Project Description

Master MIM Cybersecurity and Intelligence

Course ID – GKA-063

Cybersecurity and Intelligence seeks to specialize students at the same time in cybersecurity, so that they can analyze and manage new cyber threats and risks, and in data science, so that they can extract value from existing data in any computer network. In this way, they will acquire the necessary knowledge to be able to use underlying big data technologies through advanced statistical techniques and machine learning methods that allow them to defend ICT infrastructures. The teachers of the master are Israelites, former soldiers of his army.


Destined for graduates, graduates and university graduates; officers and noncommissioned officers of the Armed Forces and Civil Guard and the body of inspectors and deputy inspectors of the National Police Force, security agents and professionals from these sectors.

Applicants must have experience in managing social networks, as well as basic computer programs (Office Pack, email and web pages). Training professionals in Security, Defense and Geostrategy and in the knowledge of all the forms related to it.

Duration, calendar and price

Duration: The Master MIM Cybersecurity and Intelligence lasts 12 months.

Modality: Online

General characteristics online mode:

• Access to the platform 24 hours a day, 7 days a week

• Online tutoring available during the program

• Full program availability 24 hours a day, 7 days a week

• The program includes teaching materials, examples and practical exercises

The methodology has a theoretical-practical orientation in relation to the specific areas of the program, placing emphasis on teamwork, generating individualized and group supports to favor the learning of the diversity of students. It emphasizes the solution of problems present in the field of study and is characterized by the application of case studies, problem solving in multidisciplinary contexts.

Start date: September 2020

Character: Professionalizing program

The course will be held with a minimum of 10 students. If the enrollment does not reach that minimum, other dates will be set and will be published in due course.

Enquire Today

Master MIM Cybersecurity and Intelligence

Course ID – GKA-063



  • Occidental Identity
  • Ancient and Classic Heritage
  • Relations between State and religion
  • International order since 1815. History of the law of nations


National security and strategy

  • Classical Strategic Thought
  • New and Old Wars, The Transformation of War
  • War and technology
  • National security and strategy
  • Maritime security
  • Relative power, soft power, and smart power
  • Soft power: economic warfare, political warfare, psychological warfare
  • Deterrence

Security and defense

  • Geo-Strategy and super-powers
  • Non-conventional threats – Nuclear, chemical warfare, biological warfare
  • Ballistic missile’s threat
  • Mission command
  • Hybrid warfare, Irregular warfare, and asymmetric warfare

Terror and Piracy

  • The age of modern terror – threats, characteristics, challenges
  • The connection between terror and crime organizations
  • Drugs, arms, and human trafficking
  • Maritime piracy
  • The use of cyber and social networks by terrorists, criminals, and anarchists


  • The HUMINT base for social engineering
  • Avatars and fake identities
  • Methods: Physical, whatsapp, SMS, Calls and emails
  • Infrastructure
  • Use of social media


Introduction to intelligence

  • Philosophy
  • Intelligence and counter terror
  • Intelligence and non-conventional warfare
  • Intelligence analysis techniques
  • Anti-espionage
  • Gathering methods (SIGINT/COMINT/EINT, VISINT, HUMINT, etc.)
  • Human intelligence operations
  • Open source and web intelligence
  • Signal intelligence
  • Intelligence situation and assessment
  • Challenges and dilemmas

Competitive intelligence

  • Philosophy
  • Competitive intelligence and industrial espionage
  • Competitive intelligence gathering and analysis methods
  • Markets and customers evaluation and research
  • Competitor’s business model evaluation and research


Introduction to cyber – Technology

  • The technology point of view – For non-engineer students
  • Computers, networks
  • Infrastructure

Organizational and National strategy and cyber

  • The cyber threat on national infrastructure, include maritime domain, energy,transportation, water, health, etc.
  • National strategy and cyber
  • The use of cyber and social networks by terrorists, criminals and anarchists
  • The cyber threat on organizational infrastructure

Introduction to cyber-attacks

  •  Cyber warfare – Strategy point of view
  • Definitions: CNA, CNE, CNI, CND, CNC
  • Attacker prospective and motivations
  • Insider threat
  • Cyber-attack methods and tools
  • Deep-web and dark-web
  • Social engineering
  • Supply chain attack

Intelligence and cyber

  • National strategy and cyber
  • The cyber threat on national infrastructure, include maritime, energy,transportation, water, health, etc.
  • Cyber deterrence
  • The changing face of Intelligence at the age of cyber
  • Intelligence gathering using social networks
  • HUMINT at the age of cyber
  • Cyber and electronic warfare

Cyber, Influence campaigns and Social networks

  • Information warfare and psychological operations
  • Social networks and their effect on public opinion
  • Election’s influence by cyber operations
  • Regulation, privacy and cyber

Three pillars of defense: Technology, preparedness and resilience

  • Cybersecurity strategies
  • Cyber risks and threats analysis
  • Cybersecurity technologies
  • Preparedness
  • Security operation room (SIEM/SOC): methods, operation, training, challenges
  • Physical anti-access cybersecurity
  • Protecting the supply chain
  • Human resources
  • Cyber awareness and education
  • Resilience
  • Cyber crisis management
  • Cyber crisis teams
  • Legal and public relations aspects

Cyber war games and simulation

  • Planning and principles
  • Scenarios
  • Practical simulation

Cybersecurity at the national/Organizational levels

  • Define reference threats and scenarios
  • Mapping cyber assets
  • Business impact analysis – Organization level and national level
  • Intelligence and knowledge management
  • Risk assessments and gap análisis

Cyber Crisis management

  • Defining Crisis level and damages
  • Response teams
  • Ransom/extortion attacks negotiation
  • Legal and privacy issues
  • Public relations
  • Security issues

Enquire Today


Become Part of Global Knowledge Alliance to Further Your Career.