- Identify security objectives and vulnerabilities, threats and risks of a given information system in a defined operational environment.
- Evaluate the security services to be implemented in a given system and design and implement mechanisms and subsequent protocols.
- Evaluate and implement appropriate authentication mechanisms to access a specific system.
- Use the signature and certification systems in a particular environment.
- Design a security plan, developing the various parts of it, assessing their compliance over time and correcting deviations. Analyze and manage the risks of a particular installation.
- Develop a comprehensive recovery plan for an actual installation. Conduct a compliance audit of files and systems containing personal data.
- Use the tools that allow control of operating systems, mainly Windows and Linux.
- Manage the main techniques of collection, identification and analysis of events, guaranteeing the assurance testing and preserving the chain of custody of them. Assess and manage systems secure erase and data recovery.
- Implement databases over a transmission system. Assess and use different techniques to integrate data mining: extraction techniques and modeling analysis.
- To know concepts and objectives of databases
- To abstract and design databases using the Relational Model
- To acquire practical experience in querying a database