This website uses cookies

The website of the Universitat Politècnica de Catalunya uses its own and third-party cookies to improve the browsing experience and for statistical purposes. For more information about cookies you can consult the cookie policy.

Accept only selected ones
Allow all cookies
Show details
ABOUT

Cookies are small text files that can be used by websites to make a user's experience more efficient.
The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission.
This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
You can at any time change or withdraw your consent from the Cookie Declaration on our website.
Learn more about who we are, how you can contact us and how we process personal data in our privacy Policy.
When contacting us regarding your consent, please indicate your identification and the date of your consent.

COOKIE DECLARATION
Necessary :

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

Name Provider Purpose Expiry Type
lang www.fpc.upc.edu Save the web display language 2 years HTTP
politica_cookie www.fpc.upc.edu Save the general consent of cookies in the current domain. 1 year HTTP
cookie_estadistiques www.fpc.upc.edu Save the consent of statistical cookies in the current domain. 1 year HTTP
cookie_marketing www.fpc.upc.edu Save the consent of marketing cookies in the current domain. 1 year HTTP
PHPSESSID www.fpc.upc.edu Preserves user session state across page requests. Sessió HTTP
CONSENT [x3] Google Used to detect if the visitor has accepted the marketing and analytics category in the cookie banner. This cookie is necessary for GDPR-compliance of the website. 2 years HTTP
Statistics :

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

Name Provider Purpose Expiry Type
_ga Google Registers a unique ID that is used to generate statistical data on how the visitor uses the website. 2 years HTTP
_ga_# Google Used by Google Analytics to collect data on the number of times a user has visited the website as well as dates for the first and most recent visit. 2 years HTTP
_gat Google Used by Google Analytics to throttle request rate 1 day HTTP
_gid Google Registers a unique ID that is used to generate statistical data on how the visitor uses the website. 1 day HTTP
Marketing :

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

Name Provider Purpose Expiry Type
last_campaign www.fpc.upc.edu Save the last campaign for which the user has reached the website. 6 months HTTP
campaign_XX www.fpc.upc.edu Save the last campaign for which the user has reached the website. 6 months HTTP
ads/ga-audiences Google Used by Google AdWords to re-engage visitors that are likely to convert to customers based on the visitor's online behaviour across websites. S Sessió Pixel
NID Google Registers a unique ID that identifies a returning user's device. The ID is used for targeted ads. 6 months HTTP
bcookie LinkedIn Used by the social networking service, LinkedIn, for tracking the use of embedded services. 2 years HTTP
bscookie LinkedIn Used by the social networking service, LinkedIn, for tracking the use of embedded services. 2 years HTTP
lidc Used by the social networking service, LinkedIn, for tracking the use of embedded services. 1 day HTTP
i/jot Twitter Inc. Sets a unique ID for the visitor, that allows third party advertisers to target the visitor with relevant advertisement. This pairing service is provided by third party advertisement hubs, which facilitates real-time bidding for advertisers. Session Pixel
_fbp [x2] Meta Platforms, Inc. Used by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers. 3 months HTTP
Campus
MY_TECH_SPACE

Go
Campus in maintenance
User and / or password incorrect
You have no active environment
Your access has been restricted. Consultation with the department of administration
Due to technical problems, the virtual campus is inaccessible. We are working to solve it. Sorry for the inconvenience.
Start   >  Master's & postgraduate courses  >  Education  >  Master's degree in Cybersecurity Management
Request information
Request information Request information
This course is full up. If you want more information for future editions, please contact us.

Presentation

Edition
15th Edition
Credits
60 ECTS (360 teaching hours)
Delivery
Face-to-face
Language of instruction
Spanish
Fee
€8,500 €7,225(15% discount if you enrol before 30th June)
Payment of enrolment fee options

The enrolment fee can be paid:
- In a single payment to be paid within the deadline specified in the letter of admission to the programme.
- In two instalments:

  • 60% of the amount payable, to be paid within the deadline specified in the letter of admission to the programme.
  • Remaining 40% to be paid up to 90 days at the latest after the starting date of the programme.
- In four instalments, splitting the payment by direct debit:
  • 40% of the amount payable, to be paid within the deadline specified in the letter of admission to the programme.
  • The remaining 60% will be divided into 3 direct debit payments, which will be distributed equidistantly between the beginning and end of classes.
  • The student must have and be the holder of a bank account with IBAN ESXX
Notes 0,7% campaign

