Why Pursue a Master's Degree in Cybersecurity?
Businesses today are increasingly concerned about their cybersecurity, and how to avoid computer attacks and cyber espionage. Therefore, learning about risk management and how to identify internal vulnerabilities is critical to prevent and overcome a cyber crisis.
Therefore, this Master’s degree in Cybersecurity has been designed to provide students with deep and comprehensive knowledge of the digital world, and address the basic principles of network protection, evaluation, and interpretation. It addresses the following questions :
What threats are information systems exposed to in my company?
How often could these threats occur should I not take protective measures?
How do I take measures?
How can I minimize risks?
MODULE I Business Cybersecurity Vulnerabilities
Unit 1: Information Security Vulnerabilities. Social Media Risk Analysis
Unit 2: Detection, Risk Analysis, and General Protections
Unit 3: Cybersecurity Principles and Good Practices. Security Risk Management. Threats and Vulnerabilities
Unit 4: Standards, Regulations and Legislation. Cybersecurity Management Systems
MODULE II Safe Development and Identity Management
Unit 1: Security Plan and Safe Development
Unit 2: Identity Management and Authentication
Unit 3: Threat Models
Unit 4: Safe Information Management and Storage
MODULE III Digital Identity, Reputation, Fake News, Socint and Docxing
Unit 1: Types of Social Media
Unit 2: Threats and Mitigating Factors in Social Media
Unit 3: Docxing and Socint
Unit 4: Infoxication. Fake News. Techniques and Analysis
MODULE IV Malware and Malicious Codes
Unit 1: Social Media Types
Unit 2: Malware Type I
Unit 3: Malware Type II
Unit 4: Vulnerabilities, Exploits and Payloads.
MODULE V Business Cryptography
Unit 1: Introduction to Classical Algorithms
Unit 2: Symmetric Key Algorithm
Unit 3: Symmetric Key Algorithm - Hash Function
Unit 4: Digital Certificates, PKI and Cryptographic Applications
MODULE VI Introduction to Corporate Network Security
Unit 1: Social Media Security
Unit 2: Communication and Distributed Local Networks. Extranet
Unit 3: Linux-Based Architecture Security
Unit 4: Cloud 8 - Based Architecture Security
MODULE VII Web Security
Unit 1: How the Web Works
Unit 2: Web Security
Unit 3: Web Security
Unit 4: Actions to Improve Web Security
MODULE VIII OSINT Security, Open Source Research
Unit 1: OSINT
Unit 2: Server Advanced Use
Unit 3: Research Methodology
Unit 4: Security Tools
MODULE IX IoT Security
Unit 1: What is IoT?
Unit 2: Challenges in IoT Security
Unit 3: IoT Security in Cloud Suppliers
Unit 4: IoT Security Frameworks
MODULE X Master's Final Project (MFP)
The program is subject to possible content updates and upgrades
Óscar García-Rama is a Computer Engineering Technical Specialist from the Polytechnic University of Madrid (UPM) with over 10 years of experience in the technology sector. Oscar is the founder of SupportFactory.net, which is a company with over 15 years of experience in the technological development sector and specialized in EdTech security. He is currently the CEO at Content Away, a spin-off company, which focuses on EdTech for higher education programs. He has participated in different projects and events with both multinational companies and public Institutions such as the Ministry of Defense and the Ministry of Education as a guest speaker to address issues related to educational settings and security.
Additionally, Oscar has participated in several technological innovation and development projects with Telefónica in the analysis of wireless information transmission security mechanisms. He has also worked in the IBM Learning Services as a programmer for computer systems and cybersecurity training.
Rocío Carracedo is a Computer Engineering Technical Specialist from the Polytechnic University of Madrid (UPM) with over 10 years of experience in the technology sector. Rocio is the co-founder of SupportFactory.net, which is a company with over 15 years of experience in the technological development sector and specialized in EdTech security. She has implemented and coordinated different projects with multinational companies such as Intel and Macmillan. She is also specialized in agile methodologies and process optimization, and has led several multidisciplinary teams at different branches.
Rocio has participated in several startups as process development and Enterprise consolidation leader in different sectors (e.g. health, education, security, finance). Another relevant experience took place in Telefonica where she worked as Big Data specialist in charge of data analysis for Telefonica’s customer loyalty and customer acquisition campaigns.
Juan Navarro is a cybersecurity consultant and project coordinator at IAG with over 15 years of experience in technological innovation and development. Juan has worked as a computer engineer at the European Organization for Nuclear Research (CERN), and throughout his professional career, he has worked with all business management tools, and become a cybersecurity expert. Juan’s experience in large projects such as the Wannacry Attack has greatly contributed to his skills as a communicator who is capable of connecting technology to people’s needs.