Master in Cybersecurity


Read more about this program on the institution's website

Program Description

The Cybersecurity Master's degree aims to develop skills in the area of engineering and technology of an organization, specifically in the application of cyber intelligence, malware analysis, technical audits of systems and networks, management of security incidents, secure development of web applications, monitoring and correlation of security events, among others, for the effective and efficient exercise of these functions to manage the organization's computer risks

The object of study of the program focuses on developing professional skills and abilities to solve computer security problems through the technical and practical application of information systems, development of software and application analysis, design of network administration and databases. data and methodology of scientific research that facilitate technological development in the country through cybersecurity.

Professional outings

This program seeks that the graduated professionals of the Master in Cybersecurity , acquire the following professional and personal characteristics as part of their professional profile:

  • Accredit theoretical and practical experience in the area of Cybersecurity.
  • Be able to perform functions of creating information security protocols and software development.
  • Lead malware analysis, forensics, ethical hacking, development, and source code analysis processes.
  • Advise the information technology management units in the development of cybersecurity systems.
  • Be a consultant in the development of projects that link cybersecurity.131360_security-protection-anti-virus-software-60504.jpeg Pixabay / Pexels

Overcoming this mastery you will get


  • Master in Cybersecurity from the International University of Ecuador UIDE (registered at CES and recognized by SENESCYT, valid in Ecuador, Colombia, Peru and Bolivia ).


  • Own Master in Cybersecurity certified by the Nebrija University of Spain .
  • Professional Master in Cybersecurity by MFI Academic Institution of Spain .

* Title issuance fees not included.


Multiple skills that will open doors for you.

The professional will be able to work in a broad field applied to areas of development and management of information systems in the public or private sector. You will also be able to work within the framework of Information Systems, Development and analysis of software and applications and Design and administration of networks and databases.

The professional will be able to carry out competent work in the field of security analysis, malware analysis, forensic analysis, ethical hacking, development and analysis of source code; and will be able to establish new ways to apply their knowledge in cyber intelligence and cyber fraud.

  • Apply quantitative and qualitative research tools to obtain, maintain and process digital evidence using specific procedures and tools.
  • Employ methodologies, develop techniques and use tools that make the most of their skills and knowledge to carry out intrusion tests on systems and networks.
  • Apply strategies to offer an overview and introduction to the world of cybersecurity, explaining the most relevant attacks and how to mitigate them.
  • Understand the basics of monitoring and correlation of security events, through the study, preparation and interpretation of real reports.
  • In their research projects they will integrate the knowledge acquired and combine it with their work experience.

Online methodology

Class Schedule: The synchronous online class schedule will be: Saturday 08:00 - 17:00 and Sunday 08:00 - 17:00.

The curriculum structure is designed to gradually develop and achieve competencies over 2 periods.

The master has 10 professors, authors and tutors of all subjects to guarantee direct contact with students, teachers and the University. All teachers validate 120 hours of training in specific training in online education.

Likewise, there is an IT expert who will be responsible for providing support and technical support to users of the platform and learning resources, as well as connectivity and access to information and communication technologies.

Admission profile

Third level graduates who can preferably access the program belong to the broad field of Information and Communication Technologies (TICS) in accordance with the nomenclature of professional titles and academic degrees. But, due to the nature of the program, applicants who have a third level degree in a different broad field must demonstrate experience in the professional use and application of information and communication technologies focused on information security management.

The specific academic training of the students of the Master in Cybersecurity program has the following specific objectives:

  • Promote capacities and skills to analyze, diagnose and solve cybersecurity challenges through complex thinking, integrating knowledge and knowledge to generate new knowledge.
  • Acquire the necessary skills to obtain and process digital evidence using specific procedures and tools.
  • Develop technical skills and learn the use of tools to perform intrusion tests on systems and networks.
  • Obtain an overview and introduction to the world of cybersecurity, knowing the most relevant attacks and obtaining the skills to mitigate them.
  • Analyze and master the world of reverse engineering and the analysis of malicious codes, assuming the processes to understand the operation of files that work at a low level in systems and networks.
  • Provide the necessary knowledge to design, direct, execute and evaluate cybersecurity initiatives, projects and strategic plans, aligned with the objectives of companies or organizations; all in accordance with both ethical principles and national and international standards and regulations.
  • Train the professional to position himself as a developer in secure programming, as well as in the analysis and evaluation of the source code of the applications.