Registration open until the beginning of the course or until end of vacancies.
Start date
Classes start: 03/10/2022
Classes end: 05/10/2023
Programme ends : 10/11/2023
Timetable
Monday: 6:30 pm to 9:30 pm
Tuesday: 6:30 pm to 9:30 pm
Thursday: 6:30 pm to 9:30 pm
Taught at
Facultat d'Informàtica de Barcelona (FIB)
C/ Jordi Girona, 1-3
Barcelona
Why this master's degree?
Cybersecurity is one of the most important challenges of the digital age. The development of digitization, new ways of working remotely and collaboratively, and the creation of new business models have meant that there have been a record number of cyberattacks on a global scale in recent times. As a result, cybersecurity has become a priority for any organization.

In this context, the rise in the number of threats and the large number of protection and detection devices to be implemented have led to an exponential increase in the demand for experts in cybersecurity design and management.

The UPC School is organizing the Master's Degree in Cybersecurity Management in order to provide training for these professionals. Students taking the Master's degree will have the opportunity to learn the methodologies and techniques necessary for managing, planning, designing and implementing the procedures necessary to optimize the security of various assets, taking the latest threats that have recently appeared into account.

The master has an outstanding teaching team, which contains an excellent combination of practical professional experience and innovation in the field of technology cybersecurity, from the technical, legal and police point of view. We will also have contributions from internationally recognized speakers, who will offer us their vision of the sector in the present and future.
Promoted by:
Aims
  • Check the status of an institution's cybersecurity by auditing its various assets and estimating priorities in order to minimise the risks.
  • Proactively detect an attack on an institution using monitoring tools, applying data mining and artificial intelligence techniques to large amounts of information.
  • Establish contingency plans and respond to security incidents, applying recognised forensic techniques to maintain the chain of custody, analysing and retrieving information.
  • Identify an institution's critical assets and determine the measures required to protect them.
  • Manage an institution's digital security, establishing the appropriate methodologies, designing an architecture based on its needs as a business, and minimising the risks to which the different assets may be exposed.
  • Use the tools and protocols necessary to maintain the confidentiality, integrity and availability of data.
  • Identify the measures necessary to ensure systems function correctly.
  • Identify the cybersecurity compliance needs of the organization and deploy the programs and plans to implement the management systems that provide the guarantees required by the market, and also by the administration.
Who is it for?
  • Computer or Telecommunications Engineering Graduates.
  • Engineers and scientific-technical graduates interested in obtaining a recognised qualification demonstrating their knowledge of computer security and their ability to protect their installations from cyberattacks.
  • Computer systems administrators.
  • Members of the national security forces and bodies.
  • Consultants for computer security companies.
  • Consultants in security incident response teams.
  • Critical infrastructure technicians.
  • IT directors and managers.
  • Lawyers and criminologists wishing to specialise in computer crimes.
  • Professionals from related disciplines who require in-depth knowledge or specialization in cybersecurity to carry out their work activities.

