Systems currently generate a large amount of data, and it is necessary to create environments that allow information to be centralized to optimize analysis. In this course, aspects related to the centralization and management of security events will be worked on in order to proactively detect possible attacks.
In the event that the student does not have knowledge of computer security, it is recommended that before taking this course, he completes the introductory course to Computer Security.
Detect and monitor different types of threats against servers and know the best practices in the field.
Acquire theoretical and practical knowledge highly valued by the market and ICT departments of all types of public and private organizations.
To whom it is addressed
IT security managers and technicians of ICT departments of organizations who want to be up to date in the field of system and network monitoring.
Computer Science and/or Telecommunications students who want to orient their professional career in the area of computer security.
Professionals who, with minimal knowledge, are interested in expanding their theoretical and practical knowledge in a subject of increasing importance such as Cybersecurity.