Specialization Program
in Cybersecurity

Deepen your knowledge in the field of Computer Security!

Official Certification

About the course

Together with the Lifelong Learning Agency, we have launched our new Cybersecurity Specialization Program, for Codo a Codo + participants.

The Program will allow participants to deepen their knowledge in the area of โ€‹โ€‹Computer Security, acquiring the necessary expertise for this fundamental discipline in the IT world.

Cybersecurity Specialist Training Program

It includes 8 thematic axes + Professional Project with a total of 222 hours of training

Flip the phone over to see the full schedule

222 TOTAL HOURS: 162 SYNCHRONOUS HOURS + 60 ASYNCHRONOUS HOURS

COURSES (SYNCHRONOUS): TUESDAY, WEDNESDAY AND THURSDAY - 3 HOURS DAILY (FROM 6:30 PM TO 9:30 PM)

INTRODUCTION TO CYBERSECURITY

NETWORKS

OPERATING SYSTEMS

PYTHON

CRYPTOGRAPHY & SECURITY

AUTHENTICATION

COMPUTER FORENSIC ANALYSIS

ETHICAL HACKING

MAINTENANCE & UPDATES

ANALYSIS TOOLS

PLANNED ATTACKS

PROTECTION MECHANISMS

REAL PROJECT FOR NGOs

Human Skills Strengthening Workshops + Job Coaching:

Communication and Collaborative Work / Time and Emotional Management / Job Placement

Triple Support Methodology

222 TOTAL HOURS: 162 SYNCHRONOUS HOURS + 60 ASYNCHRONOUS HOURS

COURSES (SYNCHRONOUS): TUESDAY, WEDNESDAY AND THURSDAY - 3 HOURS DAILY (FROM 6:30 PM TO 9:30 PM)

AUGUST

INTRODUCTION TO
CYBERSECURITY

NETWORKS

OPERATING
SYSTEMS

SEPTEMBER

PYTHON

CRYPTOGRAPHY &
SECURITY

AUTHENTICATION

OCTOBER

COMPUTER FORENSIC
ANALYSIS

ETHICAL HACKING

MAINTENANCE &
UPDATES

NOVEMBER

ANALYSIS
TOOLS

PLANNED
ATTACKS

PROTECTION
MECHANISMS

DECEMBER

REAL PROJECT
FOR NGOs

Human Skills Strengthening Workshops + Job Coaching:

Communication and Collaborative Work / Time and Emotional Management / Job Placement

Triple Support Methodology

Official Certification

Types of Networks – Protocols – DNS – IP Addresses – Web Servers – Database Servers – DNS Servers – Registry Servers – Email Servers

Linux – Windows – Advanced Security & Vulnerabilities in each operating system – Commands for each Operating System

Control Structures – Functions – Classes and Objects – Pep8 – Port Scanning – Pointers & Memory – Hacking Python

Encryption & Cryptography – Security Fundamentals – Steganography – Hash Functions – Security Distributions – Recognition

Computer Forensics – Evidence, Data Collection, Integrity & Cloning – Networks, Files, Email & Records – Evidence Custody & Protection

Vulnerabilities, Analysis & Exploitation – Social Engineering – Attack Methods – Performance in Production – Maintenance & Update of Web Apps

Methodologies & Frameworks – Metasploit – Kali Linux – Pentester – System Programming & Security – Network Security Programming – Attacks & Scanning

Network and Computer Infiltrations – IPV4/IPV6 Data Network Attacks – Wireless Encryption & Security – Web Scraping with Python – Metasploit – Kali Linux

Participants will put the following technical skills into play:
– Identify and analyze vulnerabilities and potential threats in the organization’s system
– Design and implement security measures, such as firewalls, intrusion detection, and prevention of denial of service (DoS) attacks
– Use Python and cybersecurity tools to perform vulnerability analysis, scans, and controlled attacks
– Apply techniques to collect and preserve evidence in the event of security incidents
– Understand the appropriate procedures for the custody, preservation, and protection of digital evidence
– Perform penetration tests on systems and networks to identify vulnerabilities and evaluate the effectiveness of the implemented security measures

Are you interested in this course?

Currently not available, leave us your details and we will contact you when a new call opens!

Get to know our Methodology

Talent Upskilling

In-Company Programs

Profesional Internships and Practices

Social Impact Programs

Strategic Collaborations

Impact Reports

Press and Media

ยกTHANK YOU!

We appreciate your interest in joining the course.
Our team will contact you when a new call is opened.