Keystone logo
Universidad Rey Juan Carlos Higher University Course Cybersecurity: Architectural & Technological Strategies
Universidad Rey Juan Carlos

Higher University Course Cybersecurity: Architectural & Technological Strategies

4 Hours

Spanish, English

Request pace

Request application deadline

Request earliest startdate

EUR 1,000 *

On-Campus

* price for non-resident non-community students is just approximate since then each academic rate is different.

Introduction

The main characteristic of the master's degree, which makes it unique, is that it uses Data Science and Machine Learning models to study in depth the most current Cybersecurity incidents, deducing from this analysis the most introduced protection architectures in the sector.

We train future Cybersecurity Architects in the most demanded protection techniques, such as Zero Trust Architectures, applying Data Science models in their design, in validating the robustness of the architectures and in identifying the attacks that cause the most losses. are causing in the industry.

We are organized into five modules. You can take them in one year or several. The two initial modules are Introduction to Cybersecurity and programming in Python focused on data. The next three modules focus, on the one hand, on the architectural and technological aspects of Cybersecurity (NIST 800 Model) and on the analysis models of the most current attack techniques such as Cyber ​​Kill Chain and MITRE ATT&CK. To this we add the practical application of Data Science and Machine Learning (fundamentally Python) to identify anomalies in the behavior of systems and people, which allow rapid reaction to an attack.

As you finish each of the modules you will obtain the corresponding Higher University Degree. At the end of the five modules and the Final Master's Project, the Master's degree is issued. You can take it both if you have a university degree or if you prove experience in the world of Computer Science.

We are in the building of the Plaza de Manuel Becerra in Madrid of the URJC. Given the current situation, for the 20/21 course, classes can be followed in person or by streaming. Let's broadcast all classes!!!

Goals

Training in the main protection techniques against attacks and threats in operating systems, networks, application software, Web systems, databases and machine learning.

Admissions

Curriculum

Program Outcome

Program Tuition Fee

About the School

Questions