{"id":566,"date":"2024-09-11T12:47:44","date_gmt":"2024-09-11T10:47:44","guid":{"rendered":"https:\/\/principal.immune.institute\/?post_type=programas&#038;p=566"},"modified":"2026-01-23T14:22:07","modified_gmt":"2026-01-23T13:22:07","slug":"curso-de-fundamentos-de-ciberseguridad","status":"publish","type":"programas","link":"https:\/\/immune.institute\/en\/programas\/curso-de-fundamentos-de-ciberseguridad\/","title":{"rendered":"Cybersecurity Fundamentals Course"},"content":{"rendered":"<section class=\"wp-block-cover alignfull is-style-section-dark\"><img decoding=\"async\" width=\"1024\" height=\"576\" class=\"wp-block-cover__image-background wp-image-18997 size-large\" alt=\"\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1-1024x576.webp\" data-object-fit=\"cover\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1-1024x576.webp 1024w, https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1-256x144.webp 256w, https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1-512x288.webp 512w, https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1-768x432.webp 768w, https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1-1536x864.webp 1536w, https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1-18x10.webp 18w, https:\/\/immune.institute\/wp-content\/uploads\/curso_fundamentos_ciberseguridad-1920x1080-1.webp 1921w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim wp-block-cover__gradient-background has-background-gradient has-dark-gradient-background\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-group alignwide is-style-section-inner is-layout-grid wp-container-core-group-is-layout-efbc4574 wp-block-group-is-layout-grid is-style-section-inner--1\" style=\"border-style:none;border-width:0px\">\n<div class=\"wp-block-group wp-container-content-aeb13b88 is-vertical is-layout-flex wp-container-core-group-is-layout-f67d6286 wp-block-group-is-layout-flex\"><h1 class=\"is-style-prose wp-block-post-title\">Cybersecurity Fundamentals Course<\/h1>\n\n\n<p class=\"wp-block-paragraph\">Aimed at professionals who want to get started in the world of cybersecurity and understand the key fundamentals of protecting data and systems.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-540419d0 wp-block-group-is-layout-constrained\">\n<p class=\"is-style-prose wp-block-paragraph\">Asynchronous online learning<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">5 weeks (64h.)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">No son necesarios conocimientos previos<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/pay.immune.institute\/checkout?add-to-cart=20\" target=\"_blank\" rel=\"noreferrer noopener\">Make payment<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-group alignfull is-style-section is-layout-constrained wp-block-group-is-layout-constrained is-style-section--2\">\n<div class=\"wp-block-group alignwide is-style-section-inner is-vertical is-layout-flex wp-container-core-group-is-layout-e627be86 wp-block-group-is-layout-flex is-style-section-inner--3\">\n<h2 class=\"wp-block-heading\">Why study this course?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You will understand the fundamentals of cybersecurity, a key area in today's digital environment, present in all sectors and levels of an organisation.<\/li>\n\n\n\n<li>You will learn to identify threats and risks that can compromise data integrity, availability and confidentiality.<\/li>\n\n\n\n<li>You will develop a strategic vision on how to protect information assets through security policies, controls and frameworks.<\/li>\n\n\n\n<li>You will learn the most relevant regulations and compliance standards, essential for working in regulated environments or with sensitive data.<\/li>\n\n\n\n<li>You will increase your employability in a constantly growing sector with a high demand for qualified professionals.<\/li>\n<\/ul>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group alignfull is-style-section is-layout-constrained wp-block-group-is-layout-constrained is-style-section--4\">\n<div class=\"wp-block-group alignwide is-style-section-inner is-layout-grid wp-container-core-group-is-layout-73bbc8b4 wp-block-group-is-layout-grid is-style-section-inner--5\">\n<div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-e4303f87 wp-block-group-is-layout-flex\">\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Program aims<\/summary>\n<ul class=\"wp-block-list\">\n<li>Understand the fundamental concepts of cybersecurity, its areas, objectives and current threats.<\/li>\n\n\n\n<li>Know the main defence strategies, attack vectors, actors and regulations in the sector.<\/li>\n\n\n\n<li>Identify the key elements of cybersecurity and information security governance.<\/li>\n\n\n\n<li>Learn the principles of risk management and how to apply effective controls in organisational environments.