fbpx

Cybersecurity & AI Bootcamp

In partnership with:

Live online classes

March 2025

24 weeks (300 hours) | 4 weekly live class sessions

4900€

Free access to complementary training:

  • Generative AI Course: Prompt Engineering and Productivity
  • Introductory programming course: Python
We prepare you to get certified in:
Cisco Certified CCST CybersecurityCisco Certified CCST NetworkingMicrosoft Certified FundamentalsIT Specialist Cybersecurity

Prework

Presentation of the curriculum, work tools, program operation and presentation of the group.

Study plan

Prework

Presentation of the curriculum, work tools, program operation and presentation of the group.

Security and Systems Fundamentals

You will learn what information security, IT security and cybersecurity are and how to differentiate between them. In addition, you will learn the basic concepts and principles of auditing.

  1. Introduction to cybersecurity:
    • Basic concepts of cybersecurity.
    • Importance of information security.
    • Main threats, vulnerabilities and cyber attacks.
  2. Fundamentals of Computer Security:
    • Principles of computer security.
    • Cryptography and its application in data protection.
    • Security policies and access management.
    • Attack surface and attack vectors
    • Legal and regulatory framework
  3. Secure Operating Systems
    • Security in operating systems.
    • Secure system configuration.
    • Monitoring and intrusion detection.
  4. Networking and Secure Communications:
    • Computer network security.
    • Secure protocols and data encryption.
    • Firewalls and intrusion detection/prevention systems.
  5. Practical and laboratory work:
    • 1. Virtual Lab: Configuring and Securing Systems in a Virtual Environment
      • Practice 1: Implementing a firewall
      • Practical 2: Vulnerability analysis in an operating system
      • Practice 3: Penetration testing of a web application
      • Practice 4: Data encryption and key management
      • Practice 5: Analysis of a real case of cyber-attack
Programming Fundamentals

In this module we will learn how to program in Python language. Python is a very popular and powerful programming language. It is used to do many different things, such as creating web applications, analysing data, creating artificial intelligence programs and even controlling robots. It is a very easy language to learn and has a clear and simple syntax, which means it is easy to read and write. We will learn the different fundamentals of Python such as control structures, lists, dictionaries or functions, so that at the end of the module we will have the basis to safely continue the rest of the bootcamp.

  1. Introduction to Programming:
    • Programming basics
    • Programming languages
    • Variables, data types and operators
    • Control structures (conditionals, loops)
    • Functions and modules
  2. Object Oriented Programming
    • OOP basics (classes, objects, inheritance)
    • Polymorphism and encapsulation
    • Class design and class diagrams
  3. Data Structures and Algorithms
    • Lists, dictionaries and sets
    • Search and sort algorithms
    • Efficiency and computational complexity
  4. Programming Security
    • Common vulnerabilities in web applications
    • SQL Injection, XSS and CSRF
    • Authentication and authorisation
    • Good security practices in programming
  5. Internships and Case Studies
    • Development of a simple Python program
    • Implementing a class in Python
    • Analysis of vulnerable code
    • Development of a secure web application project
    • Analysis of a real case of cyber-attack
Basic Pentesting

You will learn the basic techniques for conducting attacks on different targets with technical approaches that will be adapted to the needs of each scenario. You begin by learning the techniques of target analysis, creating profiles to make decisions about the attack. In addition, you will assess the state of the target's infrastructures and systems. You will identify insecure configurations, vulnerabilities, etc.

  1. Introduction to Pentesting
    • Pentesting basics
    • Pentesting methodology
    • Phases of pentesting
    • Pentesting tools
  2. Acknowledgement
    • information gathering
    • Asset identification
    • List of services and ports
    • Vulnerability analysis
  3. Exploitation
    • Network layer attacks
    • Attacks on the application layer
    • Social engineering attacks
    • Attacks on web systems
  4. Post-Exploitation
    • Escalation of privileges
    • Persistence in the system
    • Obtaining sensitive information
    • Footprint coverage
  5. Internships and Case Studies
    • Practice 1: Network recognition
    • Practice 2: Exploiting a web vulnerability
    • Practice 3: Carrying out a phishing attack
    • Practice 4: Pentesting a mobile application
    • Practice 5: Analysis of a real case of pentesting
Advanced Pentesting

You will learn advanced pentesting techniques, applied once you have gained access to the target systems, to try to detect more advanced vulnerabilities.‍ In addition, you will learn different exploit techniques that will take advantage of existing vulnerabilities in the system by gaining access to confidential information, executing code on the attacked system or causing denial of service situations.

