We may earn an affiliate commission when you visit our partners.
Course image
Coursera logo

Ve a lo seguro

Gestiona los riesgos de seguridad

Google Career Certificates

En este segundo curso del Certificado de Ciberseguridad de Google profundizarás sobre los conceptos que presentamos en el primer curso, con especial énfasis en cómo las/los profesionales de la ciberseguridad utilizan los marcos y controles para proteger las operaciones comerciales. En particular, identificarás los pasos de la gestión de riesgos y conocerás las amenazas, riesgos y vulnerabilidades más comunes. También explorarás los datos de gestión de eventos e información de seguridad (SIEM) y utilizarás un manual para responder a las amenazas, riesgos y vulnerabilidades identificadas. Por último, darás un paso importante para convertirte en un/a profesional de la ciberseguridad, ya que realizarás una auditoría de ciberseguridad.

Read more

En este segundo curso del Certificado de Ciberseguridad de Google profundizarás sobre los conceptos que presentamos en el primer curso, con especial énfasis en cómo las/los profesionales de la ciberseguridad utilizan los marcos y controles para proteger las operaciones comerciales. En particular, identificarás los pasos de la gestión de riesgos y conocerás las amenazas, riesgos y vulnerabilidades más comunes. También explorarás los datos de gestión de eventos e información de seguridad (SIEM) y utilizarás un manual para responder a las amenazas, riesgos y vulnerabilidades identificadas. Por último, darás un paso importante para convertirte en un/a profesional de la ciberseguridad, ya que realizarás una auditoría de ciberseguridad.

Te guiarán especialistas de Google, que actualmente trabajan en ciberseguridad, con actividades prácticas y ejemplos que simulan tareas comunes y frecuentes de este campo. Todo esto te ayudará a desarrollar tus habilidades y prepararte para trabajar.

Las/los estudiantes que completen este certificado estarán preparados/as para solicitar trabajo en el área de la ciberseguridad, en un nivel inicial. No se necesita experiencia previa.

Enroll now

What's inside

Syllabus

Dominios de seguridad
Aprenderás en profundidad los ocho dominios de seguridad del Certificado Profesional en Seguridad de Sistemas de Información (CISSP, por sus siglas en inglés). Luego, te familiarizarás con las principales amenazas, riesgos y vulnerabilidades que afectan las operaciones comerciales. Además, explorarás el Marco de Gestión de Riesgos (RMF) del Instituto Nacional de Estándares y Tecnología (NIST) y los pasos necesarios para llevar a cabo una gestión eficaz de los riesgos.
Read more
Marcos y controles de seguridad
Te centrarás en los marcos y controles de seguridad, junto con los componentes centrales de la tríada de confidencialidad, integridad y disponibilidad (CID). Aprenderás sobre los principios de seguridad y las auditorías de seguridad del Open Web Application Security Project (OWASP).
Introducción a las herramientas de ciberseguridad
Explorarás las herramientas de gestión de eventos e información de seguridad (SIEM) más utilizadas por las/los profesionales de seguridad para proteger las operaciones comerciales. Luego, aprenderás cómo las/los analistas de seguridad de nivel inicial utilizan los paneles de SIEM en su trabajo diario.
Uso de los manuales de estrategias para responder a incidentes
Aprenderás sobre los propósitos y usos comunes de los manuales de estrategias. También explorarás cómo las y los profesionales de la ciberseguridad los utilizan para responder a las amenazas, riesgos y vulnerabilidades identificadas.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Desarrolla habilidades de ciberseguridad de nivel inicial, que son esenciales para los analistas de seguridad
Enseña los aspectos fundamentales de la gestión de riesgos y los marcos de seguridad
Explora herramientas SIEM, que son ampliamente utilizadas por los profesionales de la seguridad
Cuenta con expertos de Google como instructores, quienes brindan ejemplos prácticos y relevantes de la industria
Requiere experiencia previa, lo que puede limitar su accesibilidad para estudiantes principiantes

