Online Course – Google Certified Professional Internship in Cybersecurity, Universidad de los Andes

Developing effective cybersecurity strategies. Implementing basic procedures for identifying threats and information vulnerabilities and implementing effective solutions in organizations.

Suggested by: Coursera (What is Coursera?)

Professional Certificate

Beginners

No prior knowledge required

Time to complete the course

7-day free trial

No unnecessary risks

Skills you will acquire in the course

  • Basic knowledge of information security and network security.
  • Ability to identify threats and vulnerabilities in organizations.
  • Implementing various controls to protect the computer network and servers.
  • Information security incident management.
  • Identifying security requirements in the case of TodoVpiaInternet.
  • Identifying vulnerabilities and cyber threats at BuyME, including processes for collecting information, collecting evidence, and protecting the network.

What you will learn in the course

Courses for which the course is suitable

  • Information Security Specialist
  • Cyber ​​Security Manager
  • Information Security Analyst
  • Information Security Incident Manager
  • Information Security Consultant
  • Information security solutions developer
  • Cyber ​​person in the organization
  • Network administrator with specialization in information security
  • Cyber ​​Threat and Risk Researcher

Internship – 3-part course series

Today more than ever, protecting information assets is a vital need for all organizations. The economic and reputational losses make this need very significant, both at a strategic and technological level.

On the other hand, employment opportunities in this field continue to grow, leading to the need for training in both knowledge and professional skills in the cyber field.

Curriculum

  • Basic knowledge of information security and network security.
  • Ability to identify threats and vulnerabilities in organizations.
  • Implementing various controls to protect the computer network and servers.
  • Information security incident management.

Applied Learning Project

Through case analysis and the development of practical activities, the student develops basic processes that will allow him to identify threats, vulnerabilities, and information security solutions in organizations.

Course topics

  • Course 1: Identifying security requirements in the case of TodoVpiaInternet.
  • Courses 2 and 3: Identifying vulnerabilities and cyber threats at BuyME, including processes for gathering information, collecting evidence, and protecting the network.

Details of the courses that make up the specialization

Information security principles and regulations

Course 1

16 hours
4.7 (258 ratings)

What you’ll learn

  • Identify common information security requirements and the steps required for security
  • Understanding the processes required to define, develop, and implement information security policies and procedures in an organization
  • Knowledge of key regulatory requirements regarding personal information security
  • Identifying the characteristics and phenomena of cybercrime and new trends in the field

The skills you will gain

  • Identifying information security requirements and the steps required to meet these requirements
  • Description of cybercrime and new trends
  • Identify regulatory requirements regarding the security of personal information

Vulnerabilities and Penetration Testing

Course 2

18 hours
4.6 (88 ratings)

What you’ll learn

  • Identifying vulnerabilities and threats of cyber attacks
  • Understanding the steps required to perform system penetration testing
  • Understanding common vulnerabilities of systems, networks, and servers
  • Description of concrete cases of attacks on various components in systems

The skills you will gain

  • Identifying steps for conducting system penetration tests
  • Description of concrete cases of attacks on various components in systems
  • Identifying common vulnerabilities in systems, networks, and servers
  • Identifying vulnerabilities and threats from cyber attacks

Network security

Course 3

16 hours
4.8 (82 ratings)

What you’ll learn

  • Identify the fundamentals of cyber security architecture in the network and cloud
  • Understanding the basic operation of controlling cyber security on the network
  • Understanding the general principles of computer security
  • Understanding digital investigation processes, identifying, collecting, acquiring, and preserving digital evidence

The skills you will gain

  • Digital evidence analysis and digital aggravation
  • Identifying network security components
  • Identifying and securing computer operating systems
  • Identifying cybersecurity architectures