<\/li>\n\n\n\n<li>Familiarizarse con las regulaciones, normativas y est\u00e1ndares m\u00e1s relevantes en materia de cumplimiento.<\/li>\n<\/ul>\n<\/details>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-e4303f87 wp-block-group-is-layout-flex\">\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Methodology<\/summary>\n<ul class=\"wp-block-list\">\n<li>Actividades pr\u00e1cticas desde el minuto 1.<\/li>\n\n\n\n<li>Cada&nbsp;unidad&nbsp;incluye&nbsp;un&nbsp;cuestionario&nbsp;tipo&nbsp;test.<\/li>\n\n\n\n<li>Al&nbsp;final&nbsp;del&nbsp;curso resolver\u00e1s&nbsp;un&nbsp;caso&nbsp;pr\u00e1ctico&nbsp;guiado.<\/li>\n<\/ul>\n<\/details>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group alignfull is-style-section is-layout-constrained wp-block-group-is-layout-constrained is-style-section--6\">\n<div class=\"wp-block-group alignwide is-style-section-inner is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-e4303f87 wp-block-group-is-layout-flex is-style-section-inner--7\">\n<h2 class=\"wp-block-heading\">Study plan<\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>1. Introduction to cybersecurity<\/summary>\n<p class=\"wp-block-paragraph\">In this unit you will learn the fundamental concepts of cybersecurity, including its key areas, objectives and the most common threats. You will understand the impact of cyber-attacks on organisations, defence strategies, the actors involved and applicable regulations. In addition, you will explore the technology trends and services that drive cybersecurity.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>General concepts<\/li>\n\n\n\n<li>Global cyber security landscape<\/li>\n\n\n\n<li>Cybersecurity actors and domains<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>2. Cybersecurity governance<\/summary>\n<p class=\"wp-block-paragraph\">In this unit you will explore the principles of information governance, from its origins to how to implement effective governance. You will learn about information security and the key components of developing a sound and successful information security strategy.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Governance <\/li>\n\n\n\n<li>Governance framework <\/li>\n\n\n\n<li>Information security<\/li>\n\n\n\n<li>Security strategy<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Risk management<\/summary>\n<p class=\"wp-block-paragraph\">In this unit you will learn the key concepts of risk management, how the organisation's management should be involved in the process and the basic strategy for creating a risk management plan. You will also explore the frameworks and the control measures and countermeasures needed to protect information from threats.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Risk strategy <\/li>\n\n\n\n<li>Implementation of risk management <\/li>\n\n\n\n<li>Controls and countermeasures<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>4. Regulation and enforcement <\/summary>\n<p class=\"wp-block-paragraph\">In this unit you will learn about the importance of cybersecurity regulations, the key regulations and their scope of application by industry. You will also learn about compliance requirements and the most commonly used security standards in the sector.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regulatory framework <\/li>\n\n\n\n<li>Compliance requirements<\/li>\n\n\n\n<li>Main security standards <\/li>\n<\/ul>\n<\/details>\n\n\n\n<p class=\"is-style-default has-secondary-text-color has-text-color has-link-color has-small-font-size wp-elements-137d4dc222966e2d0cc89ee27a5c109c wp-block-paragraph\">* Los docentes realizar\u00e1n la selecci\u00f3n del alumnado.<\/p>\n<\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>In this course you will learn the basics of cyber security, from understanding the risks and threats to developing practical skills to protect yourself from cyber attacks.<\/p>","protected":false},"featured_media":23328,"menu_order":23,"template":"","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"area":[245],"tipo":[259],"class_list":["post-566","programas","type-programas","status-publish","has-post-thumbnail","hentry","area-cyber","tipo-curso"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/programas\/566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/programas"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/programas"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/programas\/566\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/23328"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"area","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/area?post=566"},{"taxonomy":"tipo","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tipo?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}