- Analyze and select audit and vulnerability detection tools for the computer system, implementing those that comply with computer security specifications. - Apply procedures related to compliance with current legal regulations. - Plan and apply security measures to guarantee the integrity of the computer system and the entry and exit points of the departmental network. - Provide students with the basic guidelines for the application of the ISO/IEC 27001 Standard within their organization. - Offer guidelines to implement an information security management system based on the ISO/IEC 27001 standard, following the controls recommended by the ISO/IEC 27002 standard in their respective clauses. - Present and explain a series of good practices to achieve information security. - Analyze the organization's implementation plans to identify the system elements involved and the security levels to implement. - Analyze and implement physical and logical access mechanisms to servers according to security specifications. - Evaluate the function and need of each service running on the server according to security specifications. - Install, configure and manage a server firewall with the necessary features according to security specifications. - Plan and implement intrusion detection systems according to security standards. - Apply information analysis and attack containment procedures in the event of a detected incident. - Analyze the extent of the damage and determine the recovery processes in the event of a detected incident. - Evaluate existing encryption techniques to choose the necessary one based on the required security requirements. - Implement cryptographic services and techniques in those services that require it according to computer security specifications. - Use digital certificate systems in those communications that require integrity and confidentiality according to security specifications. - Design and implement digital certification services according to operational and computer security needs. - Know the precise definition of the different types of hackers and their objectives. - Learn about the methodology of an attack and the means to identify vulnerabilities or security flaws through which to enter a system. - Know the physical failures, which allow direct access to computers, and the network and Wi-Fi failures, each one is presented and illustrated with countermeasure proposals. - Know about Cloud Computing (its history, how it works) to better master security. - Take into account web security and current flaws identified thanks to the help of tools that the reader can easily implement in their own systems. - Always identify possible failures to later establish the appropriate protection strategy. - Learn some examples of system failures in Windows or Linux and application failures, to become familiar with assembly language and better understand the attack possibilities.