{"id":24,"date":"2017-06-28T12:52:52","date_gmt":"2017-06-28T12:52:52","guid":{"rendered":"http:\/\/www.ull.es\/masteres\/desarrollo-y-gestion-de-recursos-humanos\/?page_id=24"},"modified":"2025-07-24T05:38:32","modified_gmt":"2025-07-24T05:38:32","slug":"estructura-del-plan-de-estudios","status":"publish","type":"page","link":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/plan-de-estudios\/estructura-del-plan-de-estudios\/","title":{"rendered":"Structure du plan d&#039;\u00e9tudes"},"content":{"rendered":"\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-2314a6b\" data-block-id=\"2314a6b\"><style>.stk-2314a6b {padding-bottom:0px !important;margin-top:-100px !important;margin-bottom:0px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-2314a6b-column alignfull\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-1d1764d\" data-v=\"4\" data-block-id=\"1d1764d\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-1d1764d-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-1d1764d-inner-blocks\"><style id=\"depicter-1-inline-pre-css\">\n\n.depicter-1:not(.depicter-ready){\n\theight:450px;\n}\n\n\/***** Tablet *****\/\n@media screen and (max-width: 1024px){\n\n.depicter-1:not(.depicter-ready){\n\theight:700px;\n}\n\n}\n\/***** Mobile *****\/\n@media screen and (max-width: 767px){\n\n.depicter-1:not(.depicter-ready){\n\theight:450px;\n}\n\n}\n<\/style>\n<div id=\"depicter-1\" class=\"depicter depicter-document depicter-revert depicter-1 depicter-layout-fullwidth\">\n\n<div class=\"depicter-loading-container depicter-loading dotFlashing-dark\"><div class=\"depicter-loading-dark depicter-dot-flashing\">\n   <span><\/span>\n   <span><\/span>\n   <span><\/span>\n<\/div>\n<\/div>\n<div id=\"depicter-1-section-1\" class=\"depicter-section depicter-1-section-1\" data-name=\"Section 1\" data-type=\"section\" data-local-id=\"section-1\">\n<picture class=\"depicter-bg\">\n<source data-depicter-srcset=\"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/wp-content\/uploads\/sites\/69\/2025\/07\/Headers-Masteres_Ingenieria-Informatica-768x248.jpg, https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/wp-content\/uploads\/sites\/69\/2025\/07\/Headers-Masteres_Ingenieria-Informatica.jpg 2x\" srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" media=\"(max-width: 1024px)\" \/>\n\n<source data-depicter-srcset=\"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/wp-content\/uploads\/sites\/69\/2025\/07\/Headers-Masteres_Ingenieria-Informatica.jpg, https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/wp-content\/uploads\/sites\/69\/2025\/07\/Headers-Masteres_Ingenieria-Informatica-1280x413.jpg 2x\" srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" media=\"(min-width: 1025px)\" \/>\n<img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-ken-burns=\"false\" data-tablet-ken-burns=\"false\" data-mobile-ken-burns=\"false\" alt=\"\" data-depicter-src=\"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/wp-content\/uploads\/sites\/69\/2025\/07\/Headers-Masteres_Ingenieria-Informatica.jpg\" data-object-fit=\"custom,custom,\" data-object-position=\"center top,,\" data-crop=\"{'focalPoint':{'x':0.5,'y':0.5},'mediaSize':{'width':1394.6731234866829254315234720706939697265625,'height':450}}\" data-tablet-crop=\"{'focalPoint':{'x':0.5,'y':0.5},'mediaSize':{'width':2169.4915254237284898408688604831695556640625,'height':700}}\" data-mobile-crop=\"{'focalPoint':{'x':0.5,'y':0.5},'mediaSize':{'width':1394.6731234866829254315234720706939697265625,'height':450}}\" \/>\n<\/picture>\n\n\n<h1 id=\"depicter-1-element-5\" class=\"depicter-element depicter-layer depicter-1-element-5\" data-type=\"text\" data-wrap=\"true\" data-name=\"Text 2\" data-local-id=\"element-5\" data-offset=\"x:0px;y:99px;origin:tl\" data-tablet-offset=\"x:196px;y:98px;origin:tl\" data-mobile-offset=\"x:0px;y:57px;origin:tl\" data-width=\"1395px,633px,408px\" data-height=\"auto,auto,auto\" data-responsive-scale=\"true,,\">Doble M\u00e1ster Universitario en Ingenier\u00eda Inform\u00e1tica y Ciberseguridad e Inteligencia de Datos<br><\/h1>\n\n<div id=\"depicter-1-element-10\" class=\"depicter-element depicter-layer depicter-1-element-10\" data-type=\"shape\" data-wrap=\"true\" data-name=\"Shape 1\" data-local-id=\"element-10\" data-offset=\"x:5px;y:359px;origin:tl\" data-tablet-offset=\"x:196px;y:602px;origin:tl\" data-mobile-offset=\"x:0px;y:404px;origin:tl\" data-width=\"1390px,547px,408px\" data-height=\"8px,8px,8px\" data-responsive-scale=\"true,,\"><\/div>\n<\/div>\n<\/div>\n<script>\n(window.depicterSetups = window.depicterSetups || []).push(function(){\n\tDepicter.basePath = 'https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/wp-content\/plugins\/depicter\/resources\/scripts\/player\/';\n\tconst dpPlayer = Depicter.setup('.depicter-1',\n\t\t{\"width\":[\"1200\",\"1024\",\"360\"],\"height\":[\"450\",\"700\",\"450\"],\"view\":\"basic\",\"keepAspectRatio\":true,\"preload\":0,\"layout\":\"fullwidth\",\"rtl\":false,\"initAfterAppear\":false,\"ajaxApiUrl\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/wp-admin\\\/admin-ajax.php\",\"mouseSwipe\":true,\"touchSwipe\":true,\"useWatermark\":false}\n\t);\n});\n<\/script><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk--hide-mobile stk-block stk-6394276 stk-block-background\" data-block-id=\"6394276\"><style>.stk-6394276 {background-color:#fa6199 !important;padding-top:50px !important;padding-right:0px !important;padding-bottom:1px !important;padding-left:0px !important;margin-top:-40px !important;margin-bottom:0px !important;}.stk-6394276:before{background-color:#fa6199 !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-6394276-column alignfull\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-8a66885\" data-v=\"4\" data-block-id=\"8a66885\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-8a66885-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-8a66885-inner-blocks\">\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-bc89b3e\" data-block-id=\"bc89b3e\"><style>.stk-bc89b3e {height:0px !important;}<\/style><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-8b59b96\" data-block-id=\"8b59b96\"><style>.stk-8b59b96 .stk--block-align-8b59b96{align-items:flex-start !important;}.stk-8b59b96 {margin-top:50px !important;}.stk-8b59b96-column{--stk-columns-spacing:0px !important;--stk-column-gap:50px !important;}@media screen and (max-width: 767px){.stk-8b59b96-column{row-gap:var(--stk--preset--spacing--60, 2.25rem) !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-8b59b96 stk-block-content stk-content-align stk-8b59b96-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-dbb7e15\" data-v=\"4\" data-block-id=\"dbb7e15\"><style>@media screen and (min-width: 768px){.stk-dbb7e15 {flex:var(--stk-flex-grow, 1) 1 66.7% !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-dbb7e15-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-dbb7e15-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-cc0239e\" id=\"complementos-de-formacion\" data-block-id=\"cc0239e\"><style>.stk-cc0239e .stk-block-heading__text{color:#fa6199 !important;font-weight:500 !important;}<\/style><h1 class=\"stk-block-heading__text has-text-color\">Estructura del plan de estudios<\/h1><\/div>\n\n\n\nEl estudiantado que finalice el itinerario curricular conjunto obtendr\u00e1 los t\u00edtulos de M\u00e1ster en Ingenier\u00eda Inform\u00e1tica y M\u00e1ster en Ciberseguridad e Inteligencia de Datos. El plan de estudios est\u00e1 organizados en dos cursos acad\u00e9micos con un total de 123 cr\u00e9ditos, incluyendo los TFM de ambas titulaciones. La carga lectiva anual est\u00e1 entre 60 y 63 cr\u00e9ditos por curso.\n<div><\/div>\n<div>\n<table dir=\"ltr\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\"><colgroup> <col width=\"126\" \/> <col width=\"264\" \/> <col width=\"56\" \/> <col width=\"46\" \/><\/colgroup>\n<thead>\n<tr>\n<th>C\u00f3digo<\/th>\n<th>Asignatura<\/th>\n<th>Car\u00e1cter<\/th>\n<th>ECTS<\/th>\n<\/tr>\n<\/thead>\n<tbody><!-- Primer curso - Primer cuatrimestre y anuales -->\n<tr>\n<td colspan=\"4\"><strong>Primer curso \u2013 Primer cuatrimestre y anuales<\/strong><\/td>\n<\/tr>\n<tr>\n<td>835941101<\/td>\n<td>Direcci\u00f3n y gesti\u00f3n de proyectos<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941102<\/td>\n<td>Administraci\u00f3n de infraestructuras TIC y sistemas<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941104<\/td>\n<td>Sistemas y tecnolog\u00eda web: cliente<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941105<\/td>\n<td>Sistemas y tecnolog\u00eda web: servidor<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941201<\/td>\n<td>Gesti\u00f3n de comunicaci\u00f3n y conocimiento empresarial<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<!