In-Person with live streaming
IMMUNE Campus: Paseo de la Castellana 89
Materials in English, Classes in Spanish
Who is this program for?
What will you learn?
Learn how to identify vulnerabilities that affect code. Develop the skills to face different hacking problems in which you have to defend and protect security systems.
Discover how to respond to a cyber breach and can identify forensic techniques to understand the incident.
Learning by Doing
Distributed in 4 modules, you will learn the foundations, the main failures of the misuse of Cryptography and apply secure coding techniques from the design up to the coding phase
Case to be Solved
From beginning to end of the program, you will develop an application, on which you will test and apply all the techniques of the courses.
The IMMUNE methodology goes beyond technology and includes a Human Sciences perspective with aspects such as Data Visualization and Presentation Skills.
This module introduces basic concepts on secure development, such as vulnerability analysis, SecDevOps, Threat Modeling and the OWASP methodology. These concepts will be used as a basis throughout the course.
SECURITY IN DESIGN PHASE
This module proposes to review basic notions of security in the design of applications. The safe design of an application significantly reduces the risk of vulnerabilities in its productive phase. Concepts such as authentication, access control, session management, cryptography and secure communications will be reviewed.
SECURITY IN CODING PHASE
Following the OWASP Top 10 methodology, the most common vulnerabilities detected in Web applications will be reviewed and their mitigation will be studied working on practical examples.
This module will review the automatic application testing tools to detect vulnerabilities and practical examples of their use. Different types of existing analyzes will be studied, such as SAST, DAST and IAST.
In addition to traditional Web applications, this bootcamp aims to introduce basic concepts in the security of native applications and APIs. In this module, vulnerabilities in mobile applications and security design principles of cloud applications will be reviewed.
This module introduces some basic concepts of cloud security and APIs.
ACCOMPANIED BY EXPERTS IN TECHNOLOGY
We offer credit lines and scholarships for students who may need them. We also offer financial aid for early registration under full payment.
IMMUNE collaborates with several companies to enhance talent in technological skills. We offer aid alternatives for groups and training under agreement with companies. Posibility of allowance through FUNDAE . Our advisors may inform you about the most appropriate for your case.
Want More Info about the Program?