Cybersecurity Bootcamp | IE Lifelong Learning

Cybersecurity Bootcamp

A practical exploration of essential key practices that will equip you with the knowledge, skills, and tools to establish a successful career in cybersecurity.
Start dateOn demand
Duration20 weeks
LanguageEnglish
LOCATIONMadrid
FormatFace to face or Virtual
Tuition Fees€12,500
Start dateOn demand
Duration20 weeks
LanguageEnglish
LOCATIONMadrid
FormatFace to face or Virtual
Tuition Fees€12,500

Program content

This program will offer you extensive exposure to various Cybersecurity approaches, utilizing the latest tools and platforms available in the market, providing a significant learning experience.

want to know more?
  • a) Introduction to Cybersecurity

    b) Current state of cybersecurity: cyber-terrorism, cyber-wars and APTs. 

    c) Terms and definitions in cybersecurity

  • a. Security Governance 

    • Departmental structure
    • Decision-making bodies
    • Cybersecurity reporting

    b. Cybersecurity strategy and models

    • Cybersecurity standards and frameworks.
    • Cyber Strategy Framework: NIST
    • Security policies and standards. Regulatory models and normative bodies.

    c. Regulatory compliance associated with cybersecurity.

    • Critical Infrastructure Protection Law / NIS2.
    • GDPR
    • PCI/SWIFT 

    d. Information security management system

    • Development Regulatory Body
    • Design an ISMS
    • Risk Analysis
    • Risk Management
  • a. Identity protection

    • Identity Management
    • MFA
    • Biometry
    • Digital Certificate
    • Secure coding AWASP

    b. Security in communications and networks

    • Secure network architecture
    • Secure protocols
    • Configuration of firewalls
    • Encryption of information
    • Network access control

    c. Cloud Security

    • Policies
    • Kubernetes
    • Microservices
    • Secure configuration and audit of System

    d. Information protection and data governance.

    • Classification of information
    • Cryptography
    • Data loss prevention
    • Information rights management
    • Mobile Device Security
  • a) Security Operation Center

    • What is a SOC?
    • Services to be provided by a SOC
    • "Threat Intelligence Analysis
    • "Threat hunting".
    • Event monitoring and correlation
    • SOC maturity models
    • SIEM/EDR Management

    b. Technical security analysis

    • Initiation to hacking
    • Methodologies of technical audits
    • Attack tools and techniques
    • Perform vulnerability scans
    • Pentesting
  • a. Security Incident Response -Basics

    b. Security Crisis Management

    c. Malware analysis

    d. Forensic analysis