This website uses cookies

The website of the Fundació Politècnica de Catalunya uses its own and third-party cookies to improve the browsing experience and for statistical purposes. For more information about cookies you can consult the cookie policy.

Manage cookies
Allow all cookies
Campus
MY_TECH_SPACE


Go
Campus in maintenance
User and / or password incorrect
You have no active environment
Your access has been restricted. Consultation with the department of administration
Due to technical problems, the virtual campus is inaccessible. We are working to solve it. Sorry for the inconvenience.
You are not authorized to make this call. You can consult webmaster.fpc@fpc.upc.edu
You have exceeded the maximum number of attempts. Your user is temporarily blocked. Check back in a little while.
You must enter your campus username, not an email
You have to perform the verification to verify that you are not a robot.
Start   >  Master's & postgraduate courses  >  Education  >  Postgraduate course in Cyber ​​Attacks: Detection and Response
We advise you! Request information or admission
relation
This postgraduate course is also part of the training track for the continuing education master's degree in Cybersecurity Management.

Presentation

Information 2024-2025 edition
The 2024-2025 edition of the postgraduate course has already begun. Shortly we will publish updated information about the new edition of this programme.
Edition
14th Edition
Credits
33 ECTS (198 teaching hours)
Delivery
Blended learning
Language of instruction
Spanish
Fee
€5,100
Special conditions on payment of enrolment fee and 0,7% campaign
Registration open until the beginning of the course or until end of vacancies.
Next course
October of 2025
Timetable
Monday: 6:30 pm to 9:30 pm
Tuesday: 6:30 pm to 9:30 pm
Thursday: 6:30 pm to 9:30 pm
Taught at
Facultat d'Informàtica de Barcelona (FIB)
C/ Jordi Girona, 1-3
Barcelona
Why this postgraduate course?
Cyberattacks have become one of the biggest threats to any environment with valuable digital information. In addition, the loss or theft of data due to infrastructure insecurity can seriously affect an institution's image.

A swift reaction to a cyberattack will minimize the negative consequences and contribute to a possible investigation of the case. However, a lack of professionals with the skills that this program provides gives cybercriminals significant advantages, as they can see how most environments have gaps due to little or no monitoring of their systems, and the lack of experts capable of reacting to an incident.

The objective of this postgraduate course is to train students in order to understand new cyberthreats and make decisions to react to them, and the necessary protection and detection measures to minimize the impact of possible attacks.

The postgraduate course will provide plenty of information about the latest threats - both general threats and those aimed at a single entity (Advanced Persistent Threats), as well as strategies to manage them and minimize their impact.

The postgraduate course has an outstanding teaching team, with an excellent combination of practical professional experience and innovation, in the field of technology security from a technical perspective, as well as in the legal and policing field. We will also have contributions from internationally renowned speakers, who will tell us about their vision of the sector in the present and the future.

Promoted by:
Aims
  • Check the status of an institution's cybersecurity by auditing its various assets and estimating priorities in order to minimise the risks.
  • Proactively detect an attack on an institution using monitoring tools, applying data mining techniques to large amounts of information.
  • Establish contingency plans and respond to security incidents, applying recognised forensic techniques to maintain the chain of custody, analysing and retrieving information.
Who is it for?
  • Computer or Telecommunications Engineering Graduates.
  • Engineers and scientific-technical graduates interested in obtaining an internationally recognised qualification demonstrating their knowledge of computer security and their ability to protect their installations from cyberattacks.
  • Computer systems administrators.
  • Members of the national security forces and bodies.
  • Consultants for computer security companies.
  • Consultants in security incident response teams.
  • Critical infrastructure technicians.
  • IT directors and managers.
  • Lawyers wishing to specialise in computer crimes.