Training Content

List of subjects
1 ECTS 9h
Technological Bases
  • Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP).
  • VirtualBox and VMware.
5 ECTS 36h
Ethical Hacking
  • Information gathering.
  • Scanning and enumeration.
  • Common vulnerabilities.
  • Manual analysis of vulnerabilities.
  • Automated analysis.
  • Exploitation and management of vulnerabilities.
3 ECTS 21h
Monitoring Security Events
  • Introduction to logs.
  • Registers of the system (Windows and Linux).
  • Detection and monitoring systems.
  • Log correlation.
2 ECTS 18h
Cloud Security and Edge Computing
  • Introduction to the cloud.
  • Types of the cloud.
  • Security in private cloud: orchestrator.
  • Security over third-party solutions: Amazon, Azure.
  • Containers.
  • API connections.
  • Use cases.
4 ECTS 24h
Data Driven Security
  • Data science.
  • Data analysis with R.
  • Viewing data.
4 ECTS 24h
Ubiquitous Environments: SCADA and Mobiles
  • Static and dynamic analysis.
  • Android.
  • iOS.
  • Supervisory Control And Data Acquisition (SCADA).
  • The ICS environment: vulnerabilities in software and protocol.
3 ECTS 21h
Responding to Incidents
  • Response to incidents.
  • The attacker's tools.
  • Log systems.
  • Forensics artifacts.
  • Forensic analysis methodology.
  • Forensic analysis demonstration.
  • File systems.
  • Windows artifacts.
4 ECTS 27h
Malware Analysis
  • Introduction to malware.
  • Analysis of the PE format.
  • Evasion techniques.
  • Static analysis.
  • Dynamic analysis.
  • Memory analysis.
  • Reversing.
1 ECTS 6h
Cybersecurity Trends I
  • Cybersecurity conferences.
2 ECTS 15h
Blockchain and Authentication
  • Symmetric or secret key cryptography I.
  • Asymmetric or public-key cryptography. Public Key Infrastructure (PKI).
  • Security protocols.
  • Blockchain Distributed Ledger Technology.
  • Trust and digital identity services.
  • Federated identities.
1 ECTS 9h
Secure Software Development Life Cycle (SSDLC)
  • SSDLC methodology.
  • Security principles and design requirements.
  • Definition and planning of the test program (link with attack methods).
  • Automation of integration tests and the transition to CI/CD production.
3 ECTS 27h
Compliance
  • Compliance framework I and II.
  • Security policy and standards.
  • Management systems.
  • Privacy and the General Data Protection Regulation (GDPR) I and II.
  • National Security Framework.
2 ECTS 12h
Security Governance
  • Cybersecurity governance frameworks and models.
  • Strategic management of cybersecurity.
  • Optimisation of resources, obtaining benefits and reporting.
  • Cloud computing governance model.
3 ECTS 21h
Risk Analysis and Cyber Resilience
  • Cyber resilience.
  • Information security and privacy standards.
  • Analysis and management of risks and their methodologies.
  • Organisation of information security.
  • Security aspects of business continuity.
  • Cybercrime.
3 ECTS 18h
Design, Development and Implementation
  • Security architecture.
  • Control design (physical and logical).
  • Role management.
  • Network architecture.
  • Cloud controls and exposed services.
  • SAP architectures.
4 ECTS 30h
Information Systems Audit
  • Information systems audit process.
  • IT governance and management.
  • Acquisition, development and implementation of information systems.
  • Information systems operations and business resilience.
  • Protection of information assets.

2 ECTS 12h
Cybercrisis Management
  • Fundamentals of crisis management and complex systems.
  • Crisis management tools.
  • Characteristics of the cybercrisis.
  • Exercises and drills.
  • Practical cases.
1 ECTS 6h
Cybersecurity Trends II
  • Cybersecurity conferences.
12 ECTS 24h
End of Master's Degree Project
  • Final project tutored by a project's director expert in the field.
The UPC School reserves the right to modify the contents of the programme, which may vary in order to better accommodate the course objectives.
Degree
Special master's degree issued by the Universitat Politècnica de Catalunya. Issued pursuant to art. 34.1 of Organic Law 4/2007 of 12 April, amending Organic Law 6/2001 of 21 December, concerning Universities. To obtain it, is necessary to have an official university qualification. Otherwise, the student will receive a course completion certificate of the programme issued by the Fundació Politècnica de Catalunya. (Ver datos que constan en el certificado).
Range of modules
The master's degree programme is organized into the following modules. If you don't wish to take the entire master's degree you can sign on one or several modules.
Master's degree:
relation Postgraduate courses:

Learning methodology

The teaching methodology of the programme facilitates the student's learning and the achievement of the necessary competences.