Necessary documents

  • Copy of the third level certificate registered in the SENESCYT and in the case of foreign titles these must be apostilled or legalized by consular route.
  • Registration Form (online).
  • Copy of the third level certificate registered in the SENESCYT and in the case of foreign titles these must be apostilled or legalized by consular route.
  • Registration Form (online).
  • Copy of personal documents: ID, voting slip, passport-size photo.
  • Curriculum vitae.
  • Preferably one year of proven professional experience (labor certificates).
  • A personal letter of recommendation.Made with Canon 5d Mark III and loved analog lens, Leica APO Macro Elmarit-R 2.8 / 100mm (Year: 1993) Markus Spiske / Unsplash

Contents of the program


  • Introduction
  • Social engineering
  • Deep web; forums and underground markets
  • Phishing and other types of fraud
  • Malware
  • TDS (Traffic Director System)

Ethical hacking

  • Introduction
  • Infrastructure Audit I: Introduction, Recognition and Scanning
  • Infrastructure Audit II: Exploitation and Escalation of Privileges
  • Web application auditing
  • Mobile app auditing
  • Generation of audit reports

Secure development

  • Introduction
  • HTTP protocol
  • Secure Software Development Life Cycle (SDLC)
  • OWASP general
  • OWASP Top Ten
  • OWASP Java Top Ten
  • PHP security
  • Security in .NET applications
  • Good security practices

Forensic analysis

  • Introduction
  • Forensic methodology
  • The acquisition process
  • System off
  • Windows system artifacts
  • Forensic network analysis: analysis of network logs and network traffic
  • Intrusion Prevention Implementation
  • Forensic in email
  • Management and analysis of Windows logs

Reverse engineering

  • Introduction to reverse engineering
  • Compiler
  • Code reconstruction I: Data structures
  • Code Reconstruction II: Common Code Structures
  • Dynamic linker binary file formats
  • Static Analysis: Code Rebuilder Disassemblers
  • Dynamic Analysis: Code Debuggers
  • Practical applications

SIEM Technologies

  • Introduction
  • Collection layer and EDR
  • Storage Layers
  • Correlation layer
  • Presentation Layer
  • Types of presentation of services and architecture
  • SIEM Intelligence
  • SOC Operations
  • SIEM vendors

Smartphone security

  • Introduction to security on mobile platforms
  • Wireless network security
  • Android security
  • IOS security
  • Windows Phone

Data treatment

  • Using virtual machines and command shell
  • Fundamentals of programming in Python
  • Relational Database Fundamentals
  • Fundamentals of Internet Technologies
  • Share data, code and resources in repositories
  • Fundamentals of data processing with the Python scientific stack

Business Intelligence

  • Introduction to business intelligence
  • Data warehouses and analytical databases
  • Extraction, transformation and loading tools
  • Business intelligence applications
  • Data visualization fundamentals
  • Visualization tools

Degree plan and integrated management systems

  • Integrated management and social responsibility systems
  • Design and implementation of projects with applied research and / or development components
  • Design and writing of high-level professional articles
  • Analysis of practical models for the development of the exam of complex character
Last updated Mar 2020

About the School

OpenUIDE nace con el objetivo de ser la Universidad a distancia de referencia en el Área Andina. Respaldada y avalada por la Universidad Internacional del Ecuador, una universidad joven, innovadora, p ... Read More

OpenUIDE nace con el objetivo de ser la Universidad a distancia de referencia en el Área Andina. Respaldada y avalada por la Universidad Internacional del Ecuador, una universidad joven, innovadora, positiva, proactiva y visionaria. La UIDE en menos de dos décadas ha construido uno de los campus más hermosos de América Latina, ha establecido sedes en diferentes ciudades del Ecuador, y ha consolidado importantes vínculos internacionales con instituciones educativas de prestigio mundial. Read less