Cybersecurity Bootcamp | IE Lifelong Learning

Cybersecurity Bootcamp

A practical exploration of essential key practices that will equip you with the knowledge, skills, and tools to establish a successful career in cybersecurity.
Start dateMay 10th, 2024
Duration20 weeks
LanguageEnglish
LOCATIONMadrid
FormatFace to face + Virtual
Tuition Fees€12,500
Start dateMay 10th, 2024
Duration20 weeks
LanguageEnglish
LOCATIONMadrid
FormatFace to face + Virtual
Tuition Fees€12,500

Program content

This program will offer you extensive exposure to various Cybersecurity approaches, utilizing the latest tools and platforms available in the market, providing a significant learning experience.

want to know more?

NEW BUSINESS RISKS IN VUCA ENVIRONMENTS

More information below

a) Introduction to Cybersecurity

b) Current state of cybersecurity: cyber-terrorism, cyber-wars and APTs. 

c) Terms and definitions in cybersecurity

CYBERSECURITY STRATEGY

More information below

a. Security Governance 

  • Departmental structure
  • Decision-making bodies
  • Cybersecurity reporting

b. Cybersecurity strategy and models

  • Cybersecurity standards and frameworks.
  • Cyber Strategy Framework: NIST
  • Security policies and standards. Regulatory models and normative bodies.

c. Regulatory compliance associated with cybersecurity.

  • Critical Infrastructure Protection Law / NIS2.
  • GDPR
  • PCI/SWIFT 

d. Information security management system

  • Development Regulatory Body
  • Design an ISMS
  • Risk Analysis
  • Risk Management

SECURITY CONTROLS AND MEASURES

More information below

a. Identity protection

  • Identity Management
  • MFA
  • Biometry
  • Digital Certificate
  • Secure coding AWASP

b. Security in communications and networks

  • Secure network architecture
  • Secure protocols
  • Configuration of firewalls
  • Encryption of information
  • Network access control

c. Cloud Security

  • Policies
  • Kubernetes
  • Microservices
  • Secure configuration and audit of System

d. Information protection and data governance.

  • Classification of information
  • Cryptography
  • Data loss prevention
  • Information rights management
  • Mobile Device Security

SECURITY VIGILANCE

More information below

a) Security Operation Center

  • What is a SOC?
  • Services to be provided by a SOC
  • "Threat Intelligence Analysis
  • "Threat hunting".
  • Event monitoring and correlation
  • SOC maturity models
  • SIEM/EDR Management

b. Technical security analysis

  • Initiation to hacking
  • Methodologies of technical audits
  • Attack tools and techniques
  • Perform vulnerability scans
  • Pentesting

SECURITY RESILIENCE

More information below

a. Security Incident Response -Basics

b. Security Crisis Management

c. Malware analysis

d. Forensic analysis

More info
Book a call
Chat with us
Download brochure
Download brochure
Chat with us
Book a call