Master in computer audit + university degree

Educational Institution
Mode On-line
Duration 1500 hours
Credits 8 ECTS
Languages Spanish
$1.979.700
Pago en cuotas sin intereses Acceso para siempre para consultar tu curso

Request information

Reconocidos por
Acreditados por

Curriculum

Summary

This Master in computer audit offers you a specialized training in the field. We must know that today computer security is a very important and sensitive issue, which covers a great set of aspects in continuous change and constant evolution, which requires that computer professionals have fully updated knowledge. With the realization of the present master in computer audit, the student will learn the necessary knowledge to audit communication networks and computer systems.

Goals

- Analyze and select the audit tools and detection of vulnerabilities of the computer system implementing those that adapt to computer security specifications. - Apply procedures related to compliance with current legal regulations. - Plan and apply security measures to guarantee the integrity of the computer system and the entry and exit points of the departmental network. - Provide students with the basic guidelines for the application of the ISO/IEC 27001 standard within their organization. - Offer the guidelines to implement a information security management system based on the ISO/IEC 27001 standard following the controls recommended by the ISO/IEC 27002 standard in their respective clauses. - Expose and explain a series of good practices to achieve information security. - Analyze the organization's implementation plans to identify the elements of the system involved and the security levels to be implemented. - Analyze and implement physical and logical access mechanisms to servers according to security specifications. - Evaluate the function and need of each service in execution on the server according to security specifications. - Install, configure and manage a server firewall with the necessary characteristics according to security specifications. - Plan and implement intruder detection systems according to safety standards. - Apply the information analysis procedures and containment of the attack before an incidence detected. - Analyze the scope of the damage and determine the recovery processes before an incidence detected. - Evaluate existing encryption techniques to choose the necessary based on the required security requirements. - Implement services and cryptographic techniques in those services that require it according to computer security specifications. - Use digital certificate systems in those communications that require integrity and confidentiality according to security specifications. - Design and implement digital certification services according to exploitation and computer security needs. - Know the precise definition of the different types of hackers and their objectives. - Learn about the methodology of an attack and the means to identify vulnerabilities or security failures through which to enter a system. - Know the physical failures, which allow direct access to computers, and the network and Wi-Fi failures are presented and illustrated by the countermeasures. - Know about cloud computing (its history, its operation) to better master security. - Take into account the security on the web and the current identified failures thanks to the help of tools that the reader can easily implement in their own systems. - Always identify the possible failures to establish the proper protection strategy later. - Know some examples the failures of systems in Windows or Linux and application failures, to familiarize themselves with assembly language and better understand attack possibilities.

Professional opportunities

It develops its professional activity in the Systems Area of the Department of Computer Science of Public or Private Companies that use computer equipment, performing auditing, configuration and issues related to computer security, both on behalf of others and on their own.

To prepare you

This Master in Computer Audit prepares you to analyze and select the audit and detection tools of the computer system by implementing those that are adapted to the computer security specifications, apply procedures related to compliance with current legal regulations and plan and apply security measures to guarantee the integrity of the computer system and the entry and exit points of the departmental network.

Who is it addressed to?

This Master in computer audit offers you a specialized training in the field. We must know that today computer security is a very important and sensitive issue, which covers a great set of aspects in continuous change and constant evolution, which requires that computer professionals have fully updated knowledge. With the realization of the present master in computer audit, the student will learn the necessary knowledge to audit communication networks and computer systems.

Methodology

Our methodology combines technology, pedagogy and empathy for learning tailored to you.

You set the pace, decide the path and artificial intelligence accompanies you so that you learn better, with meaning and purpose.

Truly personalized learning

Your style, interests and level define the route. You are the starting point.

Constructivism in action

Explore, experiment and apply. Learning means understanding, not memorizing.

AI that accompanies you, not directs you

PHIA, our artificial intelligence assistant guides you without limiting your autonomy.

Evaluation without pressure

Continuous and adaptive feedback. Because learning is a process, not a number.

Certification

Logo certificado-1
Logo certificado-2

Multiple degree: - Master's degree in computer audit with 1500 hours issued and endorsed by the European Institute of Business Studies - University Higher University Degree in I IT Computer Security Consultant: Ethical Hacking with 8 ECTS university credits. Continuous Baumable Training in Work Stock Exchanges and Contests of Public Administration.

Logo certificado-1 Logo certificado-2

Scholarships

EducaHub Scholarships

Make your training more accessible: finance at 0% interest and obtain personalized scholarships.

At EducaHub we believe that education should be available to everyone. For this reason, we offer a Scholarship Plan that facilitates your access to practical, current and quality training, eliminating economic barriers.

-25%

Alumni Scholarship: for former EducaHub students.

-20%

Unemployment Scholarship: if you prove that you are unemployed.

-20%

Large Family Scholarship: for families with 3 or more children.

-20%

Disability Scholarship: for people with disabilities ≥33%.

-15%

Emprende Scholarship: for self-employed workers who can prove their activity.

-15%

Recommended Scholarship: if you come recommended by a former student.

-15%

Group Scholarship: for joint registrations of 3 or more people.

An entire educational universe, on a single platform.

An intuitive environment with AI that guides you to train autonomously and with purpose.

Learn more

Learn at your pace

Courses, master's degrees and official qualifications. 100% online, flexible and at your pace.

Access from anywhere

Available 24/7 on mobile, tablet or PC. You decide when and how to train.

Phia, your AI mentor

It challenges you, motivates you and personalizes your path. Learn with a guide that evolves with you.

LX One Plus: Training without limits

Unlock soft skills, languages ​​and more. Move towards comprehensive and continuous training.