Scroll Top

CYbersecurity

This is a free program of 2 ECTS credits that will require that the student attends synchronously online for 16 hours of classes (see time schedule below), and additionally perform some autonomous work at home.

Once the synchronous version of this course is finished by end of October 2025, it will be offered in an asynchronous mode for those persons that are not able to follow the synchronous one in the period scheduled.

Each participant who completes this course, either synchronously or asynchronously, will receive a personalised certificate from EIT.

Please note that registration is now open only for synchronous mode; asynchronous will be open by October 15th.

Summary of the course

This course covers a set of basic cybersecurity concepts that are essential for understanding all the security principles and mechanisms necessary to ensure comprehensive data protection. To this end, the course begins with a review of the most common threats to information systems and their development environments, and evaluates which security strategies are most effective in preventing them. In this process of reflection, we will explore the usefulness of the most traditional cryptographic primitives, as well as the effectiveness of many other more advanced services developed at the application level and on specific operating system platforms. This local protection is extended with an overview of advanced network-level services, developed across all layers of the TCP/IP stack, and taking into account some additional services designed exclusively to detect, monitor, and respond to network threats.

Program OF THEMES
  • Basis cybersecurity fundamentals
  • Organizations and ecosystems
  • General threats – classification and use cases
  • Symmetric, asymmetric and hybrid cryptography
  • Hashes and digital certificates
  • Authentication and authorization principles
  • Windows-level architecture and native services
  • Linux-level architecture and native services
  • General applications and tools
  • Security protocols and services
  • Firewalls for network filtering and segmentation
  • Virtual networks for network protection adn transmission
  • Intrusion detection and prevention systems
  • Security event management and response
  • Cyberintelligence for feedback and proactive monitoring
  • Fundamentals of GDPR
  • Data protection terminology, principles and legal bases
  • Privacy-by-design and management of data subjects’ rights
  • Privacy-by-design frameworks and tools
  • Methodologies, techniques and best practices
  • Applicability of frameworks and real-world cases
  • Resource efficiency and waste reduction
  • Product life-cycle management
  • Real-world industry cases

Time schedule (all times in CET)

Day Hours
October 8
18:00-20:00
October 9
18:00-20:00
October 15
18:00-20:00
October 16
18:00-20:00
October 22
18:00-20:00
October 23
18:00-20:00
October 29
18:00-20:00
October 30
18:00-20:00

TRAINERS

RODRIGO ROMÁN

Themes 1 and 2

CRISTINA ALCARAZ

Themes 3, 4 and 5

Christos Kalloniatis

Theme 6

Aikaterini-Georgia Mavroeidi

Theme 7

Ioannis Basdekis

Theme 8

George Alexandris

Theme 8