Cybersecurity Master

In partnership with:

Live online classes

March 2025

11 months | 2 weekly live class sessions

Free access to complementary training:

  • Generative AI Course: Prompt Engineering and Productivity
  • Introductory programming course: Python
We prepare you to get certified in:
Cisco Certified CCST CybersecurityCisco Certified CCST NetworkingMicrosoft Certified FundamentalsIT Specialist Cybersecurity

Prework

Presentation of the curriculum, work tools, program operation and presentation of the group.

Study plan

Prework

9h.

Leveling Course

  • Basics of system administration in Windows and Linux.
  • Installation and configuration of programs and tools.
  • Using the command line with ease.
  • Understanding basic concepts about binary and hexadecimal codes, ASCII and Base64, working with text files and binary files.
  • Experience configuring and operating virtual machines.
Cybersecurity and Cyberthreats

70h.

The current cybersecurity situation. What are the cyberthreats and how can they be dealt with?

Global Cybersecurity Panorama:

  • Current cybersecurity overview
  • Cybersecurity labor market
  • General cybersecurity concepts
  • Defense in depth: technology, processes, and people.
  • Cybersecurity domains: management, architecture, services.
  • The future of cybersecurity: Megatrends (Blockchain, IoT, 5G, quantum computing, IA/ML).

Cyberthreats:

  • Cyberthreat actors: motivation, activity and TTPs.

Cybersecurity Management

  • Risk management and control.
  • Regulation / Compliance
Malware

75h.

Scripting, communication security and malware: What it is, how it works and life cycle.

Programming Concepts:::

  • Introduction and aims
  • Numerical representation in computing
  • Variables and constants
  • Lists and dictionaries
  • Arithmetic operators
  • Logical operators
  • Sequence, repetition, and branching
  • Functions
  • Classes and objects (basic)
  • Programming languages
  • Practical work

Communication Protocols - TCP/IP:::

  • Network protocols
  • Security at the physical and data-link layers
  • Security at the network layer
  • Security at the transport layer
  • Security at the application layer

Malware:

  • What is malware?
  • Malware development
  • Files susceptible to containing malware
  • Infection vectors
  • Malware stages
  • Anti-malware tools
  • APT: Advanced Persistent Threats
Ethical hacking

75h.

Pentesting. Determining the techniques, procedures and tools used to identify vulnerabilities in networks and systems.

  • Fundamental concepts, methodologies, and tools
  • Information gathering and enumeration
  • Exploitation
  • Post-exploitation
Bastioning and Secure Configuration of Systems and Networks

70h.

Designing and establishing plans to securely configure systems and networks. Understanding the standards and good practices within the sector

  • Risk-based approach to defining security levels
  • Benchmark standards for secure configuration
  • Bastioning in Windows environments
  • Bastioning in Linux environments
  • Security settings for mobile apps
  • Bastioning for Web apps
  • Network security architectures
Cryptography. Cybersecurity Auditing

70h.

Discover standards and techniques to verify network and system security and ensure they are securely set up.

  • Cryptography
  • Introduction to cybersecurity auditing
  • End-to-end auditing
  • Fieldwork and microplanning
  • Cybersecurity audit tools & case studies
Incident Management and Cyber Intelligence

75h.

Developing cybersecurity incident response plans, using identification, containment, and recovery techniques.

  • Incident response process
  • Organization, roles, and responsibilities
  • Containment and response case studies
  • Evidence collection and analysis
  • Reporting and lessons learned
Forensic Analysis

75h.

Application of forensic analysis methodologies and tools characterizing the preservation, collection, analysis and documentation phases.

  • Forensic analysis methodology
  • Tools and solutions
  • Forensic analysis in Windows environments
  • Forensic analysis in Linux environments
  • Forensic analysis on mobile devices
  • Generating reports
Capstone Project

80h.

This final project of the Master’s puts the knowledge and skills acquired by students into practice by applying it to a real-world case and with data connected to the business world. It is a mandatory component within the scope of the final part of the study plan, and carried out under the supervision of an assigned tutor. Students must also undergo a viva voce exam of their capstone project.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.

