Works in Cybersecurity

Shamin Haky Uhx Ghppcdg Unsplash

IT Security Governance and Management

EIP

The use of appropriate methodologies contributes to improving IT security. Managing this aspect has gained importance over the years. To the … Read more

3780321

Reconciliation of data protection and cybersecurity in a company

EIP

Cybersecurity is an essential element for all companies. Without its application, you leave customer and worker data exposed to possible incidents. Yeah … Read more

Cybersecurity Secdevops

SecDevOps and security in the SDLC

josuelopez

The implementation of the DevOps movement has meant an advance in software development processes and their implementation. The increasingly demanding “Time To Market” arises from the need for quality and agility in the Software Development Life Cycle to be increasingly united, and therefore the ideal solution is the automation of all phases of development. construction and testing of the code; or what is the same, Continuous Integration (CI).

Risk Management

The importance of risk management when facing a project

Jaime Trinidad

In this article we will provide answers to questions such as Why do we have to do a risk analysis? o When should a risk analysis be done?

Device Protected By Cyber Security

The 3 most in-demand cybersecurity positions today

Izary Rondón

Being part of a RedTeam is one of the career opportunities in cybersecurity. Currently, the demand for professionals in the sector is high. … Read more

Study-linux

First steps in using GNU/Linux, part 4

Daniel García Baameiro

This article seeks to teach the reader how to install the GNU/Linux operating system. To do this, below, the installation alternative will be explained in a… Read more

linux-for-beginners

First steps in using GNU/Linux, part 3

Daniel García Baameiro

This article seeks to teach the reader how to install the GNU/Linux operating system. To do this, below, the installation alternative will be explained in a… Read more

Cybersecurity Google Padlock

5 tips to improve the cybersecurity of your Google account

Izary Rondón

Nowadays we use our Google account for everything. In it we store all kinds of information: from the steps we take, the calories we burn or the sites we visit, to the passwords for our accounts, addresses, bank cards, etc.

Christin Hume Mfb1b1s4smc Unsplash(1)

First steps in using GNU/Linux, part 2

Daniel García Baameiro

We will explain, as we said in the previous article, which are the most used distributions, depending on the level of the user. GNU/Linux distributions for users… Read more

studying-linux

First steps in using GNU/Linux, part 1

Daniel García Baameiro

This article seeks to introduce the reader to the powerful world of the GNU/Linux operating system. To do this, a little history will be explained below... Read more

Cybersecurity and Python Workshop

Full employment in Cybersecurity and Python attracts young professionals

EIP

If you are reading this it is because you probably already know what the main concern of the International Graduate School is: offering you quality training… Read more

Manuel Garcia Presentation Feed Imgfeatured

Every two years, the demand for professionals with technological skills doubles: it is time to train

EIP

Madrid hosted the Employment Fair in the Digital Era (FEED) 2022 on April 28 and 29. An event that… Read more