Menu

Information Security

Live online classes

October 2025

12 months

We prepare you for certification

UMECIT

Official title in Colombia by the Los Libertadores University Foundation

Prework

Presentation of the curriculum, work tools, and how the programme and group operate.

Generative AI Course: Prompt Engineering and Productivity
Introductory programming course: Python

Free access to further training

UMECIT

Our cybersecurity programmes are conducted in collaboration with Santander

Learn how to use industry-leading tools

Study plan

Cybersecurity Fundamentals
Cybersecurity and Cyberthreats

To understand the current state of cybersecurity, the cyberthreats it faces and how to manage them.

Modules:

  • Global cyber security landscape
  • Current cybersecurity overview
  • Cybersecurity labor market
  • General cybersecurity concepts
  • Defense in depth: technology, processes, and people.
  • Cybersecurity domains: management, architecture, services.
  • The future of cybersecurity: Megatrends (Blockchain, IoT, 5G, quantum computing, IA/ML).
  • Cyberthreats
  • Cyberthreat actors: motivation, activity and TTPs.
  • Cybersecurity governance
  • Risk management
  • Regulation and compliance
  • Security standards
Offensive Security
Malware

Scripting, communications security and malware: what it is, how it works and its life cycle.

Modules:

  • Communication Protocols - TCP/IP::
  • Security at the physical and link levels
  • Security at the network layer
  • Security at the transport layer
  • Security at the application layer
  • Programming fundamentals
  • Introduction to Python
  • Variables and constants
  • Object types (strings, lists, dictionaries and tuples)
  • Control structures (if-statement, for-loop and white loop)
  • Functions
  • Introduction to malware
  • What is malware?
  • Malware development
  • Files susceptible to containing malware
  • Infection vectors
  • Phases of infection
  • Exposure window and Advanced Persistent Threats (APTs)
  • Use of AI in the creation of malware
  • Malware analysis
  • Antivirus & sandboxing
  • Static and dynamic analysis
  • Malware analysis laboratory
Ethical Hacking

Pentesting. Determining the techniques, procedures and tools used to identify vulnerabilities in networks and systems.

Modules:

  • Fundamental concepts, methodologies, and tools
  • Information Gathering and enumeration: Footprinting and Fingerprinting
  • Exploitation: Service, web and wireless network pentesting
  • Post-exploitation
Defensive Security
Securely Basing And Configuring Systems And Networks

Designing and establishing plans to securely configure systems and networks. Understanding the standards and good practices within the sector

Modules:

  • Network Engineering: Network Architecture
  • Network bastioning: Implementation of a perimeter firewall
  • Bastioning in Windows environments
  • Bastioning in Linux environments
Cryptography. Cybersecurity Audit

Discover standards and techniques to verify network and system security and ensure they are securely set up.

Modules:

  • Cryptography
  • Symmetric or secret key encryption
  • Asymmetric or private key encryption
  • hasg functions
  • Digital signature and digital certificates
  • Introduction to cybersecurity auditing
  • Audit function in the company
  • Types of audit
  • The cybersecurity auditor
  • Fieldwork and microplanning
  • Auditable universe
  • Microplanning
  • Generating a deliverable
  • Generating a report
  • Cybersecurity audit tools & case studies
  • Own tools
  • Market tools
  • Real cases
Risk Management
Incident management and cyber-intelligence

Developing cybersecurity incident response plans, using identification, containment, and recovery techniques.

Modules:

  • Introduction to incident management
  • Incident response process
  • Incident response team
  • Cybersecurity Operations Centre (SOC)
  • Organization, roles, and responsibilities
  • Cybersecurity incident management
  • Incident identification and classification
  • Digital forensics
  • Incident reporting and response
  • Containment and response case studies
  • Cyberintelligence
  • Evidence collection and analysis
  • Reporting and lessons learned
  • Threat intelligence
  • Good practice in incident management
  • Risk prevention and mitigation strategies
  • Tools and technologies
  • The role of staff awareness and training
  • Regulatory and reference frameworks
Forensic Analysis

Application of forensic analysis methodologies and tools characterizing the preservation, collection, analysis and documentation phases.

Modules:

  • Use of forensic tools
  • Digital forensic tools
  • Digital data acquisition
  • File system analysis and data recovery
  • Automation and scripting
  • DFIR on on-premise and cloud servers
  • Fundamentals
  • Cloud harvesting techniques
  • Analysis of security logs and events
  • Security incidents
  • Dark Web and forensics
  • Secure access
  • Anonymity and cryptography
  • De-anonymisation systems
  • Forensic analysis of e-mail servers
  • Fundamentals
  • Phishing and malware tracking
  • Message retrieval and analysis
  • Case study
Implementation Project I

First approach to a practical project where the student begins to apply acquired knowledge to a real case or challenge.

