Master’s Degree in Cybersecurity
Duration
Modality
Faculty
- CURRENT RESOLUTION OF THE MASTER'S DEGREE: Blended mode: CTDA-186-2021 (07/09/2021) Virtual mode: CTDA-187-2021 (07/09/2021)
-
CURRENT RESOLUTION OF THE SPECIALIZATION:
Semi face-to-face Modality: CTDA-183-2021 (07/09/2021)
Virtual mode: CTDA-184-2021 (07/09/2021)
Career Description
Organizations have made efforts to advance in their digital transformation, many of them with the intention of retaining their workers and contribute to economic and social development, which is transcendental given the current conditions. Faced with this, public and private companies require progressive changes in their relationship with technologies and the implementation of digital services, which requires more human capital in cybersecurity.
The final project is framed within the logic of Feasible Projects, which immerses participants in a specific scenario that requires reading the contextual reality (both internal and external) as well as determining the necessary inputs for decision making.
The graduate of the specialization will have the practical and theoretical components to successfully face operational tasks in the field of information security. The high practical content of the program will help you develop skills to implement technical measures and achieve the operational goals of organizational security.
Graduates of the Master's Degree in Computer Cybersecurity You will be able to work as a security officer within organizations, where you will implement technical measures to achieve organizational security operational goals. Additionally, they will have the necessary skills to carry out basic forensic analysis and incident management tasks with roles in accordance with three main lines:
- Security Analyst
- Technical Management
- Security Audit
Professionals interested in becoming information security officers, or practicing information security officers who want to broaden their knowledge in strategic and management elements. It is also aimed at management staff who want to strengthen their competencies in technical and strategic aspects. In addition, professionals from different areas who wish to contribute to the strengthening of information security and cybersecurity in local and international organizations can join the program.
The curricular design of the program pertinently integrates the theoretical and practical aspects sufficient for the development of operational activities that guarantee information security. This is reflected in the consolidation of a final degree project in which students mobilize conceptual, procedural and attitudinal aspects in real scenarios, in such a way that there is a strong link between the real sector and the academy. This is framed within the logic of Feasible Projects, which immerses the trainees in a specific scenario that requires reading the contextual reality (both internal and external) as well as determining the necessary inputs to carry out the work and make the appropriate decisions.
At the methodological level, the aim is to strengthen research skills in two areas: a documentary one that serves as a theoretical-conceptual support, and a baseline survey close to the empirical recognition of what has been done in other areas to solve the problems detected. All this is framed in an institution or practical problem. For its approach, specific objectives are determined, in which capacities are involved to prospect that later derive in methodologies that solve the initial problem. This immersion in institutions implies the development of communicational competencies, since it requires the recognition of information, management of relationships with different instances of the organization, teamwork and socialization of the proposed possibilities.
Under the described perspective, the different subjects that compose the Program are consolidated, and that allow the integral formation in three main lines:
- Security Analyst
- Technical Management
- Security audit
In the case of the exit as a Specialist, the design focuses on forensic analysis, monitoring and incident management, by means of individual and collaborative practical work, in which follow-up, accompaniment and constant extension by the teachers are required under the perspective of formative evaluation. On the other hand, the master's degree consolidates the three lines mentioned in previous paragraphs, determined by the appropriation of the norms and legal or regulatory requirements that are mandatory in safety, both locally and internationally.
The didactic strategies, both face-to-face and virtual, are characterized by the creation of active learning ecosystems, in which students become the center of the training, who are stimulated to constant participation through problem solving, the development of contextualized projects, as well as the collaborative construction of small solutions. To these are articulated the evaluation activities, which allow assessing the appropriation of the competencies defined in each of the subjects, in a systematic, permanent and integral way.
- To review the current regulations governing information security, both from a regulatory and law enforcement point of view.
- Study and apply modern techniques in the design, monitoring and evaluation of controls.
- Study information security auditing techniques.
- Define security requirements for software design.
- Define monitoring, incident management and forensic analysis models.