Save this course

Save Ve a lo seguro: Gestiona los riesgos de seguridad to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Ve a lo seguro: Gestiona los riesgos de seguridad. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Ve a lo seguro: Gestiona los riesgos de seguridad will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They investigate and respond to cybersecurity breaches, and develop and implement security policies and procedures. This course would provide a strong foundation for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. They assess risks to information systems, develop and implement security policies and procedures, and monitor and analyze security data to identify and respond to threats. This course would be helpful for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their information systems and data from cyber threats. They assess risks to information systems, develop and implement security policies and procedures, and monitor and analyze security data to identify and respond to threats. This course would be helpful for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
Security Architect
Security Architects design and implement security systems to protect organizations from cyber threats. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze security data to identify and respond to threats. This course would be helpful for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
Security Engineer
Security Engineers design, implement, and maintain security systems to protect organizations from cyber threats. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze security data to identify and respond to threats. This course would be helpful for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security systems to protect cloud-based applications and data. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze security data to identify and respond to threats. This course would be helpful for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
Network Security Engineer
Network Security Engineers design, implement, and maintain security systems to protect computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with other IT professionals to develop and implement security policies and procedures, and they monitor and analyze security data to identify and respond to threats. This course would be helpful for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
IT Auditor
IT Auditors evaluate the security of computer systems and networks. They assess risks to information systems, develop and implement security policies and procedures, and monitor and analyze security data to identify and respond to threats. This course would be helpful for anyone looking to enter this field, as it covers the basics of cybersecurity, including risk management, security controls, and incident response.
Risk Manager
Risk Managers identify, assess, and manage risks to organizations. They work with other business leaders to develop and implement risk management strategies, and they monitor and analyze risk data to identify and respond to threats. This course may be helpful for anyone looking to enter this field, as it covers the basics of risk management, including risk assessment, risk mitigation, and risk monitoring.
Forensic Computer Analyst
Forensic Computer Analysts investigate computer crimes and collect evidence from computer systems. They work with law enforcement and other investigators to identify and apprehend criminals, and they provide expert testimony in court. This course may be helpful for anyone looking to enter this field, as it covers the basics of computer forensics, including evidence collection, evidence analysis, and evidence presentation.
Incident Responder
Incident Responders investigate and respond to cybersecurity incidents. They work with other IT professionals to contain and mitigate the impact of security breaches, and they develop and implement incident response plans. This course may be helpful for anyone looking to enter this field, as it covers the basics of incident response, including incident investigation, incident containment, and incident mitigation.
Compliance Manager
Compliance Managers ensure that organizations comply with laws and regulations. They work with other business leaders to develop and implement compliance programs, and they monitor and analyze compliance data to identify and respond to risks. This course may be helpful for anyone looking to enter this field, as it covers the basics of compliance management, including compliance assessment, compliance monitoring, and compliance reporting.
Penetration Tester
Penetration Testers assess the security of computer systems and networks by simulating attacks. They work with other IT professionals to identify and fix security vulnerabilities, and they develop and implement penetration testing plans. This course may be helpful for anyone looking to enter this field, as it covers the basics of penetration testing, including vulnerability assessment, vulnerability exploitation, and vulnerability remediation.
Malware Analyst
Malware Analysts investigate and analyze malware to identify its purpose and behavior. They work with other IT professionals to develop and implement malware detection and prevention strategies, and they provide expert testimony in court. This course may be helpful for anyone looking to enter this field, as it covers the basics of malware analysis, including malware detection, malware analysis, and malware remediation.
Security Operations Center Analyst
Security Operations Center Analysts monitor and analyze security data to identify and respond to threats. They work with other IT professionals to investigate security incidents and develop and implement security policies and procedures. This course may be helpful for anyone looking to enter this field, as it covers the basics of security operations, including security monitoring, security analysis, and security incident response.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ve a lo seguro: Gestiona los riesgos de seguridad.
Serves as a valuable resource for students preparing for the CISSP certification exam, covering all ten domains of information security.
Focuses on security assessment, covering various techniques and tools used in penetration testing, which is essential knowledge for aspiring cybersecurity professionals.
Offers practical insights into malware analysis, providing students with hands-on experience in identifying, analyzing, and mitigating malware threats.
Este libro proporciona una base sólida en seguridad de redes, cubriendo conceptos clave como amenazas, vulnerabilidades y contramedidas, complementando el enfoque del curso en el dominio de seguridad de redes.
Covers cloud security in detail, addressing various aspects such as cloud architecture, security controls, and compliance requirements, which are essential for managing cloud-based systems securely.
Este libro especializado proporciona una inmersión profunda en el análisis cuantitativo de riesgos, complementando el enfoque del curso en la evaluación e identificación de riesgos de seguridad.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ve a lo seguro: Gestiona los riesgos de seguridad.
Activos, amenazas y vulnerabilidades
Most relevant
Ponlo en práctica: Prepárate para los trabajos en...
Most relevant
Escudo Digital: Ciberseguridad para Protección de Datos y...
Most relevant
Escudo Digital: Ciberseguridad para Protección de Datos y...
Most relevant
Conexión y protección: Redes y seguridad de redes
Most relevant
Vulnerabilidades y pruebas de penetración
Most relevant
Herramientas del oficio: Linux y SQL
Most relevant
Fundamentos de la ciberseguridad
Most relevant
Fundamentos del Internet de las cosas (IoT): Seguridad I
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser