- Acquire the knowledge required to propose original designs or developments, often in a research process within the area of cyber security.
- Ability to apply acquired knowledge to solve problems under novel or almost novel situations, or within broader (multidisciplinar) contexts related with cyber security.
- Ability to state critical opinions and judgements having incomplete or limited information in the field of cyber security. These judgements must take into account considerations about social and ethical responsibilities.
- Ability to communicate to a public audience the conclusions of a work carried out. Students will be able to give their foundational and most convincing reasons to a specialized and non specialized audience in a clear way, without ambiguities.
- Students should have the learning skills required to continue studying in a autonomous or self-directed way.
- Understand and apply methods and techniques to investigate vulnerabilities of a given site.
- Create and refine concise and comprehensively documents, plans and projects in the scope of cyber security.
- Know the relevant technical parts of legal regulations in cyber security and their implications in the design of systems and security tools.
- Analyze and detect anomalies and attack signatures in systems and networks.
- Analyze and detect hiding techniques in attacks to systems and networks.
- Knowledge of trends in cyber attack techniques and learned experiences in real cases.
- Know and apply cryptographic and steganographic mechanisms required to protect data stored in a system or data transiting a network.
LEARNING OUTCOMES
This course contributes to the following learning outcomes:
Explain other attack techniques to a system that is not vulnerable to direct intrusion
Knowing the type of information and defense mechanisms deployed in a system, explain the impact of different threats and intrusions and, in particular, information leaks.