- Analyze security management and strategic management models.
- Review trends, state of the art and advances in information security.
- Establish the ethical and moral principles that an information security specialist should have.
All applicants must submit the following documentation duly scanned from the original and sent to the promoter to be uploaded to the respective platform:
- Bachelor's degree diploma or its equivalent
- Bachelor's degree credits or grades or their equivalent
If the applicant is a foreigner, the aforementioned documents must be apostilled by the Ministry of Foreign Affairs of his/her country. In the event that the country does not have a consulate, you must apply to the official authorities that validate it.
- Identity document (passport in case of foreigners residing in Panama).
- A current passport-size photo
- Fill out the admission form in electronic format with the promoter.
Note: Students enrolled in virtual mode whose nationality is different from Panamanian, must submit a copy of their personal identity document from their country of origin.
In case of being a foreign student these documents must be provided with an apostille stamp or legalization through diplomatic channels and its translation in Spanish.
The permanence in the University will depend on the student's motivation, capacity and vision to obtain the chosen degree.
Given the profile of the curricular educational model "CYBERHUMANIST" of the University, the student must:
- Pass each subject with a minimum grade of 81 on a scale of 1 to 100 which is equivalent to B.
- Study in teams and individually.
- Develop research skills based on discovery learning.
- Deepen in the disciplinary knowledge that is of interest to them.
Respect and comply with the regulations established by the statutes that regulate the relationship between the University and the students. - Be up to date with their monthly payments.
- Attend at least 80% of the meetings under the face-to-face modality.
- For studies under the virtual modality, attendance is regulated by constant interaction in all activities planned on the platform, including synchronous and asynchronous meetings, as well as the development of the student's autonomous work.
- In case of prolonged absence, the student must present a justified argumentation.
- All students of the Specialization programs must have basic computer skills.
In order to obtain the title of Specialist, the following is required:
- Complete and pass all the subjects of the curriculum with a minimum grade of 81 points equivalent to a B.
- Maintain a cumulative academic index of not less than two (2.00) on a scale of three (3.00).
- Take a certification exam in a second language recognized by UNESCO, a minimum of 40 hours. In case of not having the above, the University offers courses in English or another language, for which the respective course will be paid.
- Approve the degree option established in the curricular design corresponding to a monograph in which the appropriation of the proposed knowledge is evidenced.
- Be in good standing with the institution (financial, academic, and library).
In order to obtain the Master's Degree it is required:
- Complete and pass all the academic content of the program enrolled.
Complete and pass all the subjects of the curriculum with a minimum grade of 81 points equivalent to a B. - Maintain a cumulative academic index of not less than two (2.00) on a scale of three (3.00).
- Take a certification exam in a second language recognized by UNESCO, a minimum of 40 hours. In case of not having the above, the University offers courses in English or another language, for which the respective course will be paid.
- Be in good standing with the institution (financial, academic, and library).
- Must opt for one of the following requirements: Submission of a final project that includes the application of the knowledge of the Master's Degree.
In the case of foreign students, they must comply with the local regulations of the country of origin where they wish to validate their degree.
The graduate of the specialization in Cybersecurity will have the practical and theoretical components to successfully face operational tasks in the field of information security. Among their skills, and thanks to a program with a high content of practical challenges, they will be able to implement technical measures to achieve the operational goals of organizational security. Additionally, you will have the necessary components to perform basic forensic analysis and incident management.
The graduate of the Master´s Degree in Cybersecurity will be able to work as a security officer within organizations, where he/she will implement technical measures to achieve the operational goals of organizational security.
Additionally, he/she will have the necessary competencies to perform basic forensic analysis and incident management roles along three main lines:
- Security Analyst
- Technical Management
- Security Audit
Knowing:
- Appropriate the principles of integrity, authenticity, confidentiality and availability of information, in order to apply the techniques, procedures and policies of information security.
- Understand the impact of national and international policies and regulations on the performance of information security officers.
