We may earn an affiliate commission when you visit our partners.
Course image
Sandra Julieta Rueda Rodríguez, Harold Enrique Castro Barrera, Juan Diego Jimenez, Yezid Enrique Donoso Meisel, and Carlos Andrés Lozano Garzón

Las organizaciones cada vez tienen procesos más complejos, los cuales son soportados en su mayoría a través de las tecnologías de la información y las comunicaciones (TIC). Debido a la alta dependencia de las TIC, cada vez se presentan más ataques informáticos poniendo en riesgo a las organizaciones. Por estas razones cada vez es más necesario que las personas desarrollen habilidades y conocimientos en seguridad de la información. En este curso justamente analizaremos el diseño de una arquitectura de seguridad en la red de computadores y diferentes controles se seguridad tanto en la red como en el host. Finalmente, se analizará los conceptos fundamentales de computación forense y el manejo de incidentes.

Read more

Las organizaciones cada vez tienen procesos más complejos, los cuales son soportados en su mayoría a través de las tecnologías de la información y las comunicaciones (TIC). Debido a la alta dependencia de las TIC, cada vez se presentan más ataques informáticos poniendo en riesgo a las organizaciones. Por estas razones cada vez es más necesario que las personas desarrollen habilidades y conocimientos en seguridad de la información. En este curso justamente analizaremos el diseño de una arquitectura de seguridad en la red de computadores y diferentes controles se seguridad tanto en la red como en el host. Finalmente, se analizará los conceptos fundamentales de computación forense y el manejo de incidentes.

El curso Seguridad en la Red busca que aprendas sobre la arquitectura de ciberseguridad para la red de datos con miras a implementar diferentes controles para la defensa de la red de computadores, el host y el manejo de incidentes.

Este curso está pensado para personas de diferentes disciplinas que quieren adentrarse en el mundo de la gerencia de proyectos, pero que saben que por las condiciones actuales que rodean los proyectos se hace necesario adquirir bases en la dimensión de la complejidad para la gestión de estos. Este curso está pensado para personas con por lo menos un título de pregrado con conocimientos intermedios en matemáticas. El aspirante a tomar este curso puede provenir de cualquier campo del conocimiento, desde el gobierno, la industria, la consultoría y la academia.

Este curso está pensado para personas de diferentes disciplinas que quieren iniciar o fortalecer sus conocimientos en seguridad en la red de computadores. Se recomienda que este curso lo tomen personas con cierto grado de conocimiento y experticia en el área de las TIC.

Enroll now

What's inside

Syllabus

Arquitectura de Ciberseguridad en la Red de Computadores y en la Nube
Te damos la bienvenida al primer módulo del curso. En este módulo nos enfocaremos en conocer acerca de la arquitectura de la ciberseguridad en la red de computadores y en la nube. Para ello avanzaremos en consultar videos, lecturas y recursos interactivos, para luego animarte a completar un cuestionario de conocimientos adquiridos.
Read more
La ciberdefensa en la red
Bienvenidos al segundo módulo del curso. Durante este módulo aprenderemos acerca del funcionamiento de control de ciberseguridad en la red de computadores, los procesos y estrategia de defensa de la red, y estudiaremos acerca de las diferentes aproximaciones de la defensa de la red. Para ello nos enfocaremos en dos lecciones principales sobre principios de ciberseguridad y sus controles perimetrales y de red.
Seguridad en el Host
Bienvenidos al tercer módulo del curso. Durante este módulo estudiaremos la problemática de seguridad en el host y las medidas de seguridad que es posible implementar para mitigar los problemas. Host es un término que generalmente usamos para referirnos a un computador conectado a una red, pero también podría representar otros dispositivos con capacidad de cómputo. Este es un tema de interés tanto para las personas como para las organizaciones; para una persona las medidas de seguridad que pueda implementar en su propio computador (host) protegen sus datos y el acceso a servicios en línea, para una organización las medidas de seguridad implementadas en un host protegen los datos almacenados en ese equipo y pueden contribuir a la seguridad de la red interna de una organización y de otros equipos en esa red.
Cómputo Forense
Te damos la bienvenida al cuarto y último módulo de nuestro curso. En este módulo aprenderemos acerca del cómputo forense, sus métodos y procedimientos además de los procesos de recolección, adquisición y preservación de videncia digital. Avancemos hacia las actividades propuestas.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Pensado para personas con disciplina variada que quieren conocer la gerencia de proyectos con conceptos de complejidad para la gestión de estos
Recomendado para personas con conocimientos intermedios en matemáticas y al menos con título pregrado
Tiene en cuenta los conocimientos y experiencias de las TIC y la ciberseguridad