-- Primer curso - Segundo cuatrimestre -->\n<tr>\n<td colspan=\"4\"><strong>Primer curso \u2013 Segundo cuatrimestre<\/strong><\/td>\n<\/tr>\n<tr>\n<td>835941103<\/td>\n<td>Computaci\u00f3n en la nube<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941202<\/td>\n<td>Seguridad inform\u00e1tica para la web y la nube<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941203<\/td>\n<td>An\u00e1lisis de datos masivos<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941204<\/td>\n<td>Sistemas y tecnolog\u00eda web: arquitectura software<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835941205<\/td>\n<td>Sistemas y tecnolog\u00eda web: integraci\u00f3n, despliegue y monitorizaci\u00f3n<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<!-- Segundo curso - Primer cuatrimestre y anuales -->\n<tr>\n<td colspan=\"4\"><strong>Segundo curso \u2013 Primer cuatrimestre y anuales<\/strong><\/td>\n<\/tr>\n<tr>\n<td>835870901<\/td>\n<td>Criptograf\u00eda de clave secreta<\/td>\n<td>Obligatoria<\/td>\n<td>5<\/td>\n<\/tr>\n<tr>\n<td>835870904<\/td>\n<td>Preprocesado de datos<\/td>\n<td>Obligatoria<\/td>\n<td>5<\/td>\n<\/tr>\n<tr>\n<td>835871101<\/td>\n<td>Identidad digital<\/td>\n<td>Obligatoria<\/td>\n<td>5<\/td>\n<\/tr>\n<tr>\n<td>835871102<\/td>\n<td>Seguridad de las comunicaciones inal\u00e1mbricas<\/td>\n<td>Obligatoria<\/td>\n<td>5<\/td>\n<\/tr>\n<tr>\n<td>835871106<\/td>\n<td>Adquisici\u00f3n e integraci\u00f3n de datos<\/td>\n<td>Obligatoria<\/td>\n<td>5<\/td>\n<\/tr>\n<tr>\n<td>835942102<\/td>\n<td>Pr\u00e1cticas Externas<\/td>\n<td>PPEE<\/td>\n<td>12<\/td>\n<\/tr>\n<!-- Segundo curso - Segundo cuatrimestre -->\n<tr>\n<td colspan=\"4\"><strong>Segundo curso \u2013 Segundo cuatrimestre<\/strong><\/td>\n<\/tr>\n<tr>\n<td>835871107<\/td>\n<td>T\u00e9cnicas avanzadas de an\u00e1lisis de datos<\/td>\n<td>Obligatoria<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835871201<\/td>\n<td>Consultor\u00eda y auditor\u00eda de seguridad<\/td>\n<td>Obligatoria<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td>835871203<\/td>\n<td>Hacking \u00e9tico y an\u00e1lisis forense<\/td>\n<td>Obligatoria<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td>835871206<\/td>\n<td>Trabajo Fin de M\u00e1ster<\/td>\n<td>TFM<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>835942101<\/td>\n<td>Trabajo Fin de M\u00e1ster<\/td>\n<td>TFM<\/td>\n<td>18<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-53ec762\" data-v=\"4\" data-block-id=\"53ec762\"><style>.stk-53ec762-inner-blocks{row-gap:0px !important;}.stk-53ec762 {padding-top:0px !important;padding-right:0px !important;padding-bottom:0px !important;padding-left:0px !important;}@media screen and (min-width: 768px){.stk-53ec762 {flex:var(--stk-flex-grow, 1) 1 33.3% !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-53ec762-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-53ec762-inner-blocks\">\n\n<ul class=\"widget-box\">\n<li class='contacto-header'>Informaci\u00f3n de contacto<\/li><li><i class=\"fa fa-map-marker\"><\/i> Avda. Astrof\u00edsico Francisco S\u00e1nchez, SN. Edificio Calabaza. 38200 San Crist\u00f3bal de La Laguna<\/li><li><i class=\"fa fa-envelope\"><\/i>  <a href=mailto:masterii@ull.es>masterii@ull.es<\/a><\/li><li><i class=\"fa fa-archive\"><\/i><a href=\"https:\/\/sede.ull.es\/ecivilis-site\/catalog\/showProcedure\/484\"> Procedimiento para quejas, sugerencias y felicitaciones<\/a><\/li>\n<\/ul>\n\n\n<\/div><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Structure du cursus\u00a0: Les \u00e9tudiants qui terminent le cursus conjoint obtiendront un master en g\u00e9nie informatique et un master en cybers\u00e9curit\u00e9 et intelligence des donn\u00e9es. Le cursus est organis\u00e9 en deux ann\u00e9es universitaires pour un total de 123 cr\u00e9dits, incluant le m\u00e9moire de master pour les deux dipl\u00f4mes. La charge de cours annuelle\u2026<\/p>","protected":false},"author":1,"featured_media":0,"parent":270,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-frontpage.php","meta":{"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Estructura del Plan de Estudios - Doble M\u00e1ster en Inform\u00e1tica y Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/plan-de-estudios\/estructura-del-plan-de-estudios\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estructura del Plan de Estudios - Doble M\u00e1ster en Inform\u00e1tica y Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"Estructura del plan de estudios El estudiantado que finalice el itinerario curricular conjunto obtendr\u00e1 los t\u00edtulos de M\u00e1ster en Ingenier\u00eda Inform\u00e1tica y M\u00e1ster en Ciberseguridad e Inteligencia de Datos. El plan de estudios est\u00e1 organizados en dos cursos acad\u00e9micos con un total de 123 cr\u00e9ditos, incluyendo los TFM de ambas titulaciones. La carga lectiva anual...