The recommended or ideal entry profile will be a Bachelor's, Engineering, or Bachelor's degree in Computer Science or Telecommunications. It will also be possible to apply with another Bachelor's, Engineering, or Bachelor's degree in related subjects, such as Statistics, Mathematics, or Physics, provided they can demonstrate professional experience in the ICT field. Applicants with qualifications whose competencies differ from the above will be evaluated by the Master's Committee based on the subjects taken and evidence of skills and achievement.
The Master's Degree in Computer Engineering is primarily aimed at students who have completed a Bachelor's Degree in Computer Engineering and/or Technical Computer Engineering. This means those degrees through which students have previously acquired the skills listed in Section 3 of Annex II of the Resolution of June 8, 2009. The Master's Degree is aimed at graduates who meet the requirements of Article 16 of Royal Decree 1393/2007 and have the required B1 level of English.
The Master's program includes a strong component related to cybersecurity and training on the usefulness of Big Data. Therefore, the competency profile of incoming students necessarily includes knowledge of computer techniques and tools, at least in communications networks and computer programming, as well as mathematical knowledge, at least at the level of a first-year engineering student.
The student who has completed the Master's Degree in Computer Engineering will have acquired the knowledge and skills required for advanced training, of a specialized or multidisciplinary nature, aimed at academic and professional specialization and initiation into research tasks, and will be prepared to direct and manage development and application projects in the field of computing.
Furthermore, the Cybersecurity specialist must be a professional with the ability to: use and promote updated techniques that invoke a general culture of computer security, distinguish between the advantages and disadvantages related to the design and administration of security policies on an organization's computing resources, design strategies to maximize cybersecurity so that it becomes an added value in the business, and apply national and international standards and ethical-legal aspects of computer security.
And, the Data Intelligence person, as the person responsible for an organization's data-driven projects, must be able to identify the relevant data sources, what processing and analysis techniques should be applied, the validity of the conclusions derived from said study, how to use the extracted knowledge to improve the organization's performance, and how to appropriately communicate the conclusions obtained.