π‘Masters & Others
Masters in Offensive Security (OSCP) (UCAM)
Developed advanced offensive-security capabilities to strengthen defensive postures by understanding adversary tactics, techniques and procedures (TTPs) and integrating them into SOC and threat-hunting operations.
Skills covered:
Penetration Testing & Vulnerability Exploitation: Practised exploiting system and network vulnerabilities, mimicking real-life attacker behaviour to assess organisational exposure and design actionable defence strategies.
Red-Team / Blue-Team Collaboration: Translated offensive findings into defensive controls, monitoring rules and incident-response workflows, thereby closing the loop between attack simulation and SOC readiness.
Incident Response & Attack Mitigation: Applied hands-on techniques for intrusion detection, containment and recovery following simulated attacks, enhancing readiness for real-world security events.
Security Architecture & Offensive Tooling: Used professional tools and frameworks to think like an attacker β enabling better anticipation of threats and implementation of proactive mitigation in enterprise systems.
Subjects:
Introduction to Ethical Hacking
Cryptography
OSINT (Open Source Intelligence)
Information Gathering - Recoinnasance and Enumeration
Systems Hacking
Vulnerability Analysis
Network Hacking
Web Hacking
OSCP


Masters in Cybersecurity (INESEM Business School)
Acquired an in-depth and practical understanding of cybersecurity operations, defense architecture, and incident response in online and hybrid environments.
Skills covered:
Security Operations & SIEM: Gained knowledge of the architecture and capabilities of SIEM platforms (log collection, event correlation, threat detection) and monitored security events at scale.
Network & Endpoint Defence: Analysed network protocols, cryptography, and applied ethical hacking techniques (OSINT, vulnerability assessment, malware analysis) to understand attacker methodologies and bolster Blue-Team defences.
Legislation & Governance: Studied security policies, risk management, standards (ISO, GDPR), and crafted frameworks to ensure confidentiality, integrity and availability of systems in compliance with regulatory requirements.
Forensics & Incident Response: Performed hands-on training in auditing, reverse engineering, and incident investigations, enabling rapid identification of compromises and formulation of remediation strategies.
Subjects:
Cybersecurity: regulation, security policy and cyberintelligence;
Computer networks: architecture, protocols and cybersecurity;
Cryptography and virtual private networks (vpn);
Malware and reverse engineering;
Osint cybersecurity tools;
Pentesting and hacking tools;
Hacking training platforms;
Forensic analysis;
Secure web development (OWASP: top 10, development, testing guide and code review);
Cybersecurity applied to ai,smartphones, IoT and industry 4.0;


Incibe (Official Institute of Cybersecurity from Spain)
Technical course of Cybersecurity:
Introduction to technology
Basics of cybersecurity
Cybersecurity advanced
Cybersecurity systems administration
Industrial control and automation systems, most used protocols and their vulnerabilities
Introduction to industrial cybersecurity
Incident analysis
Forensic analysis
Mobile forensics
Compliance
Data protection and RGDP
BCP (Business Continuity Plan)


Cybersecurity, Ethical Hacking and Cloud Bootcamp
Computer Networking: TCP/IP, OSI and their layers and protocols;
OSINT: data gathering and sources, analysis, difussion and feedback;
Firewall and proxy: configuration and rules, user groups and categorization rules creation, Advanced Threat Protection (ATP) setup, VPN SSL remote access configuration for a specific LAN and application control;
SIEM and Cloud security: log management, event correlation and analytics, incident monitoring and security alerts and compliance management and reporting;
Pentesting and Vulnerability Analysis: network scanning, web hacking including Top 10 OWASP, privilege escalation, anonymity;
Forensic Analysis: Memory dump and analysis in Linux and Windows;
Cybersecurity Fundamentals
Last updated