Save this course

Save Seguridad en la red to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Seguridad en la red with these activities:
Participate in a cybersecurity study group
Engage with peers to discuss course concepts, share knowledge, and support each other's learning.
Show steps
  • Join or form a study group with other students in the course.
  • Meet regularly to discuss course material, work on assignments, and prepare for exams.
Follow tutorials on incident response and recovery
Follow tutorials on incident response and recovery to learn how to respond to and recover from security incidents.
Browse courses on Incident Response
Show steps
  • Identify resources for incident response and recovery
  • Develop an incident response plan
  • Practice incident response and recovery procedures
Practice network security configuration
Gain hands-on experience in configuring and managing network security devices.
Browse courses on network security
Show steps
  • Set up a virtual network environment using a tool like GNS3 or EVE-NG.
  • Install and configure a firewall on the virtual network.
  • Configure network monitoring tools to track network traffic and identify potential threats.
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Practice configuring firewalls and intrusion detection systems
Configure firewalls and intrusion detection systems to protect your network from unauthorized access and malicious activity.
Browse courses on Firewalls
Show steps
  • Configure firewall rules to allow legitimate traffic and block unauthorized access
  • Configure intrusion detection systems to monitor network traffic for suspicious activity
  • Test firewall and intrusion detection system configurations to ensure they are working properly
Explora la protección contra Malware
Mejora tus conocimientos sobre protección contra malware siguiendo tutoriales guiados que cubren técnicas y herramientas avanzadas.
Show steps
  • Busca tutoriales sobre diferentes tipos de malware y técnicas de protección.
  • Sigue los pasos descritos en los tutoriales para implementar medidas de protección contra malware.
  • Practica el uso de herramientas de detección y eliminación de malware.
Attend workshops on network security best practices
Attend workshops to learn about the latest network security best practices and trends.
Browse courses on network security
Show steps
  • Identify workshops on network security best practices
  • Register for and attend workshops
  • Take notes and ask questions during workshops
Design a network security architecture for a small business
Apply your knowledge to design a comprehensive security architecture for a real-world scenario.
Browse courses on Security Architecture
Show steps
  • Identify the security requirements and constraints of the small business.
  • Design a network topology and select appropriate security devices.
  • Develop a security policy and procedures.
Attend a workshop on cloud security
Gain exposure to practical cloud security techniques and industry best practices.
Browse courses on Cloud Security
Show steps
  • Identify and register for relevant cloud security workshops.
  • Actively participate in the workshop and take notes.
  • Apply the knowledge gained to your own projects or work environment.
Create a network security plan
Create a comprehensive network security plan that outlines your security policies, procedures, and measures to protect your network infrastructure and data from cyber threats.
Browse courses on network security
Show steps
  • Review and update security plan regularly
  • Identify assets and vulnerabilities
  • Define security objectives and risk tolerance
  • Develop security strategies and controls
  • Implement and monitor security measures
Explore advanced intrusion detection techniques
Enhance your understanding of advanced security techniques to detect and respond to cyber threats.
Browse courses on Intrusion Detection
Show steps
  • Find online tutorials or courses on advanced intrusion detection technologies.
  • Follow the tutorials and complete the practice exercises.
  • Apply the techniques to analyze real-world security data.
Participate in peer review sessions on network security designs
Participate in peer review sessions to get feedback on your network security designs and learn from others.
Browse courses on network security
Show steps
  • Identify peers with expertise in network security
  • Schedule peer review sessions
  • Present your network security designs to your peers
Diseña un Plan de Incidentes de Seguridad
Solidifica tus habilidades para responder a incidentes de seguridad creando un plan integral que describa los procedimientos de respuesta.
Show steps
  • Investiga las mejores prácticas para el manejo de incidentes de seguridad.
  • Identifica los posibles tipos de incidentes de seguridad que tu organización puede enfrentar.
  • Desarrolla un plan detallado que describa los roles, responsabilidades y procedimientos para responder a incidentes.

