Introductory study of the main aspects of cybersecurity organizational environments, as well as related processes, techniques and methodologies.
Main aspects of web security, from both a defensive and offensive approach, through design principles and the application of best practices, to attack techniques for security testing.
Study of issues related to network and system monitoring and cybersecurity operations for the protection of organizations.
Study of topics related to defensive network architecture and engineering, including an overview of techniques and strategies for the design of secure environments with cyber defense capabilities.
Study of the topics necessary to understand the issues related to auditing and monitoring of networks and systems, including the different tools, techniques, methods for security risk assessments.
Study of topics related to cybersecurity incident response and threat hunting, including strategies and methodologies used, as well as techniques, tactics and tools.
Study of cybersecurity threat intelligence, including the collection, analysis, and dissemination of threat, vulnerability, and adversary information to help organizations identify and mitigate risks.
Study of topics aimed at understanding how to analyze and evaluate malware, including software reverse engineering, and static and dynamic analysis techniques, using specialized tools.
Study of security in the different phases of the software development life cycle based on best practices, and oriented to the inclusion of security in the continuous integration and delivery processes.
Study of the main aspects necessary to design, implement and evaluate an information security management plan, based on a technical, cultural and strategic approach.
Main active cyber defense approaches, from cyber deception, threat hunting, and training through Purple Team exercises, along with the development of targeted intelligence capabilities.
Study of the topics related to SIEM monitoring systems with the use of tactical analytics, including the methods and processes related to such systems.
Study of the topics oriented to identify, assess and mitigate vulnerabilities of systems and applications through the use of specific tools and techniques based on the best practices of the industry.
Study of security in cloud environments and DevSecOps culture, both in its technical and management aspects, based on the main vendors and tools on the market.
Study of multi-vendor cloud environments, based on the main vendors and tools in the market, and oriented to organizational environments with different types of requirements and complex needs.
Study of the knowledge to model and evaluate potential threats to systems, applications and networks in organizations, through different analysis methods and techniques
Study of the risks associated with cybersecurity, from their identification and evaluation, to their treatment, implementation of controls, and their relationship with business continuity processes.
Introductory study of the main aspects of cybersecurity organizational environments, as well as related processes, techniques and methodologies.
Main aspects of offensive cybersecurity applied to the context of organizations, and related processes, techniques and methodologies.
Main aspects of web security, from both a defensive and offensive approach, through design principles and the application of best practices, to attack techniques for security testing.
Study of topics related to cybersecurity incident response and threat hunting, including strategies and methodologies used, as well as techniques, tactics and tools
Study of the topics related to network forensic analysis, including the different types of attacks, techniques, methods and tools for detection, investigation, and in-depth analysis.
Study of the topics related to the forensic analysis of Windows systems, including the different types of attacks, techniques, methods and tools for detection, investigation, and analysis
Study of topics aimed at understanding how to analyze and evaluate malware, including software reverse engineering, and static and dynamic analysis techniques, using specialized tools
Introductory study of the main aspects of cybersecurity organizational environments, as well as related processes, techniques and methodologies.
Study of security in the different phases of the software development life cycle based on best practices, and oriented to the inclusion of security in the continuous integration and delivery processes.
Study of the main aspects necessary to design, implement and evaluate an information security management plan, based on a technical, cultural and strategic approach
Study of the topics oriented to identify, assess and mitigate vulnerabilities of systems and applications through the use of specific tools and techniques based on the best practices of the industry.
Study of the knowledge to model and evaluate potential threats to systems, applications and networks in organizations, through different analysis methods and techniques.
Study of the risks associated with cybersecurity, from their identification and evaluation, to their treatment, implementation of controls, and their relationship with business continuity processes.