Study Plan
Prework
9h.
Leveling Course
- Basics of system administration in Windows and Linux.
- Installation and configuration of programs and tools.
- Using the command line with ease.
- Understanding basic concepts about binary and hexadecimal codes, ASCII and Base64, working with text files and binary files.
- Experience configuring and operating virtual machines.
Cybersecurity and Cyberthreats
70h.
The current cybersecurity situation. What are the cyberthreats and how can they be dealt with?
Global Cybersecurity Panorama:
- Current cybersecurity overview
- Cybersecurity labor market
- General cybersecurity concepts
- Defense in depth: technology, processes, and people.
- Cybersecurity domains: management, architecture, services.
- The future of cybersecurity: Megatrends (Blockchain, IoT, 5G, quantum computing, IA/ML).
Cyberthreats:
- Cyberthreat actors: motivation, activity and TTPs.
Cybersecurity Management
- Risk management and control.
- Regulation / Compliance
Malware
75h.
Scripting, communication security and malware: What it is, how it works and life cycle.
Programming Concepts::
- Introduction and aims
- Numerical representation in computing
- Variables and constants
- Lists and dictionaries
- Arithmetic operators
- Logical operators
- Sequence, repetition, and branching
- Functions
- Classes and objects (basic)
- Programming languages
- Practical work
Communication Protocols - TCP/IP::
- Network protocols
- Security at the physical and data-link layers
- Security at the network layer
- Security at the transport layer
- Security at the application layer
Malware:
- What is malware?
- Malware development
- Files susceptible to containing malware
- Infection vectors
- Malware stages
- Anti-malware tools
- APT: Advanced Persistent Threats
Ethical hacking
75h.
Pentesting. Determining the techniques, procedures and tools used to identify vulnerabilities in networks and systems.
- Fundamental concepts, methodologies, and tools
- Information gathering and enumeration
- Exploitation
- Post-exploitation
Bastioning and Secure Configuration of Systems and Networks
70h.
Designing and establishing plans to securely configure systems and networks. Understanding the standards and good practices within the sector
- Risk-based approach to defining security levels
- Benchmark standards for secure configuration
- Bastioning in Windows environments
- Bastioning in Linux environments
- Security settings for mobile apps
- Bastioning for Web apps
- Network security architectures
Cryptography. Cybersecurity Auditing
70h.
Discover standards and techniques to verify network and system security and ensure they are securely set up.
- Cryptography
- Introduction to cybersecurity auditing
- End-to-end auditing
- Fieldwork and microplanning
- Cybersecurity audit tools & case studies
Incident Management and Cyber Intelligence
75h.
Developing cybersecurity incident response plans, using identification, containment, and recovery techniques.
- Incident response process
- Organization, roles, and responsibilities
- Containment and response case studies
- Evidence collection and analysis
- Reporting and lessons learned
Forensic Analysis
75h.
Application of forensic analysis methodologies and tools characterizing the preservation, collection, analysis and documentation phases.
- Forensic analysis methodology
- Tools and solutions
- Forensic analysis in Windows environments
- Forensic analysis in Linux environments
- Forensic analysis on mobile devices
- Generating reports
Capstone Project
80h.
This final project of the Master’s puts the knowledge and skills acquired by students into practice by applying it to a real-world case and with data connected to the business world. It is a mandatory component within the scope of the final part of the study plan, and carried out under the supervision of an assigned tutor. Students must also undergo a viva voce exam of their capstone project.