Applied Cryptography
CC4076 - ECTS
To understand the security problem with computer networks as well as security problems in general and the use of cryptography in this context.
The study of the most relevant cryptographic primitives, the security guarantees that they provide, their possible applications and good practices, as well as possible attacks.
To get acquainted to a sufficient large set of cryptographic protocols such that it is possible to port "real life” activities to the digital realm.
Security Operations
CC4081 - ECTS
Security operations are unavoidable in any mid- to large-sized organization, either through internal security operations centers or through outsourcing, and this course covers the specifics of how security operations centers work. The students are expected to acquire a thorough understanding of the major organizational aspects of an operations center, of the information system architectures used currently in security operations centers, and of challenges and future approaches for security operations centers.
Digital Preservation
CC4044 - ECTS
Make the students aware of the relevance of digital preservation matters in the context of an information security analysis.The classes are meant to create sensibility in the students for the problems of digital preservation and to expose them to experiences of case analysis, tool testing, and solutions development that give them competences adequate to participate in the development teams of information systems with a strong preservation component.
Processing of Structured Documents
CC4001 - ECTS
The main objective of this unit is to provide an introduction to structured documents and their processing, covering the XML and JSON formalisms, with emphasis on the former.
Network Security
CC4031 - ECTS
The course aims to introduce students to the concepts and problems of security in communication networks. Throughout the course, the students will review the basics of networks allowing a discussion from the point of view of security of communication protocols. Analysis and design of network architecture aiming at a high degree of safety will be developed, using techniques for monitoring and traffic analysis. Network tools will be presented and used to achieve those goals. Web security and attacks to its applications will also be addressed.
Privacy Enhancing Technologies
CC4068 - ECTS
The course aims to introduce students to the concepts and problems of data privacy and privacy enhancing technologies. Throughout the course, the students will review the fundamental concepts of security and privacy, followed by anonymization techniques for privacy-preserving data publishing and assessment of re-identification risks. It will also address the topics of secure multiparty computation and its application for privacy preserving data mining, anonymous communications and authentication.
Theory and Practice of Security Attacks
CC4029 - ECTS
To introduce the structured application of vulnerability tests in IT systems.
To transfer a detailed knowledge about the principal intrinsic weaknesses of operating sistems, applications and computer networks.
To introduce large spectre penetration testing metholodologies.
To promote a detailed study of tools, processes and methods needed to plan, implement and deploy penetration tests.
Big Data and Cloud Computing
CC4093 - ECTS
Introduction to the use of cloud computing infrastructures for processing massive amounts of data ("big data") in real-world problems.
Fraud Detection
CC4036 - ECTS
The objectives of this course are the study of data analysis methodologies that are useful in the context of the detection/forecasting of fraudulent cases. With the growing use of data collection methods in practically all human activities, the need for the use of techniques allowing the automatic analysis of such data with the objective of detection/predicting situations that could be considered anomalous or potentially fraudulent is increasing.
Mobile Communication Networks
CC4039 - ECTS
Knowledge of the fundamental principles of the operation of mobile communication networks, focusing on: the key technological aspects; wireless local area networks; the 2nd, 3rd, 4th, and 5th generation mobile networks; and the main services provided by mobile communication networks.
Systems and Data Security
CC4030 - ECTS
Introduction to the problem of security of information systems and data. Obtain detailed knowledge about the main weaknesses intrinsic to the operating systems and computers. Presentation of methods for building systems capable of withstanding attacks, operating errors and chance occurrences caused by intelligent opponents. Study of tools, processes and methods needed to plan, implement and test secure systems and adapt existing systems to real contextual environments constantly evolving. The students will:
Security and Applications in Trusted Hardware
CC4077 - ECTS
The syllabus will provide the student the knowledge about security and applications in trusted hardware. The different systems and approaches studied will provide choice and comparison points on how to tackle security issues. Students should have acquired a thorough knowledge about the different types of technologies currently available for smartcards or other type of security hardware, which can nowadays be employed in a solution of integrated security (authentication, digital signature, encryption) for telecommunications systems or more comprehensive information systems, including the web.
Security in Software Engineering
CC4078 - ECTS
The course provides an introduction to secure software engineering. Students learn how to make use of core principles, techniques, and tools for secure software engineering to prevent/detect/fix some of the most common classes of software security vulnerabilities. These skills are exercised through laboratory and project assignments.
Embedded Systems
CC4040 - ECTS
Introduction to the fundamental issues in the design and implementation of hardware and software solutions for embedded systems.
Present to students the capabilities and limitations of these systems and the rationale behind their wide usage in different enviroments.
Introduce the students to development in these platforms, providing and enviroment for work organization within the teams.
Advanced Topics in Databases
CC4007 - ECTS
Learn advanced concepts of Databases, which include the use of relational databases in an environment of generic programming languages. Students learn with special emphasis the "Application Programming Interfaces" APIs in C language of database management systems such as MySQL. They develop the ability to augment such systems through modules written in C.
The concept of deductive database and knowledge representation systems is addressed.
Spatial database concepts are also learned by studying the PostGIS module. You learn SQL with spatial extensions. Various spatial information analysis and visualization tools are used, through the Python programming language and modules such as MatPlotLib.
You learn Data Warehousing concepts and advanced aggregation operators.
NoSQL database concepts are learned.
Advanced Topics in Networking
CC4090 - ECTS
This course aims to dig deeper into select topics of data networks. It includes wireless, mobile, some operators technologies, and some research proposals. There is a balance of lectures and lab work that touches the subjects of the course, so that the student is able to apply the theoretical knowledge in practical examples.
Dissertation
CC5003 - ECTS
This curricular unit, from the last year of the masters degree, has the goal to evaluate the capacity of student’s to perform autonomous, research-level work.
Law and Privacy
DIR4000 - ECTS
The main aim of the unit is to call the students attention to the major legal aspects that the use of technology involves, specially related with privacy. Students shall take the legal solutions in account when solving a technical problem.
Information Security Management
CC4083 - ECTS
The objectives are:
- To know the information security management tools that exist. Study the ISO 27001 standard and based on this international standard reference other standards that complement and / or allow to know other tools.
- Study tools "Risk Management" existing and how to apply different methodologies to various contexts.
- Knowing what is "information" and the various levels that can exist in information classification context, differentiating between critical and public information depending on the context in which it operates
- Conduct an ISO 27001 implementation of work in a process / company in order to realize the association of management controls and information security to a practical context and in daily operations.