The aim of this course is to provide a global view of the different aspects that cyber security includes in order to know how to identify them and learn how to use the most appropriate tools in each of them:
- Ethical hacking : Computer networks are susceptible to computer attacks. Regular network audits provide very important information about the level of security of the various assets you have. We will see how security audits should be carried out and learn about the different tools that can help us carry them out.
- Prevention and response: Bringing the student closer to techniques of detection, prevention and response to computer attacks. Currently, systems generate a large amount of data, and it is necessary to create environments that allow information to be centralized to optimize analysis. Aspects related to the centralization and management of security events will be worked on in order to proactively detect possible attacks.
- Computer forensics: The detection, preservation and investigation of electronic tests or evidence that can be used to defend the company against possible criminal liability is known as “computer forensics”. We will try to understand the legal and technical aspects necessary to carry out a forensic analysis correctly and we will learn to obtain evidence in different work environments through a correct selection of tools.
- Security in application development: More than 80% of attacks on computer systems are made by exploiting vulnerabilities in web applications. It is therefore essential that developers have security knowledge and that this knowledge is integrated into their day-to-day work.
The course includes several guided practical exercises that help to consolidate the concepts presented during the sessions.
Prior knowledge of TCP/IP networks as well as the use of Windows and Linux systems at an advanced user level is required.
The course lasts 32 hours, the teaching format will be agreed beforehand.