TypeA
|
Code |
|
|
Job guided |
|
AJ1 |
CE1 - To know, to understand and to apply the tools of cryptography and cryptanalysis, the tools of integrity, digital identity and the protocols for secure communications |
|
AJ2 |
CE2 - Deep knowledge of cyberattack and cyberdefense techniques |
|
AJ3 |
CE3 - Knowledge of the legal and technical standards used in cybersecurity, their implications in systems design, in the use of security tools and in the protection of information |
|
AJ4 |
CE4 - To understand and to apply the methods and tools of cybersecurity to protect data and computers, communication networks, databases, computer programs and information services |
|
AJ5 |
CE5 - To design, deploy and operate a security management information system based on a referenced methodology |
|
AJ6 |
CE6 - To develop and apply forensic research techniques for analysing incidents or cybersecurity threats |
|
AJ7 |
CE7 - To demonstrate ability for doing the security audit of systems, equipment, the risk analysis related to security weaknesses, and for developing de procedures for certification of secure systems |
|
AJ8 |
CE8 - Skills for conceive, design, deploy and operate cybersecurity systems |
|
AJ9 |
CE9 - Ability to write clear, concise and motivated projects and work plans in the field of cybersecurity |
|
AJ10 |
CE10 - Knowledge of the mathematical foundations of cryptography. Ability to understand their evolution and future developments |
|
AJ11 |
CE11 - Ability to collect and interpret relevant data the field of computer and communications security |
|
AJ12 |
CE12 - Knowledge of the role of cybersecurity in the design of new industrial processes, as well as of the singularities and restrictions to be addressed in order to build a secure industrial infrastructure |
|
AJ13 |
CE13 - Ability for analysing, detecting and eliminating software vulnerabilities and malware capable to exploit those in systems or networks |
|
AJ14 |
CE14 - Ability to develop a continuity business plan on the guidelines of commonly accepted norms and standards |
|
AJ15 |
CE15 - Ability to identify the value of information for an institution, economic or of other sort; ability to identify the critical procedures in an institution, and the impact due to their disruption; ability to identify the internal and external requirements that guarantee readiness upon security attacks |
|
AJ16 |
CE16 - Ability for envisioning and driving the business operations in areas related to cybersecurity, with feasible monetization |
|
AJ17 |
CE17 - Ability to plan a time schedule containing the detection periods of incidents or disasters, and their recovery |
|
AJ18 |
CE18 - Ability to correctly interpret the information sources in the discipline of criminal law (laws, doctrine, jurisprudence) both at the national and international levels |
|
AJ19 |
CE19 - To learn how to identify the best professional profiles for an institution as a functions of its features and activity sector |
|
AJ20 |
CE20 - Knowledge about the firms specialized in cybersecurity in the region |
TypeB
|
Code |
|
|
Job guided |
|
BJ1 |
CB1 - To possess and understand the knowledge that provides the foundations and the opportunity to be original in the development and application of ideas, frequently in a research context |
|
BJ2 |
CB2 - Students will be able to apply their knowledge and their problem-solving ability in new or less familiar situations, within a broader context (or in multi-discipline contexts) related to their field of specialization |
|
BJ3 |
CB3 - Students will be able to integrate diverse knowledge areas, and address the complexity of making statements on the basis of information which, notwithstanding incomplete or limited, may include thoughts about the ethical and social responsibilities entailed to the application of their professional capabilities and judgements |
|
BJ4 |
CB4 - Students will learn to communicate their conclusions ---and the hypotheses and ultimate reasoning in their support--- to expert and nonexpert audiences in a clear and unambiguous way |
|
BJ5 |
CB5 - Students will apprehend the learning skills enabling them to study in a style that will be selfdriven and autonomous to a large extent |
|
BJ6 |
CG1 - To have skills for analysis and synthesis. To have ability to project, model, calculate and design solutions in the area of information, network or system security in every application area |
|
BJ7 |
CG2 - Ability for problem-solving. Ability to solve, using the acquired knowledge, specific problems in the technical field of information, network or system security |
|
BJ8 |
CG3 - Capacity for critical thinking and critical evaluation of any system designed for protecting information, any information security system, any system for network security or system for secure communication |
|
BJ9 |
CG4 - Ethical commitment. Ability to design and deploy engineering systems and management systems with ethical and responsible criteria, based on deontological behaviour, in the field of information, network or communications security |
|
BJ10 |
CG5 - Students will have ability to apply theoretical knowledge to practical situations, within the scope of infrastructures, equipment or specific application domains, and designed for precise operating requirements |
|
BJ11 |
CG6 - Ability to do research. Ability to innovate and contribute to the advance of the principles, the techniques and the processes within their professional domain, designing new algorithms, devices, techniques or models which are useful for the protection public, private or commercial of digital assets |
TypeC
|
Code |
|
|
Job guided |
|
CJ1 |
CT1 - Ability to apprehend the meaning and implications of the gender perspective in the different areas of knowledge and in the professional exercise, with the aim of attaining a fairer and more egalitarian society |
|
CJ2 |
CT2 - Ability for oral and written communication in Galician language |
|
CJ3 |
CT3 - Ability to include sustainability principles and environmental concerns in the professional practice. To integrate into projects the principle of efficient, responsible and equitable use of resources |
|
CJ4 |
CT4 - Ability to ponder the importance of information security in the economic progress of society |
|
CJ5 |
CT5 - Ability for oral and written communication in English |