Interuniversity Master's Degree in Cybersecurity (MUniCS)

General Data

ECTS Credits: 90
Level: EQF-7 (Master)
Fields of study: 06 Information and Communication Technologies (ICTs)
Mode of Learning: Presential
Study Modality: Full time
Professional Practices: Yes
Available for Mobility Students: Yes

Coordination

Ana Fernández Vilas
(+34) 986 812100
teleco.asuntosxerais@uvigo.es

Presentation

The Interuniversity Master in Cybersecurity from the University of Vigo and the University of A Coruña is a specialised study programme that offers a rigorous and extensive professional training in this field, from fundamentals to applications, from mechanisms to legislation, and from concepts to real business problems.

The training program consists of 90 ECTS, divided into three semesters. The first year focuses on technical subjects, while the last semester is dedicated to legal and management aspects, internships in companies, and the final Master’s Thesis (TFM).

Main Objective

The mission of this degree is to train highly qualified professionals in all technical, organisational, operational and forensic processes related to digital security. The institution (ISC)2 estimates that in the coming years there will be more than 1.5 million specialist positions in this field that cannot be filled. This is the present that is transforming the professional landscape and this master’s degree allows both newcomers to the ICT field and experienced professionals to specialise in this area.

Competencies

General Competences

  • Ability to analyse and synthesise. Ability to project, model, calculate and design security solutions for information and communications systems in all areas of application.
  • Problem solving. Ability to solve, with the acquired knowledge, specific problems in the technical field of information security, networks or communications systems.
  • Ability for critical reasoning and critical evaluation of any information protection system, any information security system, network security and/or communications systems.
  • Ethical commitment. Ability to design and implement technical and management solutions with ethical criteria of responsibility and professional ethics in the field of information security, networks and/or communications systems.
  • Ability to apply theoretical knowledge in practice, within the framework of specific infrastructures, equipment and application, and subject to specific operating requirements.
  • Research skills. Ability to innovate and contribute to the advancement of principles, techniques and processes related to their professional field, designing new algorithms, devices, techniques or models useful for the protection of public, private or commercial digital assets.

Specific Competences

  • Know, understand and apply the methods of cryptography and cryptanalysis, the fundamentals of digital identity and secure communications protocols.
  • In-depth knowledge of cyber-attack and cyber-defence techniques.
  • Know the technical and legal regulations applicable to cybersecurity, their implications in the design of systems, in the use of security tools and in the protection of information.
  • Understand and apply cybersecurity methods and techniques applicable to data, hardware, communications networks, databases, software and information services.
  • Design, implement and maintain an information security management system using reference methodologies.
  • Develop and apply forensic investigation methods for the analysis of cybersecurity incidents or risks.
  • Ability to perform the security audit of systems and facilities, the analysis of risks derived from cybersecurity weaknesses and develop the certification process of secure systems.
  • Ability to conceive, design, implement and maintain cybersecurity systems.
  • Ability to develop clear, concise and reasoned plans and projects in the field of cybersecurity.
  • Know the mathematical foundations of cryptographic techniques and to understand their evolution and future trends.
  • Gather and interpret relevant data in the area of computer and communications security.
  • Know the role of cybersecurity in the design of new industries, as well as the particularities, restrictions and limitations that must be undertaken to obtain a secure industrial infrastructure.
  • Ability to analyse, detect and eliminate vulnerabilities, and malware susceptible to use them, in systems and networks.
  • Ability to develop a business continuity plan following norms and reference standards.
  • Ability to identify the economic value and any other of the institution information, its critical processes and the impact that the interruption of these would produce. Also, the internal and external needs that will allow to be prepared against security attacks.
  • Ability to envision and focus the business effort on cybersecurity-related issues, and with a viable monetization.
  • Ability to plan in time the periods of detection of incidents or disasters, and their recovery.
  • Adequately interpret the sources of information in the field of computer criminal law (laws, jurisprudence and doctrine) at national and international level.
  • Know how to identify the personnel profiles necessary for an institution according to its characteristics and its sector.
  • Knowledge of companies specifically oriented to the security sector in our environment.