Learning tools
Participatory lectures
A presentation of the conceptual foundations of the content to be taught, promoting interaction with the students to guide them in their learning of the different contents and the development of the established competences.
Practical classroom sessions
Knowledge is applied to a real or hypothetical environment, where specific aspects are identified and worked on to facilitate understanding, with the support from teaching staff.
Solving exercises
Solutions are worked on by practising routines, applying formulas and algorithms, and procedures are followed for transforming the available information and interpreting the results.
Case studies
Real or hypothetical situations are presented in which the students, in a completely participatory and practical way, examine the situation, consider the various hypotheses and share their own conclusions.
Success stories
Outstanding business knowledge and experiences with high added value acquired during an outstanding professional career are presented and shared.
Tutorship
Students are given technical support in the preparation of the final project, according to their specialisation and the subject matter of the project.
Assessment criteria
Attendance
At least 80% attendance of teaching hours is required.
Level of participation
The student's active contribution to the various activities offered by the teaching team is assessed.
Solving exercises, questionnaires or exams
Individual tests aimed at assessing the degree of learning and the acquisition of competences.
Work out projects
Studies on a specific topic, by individuals or groups, in which the quality and depth of the work is assessed, among other factors.
Completion and presentation of the final project
Individual or group projects in which the contents taught in the programme are applied. The project can be based on real cases and include the identification of a problem, the design of the solution, its implementation or a business plan. The project will be presented and defended in public.
Work placements & employment service
Students can access job offers in their field of specialisation on the My_Tech_Space virtual campus. Applications made from this site will be treated confidentially. Hundreds of offers of the UPC School of Professional & Executive Development employment service appear annually. The offers range from formal contracts to work placement agreements.
Virtual campus
The students on this master's degree will have access to the My_ Tech_Space virtual campus - an effective platform for work and communication between the course's students, lecturers, directors and coordinators. My_Tech_Space provides the documentation for each training session before it starts, and enables students to work as a team, consult lecturers, check notes, etc.

Teaching team

Associates entities

Career opportunities

  • Security manager of an IT services department.
  • Head of cybersecurity management of critical infrastructures and computer service providers.
  • Manager of consultancy services and cybersecurity auditing in a specialised company.
  • Reverse engineering expert.
  • Malware analyst.
  • Computer forensic expert.
  • Cybersecurity data analyst.
  • Ethical hacker/pentester.
  • Security engineer in mobile devices.
  • Consultant for security incident response teams (CSIRT, CERT).
  • Operator in Security Operations Centre (SOC).
  • System and cybersecurity tools administrator.
  • Member of the anti-cybercrime units in financial institutions and state security forces and bodies.
  • Cybersecurity technician in critical infrastructures.
  • Compliance manager.
  • Expert in cybercrimes (lawyers ans criminologists).

Testimonials

Testimonials

+

Request information

Request received!
After we have registered your request, you will receive confirmation by email and we will be in touch.

Thank you for your interest in our training programmes.
Error
Due to an error in the connection to the database, your submission has not been processed. Please try again later, phone us on (34) 93 112 08 08, or send us an email at: webmaster.fpc@fpc.upc.edu
You have exceeded the maximum size of the file



  date protection policy

* Mandatory fields

Información básica o primera capa sobre protección de datos

Responsable

Fundació Politècnica de Catalunya (en adelante, FPC). + INFORMACIÓN

Finalidad

Contestar a las solicitudes de información del interesado sobre actividades de formación gestionadas o realizadas por la FPC. + INFORMACIÓN

Establecimiento o mantenimiento de relación académica con el interesado. + INFORMACIÓN

Legitimación

Consentimiento del interesado. + INFORMACIÓN

Interés legítimo en el desarrollo de la relación académica. + INFORMACIÓN

Destinatarios

No existen cesiones o comunicaciones.

Derechos

Acceso, rectificación, supresión, limitación, oposición y portabilidad. + INFORMACIÓN

Datos de contacto del delegado de protección de datos

info.dpo@fpc.upc.edu

Información adicional

Política de Privacidad de nuestra página Web. + INFORMACIÓN

Plazo de conservación

Política de Privacidad de nuestra página Web. + INFORMACIÓN

Cesión de imagen

Aceptación a la cesión, por un periodo de 10 años, las imágenes que la FPC pueda captar en las instalaciones donde se desarrolle su actividad, a fin de difundir y promocionar las actividades de la FPC y por el medio que esta tenga por conveniente.

Servicios de pago

En caso que el interesado formalice la relación con la FPC, el ordenante (interesado) autoriza y da su consentimiento al cargo, por tanto, con renuncia expresa al derecho de devolución sobre el cargo.


Send