Accreditations according to architecture

The student will be trained in possible threats and the necessary security management on strategic environments, both from the point of view of incident response and vulnerability checking and possible alert motorization.

Mobile and ubiquitous devices are one of the communication and storage bases of most entities. The knowledge of the security related to these devices (cell phones, sensors, RFID, etc.) will allow to minimize threats related to malware, poor configuration or update and to have the tools to react to new attacks.

This accreditation provides the student with the necessary knowledge to correctly manage the information security of user and server networks, applying the most appropriate policies in each case and knowing the most appropriate monitoring and response processes according to the different risks.

Accreditations according to the security cycle

The correct monitoring and correlation of security events allows an increase in the number of security updates and the reduction of resources needed to detect threats. During the different courses that make up this accreditation, different methodologies applied to wired networks, wireless and ubiquitous systems will be explored.

Knowledge of auditing methodologies on the various network devices makes it possible to check whether the protection measures put in place are valid and helps to detect the associated risks.

During the courses that comprise this accreditation, students will be trained in the different aspects of forensic analysis of devices and malware that can be found in the different existing work environments: from central desktops to Human Machine Interfaces (HMI) present in critical infrastructures.