All over the web
  • Qualifications
  • Blog
  • All over the web
  • News
Icon to close the search engine

UNIVERSAE-specific Master in Cybersecurity in Information Technology Environments

Download icon green Download brochure
Limited places Check financing options*
Icon arrow green that accompanies the text of the call Abierta convocatoria de matrícula SEPTIEMBRE 2024
Reserve your place

Train in a specialization highly demanded by companies investigating cybersecurity incidents and preparing prevention plans. With the Official Master's Degree in Cybersecurity in Information Technology Environments, you will be able to analyze and detect vulnerabilities in systems, networks, and applications to define and apply procedures in regulatory compliance in cybersecurity.

  • UNIVERSAE (will handle your personal data to respond to the requests raised. You can exercise your rights of access, rectification, erasure and portability of your data, limitation and opposition to its treatment, as well as to not be subject to decisions based solely on the automated processing of your data, where applicable, in the e-mail address [email protected]. Le recomendamos que lea la política de privacidad antes de proporcionarnos sus datos personales.

  • UNIVERSAE (request your consent for the creation of profiles and thus be able to keep you informed about new products and services of affiliated companies that may be of your interest.

  • Este sitio está protegido por reCAPTCHA y por la política de privacidad de Google. Política de privacidad and Términos de uso aplicados.

Why enroll in UNIVERSAE-specific Master in cyber security?

Learning methodology “learning-by-doing” learn through training in real-life scenarios

Get ready to get the most important certifications related to the Direction of cybersecurity, as are the CISA and CISM ISACA

Access solid agreements with companies and consultants relevant in the field of cybersecurity at the international level

Learning and participates with real cases in UNIVERSAE Cybersecurity Lab

Professional outings of UNIVERSAE-specific master in Cybersecurity in Information Technology Environments

Access requirements

To access the Master's degree in cyber security in Environments of Information Technology is necessary to be in possession of any of the following titles:
  • Superior technician in Administration of Network and Computer Systems
  • Superior technician in Development of cross-Platform Applications
  • Superior technician in Development of Web Applications
  • Higher diploma in Telecommunication Systems and Computer
  • Superior technician in Maintenance Electronic

UNIVERSAE-specific Master in Cybersecurity in Information Technology Environments syllabus


720 hours ·


Forensic analysis: 110 h

  1. Introduction to computer forensics
  2. Application of the methodologies of forensic analysis
  3. Conducting forensic analysis on mobile devices.
  4. Realization of forensics in the Cloud.
  5. Conducting forensic analysis on the IoT
  6. Documentation and reporting of forensic analysis

Bastionado of networks and systems: 210 h

  1. Design plans securitization
  2. Configuration of access control systems and authentication of people
  3. Credential management access to computer systems
  4. Design of computer networks safe
  5. Secure configuration of devices and computer systems
  6. Secure configuration of devices for installation of computer systems
  7. Secure configuration of computer systems

Start in safe production: 140 h

  1. . Test web applications for mobile devices
  2. Determination of the level of security required for
  3. Detection and correction of vulnerabilities in
    web applications
  4. Detection of security problems in applications
    for mobile devices
  5. Implementation of safe systems of deployed

Incident management cyber security: 80 h

  1. Development of plans of prevention and awareness-raising
  2. Audit of incidents in cyber security
  3. Investigation of cyber-security incidents
  4. Implementation of measures for cyber security
  5. Detection and documentation of incidents of cyber

Ethical Hacking: 140 h

  1. Determination of the monitoring tools
    to detect vulnerabilities
  2. Attack and defense in the test environment, the
    wireless communications
  3. Attack and defense in the test environment, the
    wireless communications
  4. Consolidation and use of compromised systems
  5. Attack and defense to web applications in environments

Regulations of cyber security: 40 h

  1. Main points of application for a correct
    regulatory compliance
  2. Design of regulatory compliance systems
  3. Legislation for the enforcement of the liability
  4. Legislation and case law on the protection of
  5. Current legislation cybersecurity national
    and international
  6. National Security scheme (ENS)


UNIVERSAE offers you the largest training offer on the market
Middle grades, Higher Degrees, Double Degrees and Masters.
Official qualifications
By the Spanish Ministry of Education and Vocational Training.
box-1-for-that-universae (
Learn in a virtual educational ecosystem integrating immersive technology, gamified activities and 3D simulations.
100% digital and constantly updated content
Responding to the needs of the current labour market.
Educational technology | edtech
Enrichment and practical application of tools that help improve learning.
Disruptive educational model
Apply game dynamics to achieve your goals.
Expert and active educators
Train alongside the best professionals in the sector.
box-3-for-that-universae (
A space of more than 65,000 m2 distributed between Spain and Latin America, which contributes to promoting employment through experience.
International presence in Spain, USA and Latin America
UNIVERSAE has its own first-class facilities in the main cities of each country.
Labor insertion
Agreements with the most advanced companies in the international arena. Become one of the most demanded profiles by companies.
box-5-for-that-universae (

Preguntas Frecuentes sobre el Máster en Ciberseguridad en Entornos de las Tecnologías de la Información

¿Qué es la ciberseguridad?

¿Para qué sirve la ciberseguridad?

¿Qué habilidades se necesitan para trabajar de Ciberseguridad en Entornos de las Tecnologías de la Información?

¿Cuánto gana un especialista en Ciberseguridad en Entornos de las Tecnologías de la Información?

Grados relacionados con este Máster FP Ciberseguridad en Entornos de las Tecnologías de la Información

Administration of Computer Network Systems Certificate of Higher Education

IT and Communications

Configure, manage and maintain computer systems, guaranteeing the functionality and integrity of resources and services with the required quality.

See degree

Multiplatform Applications Development Certificate of Higher Education

IT and Communications

Develops, implements, documents and maintains multiplatform computer applications, using specific technologies and development environments.

See degree

Web Application Development (DAW) Certificate of Higher Education

IT and Communications

Aprende a dominar los aspectos claves de un entorno web, sus sistemas informáticos y accesibilidad, así como la usabilidad de una página web

See degree
          Request information