Descubre nuestras becas en tecnología junto a la Fundación ONCE 🧑🏽‍💻
Logo de IMMUNE

Online Master’s in Cybersecurity

Live online classes
11-month course
Mondays and Wednesdays
October, 2024

Limited availability | 2 weekly sessions of live classes | 360º specialization in cybersecurity

In partnership with:
More Info

Cyber talent

Do you have a cybersecurity-related project you would like to develop? Have you detected any cybersecurity needs? Are you looking for financing to start up your own company? IMMUNE, in partnership with INCIBE, is organizing the CYBERTALENT program, a three-year plan to promote cybersecurity entrepreneurship in Spain.
Phase 1: Recruitment / Ideation
Get ready through our events
Phase 2: Seedbed Incubator
Develop your idea and get it up and running
Phase 3: Acceleration
Grow your business with the support of Incibe
Study Plan

Study Plan


Leveling Course

  • Basics of system administration in Windows and Linux.
  • Installation and configuration of programs and tools.
  • Using the command line with ease.
  • Understanding basic concepts about binary and hexadecimal codes, ASCII and Base64, working with text files and binary files.
  • Experience configuring and operating virtual machines.


Cybersecurity and Cyberthreats

The current cybersecurity situation. What are the cyberthreats and how can they be dealt with?

Global Cybersecurity Panorama:

  • Current cybersecurity overview
  • Cybersecurity labor market
  • General cybersecurity concepts
  • Defense in depth: technology, processes, and people.
  • Cybersecurity domains: management, architecture, services.
  • The future of cybersecurity: Megatrends (Blockchain, IoT, 5G, quantum computing, IA/ML).


  • Cyberthreat actors: motivation, activity and TTPs.

Cybersecurity Management

  • Risk management and control.
  • Regulation / Compliance



Scripting, communication security and malware: What it is, how it works and life cycle.

Programming Concepts::

  • Introduction and aims
  • Numerical representation in computing
  • Variables and constants
  • Lists and dictionaries
  • Arithmetic operators
  • Logical operators
  • Sequence, repetition, and branching
  • Functions
  • Classes and objects (basic)
  • Programming languages
  • Practical work

Communication Protocols - TCP/IP::

  • Network protocols
  • Security at the physical and data-link layers
  • Security at the network layer
  • Security at the transport layer
  • Security at the application layer


  • What is malware?
  • Malware development
  • Files susceptible to containing malware
  • Infection vectors
  • Malware stages
  • Anti-malware tools
  • APT: Advanced Persistent Threats


Ethical hacking

Pentesting. Determining the techniques, procedures and tools used to identify vulnerabilities in networks and systems.

  • Fundamental concepts, methodologies, and tools
  • Information gathering and enumeration
  • Exploitation
  • Post-exploitation


Bastioning and Secure Configuration of Systems and Networks

Designing and establishing plans to securely configure systems and networks. Understanding the standards and good practices within the sector

  • Risk-based approach to defining security levels
  • Benchmark standards for secure configuration
  • Bastioning in Windows environments
  • Bastioning in Linux environments
  • Security settings for mobile apps
  • Bastioning for Web apps
  • Network security architectures


Cryptography. Cybersecurity Auditing

Discover standards and techniques to verify network and system security and ensure they are securely set up.

  • Cryptography
  • Introduction to cybersecurity auditing
  • End-to-end auditing
  • Fieldwork and microplanning
  • Cybersecurity audit tools & case studies


Incident Management and Cyber Intelligence

Developing cybersecurity incident response plans, using identification, containment, and recovery techniques.

  • Incident response process
  • Organization, roles, and responsibilities
  • Containment and response case studies
  • Evidence collection and analysis
  • Reporting and lessons learned


Forensic Analysis

Application of forensic analysis methodologies and tools characterizing the preservation, collection, analysis and documentation phases.

  • Forensic analysis methodology
  • Tools and solutions
  • Forensic analysis in Windows environments
  • Forensic analysis in Linux environments
  • Forensic analysis on mobile devices
  • Generating reports


Capstone Project

This final project of the Master’s puts the knowledge and skills acquired by students into practice by applying it to a real-world case and with data connected to the business world. It is a mandatory component within the scope of the final part of the study plan, and carried out under the supervision of an assigned tutor. Students must also undergo a viva voce exam of their capstone project.


