Master in computer audit + university degree

Institución Educativa
Mode On-line
Duration 1500 hours
Credits 8 ECTS
Languages Spanish
C$78,691.00
Pago en cuotas sin intereses Acceso para siempre para consultar tu curso

Request information

Reconocidos por
Acreditados por

Plan de estudios

Summary

This Master in computer audit offers you a specialized training in the field. We must know that today computer security is a very important and sensitive issue, which covers a great set of aspects in continuous change and constant evolution, which requires that computer professionals have fully updated knowledge. With the realization of the present master in computer audit, the student will learn the necessary knowledge to audit communication networks and computer systems.

Goals

- Analyze and select the audit tools and detection of vulnerabilities of the computer system implementing those that adapt to computer security specifications. - Apply procedures related to compliance with current legal regulations. - Plan and apply security measures to guarantee the integrity of the computer system and the entry and exit points of the departmental network. - Provide students with the basic guidelines for the application of the ISO/IEC 27001 standard within their organization. - Offer the guidelines to implement a information security management system based on the ISO/IEC 27001 standard following the controls recommended by the ISO/IEC 27002 standard in their respective clauses. - Expose and explain a series of good practices to achieve information security. - Analyze the organization's implementation plans to identify the elements of the system involved and the security levels to be implemented. - Analyze and implement physical and logical access mechanisms to servers according to security specifications. - Evaluate the function and need of each service in execution on the server according to security specifications. - Install, configure and manage a server firewall with the necessary characteristics according to security specifications. - Plan and implement intruder detection systems according to safety standards. - Apply the information analysis procedures and containment of the attack before an incidence detected. - Analyze the scope of the damage and determine the recovery processes before an incidence detected. - Evaluate existing encryption techniques to choose the necessary based on the required security requirements. - Implement services and cryptographic techniques in those services that require it according to computer security specifications. - Use digital certificate systems in those communications that require integrity and confidentiality according to security specifications. - Design and implement digital certification services according to exploitation and computer security needs. - Know the precise definition of the different types of hackers and their objectives. - Learn about the methodology of an attack and the means to identify vulnerabilities or security failures through which to enter a system. - Know the physical failures, which allow direct access to computers, and the network and Wi-Fi failures are presented and illustrated by the countermeasures. - Know about cloud computing (its history, its operation) to better master security. - Take into account the security on the web and the current identified failures thanks to the help of tools that the reader can easily implement in their own systems. - Always identify the possible failures to establish the proper protection strategy later. - Know some examples the failures of systems in Windows or Linux and application failures, to familiarize themselves with assembly language and better understand attack possibilities.

Professional exits

It develops its professional activity in the Systems Area of the Department of Computer Science of Public or Private Companies that use computer equipment, performing auditing, configuration and issues related to computer security, both on behalf of others and on their own.

To prepare you

This Master in Computer Audit prepares you to analyze and select the audit and detection tools of the computer system by implementing those that are adapted to the computer security specifications, apply procedures related to compliance with current legal regulations and plan and apply security measures to guarantee the integrity of the computer system and the entry and exit points of the departmental network.

Who is it addressed

This Master in computer audit offers you a specialized training in the field. We must know that today computer security is a very important and sensitive issue, which covers a great set of aspects in continuous change and constant evolution, which requires that computer professionals have fully updated knowledge. With the realization of the present master in computer audit, the student will learn the necessary knowledge to audit communication networks and computer systems.

Methodology

Our methodology combines technology, pedagogy and empathy for a tailored learning.

You mark the rhythm, you decide the way and an artificial intelligence accompanies you to learn better, with meaning and purpose.

Realized personalized learning

Your style, interest and level define the route. You are the starting point.

Constructivism in action

Explore, experience and apply. Learning means understanding, not memorizing.

He who accompanies you, not who directs you

Phia, our artificial intelligence assistant guides you without limiting your autonomy.

Evaluation without pressure

Continuous and adaptive feedback. Because learning is a process, not a figure.

Certificación

Logo certificado-1
Logo certificado-2

Multiple degree: - Master's degree in computer audit with 1500 hours issued and endorsed by the European Institute of Business Studies - University Higher University Degree in I IT Computer Security Consultant: Ethical Hacking with 8 ECTS university credits. Continuous Baumable Training in Work Stock Exchanges and Contests of Public Administration.

Logo certificado-1 Logo certificado-2

Scholarships

EDUCAHUB Scholarships

Make your most accessible training: Finish 0% interest and get personalized scholarships.

In Eduahub we believe that education must be available to everyone. Therefore, we offer a scholarship plan that facilitates your access to practical, current and quality training, eliminating economic barriers.

-25%

Alumni Scholarship: For former students of Eduahub.

-20%

Unemployment scholarship: if you prove to be unemployed.

-20%

Numerous family scholarship: for families with 3 or more children.

-20%

Disability scholarship: For people with disabilities ≥33%.

-15%

Emprende Scholarship: For self -employed that accredit your activity.

-15%

Scholarship recommends: If you come recommended by an alumnus.

-15%

Group scholarship: For joint inscriptions of 3 or more people.

An entire educational universe, on a single platform.

An intuitive environment that guides you to form autonomously and with purpose.

Know more

Learn at your pace

Courses, masters and official degrees. 100% online, flexible and at your pace.

Access from anywhere

Available 24/7 on mobile, tablet or PC. You decide when and how to train.

Phia, your mentor ia

It challenges you, motivates you and customizes your path. Learn with a guide that evolves with you.

LX One Plus: Without limit formation

Unlock soft skills, languages and more. Advances towards integral and continuous formation.