• Ulster University Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
De Montfort University Featured Masters Courses
University College Cork Featured Masters Courses
Cranfield University Featured Masters Courses
Nottingham Trent University Featured Masters Courses
Cardiff University Featured Masters Courses
0 miles
Computer Science×

IMF Business School Masters Degrees in Information Systems

We have 2 IMF Business School Masters Degrees in Information Systems

  • Computer Science×
  • Information Systems×
  • IMF Business School×
  • clear all
Showing 1 to 2 of 2
Order by 
In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. Read more

In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. And in 2015 cybersecurity has been identified at the World Economic Forum as one of the major risks in the world economy.

Therefore, given the growing demand for skilled professionals, IMF Business School, Deloitte and the University Camilo Jose Cela, have developed this Master in Cybersecurity, who manages to accommodate the needs of stakeholders, opting for an online high-level training with the ease of do it from anywhere. It is the only fully online master market 60 ECTS and supported by a University Moreover, the best students will be selected by Deloitte to perform CyberSOC internship at Deloitte, with high rates of joining Deloitte after completion.

This Master enables you to:

  • Acquire the skills to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • Develop techniques and use tools to fully exploit your skills and knowledge to perform penetration testing to systems and networks.
  • Get a general and introductory vision to the world of cybersecurity, explaining the most important attacks and how to mitigate them.
  • Knowing the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • Assimilate enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Knowing the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • Perform developments in secure programming and improve your skills in security audit in the analysis and evaluation of the application source code.

Objectives

Get a comprehensive and thorough knowledge in disciplines such as Cyber ​​Intelligence, malware analysis, technical audits of systems and networks (ethical hacking), forensic analysis and management of security incidents, secure web application development and monitoring and correlation of security events (SIEM through technologies).

Students:

  • You get a general and introductory vision to the world of cybersecurity, knowing the most important attacks and how to mitigate them.
  • It will acquire the necessary steps to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • It will develop technical skills and learn to use tools to fully exploit their skills and knowledge to perform penetration testing to systems and networks.
  • You know the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • He assimilated enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Learn the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • He will qualify as a developer in secure programming skills and improve security auditors in the analysis and evaluation of the application source code.

Methodology and Evaluation

Methodology

MFI offers a flexible methodology adapted to your needs, whatever your geographical location or time availability. This master can be studied under:

  • Online Methodology: All the agenda will be on hand from our virtual campus 24 hours a day, 7 days a week.
  • Distance methodology: have course material in book form.

All contents are fully updated and have great technical, easily understandable and with a clear practical vocation rigor. In addition, IMF offers you:

  • e-face tutoring staff (via forums, chat, phone, email).
  • Webinars.
  • Debates and discussion groups through forums and chats.
  • Self-assessment test.
  • Readings, case studies and documentation.

Evaluation

Continuous assessment as advances in the study of the Master.

Each module will be assessed by combining online and development of case examination; overcoming will free each subject.

Likewise, obtaining the titles of Master of IMF and Masters from the University Camilo Jose Cela, subject to overcoming the trials of each module (continuous assessment) without final examination, and conducting a Final Project Master.

Career prospects

Booming Sector

According to a recent report by the European Union, it is expected to create one million jobs in the area Cybersecurity 2020.

At the end of our master you will be ready to serve as:

  • Security Analyst
  • Malware analyst
  • forensic analyst
  • ethical hacker
  • Cyber ​​Intelligence expert and ciberfraude
  • Developers and analysts source
  • Cybersecurity consultant

Guaranteed internships in companies

IMF Business School, through its website and Employment Practices ensures students of the Masters in Cybersecurity, practices in companies. Query conditions.



Read less
IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. Read more

IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. .. to be able to mitigate the possible cyber attacks to their organizations.

This master's degree, aimed mainly at professionals with experience in systems engineering or in the world of programming, who seek to turn their career and specialize in the world of cybersecurity.

This program has 136 hours of face-to-face training in Madrid, which will work with a theoretical-practical methodology through real cases, conferences with professionals of the sector and seminars, enhancing Networking.

Students who successfully complete this program will obtain a Dual Degree from the Universidad Camilo José Cela and a Master's Degree from the IMF Business School. They will also get a Deloitte CyberSOC Degree and 3 Deloitte Associate level certifications for Safe Development, Ethical Hacking and Forensic Analysis. They will have at their disposal all the advantages of MFI:

  • Program Scholarships and Study Grants
  • Recruiters with over 12,000 vacancies posted in the last year
  • Unlimited tutoring
  • Financing up to 12 months without interest or bank intervention
  • Virtual library with over 30,000 references
  • Virtual library with access to any master classes
  • Access to the VIP Club with discounts on leisure, travel, restaurants ...

TEMARY:

  • MODULE I - Cyber ​​intelligence
  • MODULE II - Safe Development
  • MODULE III - Monitoring and Correlation of Security Events (SIEM)
  • MODULE IV - Ethical Hacking
  • MODULE V - Forensic Analysis
  • MODULE VI - Reverse Engineering
  • MODULE VII - Security in Mobile Environments
  • MODULE VIII - Final Master's Work


Read less

  • 1
Show 10 15 30 per page



Cookie Policy    X