Career center

Learners who complete Seguridad en la red will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. They also monitor and analyze security threats and vulnerabilities, and respond to security incidents. This course may be useful for Information Security Analysts because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Security Engineer
Security Engineers work to protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They design, implement, and maintain security measures, such as firewalls, intrusion detection systems, and encryption. This course may be useful for Security Engineers because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Cybersecurity Analyst
Cybersecurity Analysts analyze and interpret data to identify and mitigate cybersecurity threats. They also develop and implement security measures to protect an organization's computer networks and systems. This course may be useful for Cybersecurity Analysts because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer networks and systems from security threats. They assess security risks, develop security plans, and implement security measures. This course may be useful for Security Consultants because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Incident Responder
Incident Responders investigate and respond to security incidents. They work with other IT professionals to contain the damage caused by security breaches, and to restore the organization's computer networks and systems to normal operation. This course may be useful for Incident Responders because it provides an overview of the process for responding to security incidents, including the different steps involved in collecting, analyzing, and preserving digital evidence.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain the security of an organization's computer networks and systems. They work with other IT professionals to ensure that the organization's information systems and data are protected from security threats. This course may be useful for Cybersecurity Engineers because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain the security of an organization's cloud computing environment. They work with other IT professionals to ensure that the organization's cloud-based applications and data are protected from security threats. This course may be useful for Cloud Security Engineers because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Information Technology Auditor
Information Technology Auditors assess the security of an organization's computer networks and systems. They work with other IT professionals to identify and mitigate risks to the organization's information systems and data. This course may be useful for Information Technology Auditors because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Network Security Analyst
Network Security Analysts monitor and analyze network traffic to identify and prevent security threats. They also develop and implement security policies and procedures, and respond to security breaches. This course may be useful for Network Security Analysts because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Security Architect
Security Architects design, implement, and maintain the security infrastructure for an organization. They work with other IT professionals to ensure that the organization's information systems and data are protected from security threats. This course may be useful for Security Architects because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Cybersecurity Manager
Cybersecurity Managers are responsible for the overall security of an organization's computer networks and systems. They work with other IT professionals to develop and implement security policies and procedures, and to ensure that the organization's computer networks and systems are protected from security threats. This course may be useful for Cybersecurity Managers because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
IT Security Manager
IT Security Managers are responsible for the overall security of an organization's information technology (IT) environment. They work with other IT professionals to develop and implement security policies and procedures, and to ensure that the organization's IT systems and data are protected from security threats. This course may be useful for IT Security Managers because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Security Operations Manager
Security Operations Managers oversee the day-to-day operations of an organization's security program. They work with other IT professionals to ensure that the organization's security policies and procedures are being followed, and that the organization's computer networks and systems are protected from security threats. This course may be useful for Security Operations Managers because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Information Assurance Analyst
Information Assurance Analysts assess and mitigate risks to an organization's information systems and data. They work with other IT professionals to develop and implement security policies and procedures, and to ensure that the organization's information systems and data are protected from security threats. This course may be useful for Information Assurance Analysts because it provides an overview of the architecture of cybersecurity in computer networks and the cloud, as well as the different controls that can be implemented to protect networks and hosts.
Computer Forensic Investigator
Computer Forensic Investigators collect, analyze, and preserve digital evidence in order to investigate computer crimes. They also testify in court as expert witnesses. This course may be useful for Computer Forensic Investigators because it provides an overview of computer forensics, including the methods and procedures for collecting, acquiring, and preserving digital evidence.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Seguridad en la red.
Este libro es un texto integral que cubre una amplia gama de temas de seguridad en redes y sistemas, incluyendo cortafuegos, sistemas de detección de intrusiones y criptografía. Es una referencia valiosa para profesionales de seguridad y para aquellos que buscan una comprensión profunda del campo.
Este libro ofrece una visión general de la seguridad en la nube, abarcando conceptos como arquitectura de seguridad en la nube, controles de seguridad y cumplimiento normativo. Es una lectura valiosa para aquellos que buscan comprender los riesgos y las mejores prácticas de seguridad en entornos de nube.
Este libro ofrece un enfoque práctico para la ingeniería de seguridad, destacando principios como el diseño seguro, la gestión de riesgos y la respuesta a incidentes. Es una lectura esencial para arquitectos de sistemas y desarrolladores que buscan crear sistemas seguros y confiables.
Este libro proporciona una preparación completa para el examen CompTIA Network+, cubriendo conceptos de seguridad de redes y tecnologías relacionadas.
Este libro es un estudio oficial para la certificación CEH v11, brindando información detallada sobre técnicas y herramientas de hacking ético.
Este libro proporciona una visión general de las técnicas de hacking y explotación, incluyendo vulnerabilidades de software, inyección de código y malware. Es una lectura fascinante para aquellos que buscan comprender cómo los atacantes aprovechan las debilidades de los sistemas informáticos.
Este libro es un texto completo sobre informática forense, cubriendo la recolección, preservación y análisis de evidencia digital. Es una referencia valiosa para investigadores forenses y para aquellos que buscan comprender los procesos y técnicas de la informática forense.
Este libro proporciona una visión técnica de las técnicas de hacking, cubriendo la explotación de vulnerabilidades y el análisis de malware.
Este libro ofrece una guía integral para la gestión de riesgos de seguridad, cubriendo principios como la evaluación de riesgos, la mitigación de riesgos y la gestión de incidentes. Es una lectura valiosa para profesionales de seguridad que buscan implementar marcos de gestión de riesgos efectivos.
Este libro proporciona una guía sobre el modelado de amenazas, una técnica para identificar y mitigar vulnerabilidades de seguridad en sistemas de información.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Seguridad en la red.
Redes de computadores
Most relevant
Competencias digitales. Conceptos y herramientas básicas
Most relevant
Sistemas Digitales: De las puertas lógicas al procesador
Most relevant
Logística Básica Agrícola
Most relevant
Sexualidad y educación
Most relevant
Aruba Network Security Basics for Spanish Speakers
Most relevant
Tecnología accesible para la inclusión
Most relevant
Trazabilidad: la clave de la eficiencia logística
Most relevant
El Convenio Multilateral Iberoamericano de Seguridad...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser