We may earn an affiliate commission when you visit our partners.
Course image
Daniel Orlando Díaz Lopez and Valérie Gauthier Umaña

La ciberseguridad ha tomado una especial relevancia en el mundo moderno por su capacidad de proteger información frente a ataques cibernéticos, convirtiéndose en una de las áreas de mayor empleabilidad hoy en día.

Este curso te brindará una visión completa de la ciberseguridad al permitirte aprender lo esencial de varios de sus principales subdominios: seguridad en el desarrollo de software, la criptografía, el hacking ético y la informática forense.

Aprende a través de metodologías de enseñanza dinámicas ofrecidas por la Escuela de ingeniería, Ciencia y Tecnología de la Universidad del Rosario (Colombia).

Read more

La ciberseguridad ha tomado una especial relevancia en el mundo moderno por su capacidad de proteger información frente a ataques cibernéticos, convirtiéndose en una de las áreas de mayor empleabilidad hoy en día.

Este curso te brindará una visión completa de la ciberseguridad al permitirte aprender lo esencial de varios de sus principales subdominios: seguridad en el desarrollo de software, la criptografía, el hacking ético y la informática forense.

Aprende a través de metodologías de enseñanza dinámicas ofrecidas por la Escuela de ingeniería, Ciencia y Tecnología de la Universidad del Rosario (Colombia).

What you'll learn

● Identificar los conceptos básicos de ciberseguridad que te permitirán entender el resto de módulos del curso

● Reconocer y analizar vulnerabilidades en un servicio web como lo haría un hacker ético

● Realizar la inspección forense de un malware utilizando los principios de la informática forense

● Identificar y corregir vulnerabilidades en el código fuente de un software

● Conocer criptosistemas de la antigüedad y de la era moderna.

● Entender criptosistemas modernos y el funcionamiento de algunas primitivas como funciones de hash y blockchain.

What's inside

Syllabus

Semana 1. Conceptos básicos de ciberseguridad
● La trivia de la seguridad
● Arquitecturas AAA
● Subdominios de la ciberseguridad
Read more
Semana 2. Seguridad en el desarrollo de software
● Seguridad para aplicaciones
● Software seguro
● Requerimientos de seguridad
● Caso de uso: hora de examinar malware
Semana 3. Hacking ético
● ¿Qué es el hacking ético?
● ¿Cómo se hace el hacking ético?
● Software de aprendizaje
● Caso de uso: hora de hackear
Semana 4. Informática Forense
● Informática forense y ciberdelitos
● Malware
● Caso de uso: diseño software seguro
Semana 5. Criptografía
● Criptografía: el arte guardar y compartir secretos
● Criptografía moderna
● Blockchain y funciones de hash
● Criptografía post-cuántica

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Estudia metodologías de enseñanza dinámicas ofrecidas por la Escuela de ingeniería, Ciencia y Tecnología de la Universidad
Investigará vulnerabilidades en un servicio web como lo haría un pirata informático ético
Fortalece las habilidades centrales necesarias para convertirse en un profesional empleable
Brinda una visión completa de la Ciberseguridad, cubriendo sus principales subdominios
Requiere que los estudiantes tengan acceso a una computadora e Internet, lo que puede ser una barrera para algunos
El programa de estudios solo cubre los conceptos básicos de ciberseguridad

Save this course

Save Introducción a la ciberseguridad to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Introducción a la ciberseguridad with these activities:
Review statistics and probability
Get a strong refresh statistics and probability, which are fundamental to understanding cybersecurity
Browse courses on Statistics
Show steps
  • Review formulas and equations
  • Solve practice problems
Read seminal works in cryptography
This activity will help to enhance foundational knowledge in cryptography
Show steps
  • Choose a seminal work on cryptography
  • Read the work carefully taking notes as you go
  • Summarize the key concepts in your own words
Develop a cybersecurity glossary
This activity will help to solidify understanding of the concepts and terms used in cybersecurity.
Browse courses on Cybersecurity Terminology
Show steps
  • Compile a list of cybersecurity terms
  • Define each term in a clear and concise way
  • Organize the terms alphabetically or by category
Six other activities
Expand to see all activities and additional details
Show all nine activities
Follow tutorials on ethical hacking techniques
This hands-on activity will help you to develop proficiency in ethical hacking.
Browse courses on Ethical Hacking
Show steps
  • Find tutorials on ethical hacking techniques
  • Follow the tutorials step by step
  • Practice the techniques in a safe and controlled environment
Practice identifying security vulnerabilities
Identify security vulnerabilities to become familiar with different types of threats
Browse courses on Security Vulnerabilities
Show steps
  • Use a web vulnerability scanner to scan a website or application
  • Use a code analysis tool to review source code and identify vulnerabilities
Practice web security challenges
Will help students to develop hands-on experience in identifying and exploiting web vulnerabilities.
Browse courses on Web Security
Show steps
  • Find a platform that provides web security challenges
  • Start solving challenges and practicing techniques
  • Review and understand the solutions to improve your skills
Design and implement a security policy for a small business
This activity will provide students the opportunity to apply their knowledge and skills to a practical scenario.
Browse courses on Security Policy
Show steps
  • Identify the assets and risks of a small business
  • Develop a security policy that addresses the identified risks
  • Implement the security policy and monitor its effectiveness
Create a cybersecurity risk assessment guide
Conduct a realistic cybersecurity risk assessment for a specific organization or scenario
Show steps
  • Identify the organization's assets and threats
  • Analyze the risks and vulnerabilities
  • Develop and implement mitigation strategies
Volunteer with a cybersecurity organization
Get hands-on experience with security issues and network with professionals
Browse courses on Volunteering
Show steps
  • Find a cybersecurity organization to volunteer with
  • Help with security events, workshops, or awareness campaigns

Career center

Learners who complete Introducción a la ciberseguridad will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts are responsible for maintaining information security. They may work for corporations or consulting agencies. Cybersecurity Analysts conduct risk assessments, evaluate security measures, and monitor networks for potential threats. The course Introducción a la ciberseguridad will help build a foundation in cybersecurity topics, such as hacking ethics, forensic informatics, cryptography, and software security. These topics are integral to the day-to-day duties of a Cybersecurity Analyst.
Information Security Analyst
Similar to Cybersecurity Analysts, Information Security Analysts are responsible for identifying, assessing, and mitigating cybersecurity risks. They may also design and implement security policies. This course, Introducción a la ciberseguridad, provides a strong foundation in the relevant topics of cybersecurity, such as software security, cryptography, and hacking ethics. Information Security Analysts may find it particularly helpful to explore the "Hacking ético" module.
Computer Forensic Analyst
Computer Forensic Analysts are responsible for the investigation and analysis of computer systems and media for digital evidence. They may be involved in cybersecurity investigations, detecting unauthorized software and device usage, and recovering compromised data. While this course, Introducción a la ciberseguridad, is not a replacement for a formal degree program, topics such as "Informática Forense" and "Criptografía" will be very helpful to Computer Forensic Analysts in their work
Incident Responder
Incident Responders are responsible for responding to security incidents such as data breaches and malware attacks. They may work for corporations or consulting agencies. Incident Responders typically have a background in information security or cybersecurity. The course Introducción a la ciberseguridad is a great fit for professionals investigating a career in Incident Response as it covers the fundamentals of cybersecurity principles, including forensics and software security.
Software Developer
Software Developers are naturally fit for a course such as Introducción a la ciberseguridad. This is because these professionals are regularly designing and implementing software solutions. Software Developers who are familiar with cybersecurity principles and methodologies are able to design more secure software applications. In particular, topics such as "Seguridad en el desarrollo de software" and "Criptografía" are highly relevant to the Software Developer role.
Malware Analyst
Malware Analysts investigate and analyze malware, such as viruses and trojan horses, and develop countermeasures to protect against them. This course, Introducción a la ciberseguridad, will help build a foundation in malware analysis, particularly the modules "Informática Forense" and "Seguridad en el desarrollo de software".
Network Security Engineer
Network Security Engineers plan, implement, and administer computer networks, their security features, and their security policies. Many Network Security Engineers have a background in either cybersecurity or IT. Información a la ciberseguridad provides an introduction to a number cybersecurity topics, such as cryptography and ethical hacking, that will be immediately recognizable to Network Security Engineers.
Penetration Tester
Penetration Testers are hired to conduct simulated cyberattacks on computer systems, networks, and web applications to find security vulnerabilities that malicious hackers could exploit. This course, Introducción a la ciberseguridad, may be helpful for Penetration Testers who want to build a foundation for their work, particularly the module "Hacking ético".
Security Architect
Security Architects are responsible for the design and implementation of an organization's security infrastructure. They work with other IT professionals to ensure that the organization's information systems are secure. The course Introducción a la ciberseguridad will be a helpful starting point for those wishing to enter this field, as it covers the essential topics in cybersecurity, such as software security, cryptography, and ethical hacking.
Cybersecurity Consultant
Cybersecurity Consultants provide advice and guidance to organizations on how to protect their information systems from cyberattacks. They may also help organizations to develop and implement cybersecurity policies and procedures. This course Introducción a la ciberseguridad will be helpful as a foundation for those who wish to pursue Cybersecurity Consulting, as it provides an introduction to the fundamentals of cybersecurity.
Ethical Hacker
Ethical Hackers are employed to try to penetrate networks and software systems so as to identify vulnerabilities. In this way, businesses and organizations can patch security holes before malicious individuals exploit them. This course, Introducción a la ciberseguridad, may be helpful for Ethical Hackers who wish to build out their knowledge of fundamentals upon which they can practice ethical hacking.
Cybersecurity Educator
Cybersecurity Educators teach students about cybersecurity topics, such as information security, risk management, and ethical hacking. They may also develop and deliver cybersecurity training programs for organizations. The course Introducción a la ciberseguridad is a great entry point for those who are interested in a career in cybersecurity education. The course covers a wide range of cybersecurity topics, from software security to ethical hacking.
Data Protection Officer
Data Protection Officers are responsible for ensuring that an organization complies with data protection laws and regulations. They may also be responsible for developing and implementing data protection policies and procedures. The course Introducción a la ciberseguridad will be helpful for Data Protection Officers, as it provides an introduction to cybersecurity topics, including cryptography and software security
Risk and Compliance Manager
Risk and Compliance Managers are responsible for identifying and mitigating risks to an organization's information systems. They may also be responsible for ensuring that the organization complies with relevant laws and regulations. Introducing a la ciberseguridad is a great introduction to cybersecurity topics for those who wish to pursue a career in risk management and compliance.
Cryptographer
Cryptographers design and develop encryption algorithms and protocols to protect information from unauthorized access. This course Introducción a la ciberseguridad provides an introduction to cryptography, which Cryptographers will find very useful. In particular, the module "Criptografía" discusses modern cryptosystems and blockchain.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Introducción a la ciberseguridad.
Este libro proporciona una base sólida en seguridad informática, cubriendo conceptos teóricos y prácticos. Es una referencia valiosa para aquellos que buscan una comprensión profunda del campo.
Este libro proporciona una cobertura integral de criptografía y seguridad de redes, cubriendo algoritmos, protocolos y aplicaciones. Es una referencia esencial para aquellos que buscan una comprensión profunda de estos temas.
Este libro explora el arte de la explotación, enseñando técnicas y estrategias utilizadas por los piratas informáticos. Es útil para aquellos que buscan comprender el funcionamiento interno de los ataques cibernéticos.
Este libro ofrece una guía práctica sobre hacking ético y pruebas de penetración, cubriendo técnicas y herramientas utilizadas en el campo. Es valioso para aquellos que buscan desarrollar habilidades prácticas en hacking ético.
Este libro proporciona una introducción completa a la informática forense de malware, cubriendo técnicas y herramientas utilizadas para investigar y analizar código malicioso. Es útil para aquellos que buscan desarrollar habilidades en este campo.
Este libro proporciona una cobertura integral de seguridad en redes, cubriendo protocolos, tecnologías y amenazas. Es una referencia esencial para aquellos que buscan una comprensión profunda del campo.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Introducción a la ciberseguridad.
Escudo Digital: Ciberseguridad para Protección de Datos y...
Most relevant
Escudo Digital: Ciberseguridad para Protección de Datos y...
Most relevant
Ve a lo seguro: Gestiona los riesgos de seguridad
Most relevant
Burp Suite: Introducción a las pruebas de penetración
Most relevant
Fundamentos de Ciberseguridad: un enfoque práctico
Most relevant
Escudo Digital: Ciberseguridad para datos y sistemas
Most relevant
Data & Cybersecurity
Most relevant
Herramientas de ciberseguridad y métodos de aplicación
Most relevant
Ciberseguridad. Bases y estructuras para la protección de...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser