Cybersecurity and Cyber Defense

The Cybersecurity and Cyber Defense program offered by the Division of Continuing Education at Blackwell Global University, in partnership with the Autonomous University of Chile, provides a comprehensive view of the phenomenon of cybersecurity. It focuses on the description, characterization, and analysis of the main technical and legal considerations that the risks and threats in cyberspace pose to the security of individuals, information assets, critical infrastructures, and human rights. 

300 hours

30 credits

Cybersecurity and Cyber Defense

The Cybersecurity and Cyber Defense program offered by the Division of Continuing Education at Blackwell Global University, in partnership with the Autonomous University of Chile, provides a comprehensive view of the phenomenon of cybersecurity. It focuses on the description, characterization, and analysis of the main technical and legal considerations that the risks and threats in cyberspace pose to the security of individuals, information assets, critical infrastructures, and human rights. 

300 hours

30 credits

December 2

Start Date


20 Weeks

Duration


Online

Mode


$900

Investment


Graduate profile

The graduate of the Cybersecurity and Cyber Defense program possesses the knowledge to manage a cybersecurity program and propose metrics to enhance an organization's maturity level in alignment with best cybersecurity practices.

Program Objectives

To train professionals specialized in the design and implementation of cybersecurity and cyber defense plans and programs in public institutions or private companies at the national, regional, or local level. This includes analyzing various aspects of cybersecurity and cyber defense issues and proposing new defense strategies against the risks and threats of cyberspace. 

  • Manage, plan, design, and implement the necessary procedures to optimize cybersecurity for the different assets of the company, considering current threats of attacks or intrusions into networks and information systems.

  • Oversee the security of an information and communication technology services department and the security of systems.

  • Provide consulting and auditing services in a company specialized in information securit

Methodology:

Asynchronous Classes
Self-Assessments
Readings and Slides

Modules:

Modules:

Cyber Defense and Cyber Intelligence

  • Concepts of Cybersecurity and Cyber Intelligence
  • Communications in Networks
  • Information Security and Cybersecurity
  • Definition of Types of Cyber Attacks and Threats
  • Information Security in Computer Systems
  • Security Mechanisms and Protocols
  • Cryptography and Data Security
  • Basic Pentesting
  • Personal Data Protection
  • Industrial Cybersecurity and Critical Infrastructures
  • Disaster Recovery  

International Law in Cyberspace

  • Importance and Implications of Cyberspace
  • Security Management and Policies
  • Social Engineering
  • Methods of Security Analysis and Evaluation
  • Cybercrime and Computer Crimes
  • Legal and Ethical Aspects of Cybersecurity
  • International and National Strategies for Cyberspace
  • Cybersecurity Strategies and Implementation
  • Guidelines on Cybersecurity, Cyber Defense, and Cyber Intelligence
  • Contingency and Business Continuity Plan
  • Information Security and Privacy Model
  • Cyber Resilience and Security Maturity  

Management of a Cybersecurity Response Center

  • Event, Incident, Attack, Incident Response Team
  • Incident Responses
  • Structure and Services of an Incident Response Team
  • Policies, Plans, and Procedures
  • Sharing Information with Third Parties
  • Incident Handling
  • Phase - Preparation
  • Phase - Detection and Analysis
  • Phase - Containment, Eradication, and Recovery
  • Phase - Post-Incident Activity
  • Incident Management Checklist; Coordination and Information Sharing
  • Workshop: Creating a Cybersecurity Response Center  

Digital Vulnerability Analysis

  • Threat, Vulnerability, Asset, and Impact
  • Event, Incident, and Attack
  • Risk and Risk Management
  • CVSS, CVE, and NVD
  • Vulnerability Management
  • Stages of the Vulnerability Management Lifecycle
  • Roles and Responsibilities in Vulnerability Management
  • Scanning, Footprinting, and Enumeration
  • Viruses, Worms, Trojans, and Backdoors
  • Workshop: SSL/TLS Vulnerability Analysis
  • Workshop: Network Vulnerability Analysis
  • Workshop: Web Application Vulnerability Analysis  

IT Security: Defense against the digital dark arts (Coursera Module)

  • Understanding Security Threats
  • Pelcgbybtl (Cryptology)
  • AAA Security (No Roadside Assistance)
  • Securing Your Networks  

Additional Certification 

As part of our program's curriculum, we have incorporated the course "IT Security: Defense against the digital dark arts" taught by Google. Upon completion of the course, you will receive an additional certification from Google, thanks to our international partnership with Coursera for Campus.

Additional Certification 

As part of our program's curriculum, we have incorporated the course "IT Security: Defense against the digital dark arts" taught by Google. Upon completion of the course, you will receive an additional certification from Google, thanks to our international partnership with Coursera for Campus.

Investment:

Investment:

Ready to take the next step in your career?

We're here to guide you. Fill in your details, and one of our advisors will reach out to support you on your journey.

El formulario CRM se cargará aquí
Utilizamos cookies
Preferencias de las cookies
A continuación, encontrará información sobre los propósitos para los cuales nosotros y nuestros socios utilizamos cookies y procesamos datos. Puede establecer sus preferencias para el procesamiento y/o consultar más información en los sitios web de nuestros socios.
Cookies analíticas Desactivar todo
Cookies funcionales
Otras cookies
We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. Obtener más información sobre nuestra política de cookies.
Entiendo Detalles
Cookies