Professional Documents
Culture Documents
Our Master programs dedicated to young students and adult professionals have a strong
international component to provide a global view of business, of the main emerging economic
sectors and of the digital technologies and systems.
Located in Barcelona, in the 22@ district, the University is part of a vibrant community of
research and training centers, startups and cutting-edge technology companies developed
within the 5 “knowledge clusters” dedicated to ICT, Bio-Medicine, Design, Energy, and Media.
The University campus is located at the Mapfre Tower in Barcelona, one of the most important
skyline of the city. The campus includes the administratives office, the student service and the
admissions office, 4 meeting rooms and a living area and a cafeteria avilable for the students.
OBJECTIVES 2
The objective of this Master is to offer the tools and skills, which are highly sought after by the
job market in the interface of artificial intelligence, data science and cybersecurity. Students will
gain a knowledge of potential application of data-analytics and AI, machine learning, neural
network methods and the mathematical models behind them.
Moreover they will analyze the enabling technologies such as Internet of Things and cloud
systems and learn how they contribute to data analytics in mitigating the advanced cyber threats.
The Master is designed to help develop the cyber professionals of the future by providing an
in-depth understanding of artificial intelligence concepts, principles and technologies, big data
analytics and cybersecurity.
3 PROFESSIONAL PROFILE
The aim of this master is to develop the employment skills which are essential to Security
Operational Centres, Antivirus Software Companies, Artificial Intelligent Start-ups, e-commerce
companies, and governmental organisations. It is designed for career-driven professionals
interested in the transition into the big data and AI industry.
• Individuals with a technology background who want to become experts in cyber security and
artificial intelligence.
• Individuals with an engineering background and an entrepreneurial mindset who want to start
their own business in the domain of threat detection and prevention using data analytics.
• Security professionals who want to advance their skills in data analytics.
CAREER OPPORTUNITIES 4
The job market remains vibrant for computer science professionals. Our graduates find
employment in ICT R&D, IT management and IT consulting, in small companies and major
multinationals.
The following positions and roles are the most demanded for graduates from the Master:
Students will gain theoretical and practical experience in using complex data systems and a
critical awareness of the challenges caused by the data generation processes.
The specialization courses of the Master are related to Intelligent web systems, web mining
techniques, Neural networks and Information system and cybersecurity, analyzing cryptography,
formal methods, secure software engineering, and machine learning.
EVERYTHING IS A SOFTWARE
The purpose of this course is to develop a deep understanding of the role currently played by software
development and its implications. Emphasis will be placed on the technical and security procedures that
are in place for software assurance and secure software lifecycle. Topics covered in the course include:
software driven innovation, software assurance, implementation and environment vulnerabilities, secure
software development, security programming, OWASP testing framework and testing techniques,
integrated security testing in SDLCs, analysis and reporting of security testing, software assurance maturity
model. Upon completion of the course, the student will be able to:
• Learn about the different methods used to protect software from malicious users;
• Evaluate and interpret the utility of information found using data science;
• Apply data science concepts and methods to solve problems in real-world contexts.
INFORMATION SYSTEM AND SECURITY
This course provides students with the knowledge and skills to understand the different aspects in which
computer safety braches out. Different technical aspects will be discussed, especially relating to
cryptographic, system security and networks safety. System security will be analyzed also from a legal and
management point of view to make students understand the most important applications of network
security. Topics covered in the course include: protection of proprietary information and security planning,
networked computer vulnerabilities, network security, detection, disaster recovery and technology law,
cryptography, symmetric and asymmetric encryption. Upon completion of the course, students will be
able to:
• Classify and describe the cryptographic algorithms and protocols such as encryption, hash functions,
digital signatures, and key Exchange;
• Understand and apply the most important application in Network Security, including Kerberos, security for
e- mail, IP Security and transport layer security;
• Describe legal and public relations implications of security and privacy issues.
DIGITAL EVOLUTION AND CYBERSECURITY
The digital revolution has created new frontiers of information that influence almost every aspect of
our lives. This course aims to give a broad overview of the technologies and paradigms which have
contributed and are still contributing to digital transformation. The main technological trends, such
as Cloud Computing, Machine Learning and Artificial Intelligence, BigData, Blockchain and RPA
(Robot Process Automation) and the cyber risks involved will be presented and analyzed through the
course. The fundamentals of Information Technology best practice and the cyber security principles will
be presented by exploring a range of topics from the modern cryptographic techniques that underlie
data protection, to the secure programming skills that reinforce secure design and play
an essential part in building layered network architecture. Topics covered in the course include: cloud
computing, cloud service and distribution models, financial metrics and IT security, IOT, Big data, machine
learning, information security, applied cryptography, data privacy and security.
