Higher University Course Cybersecurity: Architectural & Technological Strategies
DURATION
4 Hours
LANGUAGES
Spanish, English
PACE
Request pace
APPLICATION DEADLINE
Request application deadline
EARLIEST START DATE
Request earliest startdate
TUITION FEES
EUR 1,000 *
STUDY FORMAT
On-Campus
* price for non-resident non-community students is just approximate since then each academic rate is different.
Introduction
The main characteristic of the master's degree, which makes it unique, is that it uses Data Science and Machine Learning models to study in depth the most current Cybersecurity incidents, deducing from this analysis the most introduced protection architectures in the sector.
We train future Cybersecurity Architects in the most demanded protection techniques, such as Zero Trust Architectures, applying Data Science models in their design, in validating the robustness of the architectures and in identifying the attacks that cause the most losses. are causing in the industry.
We are organized into five modules. You can take them in one year or several. The two initial modules are Introduction to Cybersecurity and programming in Python focused on data. The next three modules focus, on the one hand, on the architectural and technological aspects of Cybersecurity (NIST 800 Model) and on the analysis models of the most current attack techniques such as Cyber Kill Chain and MITRE ATT&CK. To this we add the practical application of Data Science and Machine Learning (fundamentally Python) to identify anomalies in the behavior of systems and people, which allow rapid reaction to an attack.
As you finish each of the modules you will obtain the corresponding Higher University Degree. At the end of the five modules and the Final Master's Project, the Master's degree is issued. You can take it both if you have a university degree or if you prove experience in the world of Computer Science.
We are in the building of the Plaza de Manuel Becerra in Madrid of the URJC. Given the current situation, for the 20/21 course, classes can be followed in person or by streaming. Let's broadcast all classes!!!
Goals
Training in the main protection techniques against attacks and threats in operating systems, networks, application software, Web systems, databases and machine learning.
Admissions
Curriculum
Subject modules
- Introduction to Cybersecurity
- System Security
- Cryptography and Networks
- Study cases
- Security politics
Program Outcome
general Competences
- ability to Search for Specific Information Related to the Different Subjects of the Master From All Available Sources.
- ability to Present and Develop Reports.
- ability to Interpret Technical Documents.
- ability to Work in a Team, in an Interdisciplinary Environment.
- resource Management: Organization and Ability to Establish Work Priorities.
- flexibility to Adapt During the Development of a Project, Ability to Rethink.
- critical Reasoning: Analysis, Synthesis and Evaluation of Different Alternatives.
- ability for Effective Written and Oral Communication.
- information Management: Information Collection, Organization, Etc.
- responsibility and Capacity for Self-learning.
specific Competences
- the Student Will Learn How the Various Algorithms and Encryption Techniques Work and Their Benefits and Limitations.
- you Will Learn the Various Authentication Systems and Types, as Well as the Difference Between Authentication and Authorization.
- the Student Will Be Able to Assess Potential Risks and Recommend Ways to Reduce Them.
- the Student Will Get to Know the Python Programming Language, Getting an Overview of the Language and Getting to Be Able to Build Complex Programs.
- you Will Become Familiar With the Fundamental Concepts of Variable Treatment, Algorithm Development and Programming.
- the Student Will Learn a Comprehensive Vision of Cybersecurity Technologies and Techniques.
- you Will Learn New Methods of Computing Encrypted Data, Network Security and Protocol Design
- you Will Know the Most Effective Machine Learning Techniques.
- you Will Learn the Differences and Compatibility Between Octave and Matlab.
- you Will Know How to Differentiate Between Graphic Models and Network Models.
- you Will Know How to Differentiate Predictions on Temporal Data From Other Types of Data.
in Addition, the Following basic Competences will Be Guaranteed :
- possess and Understand Knowledge That Provides a Basis or Opportunity to Be Original in the Development and/or Application of Ideas, Often in a Research Context.
- that Students Know How to Apply the Knowledge Acquired and Their Ability to Solve Problems in New or Little-known Environments Within Broader (or Multidisciplinary) Contexts Related to Their Area of Study;
- that Students Are Able to Integrate Knowledge and Face the Complexity of Making Judgments Based on Incomplete or Limited Information
- that Students Know How to Communicate Their Conclusions –and the Ultimate Knowledge and Reasons That Support Them– to Specialized and Non-specialized Audiences in a Clear and Unambiguous Way;
- that Students Possess the Learning Skills That Allow Them to Continue Studying in a Way That Will Be Largely Self-directed or Autonomous.
- that Students Are Able to Establish the Relevant Interrelationships Between the Various Disciplines That Make Up the Master.
- that Students Have Communication Skills at the Oral and Written Level in the Dissemination of Manufacturing and Design Knowledge.
- that They Have the Capacity for Synthesis and Analysis in the Presentation of the Contents.
- that Students Are Able to Apply Critical Judgment in the Field of Generic and Specific Bibliography Related to the Field of Related Studies.