a) Prepare and implement cybersecurity prevention and awareness plans in the organization, applying current regulations.
b) Detect and investigate cybersecurity incidents, documenting them and including them in the organization’s security plans.
c) Design security plans contemplating the best practices for the strengthening of systems and networks.
d) Configure access control and authentication systems in computer systems, complying with security requirements and minimizing the possibilities of exposure to attacks.
e) Design and manage networked computer systems and apply the established security policies, guaranteeing the required functionality with a controlled level of risk.
f) Analyze the level of security required by the applications and the most common attack vectors, avoiding cybersecurity incidents.
h) Perform computer forensic analysis analyzing and recording the relevant related information.
i) Detect vulnerabilities in systems, networks and applications, evaluating the associated risks.
j) Define and apply procedures for regulatory compliance in cybersecurity and personal data protection, implementing them both internally and in relation to third parties.
k) Prepare technical and administrative documentation complying with current legislation, responding to the established requirements.
l) Adapt to new work situations, keeping scientific, technical and technological knowledge related to their professional environment updated, managing their training and existing resources for lifelong learning.
m) Resolve situations, problems or contingencies with initiative and autonomy in the field of their competence, with creativity, innovation and a spirit of improvement in personal work and in that of team members.
n) Generate safe environments in the development of their work and their team, supervising and applying procedures for the prevention of occupational and environmental risks, in accordance with the provisions of the regulations and the objectives of the organization.
ñ) Supervise and apply quality management procedures, universal accessibility and «design for all people» in the professional activities included in the production or service provision processes.
|Proffesional Module||Total Hours||Hours Per Week|
|Bastion of networks and systems.||168||7|
|Safe Production launch||120||5|
|Computer forensic analysis.||120||5|
Direct Access, to be in possession of one of the following titles:
• Technician in Network Information Systems Administration.
. Technician in Multiplatform Applications Development.
• Technician in Web Application.
. Technician in Telecommunications and Computer Systems.
• Technician in Electronic Maintenance.
- Expert in cybersecurity.
- Cybersecurity auditor.
- Cybersecurity consultant.
- Ethical hacker.