• Evaluate the reasons and trends for the digital organization evolution;
• Comprehend technologies such as: Cloud Computing, IoT, Big Data, Machine Learning, Blockchain and RPA;
• Evaluate the risks associated with the use of new technologies and tools;
• Develop a general overview of the possible future implication and risks of the use of innovative technologies.
ARTIFICIAL INTELLIGENCE
This course introduces students to the fundamental’s theories and applications of artificial intelligence and
provides them with a comprehensive knowledge of intelligent agents and their behaviors in connection to
the surrounding environment. In addition, search algorithms for problems solving will be covered deeply
through appropriate applications and examples. The main goal of the course is to allow students understand
the strengths and weaknesses of human decision-making and learning in combination with AI systems and
the ethical and policy implications of new AI capabilities. Topics covered in the course include: AI
methodology and fundamentals, intelligent agents, search algorithms, game playing, machine learning,
uncertainty and probability theory, probabilistic reasoning in AI, Bayesian networks, natural language
processing, robotics and image processing. Upon completion of the course, students will be able to:
• Determine the type of the environment for the intelligent agent such as robot in order to enhance its
performance;
• Analyse variables;
• Analyse expression;
• explain the challenges of Big Data analytics as related to the Internet of Things;
• analyze data using basic statistical and data preparation techniques in Python with pandas;
• critically evaluate data sources, data sets, and inferences made from big data analytics.
MACHINE LEARNING
Machine learning uses interdisciplinary techniques such as statistics, linear algebra, optimization, and
computer science to create automated systems that can sift through large volumes of data at high speed
to make predictions or decisions without human intervention. Machine learning as a field is now incredibly
pervasive, with applications spanning from business intelligence to homeland security, from analyzing
biochemical interactions to structural monitoring of aging bridges, and from emissions to astrophysics, etc.
This course introduces students with a broad cross-section of models and algorithms for machine learning,
and prepares them for research or industry application of machine learning techniques. It gives an overview
of many concepts, techniques and algorithms in machine learning, beginning with topics such as
classification and linear regression and ending up with more recent topics such support vector machines.
The course is divided into three main topics: supervised learning, unsupervised learning, and machine
learning theory. Topics covered in the course include: supervised learning (linear decision, non linear
decision and probabilistic), unsupervised learning (clustering, factor analysis, visualization), learning theory
(bias/variance theory, empirical risk minimization). Upon completion fo the course, students will be able to:
• Understand the basic operation principles of Machine Learning main techniques, and to know how to use
on the environment of an intelligent system or Service;
• Apply the algorithms to a real-world problem, optimize the models learned and report on the expected;
Students can choose a topic and explore the subject in detail, putting the theory taught during
the program into practice.
The project must be based on a critical, and analytical approach and create something new in
terms of method, application, ideas and knowledge.
Once completed and submitted by the student, the project work will be evaluated and
approved by the academic committee of the Master.
Students will be then required to present the project work during the final Master ceremony by
videoconference.
7 STUDY MODEL
A JOINT MASTER DEGREE
The Master awards students a Joint Master degree from UDIMA -Universidad a Distancia de
Madrid y MIA Digital University
A FULLY ONLINE STUDY MODEL
The Master can be attended completely online from your country through the online platform
“MIA University Campus” where you can find the video - classes recorded by the professors, the webinars
in real time when you have the opportunity to interact with your peers and instructors, the case studies and
the other study and assessment material.
• Video-lessons and teaching material available on the online MIA platform accessible 24/7 from different
devices (PC, smartphones, tablets)
• Lecture Notes on the main contents of the video-lessons
• In-depth contents about the main topics of the various modules
• Articles and case studies on relevant topics related to the course
• Interactive assessment, tests and case studies to be solved by the students
• Live classes and webinars to favor the interaction among faculty and students
• Final project work
ADMISSION REQUIRMENTS 8
The Master is addressed to:
• Individuals with a technology background who want to become experts in cyber security
and artificial intelligence
• Individuals with an engineering background and an entrepreneurial mindset who want to start
their own business in the domain of threat detection and prevention using data analytics.
• Security professionals who want to advance their skills in data analytics.
Students interested in applying for the University scholarship program should contact the
admissions office at admissions@miauniversity.es or fill and submit the scholarship form
available on this page: https://miauniversity.com/en/scholarship-form/
Carrer de la Marina 16-18
08005 Barcelona – Spain
Tel. +34937370916
Whatsapp. +34645239091
www.miauniversity.es