Protect data, protect the future

Specialize in Cybersecurity with advanced and practical training, and become a professional capable of protecting systems and data in digital environments.

 

  • 100% ONLINE –
    When you want and from where you want
  • HIGH LABOR INSERTION

  • PRACTICAL TRAINING

 

Name:Specialization course in Cybersecurity in Information Technology Environments
Level:Specialty
Duration of the training cycle:720 hours
Possibility of registration in an independent module

The Specialization Course in Cybersecurity in Information Technology Environments, offered by the JOVIAT Professional School, trains professionals specialized in protecting systems and data in digital environments. This advanced course prepares students to face cybersecurity challenges, with a practical focus on IT infrastructure protection, vulnerability detection, and incident response.

The program is characterized by complete training in network security, encryption, risk management and cloud security, ensuring that students develop the necessary skills to protect computer systems safely and efficiently . The students will be able to work in the defense against cyber threats, positioning themselves as highly qualified professionals in a constantly growing sector.

    Schedules

    Online Course

    • Synchronous or face-to-face hours and days: Friday from 3:00 p.m. to 8:00 p.m. (5 hours)

     

    • Hours and days online: Mondays, Tuesdays, Wednesdays and Thursdays in asynchronous mode, with an average dedication of 4.25 hours/day.

    Curriculum

    Teaching about the identification, analysis and management of cyber security incidents in digital environments. This subject addresses the techniques to detect threats, assess the risk and apply protocols to respond to computer attacks, guaranteeing the protection of systems and data.

    Teaching techniques and strategies to strengthen networks and computer systems against possible threats. This subject addresses the implementation of security measures, such as the configuration of firewalls, protection against intrusions and the use of encryption mechanisms to ensure the integrity and confidentiality of information.
    Teaching about the practices and processes for the safe production of computer systems. This subject includes techniques to ensure that applications and services deployed in production environments comply with security standards, minimizing risks and vulnerabilities during the launch process.
    Teaching about the techniques and methods used to investigate cyber incidents through the analysis of digital evidence. This subject covers the recovery, preservation and examination of data in computer systems to identify the origin of an attack or infringement, as well as its documentation for legal or judicial processes.

    Teaching about the techniques and methodologies used by security professionals to identify vulnerabilities in computer systems through legal and controlled practices. This subject covers the use of tools and strategies to carry out intrusion tests, with the objective of improving the security of systems before they are exploited maliciously.

    Teaching about the laws, regulations and standards that govern security in digital environments. This subject covers current regulations on data protection, privacy and cyber security, as well as good practices and legal requirements to comply with national and international security requirements.

    Practical lessons aimed at the development and management of a real cybersecurity project in technological environments. This subject allows students to apply the knowledge acquired during the course to design, implement and evaluate security solutions in computer systems, as well as solve practical challenges related to cyber security.

    Distribution of the course in two periods

    • 1st period October – January
      • 5021. Cybersecurity incidents (99 hours)
      • 5022. Strengthening Networks and Systems (132 hours)
      • 5023 Putting into Safe Production (99 hours)
      • 5024 Computer Forensic Analysis (99 hours)
    • 2nd period February – May
      • 5025 Ethical Hacking (99 hours)
      • 5026 Cybersecurity Regulation (66 hours)
      • C087 Cybersecurity Project in Information Technology Environments (126 hours)

    Access requirements

    To access the Specialization Course in Cybersecurity in Information Technology Environments , it is necessary to be in possession of a Higher Degree Formative Cycle title within the Computer Science family of studies:

    Senior Technician in Network Systems Administration (SASIX)

    Senior Technician in Multi-Platform Application Development (SDAM)

    Senior Technician in Web Application Development (SDAW)

    Senior technician in Telecommunications and Computer Systems (SSTI)

    Senior Technician in Electronic Maintenance (SME)

    In case of availability of places (the degree will be an academic certificate of successful completion of the course)

    • Technician of any higher degree and proven previous knowledge in the professional area associated with cyber security in the information technology environment
    • Technician of any higher degree and proven experience in the professional area associated with cyber security in the information technology environment
    • Accredit previous knowledge or work experience in the professional area associated with cyber security in the context of information technologies, even if you do not have a higher professional training technician title.

    Teaching team

    Online Cybersecurity Specialization Course

    JOVIAT is a reference center in post-compulsory and professional training, with 65 years of experience and thousands of success stories from students who have passed through its classrooms.

    We bet on quality and pedagogical innovation, exploring talents to the fullest to develop a professional career.

    JOVIAT, every challenge is an opportunity.