900 321 322
Menu

Cybersecurity for Business Program

How to manage information in a secure way to improve the security of your business and reduce risks, increasing profitability
Program on Cybersecurity for Business Program on Cybersecurity for Business
> Español
Cybersecurity for Business Program

More and more companies tend towards and need digitalization. This digital transformation does not consist only in integrating computer systems in the company, but it is necessary to have a digital culture to prevent cybercriminals from taking advantage of digital and human vulnerabilities in order to obtain the most valuable thing in a company: information.

More and more companies tend towards and need digitalization. This digital transformation does not consist only in integrating computer systems in the company, but it is necessary to have a digital culture to prevent cybercriminals from taking advantage of digital and human vulnerabilities in order to obtain the most valuable thing in a company: information.

In collaboration with:

Escudo digital
Dacor

Specialized teaching staff

The lectures are taught by expert professors with extensive professional experience and who combine knowledge, experience and pedagogical vocation. In this way, the program is taught from a real perspective and from close and specialized knowledge of business practice.

Emphasis on prevention and awareness of vulnerabilities

Analyze the vulnerabilities of your company and know the possible problems that it faces every day, allowing you to strengthen prevention and the tools to face them.

Practical guidance for the best operation of your company

Extensive knowledge and experience in the current context, providing the necessary means and information to optimize the security and proper functioning of the company.



Objectives

  • Destroy the myth that security equals business expense.
  • Learn how to protect yourself and the company.
  • Know the main cyberattacks and risks. Cybercrime. Trends.
  • Know the main cybersecurity solutions that are usually implemented in companies.
  • Know the main challenges in managing information leaks.
  • Know the main cybersecurity measures that can be carried out individually and on the devices used.
  • Establish best practices in cybersecurity.
  • Identify if the information is being put at risk.
  • Develop cybersecurity culture.

Competences

At the end of this program, the student will have the necessary competences to:

  • Know the main cybersecurity solutions that are usually implemented in companies.
  • Know the main cybersecurity measures that can be carried out individually and on the devices used.
  • Establish best practices in cybersecurity.
  • Develop cybersecurity culture.

Course program Each module is equivalent to 15 hours with online methodology.

Module 1: Standards and levels for information security

Know and understand the different norms, standards and regulations related to information security.

Learn what is important to apply and how it should be implemented.

Index

  • Computer Security Management System
  • ISO 27001 and 27002
  • NIST
  • National security scheme

Module 2: Attacks and vulnerabilities

Know and understand what a vulnerability is, why it appears and how it is attacked.

Know and understand the different phases of an attack.

Know the most frequent attacks faced by a company or an employee.

Index

  • Vulnerabilities
  • Malware
  • Intrusion into systems
  • Exploits
  • Most-used attacks
  • How cybercriminals act
  • Cybercrime trend
  • Cyberterrorism
  • Organized crime

Module 3: Cybersecurity technology solutions

Learn about the mechanisms to protect improper access.

Learn about the systems to protect network access.

Index

  • Mechanisms for user authentication and access control.
  • Network access control systems.
  • Monitoring systems.

Module 4: Protection in the organization and culture in cybersecurity

How the human factor affects cybersecurity.

Social engineering

Training and awareness plans.

Index

  • Typical mistakes we make
  • Social engineering techniques and how to avoid them
  • Types of training and their importance

Professors

BC Bernard Cortijo Professor
JJ José Luis Jerez Professor
RJ Rafael Jurado Professor