TECHNOLOGY PROGRAM

Cybersecurity, Safety & Security Engineering

Stability and safety in a connected world

PROGRAM
DESCRIPTION

We are all connected and data is flowing around like never before. Keeping data secure and safe is a key component of every modern organisation and with ever more digital opportunities the bigger the challenge of securing an organisation becomes. That’s why the demand for security experts is ever increasing and one of the most important job profiles of the future.

In this program you will learn how to identify security risks and vulnerabilities in cybersystems. The program focuses not only on the technical aspects but also on user threats and risks. This program teaches you how to design secure systems and gives you a holistic understanding of cybersecurity.

REQUEST INFORMATION

KEY-FACTS

For Organisations

  • Duration: 5 month online plus 2 weeks on campus
  • Style: Lectures & Workshops
  • Location: Online plus GILT Barcelona Campus
  • Participants: For up to 20 participants
  • GILT certification at the end of the program

For Individuals

  • Duration: 5 month online plus 2 weeks on campus
  • Style: Lectures & Workshops
  • Location: Online plus GILT Barcelona Campus
  • Intake: Individual announcement
  • Participants: Maximum 50 participants
  • GILT certification at the end of the program

PROGRAM HIGHLIGHTS

# 1

CYBERSECURITY 101

Learn the basics of cybersecurity and how to create safe systems.

# 2

HACKING

Become a hacker of good and learn how to identify weak spots in systems.

# 3

APPLIED LEARNING

You will attack and secure a real company to deepen your learning.

# 4

AN IN DEMAND SKILL

Cybersecurity experts are much needed in all organisations and is one of the critical job profiles of the future.

# 5

SOCIAL HACKING

Cybersecurity is not just systems it’s also about people and communication.

# 6

HOLISTIC SECURITY

Learn the big picture of cybersecurity and how to develop security measures.

PROGRAM CURRICULUM

  • How a server architecture is working
  • Linux fundamentals
  • Programming fundamentals
  • SQL injection
  • Cross site scripting
  • Command injection
  • Xml external entity
  • Tools
  • Symmetrical and asymmetrical encryption
  • Digital signatures
  • Public key infrastructure
  • Hashing
  • Hands onto cryptography
  • ISO osi
  • TCP ip
  • Key exchange
  • Tls
  • Ipsec and Kerberos
  • How passwords are stored
  • Wordlists
  • Cracking
  • Week 1: Applying system hacking and social manipulation mechanisms to hack systems
  • Week 2: Applying security engineering rules to minimise risks
  • Security Engineering
  • Risk Management
  • Social Engineering
  • Access Control
  • Blockchain Foundations