Courses

Formal construction and verification of programs in Type Theory

LThis course aims to introduce students to the use of formal methods for the production of software that is correct by construction.

Course Webpage

Gestión de la Seguridad de la Información

This course will allow you to learn the main regulations and the theoretical and practical framework necessary for the implementation of Information Security Management Systems in all types of organizations. It will also provide you with the tools to apply specific methodologies for risk management, incidents and business continuity.

Course Webpage

Metodologías para el Análisis Forense Informático

The objective of this course is to introduce the student to the basic concepts of computer forensic analysis. The course is aimed at professionals in charge of designing and/or implementing security mechanisms in their companies. At the end of the course, the student will have acquired the basic technical concepts necessary with regard to analysis methodologies and the treatment and/or acquisition of digital evidence.

Course Webpage

Seguridad de Sistemas Informáticos

Course aimed at designing and/or implementing security mechanisms in companies, with the aim of developing, expanding or improving computing platforms. Basic concepts are taught to identify the possible threats that a computer system may suffer and to establish the appropriate protection mechanisms to guarantee its security.

Course Webpage

Seguridad en redes TCP/IP

Curso orientado a diseñar y/o implantar mecanismos de seguridad en sus empresas, con el objetivo de desarrollar, ampliar o mejorar las plataformas de comunicación de datos. Se impartirán los conceptos básicos necesarios para identificar las posibles amenazas que puede sufrir una red de datos TCP/IP y establecer los mecanismos de protección adecuados.

Course Webpage

Workshop in Computer Security

The objectives of this course are:

  • To deepen the concepts of computer security
  • To introduce the student to the implementation of services and functionalities oriented to the security field, for example, developing authentication functions, plugins for security tools, modifying and configuring complex functionalities of operating systems, etc.
  • To acquire knowledge of developing secure programming code by studying the structures and functionalities provided by different security frameworks available in operating systems.

Course Webpage

Software Security

Today, more than 70% of attacks against a company’s website or web application are directed at the ‘Application Layer’ and not the network or system" -Gartner Group. Security problems in the applications that a company develops have a direct impact on its image in the market, strongly affecting its business. Correctly identifying and correcting potential security problems at an early stage of development saves work, reduces costs and increases the quality of the final application, improving overall performance.

Course Webpage

Computer Security Fundamentals

The objective of this course is to train the student to:

  • Assimilate computer security as a set of methodologies.
  • Analyze the security of a network or computer system, identifying its weak points for protection.
  • Know the main attacks that a computer system can be subject to, as well as the possible methods of protection, detection and security policies that allow avoiding damage to the system or minimizing its impact.
  • Understand the operation of different cryptographic protocols that are currently used.
  • Know the most important authentication systems, identifying their characteristics.

Course Webpage