Elective I

Subject defined by the institution to incorporate updated or emerging contents in the field of specialisation.

Elective II

Subject defined by the institution to incorporate updated or emerging contents in the field of specialisation.

Implementation Project II

Final development of the initiated project, with focus on integration, validation and presentation of results.

Certification

An asynchronous module in which time will be provided to prepare for and take the certification exams included in the program. IMMUNE, in this case, acts as a facilitator in connecting the certifying entity and the student, easing the process but without having authority over the exam or the grades obtained by the students.

Capstone Project
  • Team building.
  • Choice of topic for final project.
  • Assignment of tutors.
  • Development of the project with an assigned tutor.
  • Project delivery.
Capstone Project Presentation

Presentation of the final project before a panel of experts.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.Download the brochure here

We rub shoulders with the best

Maria Riesco

Master's in Cybersecurity Director | Head of Spanish National Police Cybersecurity Group

Alejandro Chillarón

Internal Cybersecurity Auditor

Rubén Ayala Jiménez

Security Architect at Santander | CISSP CEH Cloud | Cyber Security

Carlos Leonardo

National CSIRT Director of the Dominican Republic

Francisco Ramos

Malware analyst

Gonzalo Barañano Muñoz

Lecturer. Master's Degree in Computer Security

Manuel López Guerra

Forensic Analysis Expert, Linux Engineer

Margarita López del Campo

Information Security Officer

Ricardo Sánchez Ruíz

Red Team Leader - Security Engineer at Siemens

ElizaCareer opportunities

Cybersecurity Analyst | Information Security and Risk Management Consultant | Ethical Hacker / Pentester | Digital Forensic Analyst | Incident Response Specialist | Cyber Intelligence Consultant

Certifications
Cisco Certified CCST Cybersecurity
Cisco Certified CCST Networking
Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900
IMMUNE Technology Institute - Information Security

Certification training

With this programme you will acquire the necessary skills to work in a professional environment. In order for you to be able to demonstrate this, IMMUNE prepares you to be certified in:

Cisco Certified CCST Cybersecurity

Cisco Certified CCST Networking

Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900

Information Security

The Official Master's Degree in Information Security provides comprehensive training in the fundamental pillars of computer security: ethical hacking, active defence, digital forensics and cyberintelligence.

Through practical methodologies and real case studies, students will learn to identify and mitigate vulnerabilities in systems, respond to security incidents, analyse malicious code (malware) and develop strategies to strengthen the technological infrastructure of organisations.

Program aims
  • Design and manage cybersecurity processes and policies in corporate environments.
  • Identify vulnerabilities in software and apply secure development principles.
  • Design network architectures and systems with high security standards.
  • Perform security audits and penetration testing (pentesting) in different environments.
  • Apply digital forensics and incident response techniques to investigate and mitigate security breaches.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

Learning paths

With IDEIA, we design customized learning paths, tailored to your experience and goals. This ensures efficient progress, focused on what you truly need.

Our learning paths guide you from beginner level to becoming an expert in your chosen field. They are structured yet flexible routes, paced to suit you, so you can reach your full personal and professional potential.

Learning paths
CybertalentIncibe

Cybertalent

Do you have a cybersecurity-related project that you would like to develop? Have you identified a cybersecurity need? Do you need funding to launch your company? IMMUNE, in collaboration with INCIBE, is developing the CYBERTALENT program, a three-year plan to promote cybersecurity entrepreneurship in Spain.

Find out more
Cybertalent map
Seedbed Incubator
Business Accelerator
Catchment
Phase 1: Recruitment / Ideation
Get ready through our events
Incubation
Phase 2: Seedbed Incubator
Develop your idea and get it up and running
Acceleration
Phase 3: Acceleration
Grow your business with the support of Incibe
Funded by the European Union NextGenerationEUSpanish GovernmentRecovery, Transformation and Resilience PlanIncibeIncibeIMMUNE Technology Institute

Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Financing

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Sequra

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

Fundae

FAQs

What certification or qualification will I receive on completion of the course?

Once you complete and pass the programme you will receive:

  • Master's Degree in Cybersecurity issued by IMMUNE Technology Institute.
  • Official Master's Degree in Information Security issued by the Fundación Universitaria Los Libertadores.

Non-regulated and non-official education. The degrees of this training are protected by the Organic Law on Universities.

Is this programme for me?

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application

3. Academic committee

4. Enrollment

2. Personal interview

Request information

Visit our Campus in Madrid and discover everything about our programmes

  • Personalised guidance Monday to Friday.
  • Intake now open for March, September and October.

Designed to replicate an ecosystem of start-ups and tech companies, we’ve created a slice of Silicon Valley in the heart of Madrid.

Find out more
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio