• Cybersecurity

  • 1

    Duration

    ๐Ÿ—“๏ธ 9 months

    Format: Remote

    Location: Available at any of our campuses:

    ๐ŸŒ Colombia
    ๐ŸŒ Ecuador
    ๐ŸŒ Miami
    ๐ŸŒ Panama

    2

    Methodology

    Our learning model is based on cohorts, projects, and peer-to-peer interaction, helping students learn how to learn and learn by doing.

    We offer a hands-on, project-based approach to learning programming, which means participants gain real-world experience by working on real projects.

    3

    Program Cost

    $9,000 USD total

    $3,000 USD

    (per quarter)

  • Step into the world of digital defense with a program designed to shape the next generation of cybersecurity leaders. Gain the skills to detect threats, secure systems, and protect data in an increasingly connected world. Whether youโ€™re starting your tech career or looking to specialize, this program will prepare you for one of the most in-demand roles in the tech industry.

    ๐Ÿ—“ Starting Date: December 1st, 2025

  • Learn, Protect, and Lead

    1

    Who is this program for?

    This specialization is ideal for:

    • For developers or IT professionals ready to specialize in cybersecurity and boost their tech careers.
    • Already familiar with programming (Python, C, JavaScript), data structures, and algorithms.
    • Comfortable with system administration basics (Linux, networking, scripting).
    • Want to specialize in cybersecurity to boost their professional profile.

    ๐Ÿ”ฅ If youโ€™re ready to protect what matters, lead with confidence, and stand at the front lines of digital defense, this is your next move.

    2

    After this program you will be able to:

    • Detect and respond to real-world cyber threats.
    • Protect networks, systems, and applications.
    • Build secure infrastructures and enforce best practices.
    • Apply for roles like Security Analyst or Network Security Engineer.
    3

    Requirements

    Before joining the Cybersecurity program, candidates must meet certain technical and motivational requirements to ensure success throughout the training.

    • Basic programming and IT knowledge (Python, systems, networks)
    • Motivation to grow in the cybersecurity field
    • Pass a technical quiz and interview

    If youโ€™re new to coding, we recommend starting with our Software Development Program to build the right foundation before diving into advanced topics.

  • Curriculum

    Master Cybersecurity from Day One! Learn how to protect, hack, and investigate systems with hands-on training in network security, ethical hacking, reverse engineering, and more.

    Module 1

    • Introduction To Cyber Security
    • Networking Introduction - reading
    • Linux Security Basics
    • Passive Reconnaissance
    • Active Reconnaissance
    • Packets and Frames - reading
    • Nmap Live Host Discovery
    • Wireshark Basics
    • Web Fundamentals
    • OWASP Top 10
    • BurpSuite-Fundamentals
    • SQL,noSQL Injection
    • Content Discovery
    • Upload Vulnerability
    • Cryptography Basics
    • Permissions, SUD & SGID
    • Mandatory Access Control
    • Protocols & Servers
    • Offensive vs Defensive Security
    • Forensic Ethics & Methodologies

    Module 2

    • Nmap Advanced Port Scans
    • Insecure Direct Object Reference
    • File Inclusion
    • Command Injection (CVE-2021-44228
    • Explained)
    • Buffer Overflow
    • Web Application Fast Incident Response
    • Web Application Forensics
    • Nmap Post Port Scan & Scripting
    • Server-Side Request Forgery
    • Understanding vulnerabilites-Reading
    • Understanding vulnerabilites-Exploitation
    • CVE, CWE, and NVD
    • Nessus
    • Ruby Scripting (Cyber)
    • Metasploit-basics
    • Metasploit-Scripting
    • Advanced Web Attack Techniques
    • Active Directory - Fundamentals
    • Active Directory - Enumeration
    • Active Directory - Exploitation
    • Active Directory - Forensics
    • Active Directory -Hardering

    Module 3

    • What the shell?
    • Linux Privilege Escalation
    • Windows Privilege Escalation
    • Acces Presistence Techniques
    • Reverse Engineering Fundamentals
    • Static Analysis in Reverse Engineering
    • Dynamic Analysis in Reverse Engineering
    • Malware Analysis in Reverse Engineering
    • Mobile Application Fundamentals and Security
    • Static Analysis In Mobile Security
    • Dynamic analysis In Mobile Security
    • Ethics in Cybersecurity
    • ISO 2700X
    • NIST
    • General Data Protection & Privacy
  • Certifications

    Discover the certifications you can earn in each module:

    Module 1

    Network Security Basics
    CompTIA

    Security+

    /eJPT

    Linux Security

    CompTIA

    Linux+

    Module 2

    Certified Ethical Hacker

    (CEH)

    Network Security Advanced

    CompTIA

    Network+

    Cisco

    CCNA

    Web Application Security Advanced

    Certified Web

    Application Penetration

    Tester (GWAPT)

    Module 3

    Offensive Security Certified Profession al (OSCP)

    Offensive Security Certified Web (OSWE)

    Windows Active Directory Security
    GIAC Certified Windows

    Security

    Administrator (GCWN)

    Reverse Engineering

    Certified Reverse Engineering Analyst

    (CREA)

    Cybersecurity Laws & Ethics

    Certified Information Privacy

    Professional (CIPP)

    Offensive Security Certified Expert (OSCE)

    Certified Information Systems Security

    Professional (CISSP)

  • Ready to take the next step in your tech career?