  1. Advanced Web Application Pentesting
    • OWASP Top 10 Attacks
    • Exploitation of CER vulnerabilities
    • API attacks
    • Mobile application pentesting
  2. Cloud Infrastructure Pentesting
    • Attacks on cloud providers (AWS, Azure, GCP)
    • Exploiting vulnerabilities in containers
    • Serverless Computing Pentesting
    • Cloud security and hardening
  3. Network and Systems Pentesting
    • Advanced network attacks (ARP Spoofing, DNS Spoofing)
    • Exploitation of zero-day vulnerabilities
    • Attacks on operating systems and applications
    • Advanced malware scanning
  4. Social Pentesting and Social Engineering
    • Phishing and spear phishing attacks
    • Advanced social engineering (vishing, baiting)
    • Supply chain attacks
    • Physical security and facility analysis
  5. Internships and Case Studies
    • Practice 1: Advanced pentesting of a web application
    • Practice 2: Pentesting of a cloud infrastructure
    • Practice 3: Performing an advanced network attack
    • Practice 4: Operating system pentesting
    • Practical 5: Analysis of a real case of advanced pentesting
Industrial Cybersecurity

We will learn the big difference in the industrial OT world, protocols, obsolescence and how to protect these critical environments almost every time.

  1. Introduction to Industrial Cybersecurity OT2. What is a startup and what stages of development do they go through?
  2. Industrial Networks and Systems4. The five phases and tools of the process:
  3. Security in Industrial Devices and SoftwareUnderstanding the problem to determine the opportunity
  4. Threat Analysis and Detection in OT Environments
  5. Critical Infrastructure Protection
  6. Internships and Case Studies
    • Practical laboratories for vulnerability analysis in OT environments.
    • Simulations of cyber attacks in OT environments.
Exploiting and Reverse Engineering

Exploiting and reverse engineering are branches of cybersecurity for the most advanced researchers. Knowing how a program or process works inside to try to modify its behaviour is not trivial, but it is exciting. You will acquire the knowledge and skills necessary to perform debugging tasks and the process of creating malicious code, also known as an "exploit".

  1. Introduction to Exploiting and Reverse Engineering
    • Exploiting and reverse engineering basics
    • Working environment and tools
    • Fundamentals of malware analysis
    • Reverse engineering techniques
  2. Exploiting Vulnerabilities
    • Exploitation of memory vulnerabilities (buffer overflows)
    • Exploitation of web vulnerabilities (XSS, SQL injection)
    • Exploiting vulnerabilities in applications
    • Exploitation of zero-day vulnerabilities
  3. Advanced Reverse Engineering
    • Binary code analysis and decompilation
    • Code modification and exploit creation
    • Advanced malware analysis (ransomware, cryptojacking)
    • Anti-analysis and anti-debugging techniques
  4. Internships and Case Studies
    • Practice 1: Analysis of simple malware
    • Practice 2: Exploiting a buffer overflow vulnerability
    • Practice 3: Reverse engineering an application
    • Practice 4: Analysis of a real case of exploiting and reverse engineering
    • Practice 5: Developing an exploit for a web vulnerability
Defensive Security

You will become familiar with the Security Information and Event Management systems, SIEM, and with which you will be able to monitor the security of all network systems. You will learn how to protect assets, minimising areas of exposure and reducing the risk and diversity of attacks that may occur. You will control the techniques to reduce an attack against an entity, counteracting the attackers, identifying the entry vector and defining the measures to be taken to stop or mitigate the attack.