We rub shoulders with the best

María Riesco

Maria Riesco

Master's in Cybersecurity Director | Head of Spanish National Police Cybersecurity Group

Carlos Luis Leonardo García

Carlos Luis Leonardo García

National CSIRT Director of the Dominican Republic

Francisco Hernández Cuchi

Francisco Hernández Cuchi

Head of Cyber Operations Area

Gonzalo Barañano Muñoz

Gonzalo Barañano Muñoz

Lecturer. Master's Degree in Computer Security

Manuel López Guerra

Manuel López Guerra

Forensic Analysis Expert, Linux Engineer

Margarita López del Campo

Margarita López del Campo

Information Security Officer

Ricardo Sánchez Ruíz

Ricardo Sánchez Ruíz

Red Team Leader - Security Engineer at Siemens

Rubén Ayala Jiménez

Rubén Ayala Jiménez

Security Architect at BBVA : CISSP CEH Cloud : Cyber Security

Sergio Ruiz Teclesmayer

Sergio Ruiz Teclesmayer

Malware Analyst

Certification training

With this program, you will acquire the skills needed to work in a professional environment. To help you showcase them, IMMUNE offers you these official certifications for free:

Cisco Certified CCST CybersecurityCisco Certified CCST NetworkingMicrosoft Certified FundamentalsIT Specialist Cybersecurity
ElizaCareer opportunities

Cybersecurity analyst | Risk consultant | Cybersecurity consultant | Ethical hacker | Forensic analyst | Incident response specialist | Incident response specialist


Certifications
Cisco

Cisco certified

CCST Cybersecurity and Networking

Microsoft Azure

Microsoft Certified

SC-900 Security, Compliance and Identity Fundamentals

Pearson

IT Specialist

Cybersecurity

IMMUNE

IMMUNE Technology Institute

Data Science Master

Academic information

Government and master plans, incident research and response, pentesting, and ethical hacking, or cybersecurity architectures. 11 months of technical knowledge, skills, and competencies in hacking, cyber fraud, and forensics. The Online Master's in Cybersecurity uses the Capture The Flag technique to identify vulnerabilities affecting code, preparing and specializing you in cybersecurity through an online format with a practical, flexible, and collaborative methodology.

Prerequisites
  • Basic knowledge of Windows and Linux operating systems
  • Installation and configuration of programs and tools.
  • Using the command line with ease.
  • Understanding basic concepts about binary and hexadecimal codes, ASCII and Base64, working with text files and binary files.
  • Experience configuring and operating virtual machines.
Program aims
  • Define and develop the organization and the processes related to corporate cybersecurity.
  • Design and propose network architectures and secure systems.
  • Forensic techniques applied to cybersecurity breaches. Learn to investigate and respond to incidents.
  • Identify the main vulnerabilities that affect code. Develop secure code.
  • Auditing and pentesting.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

CybertalentIncibe

Cybertalent

Do you have a cybersecurity-related project that you would like to develop? Have you identified a cybersecurity need? Do you need funding to launch your company? IMMUNE, in collaboration with INCIBE, is developing the CYBERTALENT program, a three-year plan to promote cybersecurity entrepreneurship in Spain.

Find out more
Seedbed Incubator
Business Accelerator
Captación
Phase 1: Recruitment / Ideation
Get ready through our events
Incubación
Phase 2: Seedbed Incubator
Develop your idea and get it up and running
Aceleración
Phase 3: Acceleration
Grow your business with the support of Incibe
Financiado por la Unión Europea NextGenerationEUGobierno de EspañaPlan de Recuperación, Transformación y ResilienciaIncibeIMMUNE Technology Institute
Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Testimonials

Financing

IMMUNE financing

Full payment

Si realizas el pago en una sola cuota te beneficiarás de un 20% de descuento.

12 interest-free instalments

External financing

Sequra

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Fundae

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

FAQs
This program is for you if

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

What certification or qualification will I receive on completion of the course?

Once you have finished and passed the program, you will receive a diploma issued by IMMUNE Technology Institute in digital format and verifiable using blockchain technology.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application
2. Personal interview
3. Academic committee
4. Enrollment
Request informationStudy planCertificationsAcademic informationFinancingFAQs
IMMUNE Campus

An innovative and vibrant Tech Hub

We are not conventional and our campus even less so.
Designed to replicate an ecosystem of startups and tech companies, we have created a Silicon Valley oasis in the heart of Madrid. Come and check it out.

Visit the campus
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio
Subscribe to our newsletter
menuchevron-down