Master CYBER SECURITY

Harbour.Space University
En Barcelona (España)
2 opiniones

22.900 € - ($ 389.117)
IVA inc.

Información importante

  • Master
  • Barcelona (España)
  • Duración:
    2 Years
Descripción

Nowadays every single company has been hacked. Cyber security jobs are really on demand, but the applicants are not skilled enough to handle enterprise security challenges. If you are interested in this kind of work and want to develop your path towards it, this MSc in CYBER SECURITY will teach you every important subject, such as cryptography, java programming and cyber warfare.

During two years you will build a solid foundation in key technology including computer and network security, enterprise security architecture analysis, cyber risk management, etc. You will evolve at the same pace and rhythm as changing technologies, adapt yourself and manage new threats.

Do not hesitate and ask for more information in order to start your successful career in enterprise security.

Información importante
¿Qué pasará tras pedir información?

We will contact you per phone and/or email to find out about your motivation.

Requisitos: - Bachelor of Science - Math test - Skype interview - Personal project - High motivation

Sedes

Dónde se enseña y en qué fechas

inicio Ubicación
17 octubre 2016
Barcelona
Carrer de Roc Boronat, 117, Barcelona, España
Ver mapa

Opiniones

M

21/06/2016
Lo mejor I know that Harbour.Space will give me the career I want, only then can I grow successful and passionate about my job. They will help me acquire the skills and knowledge needed in order to achieve my dream.

A mejorar Nothing negative.

Curso realizado: Junio 2016 | Recomendarías este centro? Sí.
N

22/06/2016
Lo mejor Harbour.Space taught me a non-standardised view. Their professors will help me study my favourite subject and achieve my goals in my professional career.

A mejorar Nothing bad.

Curso realizado: Junio 2016 | Recomendarías este centro? Sí.

¿Qué aprendés en este curso?

Security Systems Installation
Internet Security
Unix
Network security
Computer virus
Firewall
Hacker
Algorithms
Data Collection
Security Management
Programming
IT Security
Cryptography
Cybersecurity
Enterprise security architecture analysis

Temario

PROGRAMME STRUCTURE

1

1 YEAR

During the first year students quickly recap basics of computer science and then focus on fundamentals of cybersecurity including computer architecture, operating systems security, secure programming, networks, and cryptography.

Modules

·         Computer Architecture

·         Secure Programming

·         Algorithms and Data Structures

·         Practical Unix

·         Windows Administration

·         Operating Systems

·         Computer Networking

·         Human Aspects of Cybersecurity: Law, Ethics and Privacy

·         Cryptography

·         Software Engineering & Design

·         Scripting Languages

·         Java Programming

·         Identity and Access Management

·         Technical Writing and Presenting

·         Introduction to Interaction Design

·         Leadership and Group Dynamics

·         Secure Data management

·         Captstone Project

·         Seminars & Workshops

 

 

2

2 YEAR

The second year exposes students to different dimensions of cybersecurity field. Subjects range from Mobile and Cloud Security to Digital Forensics and Quantum Communication and Cryptography. Additionally students participate in communication and leadership modules preparing them for the career as a successful member of a professional team. At the end of the programme, graduates will be ready to take on responsibilities to safeguard an organization’s information and technology assets.

Modules

·         Technical Project Management

·         Application Security

·         Mobile Security

·         Network Security

·         Enterprise Security Architecture and Design

·         Software Testing

·         Reverse Software Engineering

·         Vulnerability Analysis, Penetration Testing, Intrusion Detection and Incident Handling

·         Ethical Hacking and Response

·         Cyber Warfare

·         Security Tools for Information Security

·         Digital Forensics

·         Quantum Communication and Cryptography

·         Parallel and Distributed Computing

·         Cloud Computing

·         Advanced computer networks

·         Distributed Databases

·         Global Cyber Capabilities and Trends

·         Enterprise Security Threats

·         Enterprise Security Case Studies

·         Economics of Security

·         Cyber Risk Management