+ INFORMATION

Hiring Incentives

Our students

You are seeing all the students who have taken or are taking the Professional Master in BIM and Efficient Energy Management.

Avatar Silhouette Flaw

Anton Vazquez Llano

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Tomás Ignacio De Nicolás Vela

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Juan Sebastian Parra Camacho

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Gonzalo Pérez Salcedo success story

Gonzalo Perez Salcedo

Master of Human Resources HR: People Management, Talent Development and Labor Management

Avatar Silhouette Flaw

Vicent Ciscar Advanced

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Oriol Ventura Cvico

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

José Luis Mondejar Paton

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Gonzalo Perez Salcedo

Gonzalo Perez Salcedo

Master of Human Resources HR: People Management, Talent Development and Labor Management

Avatar Silhouette Flaw

Sergio Casaus Quemada

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Alfonso Simón Díaz-Cano

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Laura Moccia Parada

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Fernando Cardeña Arias

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Beatriz Serrano Sánchez

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Lorena Cabas Marquez

Master in Cybersecurity Management, Ethical Hacking and Offensive Security

Avatar Silhouette Flaw

Abraham Saucedo Perez

Master in Cybersecurity Management, Ethical Hacking and Offensive Security