CB6: Master the knowledge required to propose original designs or developments, often in a research process within the area of cyber security.
CB7: Ability to apply acquired knowledge to solve problems under novel or almost novel situations or within broader (multidisciplinar) contexts related with cyber security.
CB8: Ability to state critical opinions and judgements having incomplete or limited information in the field of cyber security. These judgements must take into account include considerations about social and ethical responsibilities
CB9: Discuss in a public audience about their acquired knowledge, and the conclusions from the work. Students will be able to give their foundational and most convincing reasons to a specialized and non specialized audience in a clear way, without ambiguities .
CB10: Students should have the learning skills required to continue studying in a autonomous or self-directed way.
CG2: Create, design, deploy and maintain a cyber defense global system in a given context
CG3: Create and refine concise and comprehensively documents, plans and projects in the scope of cyber security.
CG4: Know the relevant technique part of the legal regulation in cyber security and its implications in the design of systems and security tools.
CE4: Analyze systems to find attack evidences and to adopt the required measures to maintain the custody chain of the found evidences.
CE5: Apply the suited services, mechanisms and security protocols to a given case.
CE6: Design and evaluate security architectures of systems and networks.
CE7: Know and apply the cryptographic and steganographic mechanisms required to protect data stored in a system or data transiting a network.
CE8: Analyze the risks of introducing personal devices in a corporate professional environment (Bring your own device). Know and apply the measures to control the risks.
LEARNING OUTCOMES
This course contributes to the following learning outcomes:
Given a system with security requirements established to propose mechanisms and protocols required to provide some basic security services: authentication, authorization, privacy and access control. Give a measure of their effectiveness and limitations.
Explain the security issues related to personal mobile devices in a given professional environment and apply the studied techniques to the secure systems engineering
Evaluate the security architecture of a given vulnerable system and propose improvements.
To design and evaluate appropriate measures for the identification and authentication of users and management of identities and associated authorizations.
Understand legal and technical aspects related to cybersecurity.