Design of a strategy to secure data and applications


In this course you will learn to create strategies to secure sensitive applications and data. You can create the plalignment in DevOps and the application lifecycle, in addition to identify and mitigate all threats.

course description

This course is taught in online modality and consists of 6 units.

The duration of the course is 70 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.

Training is done through our Campus Virtual, with this modality you will have all the didactic content on the course platform and it will be accessible, from the day the course starts, 24 hours a day, every day of the week. Access to the Campus will be available by 6 weeks.

The student will also have participation forums, as well as a continuous tutoring.


Course content 

  1. Application Threat Mitigation
  2. DevOps planning and the application lifecycle
  3. Data Threat Mitigation
  4. Design a strategy to identify and protect sensitive data
  5. Planning for encryption of data at rest and in motion
  6. Discussion Case Study: Designing a Strategy to Protect Data


Previous requirements 

To take this course, no technical prerequisites are necessary. However, basic computer skills and knowledge of Information Technology related environments are recommended.