Name:Specialization course
in Cybersecurity in
Technology Environments
of Information
Level:Specialty
Duration of the training cycle:720 hours
Possibility of enrolling in an independent module

The Specialization Course in Cybersecurity in Information Technology Environments , offered by the JOVIAT Professional School, trains professionals specialized in the protection of systems and data in digital environments. This advanced course prepares students to face the challenges of cybersecurity , with a practical focus on the protection of IT infrastructures, vulnerability detection and incident response.

The program is characterized by comprehensive training in network security, encryption, risk management and cloud security , ensuring that students develop the necessary skills to protect computer systems safely and efficiently. Students will be able to work in defense against cyber threats, positioning themselves as highly qualified professionals in a constantly growing sector.

Schedules

Online Course

  • Synchronous or in-person hours and days: Friday from 3:00 p.m. to 8:00 p.m. (5 hours)
  • Online hours and days: Monday, Tuesday, Wednesday and Thursday asynchronously with an average dedication of 4.25 hours/day.

Curriculum

Teachings on the identification, analysis and management of cybersecurity incidents in digital environments. This subject addresses techniques for detecting threats, assessing risk and applying response protocols to computer attacks, ensuring the protection of systems and data.

Teachings on techniques and strategies to strengthen networks and computer systems against possible threats. This subject addresses the implementation of security measures, such as configuring firewalls, protecting against intrusions and the use of cryptographic mechanisms to ensure the integrity and confidentiality of information.

Teachings on practices and processes for the secure deployment of computer systems. This subject includes techniques to ensure that applications and services deployed in production environments comply with security standards, minimizing risks and vulnerabilities during the launch process.

Teachings on the techniques and methods used to investigate cyber incidents through the analysis of digital evidence. This subject covers the recovery, preservation and examination of data in computer systems to identify the origin of an attack or breach, as well as its documentation for legal or judicial processes.

Teachings on the techniques and methodologies used by security professionals to identify vulnerabilities in computer systems through legal and controlled practices. This subject covers the use of tools and strategies to perform penetration testing, with the aim of improving the security of systems before they are exploited maliciously.

Teachings on the laws, regulations and standards that govern security in digital environments. This subject covers current regulations on data protection, privacy and cybersecurity, as well as good practices and legal requirements to comply with national and international security requirements.

Practical lessons aimed at the development and management of a real cybersecurity project in technological environments. This subject allows students to apply the knowledge acquired during the course to design, implement and evaluate security solutions in computer systems, as well as solve practical challenges related to cybersecurity.

Distribution of the course into two periods

  • 1st period October – January
    • 5021. Cybersecurity Incidents (99 hours)
    • 5022. Strengthening Networks and Systems (132 hours)
    • 5023 Safe Production Start-up (99 hours)
    • 5024 Computer Forensic Analysis (99 hours)
  • 2nd period February – May
    • 5025 Ethical Hacking (99 hours)
    • 5026 Cybersecurity Regulations (66 hours)
    • C087 Cybersecurity Project in Information Technology Environments (126 hours)

Access requirements

To access the specialization course in Cybersecurity in Information Technology Environments , it is necessary to be in possession of a Higher Education Degree within the Computer Science family of studies:

Senior Technician in Network Systems Administration (SASIX)

Senior Technician in Multiplatform Application Development (SDAM)

Senior Technician in Web Application Development (SDAW)

Senior Technician in Telecommunications and Computer Systems (SSTI)

Senior Electronic Maintenance Technician (SME)

In case of availability of places (the qualification will be an academic certificate of completion of the course with success)

    • Technician of any higher degree and accredit previous knowledge in the professional area associated with cybersecurity in the information technology environment
    • Technician of any higher degree and proven experience in the professional area associated with cybersecurity in the information technology environment
    • Accredit previous knowledge or work experience in the professional area associated with cybersecurity in the information technology environment even if you do not have a higher vocational training technician title.

    Teaching staff

    #2be

    A pioneering and innovative program for high school and vocational training

    This project focuses on growth, leadership and personal transformation. A life subject around personal autonomy and social skills.

    Related blog posts

    We promote your professional career

    At JOVIAT we understand learning as a full, conscious and vital experience. An experience that marks our paths of professional and personal growth, and that leaves an impact on society.