Specialization Program
in Cybersecurity
Deepen your knowledge in the field of Computer Security!
Official Certification
About the course
Together with the Lifelong Learning Agency, we have launched our new Cybersecurity Specialization Program, for Codo a Codo + participants.
The Program will allow participants to deepen their knowledge in the area of โโComputer Security, acquiring the necessary expertise for this fundamental discipline in the IT world.
Cybersecurity Specialist Training Program
It includes 8 thematic axes + Professional Project with a total of 222 hours of training
Flip the phone over to see the full schedule
222 TOTAL HOURS: 162 SYNCHRONOUS HOURS + 60 ASYNCHRONOUS HOURS
COURSES (SYNCHRONOUS): TUESDAY, WEDNESDAY AND THURSDAY - 3 HOURS DAILY (FROM 6:30 PM TO 9:30 PM)
AUGUST (36 HOURS)
INTRODUCTION TO CYBERSECURITY
NETWORKS
OPERATING SYSTEMS
SEPTEMBER (48 HOURS)
PYTHON
CRYPTOGRAPHY & SECURITY
AUTHENTICATION
OCTOBER (52 HOURS)
COMPUTER FORENSIC ANALYSIS
ETHICAL HACKING
MAINTENANCE & UPDATES
NOVEMBER (56 HOURS)
ANALYSIS TOOLS
PLANNED ATTACKS
PROTECTION MECHANISMS
DECEMBER (30 HOURS)
REAL PROJECT FOR NGOs
Human Skills Strengthening Workshops + Job Coaching:
Communication and Collaborative Work / Time and Emotional Management / Job Placement
Triple Support Methodology
222 TOTAL HOURS: 162 SYNCHRONOUS HOURS + 60 ASYNCHRONOUS HOURS
COURSES (SYNCHRONOUS): TUESDAY, WEDNESDAY AND THURSDAY - 3 HOURS DAILY (FROM 6:30 PM TO 9:30 PM)
AUGUST
INTRODUCTION TO
CYBERSECURITY
NETWORKS
OPERATING
SYSTEMS
SEPTEMBER
PYTHON
CRYPTOGRAPHY &
SECURITY
AUTHENTICATION
OCTOBER
COMPUTER FORENSIC
ANALYSIS
ETHICAL HACKING
MAINTENANCE &
UPDATES
NOVEMBER
ANALYSIS
TOOLS
PLANNED
ATTACKS
PROTECTION
MECHANISMS
Human Skills Strengthening Workshops + Job Coaching:
Communication and Collaborative Work / Time and Emotional Management / Job Placement
Triple Support Methodology
Official Certification
Axis 1 - Networks
Types of Networks – Protocols – DNS – IP Addresses – Web Servers – Database Servers – DNS Servers – Registry Servers – Email Servers
Axis 2 - Operating Systems
Linux – Windows – Advanced Security & Vulnerabilities in each operating system – Commands for each Operating System
Axis 3 - Python
Control Structures – Functions – Classes and Objects – Pep8 – Port Scanning – Pointers & Memory – Hacking Python
Axis 4 - Security
Encryption & Cryptography – Security Fundamentals – Steganography – Hash Functions – Security Distributions – Recognition
Axis 5 - Forensic Analysis
Computer Forensics – Evidence, Data Collection, Integrity & Cloning – Networks, Files, Email & Records – Evidence Custody & Protection
Axis 6 - Ethical Hacking
Vulnerabilities, Analysis & Exploitation – Social Engineering – Attack Methods – Performance in Production – Maintenance & Update of Web Apps
Axis 7 - Analysis Tools
Methodologies & Frameworks – Metasploit – Kali Linux – Pentester – System Programming & Security – Network Security Programming – Attacks & Scanning
Axis 8 - Planned Attacks and Planned Protection Mechanisms
Network and Computer Infiltrations – IPV4/IPV6 Data Network Attacks – Wireless Encryption & Security – Web Scraping with Python – Metasploit – Kali Linux
Real Professional Project: NGO Client
– Identify and analyze vulnerabilities and potential threats in the organization’s system
– Design and implement security measures, such as firewalls, intrusion detection, and prevention of denial of service (DoS) attacks
– Use Python and cybersecurity tools to perform vulnerability analysis, scans, and controlled attacks
– Apply techniques to collect and preserve evidence in the event of security incidents
– Understand the appropriate procedures for the custody, preservation, and protection of digital evidence
– Perform penetration tests on systems and networks to identify vulnerabilities and evaluate the effectiveness of the implemented security measures