*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.
Outstanding Mentors


María Riesco
María Riesco

Master’s in Cybersecurity Director | Head of Spanish National Police Cybersecurity Group

José Carlos Alvarez-Gascón

Senior Corps of Information Systems and Technologies of the Spanish Government

Margarita López del Campo
Margarita López del Campo

Information Security Officer en Credit Suisse

Sergio Ruiz Teclesmayer
Sergio Ruiz Teclesmayer

Malware Analyst at Panda Security

Ricardo Sánchez
Ricardo Sánchez

Red Team Leader - Security Engineer at Siemens

Rubén Ayala
Rubén Ayala

Security Architect at BBVA | Docente | CISSP CEH Cloud | Cyber Security

Carlos Leonardo
Carlos Leonardo

National CSIRT Director of the Dominican Republic

Manuel Guerra
Manuel Guerra

*We are always on the lookout for the best professionals in the sector, so the team may vary from one edition of the course to another

Certification Training

At the end of the program you will have the most widespread skills and techniques used in the industry's work environment. In addition to preparing you as a cybersecurity specialist, it gives you the basis to prepare you for official international certifications such as:

At IMMUNE we are wholly committed to ensuring that our students obtain the essential competencies and skills that the market demands. That’s why we offer an optional IT certification program for various subjects:

*As an IMMUNE student you will enjoy free access to certification exams.
Academic Information

Gobierno y planes directores, investigación y respuesta ante incidentes, pentesting y hacking ético, o arquitecturas de ciberseguridad. 11 meses de conocimientos técnicos, competencias y habilidades en hacking, ciberfraude y forense. El Máster en Ciberseguridad Online utiliza la técnica Capture The Flag para identificar las vulnerabilidades que afectan el código para formarte y especializarte en ciberseguridad en un formato online, con metodología práctica, flexible y colaborativa.

Program Aims
  • Define and develop the organization and the processes related to corporate cybersecurity.
  • Design and propose network architectures and secure systems.
  • Forensic techniques applied to cybersecurity breaches. Learn to investigate and respond to incidents.
  • Identify the main vulnerabilities that affect code. Develop secure code.
  • Auditing and pentesting.
Competencias profesionales del programa

Estas son solo algunas de las salidas profesionales que tiene el máster en ciberseguridad online. Podrás trabajar como: Analista de ciberseguridad, consultor de riesgos, consultor en ciberseguridad, hacker ético, analista forense, especialista en respuesta ante incidentes.A través del máster en ciberseguridad online adquieres los conocimientos necesarios para optar a la certificación: CSX de ISACA.

Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

Una experiencia única

Utilizamos el storytelling para crear experiencias de aprendizaje memorables que conecten con las emociones de nuestros estudiantes.

The industry is on fire
+84% Improved Employment Status
+40 Monthly Job Offers
94,5% Employability
+4,7 Job Offers/Student

An innovative and vibrant Tech Hub

We are not conventional and our campus even less so.
Designed to replicate an ecosystem of startups and tech companies, we have created a Silicon Valley oasis in the heart of Madrid. Come and check it out.

Visit the Campus
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Our students are working in
Marta Pérez

Fabio Lai
IT & Networking Expert at Sophos

"The practical component of the Master’s is so important, as you will truly learn through repetition."

Tomás Woodhalllogo universitat manhheim

Tomás Woodhall
Solutions Architect at AWS

"They will train you to be able to defend businesses from all possible types of threats."


IMMUNE Financing

Full Payment
Pay for the course in a single installment and receive a 5% discount.

9 / 16 Interest-free Installments
Payment can be made in 9 installments for on campus courses and 16 installments for online master’s courses.

External Financing

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Pay for your training through the Spanish Employment Training Foundation
*Aimed at active workers who wish to finance their program through the subsidized training program.


We are here to answer your questions!

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

Do I need prior knowledge or experience?

No prior knowledge is required since all programs start from scratch. It is advisable however, to have user-level knowledge and a keenness for technology.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

What certification or qualification will I receive on completion of the course?

Once you have finished and passed the program, you will receive a diploma issued by IMMUNE Technology Institute in digital format and verifiable using blockchain technology.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

This program is for you if...

  • Networking de asistentes a evento de tecnología en immune
    Do you want to level up?

    Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

  • Estudiantes del centro tecnológico immune dando clase de tecnología
    Are you finishing your degree, and you want an upgrade in technology?

    We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level. 

  • profesor de máster enseñando conceptos tecnológicos
    Want to change your professional career?

    If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile. 

  • Alumnos de programa tecnológico en clase de ciberseguridad, data science y programación
    Are you an entrepreneur or freelancer?

    This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

Personal Interview
Academic Committee

Paseo de la Castellana 89, 28046 Madrid
© IMMUNE Technology Institute. All rights reserved.
Awards and recognitionspremio educacion en tecnologia e innovacionpremio educacion en tecnologia e innovacionlogo memberlogo premios excelencia educativalogo european excellence education
Logo GIMI instituteInnovation Catalyst
logo european excellence educationAcademic Partnerslogo asottechInternational partnerslogo sica