Cybersecurity and Digital Forensics

Cybersecurity and Digital Forensics

Course Type:
Master’s Programme

Programme Introduction

The goal of the Master’s degree in Cybersecurity and Digital Forensics is to develop specialized training in cybersecurity and computer forensics, allowing holders of degrees in Computer Engineering or similar degrees to continue their studies, and to train highly qualified technicians in cybersecurity and computer forensics.

http://www.dei.estg.ipleiria.pt/mcif/

Programme Coordinator

Miguel Monteiro de Sousa Frade
coord.mcif.estg@ipleiria.pt

Reference

D 2259 – PL 2159

School

City

Language

Portuguese

Type

Evening, Morning & Afternoon

Length

4 Semesters

Vacancies

General and International Student Contingent
Daytime Classes: 20

General and International Student Contingent
Evening Classes: 20

Notice

DGES certification

Objectives

Programme

This Master’s degree aims at developing the connection with the business fabric of the region, by performing internships, projects and dissertations, which may allow to apply good practices in cybersecurity. The main objectives of this Master’s also include the development of applied research in cybersecurity and computer forensics, as well as to promote the transference of advanced knowledge in cybersecurity and computer forensics to organizations.

1st Year
ID Name Semester ECTS Length
1st Semester 6 30 h

1. Introduction to digital forensics:
1.1 Scientific method;
1.2 Privacy and ethics;
1.3 Technical concepts;
bytes, hexadecimal and unicode
order of volatility
2. Obtaining evidences:
2.1 1st intervention procedures and equipment seizure;
2.2 Evidence sources;
– Storage media and hidden areas
-Data networks, live and mobile.
2.3 Storage media;
– Write blockers
– Forensic copies
– Partitions and volumes
– FAT and NTFS file systems
– Copy integrity, collisions and digital signatures
3. Analysis of forensic images with Autopsy:
– Unallocated and slack space
– Deleted files
– Files and metadata
– Search patterns
– File extension mismatch
– Web browsing
– Email clients
-Windows OS artefacts.
4. Documentation and report:
4.1 Digital forensics limitations;
-Hidden information
-Evidences removal
-Records tampering
4.2 Forensic report comprehension
Case studies .

1st Semester 6 30 h
  1. Fundamental principles of security (C1)
  2. Regulation, investigation, compliance and ethics (C3)
  3. Information security management systems (C2, C4)
  4. Policies, Standards, Baselines, Guidelines and Procedures (C3, C6, C7)
  5. Information Security Program (C6, C7, C8, C9, C10)
  6. Risk Management, Assessment and Analysis (C1, C5, C9, C10)
  7. Security management models and practices (C3, C7, C8, C9, C10)
1st Semester 6 30 h

1) Fundamentals of Internet security and TCP/IP communication model

  • Functioning of Internet, its infrastructure and TCP/IP model
  • meaning of service and port
  • security issues in IPv6
  • attacks and threats
  • network security model
  • diagnostic tools and traffic analysis.
    2) Fundamentals of cryptography
  • symmetric cryptography
  • asymmetric cryptography
    3) Applications of cryptographic algorithms:
  • hash functions
  • message authentication
  • digital signatures
  • keys management and distribution
    4) Protocols and services related with network security
  • IPSec
  • SSL/TLS
  • SSH
    5) IoT security
    6) Intrusion Detection Systems
  • fundamentals
  • types
  • practical applications
    7) Firewalls
  • fundamentals
  • types
  • practical applications
1st Semester 6 30 h
  1. – Systems Administration
    1.1 – Operating Systems
    1.2 – Services
    1.3 – Maintenance
    1.4 – Digital Artifacts
    2 – Logs
    2.1 – Log Concepts
    2.2 – Logs in Operating Systems
    2.3 – Application Logs
    3 – Name Services
    3.1 – Basic Concepts
    3.2 – General Operation
    3.2 – Vulnerabilities
    3.3 – Alternative Services
1st Semester 6 30 h
  1. Introduction to Ethical Hacking.
  2. Footprinting and Reconnaissance.
  3. Social Engineering.
  4. Communications sniffing.
  5. Networks scanning.
  6. Services enumeration.
  7. Vulnerability analysis.
  8. Introduction to vulnerability exploitation.
2nd Semester 6 30 h
  1. Security analysis and analytics techniques
    2.Management of security events
  2. Collection of security event data (logs)
  3. Data processing
  4. Real-time data analysis and pattern identification
  5. Security reports and alerts (dashboards)
  6. Architecture of SIEM systems – Security Information and Event Management
  7. SIEM systems
  8. Real test scenarios
  9. SIEM systems in Big Data environments
2nd Semester 6 30 h
  1. Planning and development of computer security incident response process
  2. Incident detection and characterization
  3. Collection and preservation of information
  4. Data analysis: methodologies and investigation
  5. Remediation
2nd Semester 6 30 h

