Use of cookies

We use our own and third-party cookies to improve our services. You can get more information and set your preferences.
Information on our cookies policy

Reject Cookies
Accept Cookies
Campus
MY_TECH_SPACE

Go
Campus in maintenance
User and / or password incorrect
You have no active environment
Your access has been restricted. Consultation with the department of administration
Due to technical problems, the virtual campus is inaccessible. We are working to solve it. Sorry for the inconvenience.
Start   >  Master's & postgraduate courses  >  Education  >  Postgraduate course in Cyber ​​Attacks: Detection and Response
Request information
Request information Request information or admission
Apply for admission
Apply for admission
  • discount
    10% discount if you enrol before 31th July
  • discount
    This programme is part of the Employment Help grants programme
relation
This postgraduate course is also part of the training track for the master's degree in Cybersecurity Management.

Programme

Edition
9th Edition
Credits
32 ECTS (183 teaching hours)
Delivery
Face-to-face
Language of instruction
Spanish
Fee
€4,800  €4,320 (10% discount if you enrol before 31th July)
Payment of enrolment fee options

The enrolment fee can be paid:
- In a single payment to be paid within the deadline specified in the letter of admission to the programme.
- In two instalments:

  • 60% of the amount payable, to be paid within the deadline specified in the letter of admission to the programme.
  • Remaining 40% to be paid up to 60 days at the latest after the starting date of the programme.
Notes 0,7% campaign

Registration open until the beginning of the course or until end of vacancies.
Start date
Classes start: 05/10/2020
Classes end: 11/03/2021
Programme ends : 15/07/2021
Timetable
Monday: 6:30 pm to 9:30 pm
Tuesday: 6:30 pm to 9:30 pm
Thursday: 6:30 pm to 9:30 pm
Taught at
Facultat d'Informàtica de Barcelona (FIB)
C/ Jordi Girona, 1-3
Barcelona
Why this programme?
Cyberattacks have become one of the biggest threats to any environment with valuable digital information. In addition, the loss or theft of data due to infrastructure insecurity can seriously affect an institution's image.

A swift reaction to a cyberattack will minimize the negative consequences and contribute to a possible investigation of the case. However, a lack of professionals with the skills that this program provides gives cybercriminals significant advantages, as they can see how most environments have gaps due to little or no monitoring of their systems, and the lack of experts capable of reacting to an incident.

The objective of this postgraduate course is to train students in order to understand new cyberthreats and make decisions to react to them, and the necessary protection and detection measures to minimize the impact of possible attacks.

The postgraduate course will provide plenty of information about the latest threats - both general threats and those aimed at a single entity (Advanced Persistent Threats), as well as strategies to manage them and minimize their impact.

The postgraduate course has an outstanding teaching team, with an excellent combination of practical professional experience and innovation, in the field of technology security from a technical perspective, as well as in the legal and policing field. We will also have contributions from internationally renowned speakers, who will tell us about their vision of the sector in the present and the future.
Students on the Postgraduate course will also be prepared for the Cybersecurity Nexus Certificate (CSX), awarded by the ISACA and recognized worldwide.


CSX


Students registering for the program can register free of charge with ISACA International and ISACA Barcelona and take advantage of membership until 31/12/2020.
Aims
  • Check the status of an institution's cybersecurity by auditing its various assets and estimating priorities in order to minimise the risks.
  • Proactively detect an attack on an institution using monitoring tools, applying data mining techniques to large amounts of information.
  • Establish contingency plans and respond to security incidents, applying recognised forensic techniques to maintain the chain of custody, analysing and retrieving information.
Who is it for?
  • Computer or Telecommunications Engineering Graduates.
  • Engineers and scientific-technical graduates interested in obtaining an internationally recognised qualification demonstrating their knowledge of computer security and their ability to protect their installations from cyberattacks.
  • Computer systems administrators.
  • Members of the national security forces and bodies.
  • Consultants for computer security companies.
  • Consultants in security incident response teams.
  • Critical infrastructure technicians.
  • IT directors and managers.
  • Lawyers wishing to specialise in computer crimes.

Training Content

List of subjects
1 ECTS 6h
Networks
  • Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP).
  • VirtualBox and VMware.
5 ECTS 36h
Ethical Hacking
  • Information gathering.
  • Scanning and enumeration.
  • Common vulnerabilities.
  • Manual analysis of vulnerabilities.
  • Automated analysis.
  • Exploitation and management of vulnerabilities.
3 ECTS 21h
Monitoring Security Events
  • Registers within the system.
  • Detection and monitoring systems.
  • Heterogeneous data sources.
  • Correlation of logs.
4 ECTS 24h
Data Driven Security
  • Data Science.
  • Data analysis with R.
  • Viewing data.
  • Reproducible research.
  • R-net-tools.
4 ECTS 24h
Ubiquitous Environments: SCADA and Mobiles
  • Static and dynamic analysis.
  • Android.
  • iOS.
  • Supervisory Control And Data Acquisition (SCADA).
  • The ICS environment: vulnerabilities in software and protocol.
2 ECTS 15h
Cloud Security
  • Introduction to the cloud.
  • Types of the cloud.
  • Security in private cloud: orchestrator.
  • Security over third-party solutions: Amazon, Azure.
  • Containers.
  • API connections.
  • Use cases.
3 ECTS 21h
Responding to Incidents
  • Computer Emergency Response Team (CERT) and Incident response team (IRT).
  • The attacker's tools.
  • Forensics.
  • Forensics devices.
  • Studying non-assigned space.
3 ECTS 21h
Malware Analysis
  • Introduction to malware: history, threats, actors, trends in attacks.
  • Static analysis (hashing, anti-virus, fingerprinting, strings, tools).
  • Dynamic analysis (environment, tools, memory, debugging, sandbox).
  • Malware in mobile devices.
7 ECTS 15h
Proyecto Final de Postgrado
Final project tutored by a project's director expert in the field.
The UPC School reserves the right to modify the contents of the programme, which may vary in order to better accommodate the course objectives.
Degree
Postgraduate diplomas issued by the Universitat Politècnica de Catalunya. Issued pursuant to art. 34.1 of Organic Law 4/2007 of 12 April, amending Organic Law 6/2001 of 21 December, concerning Universities. To obtain this degree it is necessary to have an official. Otherwise, the Fundació Politècnica de Catalunya will only award them a a certificate of completion.
Range of modules
This postgraduate course is part of the training track for the master's degree in Cybersecurity Management .
The master's degree programme is organized into the following modules. If you don't wish to take the entire master's degree you can sign on one or several modules.
Master's degree:
relation Postgraduate courses:

Learning methodology

The teaching methodology of the programme facilitates the student's learning and the achievement of the necessary competences.

Learning tools
Participatory lectures
A presentation of the conceptual foundations of the content to be taught, promoting interaction with the students to guide them in their learning of the different contents and the development of the established competences.
Practical classroom sessions
Knowledge is applied to a real or hypothetical environment, where specific aspects are identified and worked on to facilitate understanding, with the support from teaching staff.
Solving exercises
Solutions are worked on by practising routines, applying formulas and algorithms, and procedures are followed for transforming the available information and interpreting the results.
Visits
These visits are to specialist centres, companies in the sector or outstanding and important locations in the sector, in order to obtain knowledge in situ of development, production and demonstration environments within the programme.
Problem-based learning (PBL)
An active learning methodology that enables the student to be involved from the beginning, and to acquire knowledge and skills by considering and resolving complex problems and situations.
Tutorship
Students are given technical support in the preparation of the final project, according to their specialisation and the subject matter of the project.
Assessment criteria
Attendance
At least 80% attendance of teaching hours is required.
Level of participation
The student's active contribution to the various activities offered by the teaching team is assessed.
Solving exercises, questionnaires or exams
Individual tests aimed at assessing the degree of learning and the acquisition of competences.
Work out projects
Studies on a specific topic, by individuals or groups, in which the quality and depth of the work is assessed, among other factors.
Completion and presentation of the final project
Individual or group projects in which the contents taught in the programme are applied. The project can be based on real cases and include the identification of a problem, the design of the solution, its implementation or a business plan. The project will be presented and defended in public.
Work placements & employment service
Students can access job offers in their field of specialisation on the My_Tech_Space virtual campus. Applications made from this site will be treated confidentially. Hundreds of offers of the UPC School of Professional & Executive Development employment service appear annually. The offers range from formal contracts to work placement agreements.
Virtual campus
The students on this postgraduate course will have access to the My_ Tech_Space virtual campus - an effective platform for work and communication between the course's students, lecturers, directors and coordinators. My_Tech_Space provides the documentation for each training session before it starts, and enables students to work as a team, consult lecturers, check notes, etc.

Teaching team

Associates entities

Strategic partners
  • Associació pel Control i Auditoria dels Sistemes d'Informació. ISACA Barcelona
    • Disseminates the programme in the professional sphere and area of expertise.
    • Participates in the design of the contents of the programme, and ensures they are appropriate to the needs of the professional sphere.
Collaborating partners

Career opportunities

  • Reverse engineering expert.
  • Malware analyst.
  • Computer forensic expert.
  • Cybersecurity data analyst.
  • Ethical hacker/pentester.
  • Security engineer in mobile devices.
  • Consultant for security incident response teams (CSIRT, CERT).
  • Operator in Security Operations Center (SOC).
  • System and cybersecurity tools administrator.
  • Member of the anti-cybercrime units in financial institutions and state security forces and bodies.
  • Cybersecurity technician in critical infrastructures.

Request information or admission

Your request has been received correctly at the UPC School.

We will contact you soon.

Thank you for your interest in our training programmes.

Due to an error in the connection to the database, your submission has not been processed. Please try again later, phone us on (34) 93 112 08 08, or send us an email at: webmaster.fpc@fpc.upc.edu
You have exceeded the maximum size of the file
  • If you have any doubts about the postgraduate course.
  • If you want to start the registration procedure.
How to start admission
To start the enrolment process for this programme you must complete and send the form that you will find at the bottom of these lines.

Next you will receive a welcome email detailing the three steps necessary to formalize the enrolment procedure:

1. Complete and confirm your personal details.

2. Validate your curriculum vitae and attach any additional required documentation, whenever this is necessary for admission.

3. Pay €110 in concept of the registration fee for the programme. This fee will be discounted from the total enrolment fee and will only be returned when a student isn't admitted on a programme.

Once the fee has been paid and we have all your documentation, we will assess your candidacy and, if you are admitted on the course, we will send you a letter of acceptance. This document will provide you with all the necessary information to formalize the enrolment process for the programme.




  date protection policy

* Mandatory fields


Fatal error: Uncaught --> Smarty: Unable to load template 'file:default/avislegal.gpdr_fitxa_solinfo.ing.html' <-- thrown in /fpc/www/fpc.upc.edu/libs/smarty/libs/sysplugins/smarty_internal_template.php on line 163
Send