  1. Defensive Security Fundamentals
    • Defensive security basics
    • Legal and regulatory framework
    • Risk management and threat analysis
    • Implementation of security controls
  2. Perimeter and Network Security
    • Firewalls and network segmentation
    • Intrusion detection systems (IDS/IPS)
    • Virtual Private Networks (VPN)
    • Cloud security
  3. Application and Endpoint Security
    • Security in application development (SDLC)
    • Application security testing
    • Endpoint protection and device control
    • Security in web browsing
  4. Data and Identity Security
    • Personal data protection and privacy
    • Identity and Access Management (IAM)
    • Cryptography and information security
    • Data backup and recovery
  5. Internships and Case Studies
    • Practice 1: Implementing a firewall
    • Practice 2: Setting up an intrusion detection system
    • Practice 3: Performing security tests on a web application
    • Practice 4: Implementing an identity management system
    • Practice 5: Analysis of a real case of cyber-attack
Forensic Analysis - Blue Team

You will learn how to carry out a forensic analysis process in different environments and you will learn how the professionals who work every day strive to provide answers to organisations work. You will also acquire the knowledge of forensic analysis, tasks that allow you to analyse the events that occur during a security incident in order to analyse what happened in order to implement actions and improve cyber resilience. You will analyse malware both statically and dynamically and will be able to produce reports afterwards.

  1. Fundamentals of Forensic Analysis
    • Digital forensics basics
    • Legal and regulatory framework
    • Digital crime scene processing
    • Acquisition and analysis of digital evidence
  2. File System Analysis
    • File systems and data structures
    • Deleted file recovery and metadata analysis
    • Malware and ransomware scanning
    • Analysis of mobile devices
  3. Network Analysis and Applications
    • Analysis of network traffic and logs
    • Intrusion and cyber attack analysis
    • Analysis of web and mobile applications
    • Cloud analysis
  4. Analysis Tools and Techniques
    • Use of forensic tools
    • Analysis of disk images and volumes
    • Analysis of encrypted data
    • Advanced analytical techniques
  5. Internships and Case Studies
    • Practice 1: Analysing a disk image
    • Practice 2: Recovering deleted files
    • Practice 3: Malware analysis
    • Practice 4: Analysing a cyber attack
    • Practice 5: Analysis of a real case of forensic investigation
Cybersecurity and Entrepreneurship

The module aims to present the opportunities for entrepreneurship in cybersecurity and to apply design thinking to make this journey, reducing uncertainties and prioritising problem solving and market orientation over technology.

The course describes techniques and tools that can be used for the development and modelling of a business opportunity. It is a basic orientation for the construction of the Capstone Project.

  1. Entrepreneurship in cybersecurity. Opportunities and challenges.
  2. What is a startup and what stages of development do they follow?
  3. What is design thinking and how it can help us
  4. The five phases and tools of the process:
    • Empathy
    • Define
    • Idear
    • Prototyping
    • Validate
  5. Keys to success:
    • Understanding the problem to determine the opportunity
    • Devise a solution to determine its feasibility
    • How to determine business viability
  6. Applying what we have learned in a cybersecurity project.
Certification

An asynchronous module in which time will be provided to prepare for and take the certification exams included in the program. IMMUNE, in this case, acts as a facilitator in connecting the certifying entity and the student, easing the process but without having authority over the exam or the grades obtained by the students.

Capstone Project
  • Team building.
  • Choice of topic for final project.
  • Assignment of tutors.
  • Development of the project with an assigned tutor.
  • Project delivery.
Capstone Project Presentation

Presentation of the final project before a panel of experts.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.

We rub shoulders with the best

Miguel Rego

Miguel Rego

Cybersecurity Area Director | President of AI Cluster, General Manager | CEO

Javier Soria

Javier Soria

Cybersecurity Bootcamp Director | CTO Technical Director

Alejandro Corletti

Alejandro Corletti

CEO

Daniel Palomino

Daniel Palomino

Director of Corporate Security, Intelligence, Cyber Security, Digital Forensics

Juan Arce Luzuriaga

Juan Arce Luzuriaga

Computer Forensic Analyst, Data Protection, ENS, ISO27000, Security, R+D+i

Kiril Zemlyanov Petrov

Kiril Zemlyanov Petrov

SOC Analyst

Marta López Pardal

Marta López Pardal

CSIRT / L3

Certification training

With this program, you will acquire the skills needed to work in a professional environment. To help you showcase them, IMMUNE offers you these official certifications for free:

