Objectives
- Assess the need for security management in organizations.
- Understand the main threats to information systems.
- Identify the main security tools and their application in each case.
Program
This module belongs to the SME digitalization program developed within the Aragón EDIH “Academy”. The course aims to address in a basic and general way the security of information systems and the resolution of certain problems that can occur in the day-to-day of a company.
Initially and in an introductory manner, students will approach the security of systems and the basic security requirements that every user should take into account to, later, enter into the concepts of cybersecurity, security management, computing, going through computer software, wireless networks, security tools and problem solving.
1. Introduction to Information Systems Security
- System security concepts
- Classification of security measures
- Security requirements in information systems
2. Cybersecurity
- Concept of cybersecurity
- Most frequent threats to information systems
- Most common security technologies
- Computer security management
3. Harmful Software
- Concepts about harmful software
- Classification of harmful software
- Persistent and advanced threats
- Social engineering and social networks
4. Wireless Network Security
5. Security Tools
- Protective measures
- Control of user access to the operating system
- Secure management of communications, folders and other shared resources.
- Protection against malicious code
6. Troubleshooting
- Detection and elimination of viruses and Trojans
Who is it for?
It is aimed at professionals, whether self-employed or SMEs, linked to the technological world or not, as well as businesspeople, entrepreneurs or managers who are interested in learning about the importance of cybersecurity in an increasingly digitalized economy and society.
Requirements:
Priority for SME employees
Modality
Mixed Training
Teachers
Isaac Bolea
Digital skills
Online Communication and Collaboration
Network Security
- Protection of devices
Protection of personal data and privacy
Problem solving
- Technical problem solving
- Identification of technological needs and responses
- Creative use of digital technology
Schedule, date and place
- Total duration: 24h
- Dates and times:
- In-person hours: Tuesday: May 6, 3, 20, 27 from 09:30 a.m. to 12:30 p.m.
- Online hours: Thursday: May 8, 15, 22, 29 from 5:30 p.m. to 8:30 p.m.
- Location:
- Maximum number of attendees: 15 people
Registration