Advanced University Course Cybersecurity Fundamentals
DURATION
4 Hours
LANGUAGES
Spanish, English
PACE
Full time
APPLICATION DEADLINE
Request application deadline
EARLIEST START DATE
Request earliest startdate
TUITION FEES
EUR 375 *
STUDY FORMAT
On-Campus
* price for non-resident non-community students is just approximate since then each academic rate is different.
Introduction
The main characteristic of the master's degree, which makes it unique, is that it uses Data Science and Machine Learning models to study in depth the most current Cybersecurity incidents, deducing from this analysis the most introduced protection architectures in the sector.
We train future Cybersecurity Architects in the most demanded protection techniques, such as Zero Trust Architectures, applying Data Science models in their design, in validating the robustness of the architectures and in identifying the attacks that cause the most losses. are causing in the industry.
We are organized into five modules. You can take them in one year or several. The two initial modules are Introduction to Cybersecurity and programming in Python focused on data. The next three modules focus, on the one hand, on the architectural and technological aspects of Cybersecurity (NIST 800 Model) and on the analysis models of the most current attack techniques such as Cyber Kill Chain and MITRE ATT&CK. To this we add the practical application of Data Science and Machine Learning (fundamentally Python) to identify anomalies in the behavior of systems and people, which allow rapid reaction to an attack.
As you finish each of the modules you will obtain the corresponding Higher University Degree. At the end of the five modules and the Final Master's Project, the Master's degree is issued. You can take it both if you have a university degree or if you prove experience in the world of Computer Science.
We are in the building of the Plaza de Manuel Becerra in Madrid of the URJC. Given the current situation, for the 20/21 course, classes can be followed in person or by streaming. Let's broadcast all classes!!!
Goals
Training in the main protection techniques against attacks and threats in operating systems, networks, application software, Web systems, databases and machine learning.
Admissions
Curriculum
Contact hours: 4.5
Subject modules
- Security Operations & IAM
- Cryptography
- Complex Networks
- NIST Framework Introduction
- data science
- practical projects
- CyberData Driven Model
Program Outcome
General Competences
Ability to Search for Specific Information Related to the Different Subjects of the Master From All Available Sources.
Ability to Present and Develop Reports.
Ability to Interpret Technical Documents.
Ability to Work in a Team, in an Interdisciplinary Environment.
Resource Management: Organization and Ability to Establish Work Priorities.
Flexibility to Adapt During the Development of a Project, Ability to Rethink.
Critical Reasoning: Analysis, Synthesis and Evaluation of Different Alternatives.
Ability for Effective Written and Oral Communication.
Information Management: Information Collection, Organization, Etc.
Responsibility and Capacity for Self-learning.
Specific Competences
The Student Will Learn How the Various Algorithms and Encryption Techniques Work and Their Benefits and
Limitations.
You Will Learn the Various Authentication Systems and Types, as Well as the Difference Between
Authentication and Authorization.
The Student Will Be Able to Evaluate Potential Risks and Recommend Ways to Reduce Them.
The Student Will Get to Know the Python Programming Language, Getting an Overview of the Language and
Getting to Be Able to Build Complex Programs.
You Will Become Familiar With the Fundamental Concepts of Variable Treatment, Algorithm Development
and Programming.
The Student Will Learn a Comprehensive Vision of Cybersecurity Technologies and Techniques.
You Will Learn New Methods of Computing Encrypted Data, Network Security and Protocol Design
You Will Know the Most Effective Machine Learning Techniques.
You Will Learn the Differences and Compatibility Between Octave and Matlab.
You Will Know How to Differentiate Between Graphic Models and Network Models.
You Will Know How to Differentiate Predictions on Temporal Data From Other Types of Data.
In Addition, the Following Basic Competences Will Be Guaranteed :
Possess and Understand Knowledge That Provides a Basis or Opportunity to Be Original in the Development
and/or Application of Ideas, Often in a Research Context.
That Students Know How to Apply the Knowledge Acquired and Their Ability to Solve Problems in New or
Little-known Environments Within Broader (or Multidisciplinary) Contexts Related to Their Area of study;
That Students Are Able to Integrate Knowledge and Face the Complexity of Making Judgments Based on
Incomplete or Limited Information
That Students Know How to Communicate Their Conclusions –and the Ultimate Knowledge and Reasons
That Support Them– to Specialized and Non-specialized Audiences in a Clear and Unambiguous Way;
That Students Possess the Learning Skills That Allow Them to Continue Studying in a Way That Will Be
Largely Self-directed or Autonomous.
That Students Are Able to Establish the Relevant Interrelationships Between the Various Disciplines That
Make Up the Master.
That Students Have Communication Skills at the Oral and Written Level in the Dissemination of
Manufacturing and Design Knowledge.
That They Have the Capacity for Synthesis and Analysis in the Presentation of the Contents.
That Students Are Able to Apply Critical Judgment in the Field of Generic and Specific Bibliography Related
to the Field of Related Studies.