Doing
- Develop assertive communication skills that allow the creation of synergies with different levels and levels of organizations.
- Execute information security auditing processes in accordance with international standards, allowing continuous improvement and development of organizations.
- Apply different models of management and strategic management of security in different types of organizations.
Living:
- Develop assertive communication skills that allow the creation of synergies with different levels and levels of organizations.
- Carry out projects associated with information security that require the application of teamwork skills.
Being:
- Strengthen skills related to critical thinking, which will allow him/her to make decisions focused on the improvement of information security in different types of organizations.
- To propose creative strategies to solve problems that imply the revision of new ways of thinking, acting and communicating.
Undertaking
- Make proposals to improve their own and the communities' conditions through the implementation of actions, projects and tasks related to information security.
- Design projects related to the disciplinary knowledge of the academic program, which respond to contextualized needs and in which different concepts, theories, processes, procedures, attitudes and values are mobilized.
Our teachers
Marlon Mike Toro Alvarez
Lieutenant colonel
His academic and professional work in cybersecurity has focused on the investigation and profiling of cyberthreats, which allowed him, together with the number one cybercriminologist in the world, Dr. Kyung-shick Choi, to write the first book in Spanish on Cybercriminology, propose the First White Hat Hackers Conference and advise the Andean Parliament's Regulatory Framework for Cybersecurity. From digital literacy and testing criminal models online, he has forged a legacy that recognizes him as the forerunner of the Latin American school of cybercriminology. His participation as a postgraduate teacher in different countries and languages has led him to give lectures to thousands of viewers and inspire the new generations of cybercrime investigators. Among the most prominent positions is that of being a founding member of the Center for Cybersecurity and Cybercrime Investigation (Center for CIC) at Boston University. Co-founder of the International Observatory of ComputerCrime (INTOCC) and the Cybercrime Division of the American Society for Criminology; Cyber expert accredited by the Chaos Computer Club (CCC), the Society for Interdisciplinary Scientific Criminology (GiwK), a society that has the participation of important scientists from Germany, Austria and Switzerland; Honorary Cyberthinker of the Cyberthinking and Forensic Audit Tank (TCP-IP), among other renowned affiliations and professional reserve. Lieutenant Colonel Toro-Alvarez holds a Master's in Cybersecurity and Cybercrime Investigation from Boston University (2017) and a doctoral fellow from Southern Illinois University (2018), Florida International University (2021) and New Haven University (2018).
Reinaldo Mayol Arnao
Senior consultant
Senior consultant with experience in information technology and security, with a master's degree and doctoral training in the area. He has been CIO and CISO in the public and private sector. His areas of work include security systems administration, architecture design, risk analysis, Security Information Systems Management (ISMS) evaluation and design, cryptographic architecture design, and security policy evaluation. He has been an invited speaker and professor in the United States, Mexico, Panama, Venezuela, Cuba, Colombia, Spain, Brazil, El Salvador, Honduras, Guatemala, Peru, and Ecuador.
emmer sanjur
Computer Systems Engineer
Professional graduated from the Technological University of Panama with a degree in Computer Systems Engineering, with postgraduate studies in Systems Auditing and Higher Education. Involved in the technological field for more than 20 years, in various sectors such as Energy, Telecommunications, Financial, etc. During this period he has held various roles such as technical support, infrastructure specialist, project manager and technological services, as well as information security officer.
Meet Here Our Study plan
Contact us and start now
Headquarters C Panama Masters
Phone: (+507) 263-2519 Eusebio A. Morales Street, Bella Vista.
La Chorrera Headquarters
Phone: (+507) 254-1141 Ave. de Las Americas, Plaza Nueva Orleans.
Chitre Headquarters
Phone: (+507) 996-4260 In front of the Herrera park.
Santiago Headquarters
Phone: (+507) 998-0363 2nd street diagonal to vector control.
David Headquarters
Phone: (+507) 788-0018
Phone: (+507) 788-0019
Mariví Building, Ave. Francisco Clark, David.