The admission profile is the knowledge, skills and abilities of the students who access the degree.
The recommended or ideal profile for admission will be a Bachelor's Degree, Engineering Degree or Bachelor's Degree in Computer Science or Telecommunications. It will also be possible to access with another Bachelor's Degree, Engineering Degree or Bachelor's Degree in related subjects, such as Statistics, Mathematics or Physics, provided that professional experience in the field of ICT is accredited. Applicants with qualifications whose competencies are different from those mentioned above will be evaluated by the Master's Committee, based on the subjects studied and evidence of capabilities and achievement.
The Master's includes a strong component related to cybersecurity and training on the usefulness of Big Data. Therefore, the competency profile of the entry-level student necessarily includes knowledge of computer techniques and tools, at least in communication networks and computer programming, as well as mathematical knowledge, at least at the level of a first year of engineering.
The graduate profile is the skills, knowledge and abilities that the student must have acquired upon completion of the degree. This information is included in the competencies/learning outcomes section defined for the degree.
«Security Auditor and Data Scientist».
On the one hand, the person specializing in Cybersecurity must be a professional with the ability to: use and promote updated techniques that invoke a general culture of computer security, distinguish between the advantages and disadvantages related to the design and administration of security policies on the computer resources of an organization, design strategies to maximize cybersecurity so that it becomes an added value in the business, and apply national and international standards and ethical-legal aspects of computer security. On the other hand, the person in Data Intelligence, as the person responsible for an organization's data-based projects, must be able to identify which are the relevant data sources, which treatment and analysis techniques should be applied, what validity the conclusions derived from said study have, how to use the extracted knowledge to improve the organization's performance and how to appropriately communicate the conclusions obtained.