Transversal Competences

  • Ability to understand the meaning and application of the gender perspective in the different fields of knowledge and in professional practice with the aim of achieving a more fair and egalitarian society.
  • Ability to communicate orally and in writing in Galician language.
  • Sustainability and environmental commitment. Equitable, responsible and efficient use of resources.
  • Assume as a professional and citizen the importance of lifelong learning.
  • Value the importance of information security in the socioeconomic progress of society.

Basic Competences

  • Students should demonstrate possession and understanding of knowledge in an area of study that builds on the foundation of general secondary education and is usually at a level that, despite relying on advanced textbooks, also includes some aspects that involve knowledge from the forefront of their field of study.
  • Students should know how to apply their knowledge to their work or vocation in a professional manner and possess the competencies that are usually demonstrated through the elaboration and defence of arguments and problem solving within their area of study.
  • Students should be able to gather and interpret relevant data (usually within their area of study) to make judgments that include a reflection on relevant social, scientific or ethical issues.
  • Students should be able to convey information, ideas, problems and solutions to both specialised and non-specialised audiences.
  • Students should have developed the learning skills necessary to undertake further studies with a high degree of autonomy.

Structure and Distribution of Credits

The master’s degree studies are organised by modules.

Modules

  • Cybersecurity Management and Legislation Module, which is compulsory. This module consists of 9 ECTS, divided into two courses of 6 and 3 ECTS, respectively.
  • Cybersecurity Fundamentals Module, of a compulsory nature, consisting of four courses of 6 ECTS each.
  • Cybersecurity Techniques Module, which is compulsory. The module consists of four courses, three of them of 5 ECTS and one of 3 ECTS. The purpose of these subjects is to complete the training of the students by applying the knowledge of the Fundamentals module to the protection of systems.
  • Complementary Training Module, of optional nature, consisting of elective courses of 3 ECTS each. Each student must compulsorily take three courses among those offered (five in the memory).
  • Internships and Final Degree Project (TFM), which is compulsory and consists of 30 ECTS. This module includes the recognition of professional experience. 15 ECTS correspond to the Internships in Company and another 15 ECTS to the Final Degree Project.

The Master’s Degree in Cybersecurity is obtained with 90 ECTS. To complete the degree, students must take all the compulsory modules and three courses (9 ECTS) to be chosen freely from the Complementary Training module. The curriculum does not include specialisations, but reserves 9 ECTS to specialise the training in those specific areas that are of greater interest to students.

Distribution by semesters

1st semester

  • Cybersecurity Management and Legislation, 6 ECTS.
  • Cybersecurity Fundamentals, 24 ECTS.

2nd semester

  • Cybersecurity Techniques, 18 ECTS.
  • Cybersecurity Management and Legislation, 3 ECTS.
  • Complementary Training Module, 9 ECTS.

3rd semester

  • Internships Module, 15 ECTS.
  • Final Degree Project (TFM) Module, 15 ECTS.

 

Distribution by modules

ModuleCourseECTSTypeSemesterYear
Cybersecurity Management and LegislationCybersecurity Concepts and Laws3Compulsory21
Information security management6Compulsory11
Cybersecurity FundamentalsInformation security6Compulsory11
Communication security6Compulsory21
Application security6Compulsory11
Secure networks6Compulsory11
Cybersecurity Techniques Complementary TrainingFortification of operating systems5Compulsory11
Intrusion tests5Compulsory21
Malware analysis5Compulsory21
Security as a business3Compulsory21
Complementary TrainingSecurity in mobile devices3Elective21
Forensic analysis of equipment3Elective21
Ubiquitous security3Elective21
Incident management3Elective21
Cybersecurity in industrial environments3Elective21
Internships and Final Degree Project (TFM)Internships15External internships12
Final Degree Project15Final Degree Project12

 



 

Courses

1st term

Code Name Year Term ECTS Type Mobility

2nd term

Code Name Year Term ECTS Type Mobility

1st term

Code Name Year Term ECTS Type Mobility

2nd term

Code Name Year Term ECTS Type Mobility

1º Year

Code Name Term ECTS Type Mobility

2º Year

Code Name Term ECTS Type Mobility

3º Year

Code Name Term ECTS Type Mobility

4º Year

Code Name Term ECTS Type Mobility

1º Year

Code Name Term ECTS Type Mobility

2º Year

Code Name Term ECTS Type Mobility

3º Year

Code Name Term ECTS Type Mobility

4º Year

Code Name Term ECTS Type Mobility