Master the knowledge required to propose original designs or developments, often in a research process within the area of cyber security.
Ability to apply acquired knowledge to solve problems under novel or almost novel situations or within broader (multidisciplinar) contexts related with cyber security.
Ability to state critical opinions and judgements having incomplete or limited information in the field of cyber security. These judgements must take into account include considerations about social and ethical responsibilities.
Discuss in a public audience about their acquired knowledge, and the conclusions from the work. Students will be able to give their foundational and most convincing reasons to a specialized and non specialized audience in a clear way, without ambiguities.
Students should have the learning skills required to continue studying in a autonomous or self-directed way.
Create, design, deploy and maintain a cyber defense global system in a given context.
Create and refine concise and comprehensively documents, plans and projects in the scope of cyber security.
Know the relevant technique part of the legal regulation in cyber security and its implications in the design of systems and security tools.
Analyze systems to find attack evidences and to adopt the required measures to maintain the custody chain of the found evidences.
Apply the suited services, mechanisms and security protocols to a given case.
Design and evaluate security architectures of systems and networks.
Know and apply the cryptographic and steganographic mechanisms required to protect data stored in a system or data transiting a network.
Analyze the risks of introducing personal devices in a corporate professional environment (Bring your own device). Know and apply the measures to control the risks.
LEARNING OUTCOMES
This course contributes to the following learning outcomes:
Design strategies to distribute sensors in a network and analyze observed events to determine which are relevant in a particular case.
Given a system under attack, identify the features of most of these attacks and point out the most probable sources.
Given an attack and its source, propose countermeasures to counteract it explaining its efficacy. Evaluate network zoning strategies and design traffic filtering policies.
To design and evaluate appropriate measures for the identification and authentication of users and management of identities and associated authorizations.