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/plan-de-estudios\/estructura-del-plan-de-estudios\/\" \/>\n<meta property=\"og:site_name\" content=\"Doble M\u00e1ster en Inform\u00e1tica y Ciberseguridad\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-24T05:38:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/plan-de-estudios\\\/estructura-del-plan-de-estudios\\\/\",\"url\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/plan-de-estudios\\\/estructura-del-plan-de-estudios\\\/\",\"name\":\"Estructura del Plan de Estudios - Doble M\u00e1ster en Inform\u00e1tica y Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/#website\"},\"datePublished\":\"2017-06-28T12:52:52+00:00\",\"dateModified\":\"2025-07-24T05:38:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/plan-de-estudios\\\/estructura-del-plan-de-estudios\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/plan-de-estudios\\\/estructura-del-plan-de-estudios\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/plan-de-estudios\\\/estructura-del-plan-de-estudios\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Plan de estudios\",\"item\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/en\\\/plan-de-estudios\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Estructura del Plan de Estudios\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/#website\",\"url\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/\",\"name\":\"Doble M\u00e1ster en Inform\u00e1tica y Ciberseguridad\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ull.es\\\/masteres\\\/ingenieria-informatica-y-ciberseguridad\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Structure du cursus - Double Master en Informatique et Cybers\u00e9curit\u00e9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/plan-de-estudios\/estructura-del-plan-de-estudios\/","og_locale":"fr_FR","og_type":"article","og_title":"Estructura del Plan de Estudios - Doble M\u00e1ster en Inform\u00e1tica y Ciberseguridad","og_description":"Estructura del plan de estudios El estudiantado que finalice el itinerario curricular conjunto obtendr\u00e1 los t\u00edtulos de M\u00e1ster en Ingenier\u00eda Inform\u00e1tica y M\u00e1ster en Ciberseguridad e Inteligencia de Datos. El plan de estudios est\u00e1 organizados en dos cursos acad\u00e9micos con un total de 123 cr\u00e9ditos, incluyendo los TFM de ambas titulaciones. La carga lectiva anual...","og_url":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/plan-de-estudios\/estructura-del-plan-de-estudios\/","og_site_name":"Doble M\u00e1ster en Inform\u00e1tica y Ciberseguridad","article_modified_time":"2025-07-24T05:38:32+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/plan-de-estudios\/estructura-del-plan-de-estudios\/","url":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/plan-de-estudios\/estructura-del-plan-de-estudios\/","name":"Structure du cursus - Double Master en Informatique et Cybers\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/#website"},"datePublished":"2017-06-28T12:52:52+00:00","dateModified":"2025-07-24T05:38:32+00:00","breadcrumb":{"@id":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/plan-de-estudios\/estructura-del-plan-de-estudios\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/plan-de-estudios\/estructura-del-plan-de-estudios\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/plan-de-estudios\/estructura-del-plan-de-estudios\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/"},{"@type":"ListItem","position":2,"name":"Plan de estudios","item":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/en\/plan-de-estudios\/"},{"@type":"ListItem","position":3,"name":"Estructura del Plan de Estudios"}]},{"@type":"WebSite","@id":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/#website","url":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/","name":"Double Master en Informatique et Cybers\u00e9curit\u00e9","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":11,"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":984,"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/pages\/24\/revisions\/984"}],"up":[{"embeddable":true,"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/pages\/270"}],"wp:attachment":[{"href":"https:\/\/www.ull.es\/masteres\/ingenieria-informatica-y-ciberseguridad\/fr\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}