Skip to main content Scroll Top

CYbersecurity – 2026

This is a free asynchronous program of 3 ECTS credits that consists of ten compulsory themes plus three optional ones.

Please note that, although a number of optional themes are offered, the student must take only three among them. The student can freely decide on the selection of the optional themes at any time after he/she started the course.

Also note that students who already passed the UPTECH course on Cybersecurity in 2025 (either synchronous or asynchronous versions) are NOT entitled to take this Cybersecurity course offered in 2026.

Summary of the course

This course covers a set of basic cybersecurity concepts that are essential for understanding all the security principles and mechanisms necessary to ensure comprehensive data protection. To this end, the course begins with a review of the most common threats to information systems and their development environments, and evaluates which security strategies are most effective in preventing them. In this process of reflection, we will explore the usefulness of the most traditional cryptographic primitives, as well as the effectiveness of many other more advanced services developed at the application level and on specific operating system platforms. This local protection is extended with an overview of advanced network-level services, developed across all layers of the TCP/IP stack, and taking into account some additional services designed exclusively to detect, monitor, and respond to network threats.

COMPULSORY THEMES
  • Basis cybersecurity fundamentals
  • Organizations and ecosystems
  • General threats – classification and use cases
  • Symmetric, asymmetric and hybrid cryptography
  • Hashes and digital certificates
  • Authentication and authorization principles
  • Windows-level architecture and native services
  • Linux-level architecture and native services
  • General applications and tools
  • Security protocols and services
  • Firewalls for network filtering and segmentation
  • Virtual networks for network protection adn transmission
  • Intrusion detection and prevention systems
  • Security event management and response
  • Cyberintelligence for feedback and proactive monitoring
  • Fundamentals of GDPR
  • Data protection terminology, principles and legal bases
  • Privacy-by-design and management of data subjects’ rights
  • Privacy-by-design frameworks and tools
  • Methodologies, techniques and best practices
  • Applicability of frameworks and real-world cases
  • Resource efficiency and waste reduction
  • Product life-cycle management
  • Real-world industry cases
  • How to create a business plan
  • Building the Vision
  • How to build without investment?
  • Team Building and mindset
  • Strategic and Inclusive Communication for Startups
  • Internationalisation and entrepreneurship strategies in Social Media
  • Fostering Innovation and Entrepreneurship: Lessons from Startup Support Initiatives
OPTIONAL themes
  • Blockchain principles and security features
  • Main Blockchain platforms – public (Bitcoin, Ethereum) and permissioned (LFDecentralized Trust)
  • Blockchain use cases

 

  • Common vulnerabilities and attack vectors
  • Secure-by-design principles for IoT systems

 

  • Bias, transparency, AI control
  • Regulation and responsible use
  • Key Elements in Customer Behaviour
  • Content Marketing Essential
  • Internal Marketing in Startups

TRAINERS

RODRIGO ROMÁN

Themes 1, 2 and 11

CRISTINA ALCARAZ

Themes 3, 4 and 5

Christos Kalloniatis

Theme 6

Aikaterini-Georgia Mavroeidi

Theme 7

Ioannis Basdekis

Theme 8

George Alexandris

Theme 8

HUGO BARROS

Theme 9

AUGUSTO COPPOLA

Theme 9

LENZ GSCHWENDTNER

Theme 9

CARMINA JAMBRINO

Theme 10

PATRICIA IGLESIAS

Theme 10

MERCEDES ROJAS

Theme 10

JAVIER PÉREZ ARANDA

Theme 10

Vanessa Cocca

Theme 12

Marko Valčić

Theme 13

José manuel nuñez

Theme 14

PLÁCIDO SIERRA

Theme 14

MARÍA HRISTOVA

Theme 14

need help?