C1.Identification the threats and corrective measures to be applied
C2.Identify and detect system and service vulnerabilities
C3.Problems associated with BYOD
C4.Planning of secure communication solutions in computer networks and systems
C5.Planning solutions for mobile systems and solutions
C6.Applications of perimeter security solutions
C7.Evaluation of logs and network traffic
C8.Study and behavioral analysis of applications, services and protocols
C9.Study the behavior of IOT devices in computer systems

2nd Semester 6 30 h
  1. Preparation of virtual environments
    forensic laboratory
    virtual machines
    isolation techniques
  2. Analysis of data networks
    capture and packet filters
    log analysis
    geolocation of IPs
    segmentation and encryption
    traffic anonymization
  3. Real-time forensics
    log collection and running processes
    acquisition of data in volatile memory
    acquisition of cryptographic keys
  4. Mobile Devices
    location of data
    procedures for data acquisition
    data structures
    analysis tools
    Android and iOS differences
  5. OSINT
    types of information sources
    information collection cycle
    cognitive bias
  6. Malicious software
    sandboxes
    identify and classification
    obfuscation
    analysis
  7. Case studies
2nd Semester 6 30 h

Students must choose one of the following curricular units:

Artificial Intelligence in Digital Forensics

  1. Introduction to Artificial Intelligence
  2. Artificial Intelligence in Digital Forensic Investigation
    2.1 File Type Classification
    2.2 Transcription, Automatic Translation, and Optical Character Recognition
    2.3 Search for Images, Videos, and Audio Containing People or Objects of Interest
    2.4 Generation and Detection of Deepfake Audio, Images, and Video; Detection of Audio, Image, and Video Manipulation
    2.5 Text Search and Analysis Using Large Language Models

Free Curricular Unit

By selecting the “Free” curricular unit, you may choose a subject from any of the study cycles at the Polytechnic of Leiria. Please consult the enrolment/registration portal.

2nd Year
ID Name Semester ECTS Length
Preparation for Dissertation, Project or Internship in Cybersecurity and Digital Forensics 1S 6 30 h
Annual 54 60 h

Student must choose one of three optional subjects.

Project
Students will undertake an original practical project in one of the scientific areas of the specialization.
The project, whose theme must be defined and subsequently approved by the statutorily competent scientific body, will be primarily carried
out in an academic and research environment, with a strong practical and laboratory component.

Dissertation
Students will undertake an original project in one of the scientific areas of the specialization.
The work plan will be defined and must be approved by the statutorily competent scientific body.
The work will be primarily carried out in an academic and applied research environment.

Internship
Students will undertake an original project in one of the scientific areas of the specialization.
The work plan will be defined and must be approved by the statutorily competent scientific body. The work will be fully carried out in a
professional environment.



Entry Requirements

Entry Requirements

People who can apply to the Master’s Degree:

  1. Holders of an undergraduate degree or a legal equivalent in Computer Engineering or related fields;
  2. Holders of a foreign higher education diploma, granted after a first cycle of studies, under the principles of the Bologna Process, by a State, which has subscribed this Process, in Computer Engineering or related fields;
  3. Holders of a foreign higher education diploma that is recognized as meeting the objectives of an undergraduate degree in Computer Engineering or related fields by the scientific body of ESTG – ­Polytechnic of Leiria;
  4. Holders of an academic, scientific or professional curriculum, recognized as adequate to attend the study cycle by the scientific body of ESTG – ­Polytechnic of Leiria;
  5. Students who are close to completing their undergraduate degree in the field required for entering the Master’s degree, and declare it in their application (*).

(*) Applications submitted under the terms of this paragraph are considered for the purposes of admission and ranking on the date on which proof of the condition is verified.

International Student
All information related to the  international student application should be consulted on our International Students webpage.

Accreditation

State: Accredited
Number of years of accreditation: 6
Publication date: 09/06/2025
Accreditation A3ES

More Information

International student
E-mail: 
studywithus@ipleiria.pt

Application Fee

60€

Enrolment Fee

General contingent: 50€
International student contingent: 100€

Tuition Fee

General contingent: 1140€
International student contingent: 3000€


Online Application

Use the button bellow to start your application.