Training Content

List of subjects
1 ECTS 9h
Technological Bases
  • Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP).
  • VirtualBox and VMware.
  • Linux and its command interface.
  • Basic powershell.
  • Disassembly of binaries and their content.
  • Software compilation and its process.
5 ECTS 36h
Ethical Hacking
  • Information gathering.
  • Scanning and enumeration.
  • Common vulnerabilities.
  • Manual analysis of vulnerabilities.
  • Automated analysis.
  • Exploitation and management of vulnerabilities.
3 ECTS 21h
Monitoring Security Events
  • Introduction to logs.
  • Registers of the system (Windows and Linux).
  • Detection and monitoring systems.
  • Log correlation.
2 ECTS 18h
Cloud Security and Edge Computing
  • Introduction to the cloud.
  • Types of the cloud.
  • Security in private cloud: orchestrator.
  • Security over third-party solutions: Amazon, Azure.
  • Containers.
  • API connections.
  • Use cases.
4 ECTS 24h
Data Driven Security
  • Data science.
  • Data analysis with R.
  • Viewing data.
4 ECTS 24h
Ubiquitous Environments: SCADA and Mobiles
  • Static and dynamic analysis.
  • Android.
  • iOS.
  • Supervisory Control And Data Acquisition (SCADA).
  • The ICS environment: vulnerabilities in software and protocol.
3 ECTS 21h
Responding to Incidents
  • Response to incidents.
  • The attacker's tools.
  • Log systems.
  • Forensics artifacts.
  • Forensic analysis methodology.
  • Forensic analysis demonstration.
  • File systems.
  • Windows artifacts.
4 ECTS 27h
Malware Analysis
  • Introduction to malware.
  • Analysis of the PE format (Windows binaries).
  • AV/EDR evasion techniques
  • Static analysis (Hash, Fingerprinting, Sandbox, Strings, imports).
  • Dynamic analysis (DNS resolution, sockets, registry, files, processes, services).
  • Memory analysis.
  • Reversing (introduction, crackmes, disassembly and analysis of malware debugging).
  • Hunting and containment with IOCs obtained from malware analysis.
1 ECTS 6h
Cybersecurity Trends I
  • Cybersecurity conferences.
6 ECTS 12h
Proyecto Final de Postgrado
  • Final project tutored by a project's director expert in the field.
Degree
Postgraduate qualification in Cyber ​​Attacks: Detection and Response, issued by the Universitat Politècnica de Catalunya. Issued by virtue of the provisions of art. 7.1 of Organic Law 2/2023 of 22 March, concerning the University System, and art. 36 of Royal Decree 822/2021 of 28 September, which establishes the organisation of university education and the procedure for ensuring its quality. A prior official university qualification is necessary to obtain it. Otherwise, the student will receive a certificate of completion of the programme issued by the Fundació Politècnica de Catalunya. Lifelong learning studies at the Universitat Politècnica de Catalunya are approved by the University's Governing Council on an annual basis. (See details appearing on the certificate).
Range of modules
This postgraduate course is part of the training track for the continuing education master's degree in Cybersecurity Management .
The continuing education master's degree programme is organized into the following modules. If you don't wish to take the entire continuing education master's degree you can sign on one or several modules.
Continuing education master's degree:
relation Postgraduate courses:

Learning methodology

The teaching methodology of the programme facilitates the student's learning and the achievement of the necessary competences.



Learning tools
Participatory lectures
A presentation of the conceptual foundations of the content to be taught, promoting interaction with the students to guide them in their learning of the different contents and the development of the established competences.
Practical classroom sessions
Knowledge is applied to a real or hypothetical environment, where specific aspects are identified and worked on to facilitate understanding, with the support from teaching staff.
Solving exercises
Solutions are worked on by practising routines, applying formulas and algorithms, and procedures are followed for transforming the available information and interpreting the results.
Case studies
Real or hypothetical situations are presented in which the students, in a completely participatory and practical way, examine the situation, consider the various hypotheses and share their own conclusions.
Success stories
Outstanding business knowledge and experiences with high added value acquired during an outstanding professional career are presented and shared.
Tutorship
Students are given technical support in the preparation of the final project, according to their specialisation and the subject matter of the project.
Assessment criteria
Attendance
At least 80% attendance of teaching hours is required.
Level of participation
The student's active contribution to the various activities offered by the teaching team is assessed.
Solving exercises, questionnaires or exams
Individual tests aimed at assessing the degree of learning and the acquisition of competences.
Work out projects
Studies on a specific topic, by individuals or groups, in which the quality and depth of the work is assessed, among other factors.
Completion and presentation of the final project
Individual or group projects in which the contents taught in the programme are applied. The project can be based on real cases and include the identification of a problem, the design of the solution, its implementation or a business plan. The project will be presented and defended in public.
Work placements & employment service
Students can access job offers in their field of specialisation on the My_Tech_Space virtual campus. Applications made from this site will be treated confidentially. Hundreds of offers of the UPC School of Professional & Executive Development employment service appear annually. The offers range from formal contracts to work placement agreements.
Virtual campus
The students on this postgraduate course will have access to the My_ Tech_Space virtual campus - an effective platform for work and communication between the course's students, lecturers, directors and coordinators. My_Tech_Space provides the documentation for each training session before it starts, and enables students to work as a team, consult lecturers, check notes, etc.

Teaching team

Academic management
  • Serral Gracià, René
    Serral Gracià, René
    info
    View profile in Linkedin
    D. in Computer Science from the Universitat Politècnica de Catalunya (UPC). Associate professor in the Department of Computer Architecture at the UPC. He has more than fifteen years of experience in teaching networks, operating systems and cybersecurity. Co-founder and principal engineer of Clevernet. Currently Vice-Dean of Business Relations at the Faculty of Computer Science of Barcelona (FIB). He has participated in more than ten European and Spanish projects in the area of cybersecurity and networks.
Teaching staff
  • Serral Gracià, René
    info
    View profile in Linkedin
    D. in Computer Science from the Universitat Politècnica de Catalunya (UPC). Associate professor in the Department of Computer Architecture at the UPC. He has more than fifteen years of experience in teaching networks, operating systems and cybersecurity. Co-founder and principal engineer of Clevernet. Currently Vice-Dean of Business Relations at the Faculty of Computer Science of Barcelona (FIB). He has participated in more than ten European and Spanish projects in the area of cybersecurity and networks.

Associates entities

Career opportunities

  • Reverse engineering expert.
  • Malware analyst.
  • Computer forensic expert.
  • Cybersecurity data analyst.
  • Ethical hacker/pentester.
  • Security engineer in mobile devices.
  • Consultant for security incident response teams (CSIRT, CERT).
  • Operator in Security Operations Center (SOC).
  • System and cybersecurity tools administrator.
  • Member of the anti-cybercrime units in financial institutions and state security forces and bodies.
  • Cybersecurity technician in critical infrastructures.

Testimonials

Testimonials

+

Request information or admission

Information and guidance:
Isabel de la Fuente Larriba
(34) 93 115 57 51
Request received!
After we have registered your request, you will receive confirmation by email and we will be in touch.

Thank you for your interest in our training programmes.
Error
Due to an error in the connection to the database, your submission has not been processed. Please try again later, phone us on (34) 93 112 08 08, or send us an email at: webmaster.fpc@fpc.upc.edu
You have exceeded the maximum size of the file
  • If you have any doubts about the postgraduate course.
  • If you want to start the registration procedure.
How to start admission
To start the enrolment process for this programme you must complete and send the form that you will find at the bottom of these lines.

Next you will receive a welcome email detailing the three steps necessary to formalize the enrolment procedure:

1. Complete and confirm your personal details.

2. Validate your curriculum vitae and attach any additional required documentation, whenever this is necessary for admission.

3. Pay €110 in concept of the registration fee for the programme. This fee will be discounted from the total enrolment fee and will only be returned when a student isn't admitted on a programme.

Once the fee has been paid and we have all your documentation, we will assess your candidacy and, if you are admitted on the course, we will send you a letter of acceptance. This document will provide you with all the necessary information to formalize the enrolment process for the programme.





  date protection policy

* Mandatory fields

Basic information or first layer on data protection

Controller

Fundació Politècnica de Catalunya (FPC). + INFORMATION

Purpose of processing

Respond to requests for information from the data subjects on training activities managed or carried out by the FPC. + INFORMATION

Establishment or maintenance of the academic relationship with the data subject. + INFORMATION

Send information on the activities of the FPC. + INFORMATION

Legitimation

Data subject's consent. + INFORMATION

Legitimate interest in the development of the academic relationship. + INFORMATION

Addressees

No assignments or communications.

Rights

Access, rectification, erasure, restriction, object and data portability. + INFORMATION

Data protection officer contact details

info.dpo@fpc.upc.edu

Additional information

Privacy policy of our website. + INFORMATION

Storage limitation

Privacy policy of our website. + INFORMATION

Payment services

In the event that the data subject enters into a formal relationship with the FPC, the data subject authorises and consents to the charge, thereby expressly waiving the right to a refund of the charge.


Send