Cisco Certified CCST CybersecurityCisco Certified CCST NetworkingMicrosoft Certified FundamentalsIT Specialist CybersecurityCommunication Skills fot Business
ElizaCareer opportunities

Cloud Systems Administrator | DevOps Engineer | Cloud Architect | Automation Engineer | Cloud Computing and DevOps Consultant | Cloud Support Engineer | Cloud Engineer


AWS

Cisco certified

Cybersecurity and Networking

Microsoft Azure

Microsoft Certified

CS-900

Pearson

IT Specialist

Cybersecurity

Communication Skills for Business

IMMUNE

IMMUNE Technology Institute

Cybersecurity & Artificial Intelligence Bootcamp

Academic information

In the Cybersecurity Bootcamp you will develop competencies and professional skills that will allow you to specialise in this sector in order to form part of a professional team of auditors, pentesters, forensic experts. You will learn through real cases in a specialised training platform to identify vulnerabilities, learn about malware, forensic analysis, cyberintelligence and much more.

Program aims
  • You will learn about the world of cybersecurity and its different branches.
  • Define and develop the organisation and processes related to corporate cybersecurity.
  • Design and propose secure network architectures and systems.
  • Learn how to investigate and respond to incidents and forensic systems techniques.
  • Know and put into practice attack and defence techniques for web applications.
  • Obtain the practical knowledge to carry out audits and penetration tests.
  • You will learn the secrets of network and system fortification.
Professional skills

The opportunities vary depending on your profile and experience, among others, you will be prepared to become:

  • Ethical hacker.
  • Cybersecurity auditor.
  • Forensic analyst.
  • Member of Red Team and Blue Team.
  • Indicent response team member.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

CybertalentIncibe

Cybertalent

Do you have a cybersecurity-related project that you would like to develop? Have you identified a cybersecurity need? Do you need funding to launch your company? IMMUNE, in collaboration with INCIBE, is developing the CYBERTALENT program, a three-year plan to promote cybersecurity entrepreneurship in Spain.

Find out more
Seedbed Incubator
Business Accelerator
Captación
Phase 1: Recruitment / Ideation
Get ready through our events
Incubación
Phase 2: Seedbed Incubator
Develop your idea and get it up and running
Aceleración
Phase 3: Acceleration
Grow your business with the support of Incibe
Financiado por la Unión Europea NextGenerationEUGobierno de EspañaPlan de Recuperación, Transformación y ResilienciaIncibeIMMUNE Technology Institute
Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Testimonials

Marta Pérez

Thomas Woodhall

Solutions Architect at AWS


They prepare you to defend companies against all possible threats.

AWS
Marta Pérez

Fabio Lai

IT and networking at Sophos


The practical part of the Master's is much more relevant, you really learn when you do it repeatedly.

AWS

Financing

IMMUNE financing

Full payment

Si realizas el pago en una sola cuota te beneficiarás de un 15% de descuento.

6 interest-free instalments

6 interest-free instalments

External financing

Sequra

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

ISA Bcas

ISA Bcas

Don't pay until you find a job in instalments adapted to your salary. Aimed at people with Spanish nationality or residence permit in Spain.

Fundae

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

FAQs
This program is for you if

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

What certification or qualification will I receive on completion of the course?

Once you have finished and passed the program, you will receive a diploma issued by IMMUNE Technology Institute in digital format and verifiable using blockchain technology.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application
2. Personal interview
3. Academic committee
4. Enrollment
Request informationStudy planCertificationsAcademic informationFinancingFAQs
IMMUNE Campus

An innovative and vibrant Tech Hub

We are not conventional and our campus even less so.
Designed to replicate an ecosystem of startups and tech companies, we have created a Silicon Valley oasis in the heart of Madrid. Come and check it out.

Visit the campus
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio
Subscribe to our newsletter
menuchevron-down