of zero-day vulnerabilities
    • Attacks on operating systems and applications
    • Advanced malware scanning
  4. Social Pentesting and Social Engineering
    • Phishing and spear phishing attacks
    • Advanced social engineering (vishing, baiting)
    • Supply chain attacks
    • Physical security and facility analysis
  5. Internships and Case Studies
    • Practice 1: Advanced pentesting of a web application
    • Practice 2: Pentesting of a cloud infrastructure
    • Practice 3: Performing an advanced network attack
    • Practice 4: Operating system pentesting
    • Practice 5: Analysis of a real case of advanced pentesting
Certification

An asynchronous module in which time will be provided to prepare for and take the certification exams included in the program. IMMUNE, in this case, acts as a facilitator in connecting the certifying entity and the student, easing the process but without having authority over the exam or the grades obtained by the students.

Capstone Project
  • Team building.
  • Choice of topic for final project.
  • Assignment of tutors.
  • Development of the project with an assigned tutor.
  • Project delivery.
Capstone Project Presentation

Presentation of the final project before a panel of experts.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.Download the brochure here

We rub shoulders with the best

Miguel Rego

Cybersecurity Area Director | President of AI Cluster, General Manager | CEO

Javier Soria

Cybersecurity Bootcamp Director | CTO Technical Director

Alejandro Corletti

CEO

Juan Arce Luzuriaga

Computer Forensic Analyst, Data Protection, ENS, ISO27000, Security, R+D+i

Kiril Zemlyanov Petrov

SOC Analyst

Marta López Pardal

CSIRT / L3

ElizaCareer opportunities

Cloud Systems Administrator | DevOps Engineer | Cloud Architect | Automation Engineer | Cloud Computing and DevOps Consultant | Cloud Support Engineer | Cloud Engineer

Certifications
Cisco Certified CCST Cybersecurity
Cisco Certified CCST Networking
Communication Skills for Business
IT Specialist Cybersecurity
Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900
IMMUNE Technology Institute - Cybersecurity Bootcamp

Certification training

With this programme you will acquire the necessary skills to work in a professional environment. In order for you to be able to demonstrate this, IMMUNE prepares you to be certified in:

Cisco Certified CCST Cybersecurity

Cisco Certified CCST Networking

Communication Skills for Business

IT Specialist Cybersecurity

Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900

Cybersecurity Bootcamp

In the Cybersecurity Bootcamp you will develop competencies and professional skills that will allow you to specialise in this sector in order to form part of a professional team of auditors, pentesters, forensic experts. You will learn through real cases in a specialised training platform to identify vulnerabilities, learn about malware, forensic analysis, cyberintelligence and much more.

Program aims
  • You will learn about the world of cybersecurity and its different branches.
  • Define and develop the organisation and processes related to corporate cybersecurity.
  • Design and propose secure network architectures and systems.
  • Learn how to investigate and respond to incidents and forensic systems techniques.
  • Know and put into practice attack and defence techniques for web applications.
  • Obtain the practical knowledge to carry out audits and penetration tests.
  • You will learn the secrets of network and system fortification.
Professional skills

The opportunities vary depending on your profile and experience, among others, you will be prepared to become:

  • Ethical hacker.
  • Cybersecurity auditor.
  • Forensic analyst.
  • Member of Red Team and Blue Team.
  • Indicent response team member.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

What people say about us

CybertalentIncibe

Cybertalent

Do you have a cybersecurity-related project that you would like to develop? Have you identified a cybersecurity need? Do you need funding to launch your company? IMMUNE, in collaboration with INCIBE, is developing the CYBERTALENT program, a three-year plan to promote cybersecurity entrepreneurship in Spain.

Find out more
Cybertalent map
Seedbed Incubator
Business Accelerator
Catchment
Phase 1: Recruitment / Ideation
Get ready through our events
Incubation
Phase 2: Seedbed Incubator
Develop your idea and get it up and running
Acceleration
Phase 3: Acceleration
Grow your business with the support of Incibe
Funded by the European Union NextGenerationEUSpanish GovernmentRecovery, Transformation and Resilience PlanIncibeIncibeIMMUNE Technology Institute

Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Financing

Full payment

If you pay in one instalment you will receive a 15% discount.

6 interest-free instalments

Sequra

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Sequra

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

Fundae

ISA Bcas

Don't pay until you find a job in instalments adapted to your salary. Aimed at people with Spanish nationality or residence permit in Spain.

ISA Bcas

FAQs

What certification or qualification will I receive on completion of the course?

Once you complete and pass the programme you will receive a diploma issued by IMMUNE Technology Institute in a digital format verifiable through blockchain technology.

Is this programme for me?

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application

3. Academic committee

4. Enrollment

2. Personal interview

Request information

Visit our Campus in Madrid and discover everything about our programmes

  • Personalised guidance Monday to Friday.
  • Intake now open for March, September and October.

Designed to replicate an ecosystem of start-ups and tech companies, we’ve created a slice of Silicon Valley in the heart of Madrid.

Find out more
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio