Menu

Information Security

In partnership with:

Live online classes

Octubre 2025

12 meses

Te preparamos para certificarte en

Cisco Certified CCST Cybersecurity
Cisco Certified CCST Networking
Microsoft Certified SC-900 Security, Compliance and Identity Fundamentals

Free access to complementary training:

  • Generative AI Course: Prompt Engineering and Productivity
  • Introductory programming course: Python
UMECITTítulo oficial en Colombia por la Fundación Universitaria Los Libertadores.

Prework

Presentation of the curriculum, work tools, program operation and presentation of the group.

Study plan

Cybersecurity Fundamentals
Ciberseguridad Y Ciberamenazas

Conocer el estado actual de la ciberseguridad, las ciberamenazas a las que hace frente y cómo gestionarlas.

Modules:

  • Global cyber security landscape
  • Current cybersecurity overview
  • Cybersecurity labor market
  • General cybersecurity concepts
  • Defense in depth: technology, processes, and people.
  • Cybersecurity domains: management, architecture, services.
  • The future of cybersecurity: Megatrends (Blockchain, IoT, 5G, quantum computing, IA/ML).
  • Ciberamenazas
  • Cyberthreat actors: motivation, activity and TTPs.
  • Gobierno de la ciberseguridad
  • Gestión de riesgos
  • Regulación y compliance
  • Estándares de seguridad
Offensive Security
Malware

Scripting, seguridad en comunicaciones y malware: Qué es, funcionamiento y ciclo de vida.

Modules:

  • Communication Protocols - TCP/IP::
  • Security at the physical and link levels
  • Security at the network layer
  • Security at the transport layer
  • Security at the application layer
  • Fundamentos de programación
  • Introduction to Python
  • Variables and constants
  • Tipos de objetos (cadenas de texto, listas, diccionarios y tuplas)
  • Estructuras de control (sentencia if, bucle for y bucle white)
  • Functions
  • Introducción al malware
  • What is malware?
  • Malware development
  • Files susceptible to containing malware
  • Infection vectors
  • Phases of infection
  • Ventana de exposición y Amenazas Persistentes Avanzadas (APT)
  • Uso de la IA en la creación de malware
  • Análisis de malware
  • Antivirus & sandboxing
  • Análisis estático y dinámico
  • Laboratorio de análisis de malware
Hacking Ético

Pentesting. Determining the techniques, procedures and tools used to identify vulnerabilities in networks and systems.

Modules:

  • Fundamental concepts, methodologies, and tools
  • Information Gathering y enumeración: Footprinting y Fingerprinting
  • Explotación: Pentesting a servicios, web y redes inalámbricas
  • Post-exploitation
Defensive Security
Bastionado Y Configuración Segura De Sistemas Y Redes

Designing and establishing plans to securely configure systems and networks. Understanding the standards and good practices within the sector

Modules:

  • Ingeniería de redes: Arquitectura de redes
  • Bastionado de redes: Implementación de un firewall perimetral
  • Bastioning in Windows environments
  • Bastioning in Linux environments
Criptografía. Auditoría De Ciberseguridad

Discover standards and techniques to verify network and system security and ensure they are securely set up.

Modules:

  • Cryptography
  • Cifrado simético o de clave secreta
  • Cifrado asimétrico o de clave privada
  • Funciones hasg
  • Firma digital y certificados digitales
  • Introduction to cybersecurity auditing
  • Función de auditoría en la empresa
  • Tipos de auditoría
  • El auditor de ciberseguridad
  • Fieldwork and microplanning
  • Universo auditable
  • Microplanificación
  • Generando un entregable
  • Generando un informe
  • Cybersecurity audit tools & case studies
  • Herramientas propias
  • Herramientas de mercado
  • Casos reales
Risk Management
Gestión De Incidentes Y Ciberinteligencia

Developing cybersecurity incident response plans, using identification, containment, and recovery techniques.

Modules:

  • Introducción a la gestión de incidentes
  • Incident response process
  • Equipo de respuesta ante incidentes
  • Centro de operaciones de ciberseguridad (SOC)
  • Organization, roles, and responsibilities
  • Gestión de incidentes de ciberseguridad
  • Identificación y clasificación de incidentes
  • Investigación forense digital
  • Notificación y respuesta a incidentes
  • Containment and response case studies
  • Ciberinteligencia
  • Evidence collection and analysis
  • Reporting and lessons learned
  • Inteligencia de amenazas
  • Buenas prácticas en la gestión de incidentes
  • Estategias de prevención y mitigación de riesgos
  • Herramientas y tecnologías
  • El papel de la concientización y capacitación del personal
  • Marcos normativos y de referencia
Forensic Analysis

Application of forensic analysis methodologies and tools characterizing the preservation, collection, analysis and documentation phases.

Modules:

  • Use of forensic tools
  • Herramientas forenses digitales
  • Adquisición de datos digitales
  • Análisis de sistemas de archivos y recuperación de datos
  • Automatización y scripts
  • DFIR en servidores on-premise y cloud
  • Fundamentos
  • Técnicas de recolección en cloud
  • Análisis de logs y eventos de seguridad
  • Incidentes de seguridad
  • Dark Web y análisis forense
  • Acceso seguro
  • Anonimato y criptografía
  • Sistemas de desanonimización
  • Análisis forense en servidores de correo electrónico
  • Fundamentos
  • Rastreo de phishing y malware
  • Recuperación y análisis de mensajes
  • Estudio de caso
Proyecto de Aplicación I

Primera aproximación a un proyecto práctico donde el estudiante comienza a aplicar conocimientos adquiridos en un caso o reto real.

Electiva I

Asignatura definida por la institución para incorporar contenidos actualizados o emergentes en el ámbito de la especialización.

Electiva II

Asignatura definida por la institución para incorporar contenidos actualizados o emergentes en el ámbito de la especialización.

Proyecto de Aplicación II

Desarrollo final del proyecto iniciado, con foco en la integración, validación y presentación de resultados.

Certification

An asynchronous module in which time will be provided to prepare for and take the certification exams included in the program. IMMUNE, in this case, acts as a facilitator in connecting the certifying entity and the student, easing the process but without having authority over the exam or the grades obtained by the students.

Capstone Project
  • Team building.
  • Choice of topic for final project.
  • Assignment of tutors.
  • Development of the project with an assigned tutor.
  • Project delivery.
Capstone Project Presentation

Presentation of the final project before a panel of experts.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.

We rub shoulders with the best

Maria Riesco

Maria Riesco

Master's in Cybersecurity Director | Head of Spanish National Police Cybersecurity Group

Alejandro Chillarón

Alejandro Chillarón

Internal Cybersecurity Auditor

Rubén Ayala Jiménez

Rubén Ayala Jiménez

Security Architect at Santander | CISSP CEH Cloud | Cyber Security

Carlos Leonardo

Carlos Leonardo

National CSIRT Director of the Dominican Republic

Francisco Ramos

Francisco Ramos

Malware analyst

Gonzalo Barañano Muñoz

Gonzalo Barañano Muñoz

Lecturer. Master's Degree in Computer Security

Manuel López Guerra

Manuel López Guerra

Forensic Analysis Expert, Linux Engineer

Margarita López del Campo

Margarita López del Campo

Information Security Officer

Ricardo Sánchez Ruíz

Ricardo Sánchez Ruíz

Red Team Leader - Security Engineer at Siemens

Sergio Ruiz Teclesmayer

Sergio Ruiz Teclesmayer

Malware Analyst

Certification training

Con este programa adquirirás las competencias necesarias para trabajar en un entorno profesional. Para que puedas demostrarlo, IMMUNE te prepara para certificarte en:

Cisco Certified CCST CybersecurityCisco Certified CCST NetworkingMicrosoft Certified SC-900 Security, Compliance and Identity Fundamentals
Information SecurityElizaCareer opportunities

Analista de Ciberseguridad | Consultor en Seguridad de la Información y Gestión de Riesgos | Hacker Ético / Pentester | Analista Forense Digital | Especialista en Respuesta ante Incidentes | Consultor en Ciberinteligencia


Certifications
Cisco

Cisco certified

CCST Cybersecurity and Networking

Microsoft Azure

Microsoft Certified

SC-900 Security, Compliance and Identity Fundamentals

IMMUNE

IMMUNE Technology Institute

Information Security

Academic information

La Maestría Oficial en Seguridad de la Información proporciona una formación integral en los pilares fundamentales de la seguridad informática: hacking ético, defensa activa, análisis forense digital y ciberinteligencia.

A través de metodologías prácticas y estudios de caso reales, los estudiantes aprenderán a identificar y mitigar vulnerabilidades en sistemas, responder ante incidentes de seguridad, analizar código malicioso (malware) y desarrollar estrategias para fortalecer la infraestructura tecnológica de las organizaciones.

Program aims
  • Diseñar y gestionar procesos y políticas de ciberseguridad en entornos corporativos.
  • Identificar vulnerabilidades en el software y aplicar principios de desarrollo seguro.
  • Diseñar arquitecturas de red y sistemas con altos estándares de seguridad.
  • Realizar auditorías de seguridad y pruebas de penetración (pentesting) en distintos entornos.
  • Aplicar técnicas de análisis forense digital y respuesta ante incidentes para investigar y mitigar brechas de seguridad.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

Learning paths

With IDEIA, we design customized learning paths, tailored to your experience and goals. This ensures efficient progress, focused on what you truly need.

Nuestros learning paths te guían desde el nivel básico hasta convertirte en experto en tu área de interés. Son itinerarios estructurados y flexibles, ajustados a tu ritmo, para que alcances tu máximo potencial personal y profesional.

Learning paths

Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Financing

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Sequra

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

Fundae

FAQs

What certification or qualification will I receive on completion of the course?

Una vez finalices y superes el programa recibirás:

  • Título en Máster en Ciberseguridad emitido por IMMUNE Technology Institute.
  • Título en Maestría Oficial en Seguridad de la Información emitido por la Fundación Universitaria Los Libertadores.

Enseñanza no reglada y sin carácter oficial. Los títulos propios de esta formación están amparados por la Ley Orgánica de Universidades.

This program is for you if

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application

2. Personal interview

3. Academic committee

4. Enrollment

Request informationStudy planCertificationsAcademic informationFinancingFAQs

Visita nuestro Campus en Madrid y conoce todo sobre nuestros programas

  • Orientación personalizada de lunes a viernes.
  • Convocatoria abierta para marzo, septiembre y octubre.

Diseñado para replicar un ecosistema de startups y empresas tecnológicas, hemos creado un oasis de Silicon Valley en el corazón de Madrid.

Solicitar visita
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio