Cryptography expert
Year 1
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
01QYDUV
01UWTUV 02DSMUV 04TAHUV |
Big data: architectures and data analytics
or Blockchain e criptoeconomia or Machine learning for networking or Quantum computing |
![]() ![]() ![]() ![]() |
1
2 1 1 |
6
6 6 6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV | Computer Forensics and cyber crime analysis |
![]() |
1 | 8 |
01GZCUV | Corporate cybersecurity evaluation |
![]() |
1 | 6 |
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01GYYUV
02TYAUV |
Advanced Information systems security
or Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GZEUV | Post-quantum Cryptography |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Analyst
Year 1
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
01QYDUV
01UWTUV 02DSMUV 04TAHUV |
Big data: architectures and data analytics
or Blockchain e criptoeconomia or Machine learning for networking or Quantum computing |
![]() ![]() ![]() ![]() |
1
2 1 1 |
6
6 6 6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYYUV | Advanced Information systems security |
![]() |
1 | 8 |
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV
01GZCUV 01GZBUV |
Computer Forensics and cyber crime analysis
or Corporate cybersecurity evaluation or Cybersecurity laws and regulations |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
02TYAUV | Security verification and testing |
![]() |
1 | 8 |
01GYZUV | AI and Cybersecurity |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Designer
Year 1
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
01QYDUV
01UWTUV 02DSMUV 04TAHUV |
Big data: architectures and data analytics
or Blockchain e criptoeconomia or Machine learning for networking or Quantum computing |
![]() ![]() ![]() ![]() |
1
2 1 1 |
6
6 6 6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYYUV | Advanced Information systems security |
![]() |
1 | 8 |
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV
01GZCUV 01GZBUV |
Computer Forensics and cyber crime analysis
or Corporate cybersecurity evaluation or Cybersecurity laws and regulations |
![]() ![]() ![]() |
1
1 1 |
8
6 6 |
02TYAUV | Security verification and testing |
![]() |
1 | 8 |
01GZAUV | Advanced data protection, and methods for privacy and anonymity |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |
Cyber Legal and Compliance Officer
Year 1
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYKUV | Computer architectures and operating systems |
![]() |
1 | 8 |
01TYMUV | Information systems security |
![]() |
1 | 6 |
01QYDUV
01UWTUV 02DSMUV 04TAHUV |
Big data: architectures and data analytics
or Blockchain e criptoeconomia or Machine learning for networking or Quantum computing |
![]() ![]() ![]() ![]() |
1
2 1 1 |
6
6 6 6 |
01GYLUV | Networks, cloud and application security |
![]() |
1,2 | 12 |
06LPYUV | Cryptography |
![]() |
2 | 6 |
01GYSUV | Hardware & Wireless Security |
![]() |
2 | 12 |
01GYOUV | Web Applications |
![]() |
2 | 8 |
Year 2
Code | Course | Language | Period | Credits |
---|---|---|---|---|
01GYRUV | Advanced cryptography |
![]() |
1 | 6 |
01GZDUV | Computer Forensics and cyber crime analysis |
![]() |
1 | 8 |
01GZCUV | Corporate cybersecurity evaluation |
![]() |
1 | 6 |
01GZBUV | Cybersecurity laws and regulations |
![]() |
1 | 6 |
01GYYUV
02TYAUV |
Advanced Information systems security
or Security verification and testing |
![]() ![]() |
1
1 |
8
8 |
01GZAUV | Advanced data protection, and methods for privacy and anonymity |
![]() |
2 | 6 |
19MSYUV
11MBRUV 17MBRUV |
Professional Training
or Thesis or Thesis |
![]() ![]() ![]() |
1,2
2 2 |
10
12 22 |