Computer Engineering

Computer Engineering

Course Type:
Bachelor’s Programme

Programme Introduction

With a Bachelor’s Degree in Computer Engineering, students gain the skills needed to enter one of the most in-demand fields in the job market and develop innovative technological solutions with real impact.

The programme combines practical training in Information Systems and Information Technologies and Cybersecurity with direct exposure to real-world contexts. Throughout the course, students work on real cases in collaboration with internal and external organisations. This enables them to gain experience in teamwork, solve concrete problems, and take part in projects and events in partnership with companies. This hands-on approach allows them to build a strong portfolio and enter the job market with proven experience in the field.

Graduates of this programme stand out for their ability to turn technology into practical solutions, mastering current tools and being ready to meet the challenges of the professional world.

Programme Coordinator

Leonel Filipe Simões Santos
coord.ei.estg@ipleiria.pt

School

City

Language

Portuguese

Type

Evening, Morning & Afternoon

Length

6 Semesters

Vacancies

General contingent Morning & Afternoon: 125
General contingent Evening: 30
International student contingent: 12

DGES certification

Objectives

Programme
  • Information Systems and Information Technologies and Cybersecurity
  • Software development
  • Network and service planning and configuration
  • Cybersecurity and mobile computing
  • Data administration and intelligent data analysis

Careers Options

Programme
  • Network and Database Administrator
  • Systems Analyst
  • Software Engineer
  • Communications Network Engineer
  • Systems and Services Administrator
  • Multimedia Engineer
  • Information Technologies and Cybersecurity Consultant
  • Project Manager
1st Year | Common-core Syllabus
ID Name Semester ECTS Length
S1 6 75 h

1) PC Architecture
2) Computers: Theory and Technology
3) Instruction Set Architecture
4) Representing
5) Below programs
6) Trends
7) Pipelining
8) Memory Hierarchy
9) Instruction Level Paralelism (ILP)
10) Measuring, Reporting and Summarizing Performance

S1 5 60 h
  1. Propositional Logic and Mathematical Reasoning
  2. Vectors
  3. Matrices and Systems of Linear Equations
  4. Determinants
  5. Vectors Spaces
  6. Linear Transformations
S1 7 75 h
  1. Algorithms
  2. Introduction to C Programming Language
  3. Control statements
  4. Functions
  5. Arrays and Strings
  6. Structures
  7. Files
  8. Pointers
  9. Memory Management
S1 6 75 h
  1. Differential calculus in IR
    1.1Derivative notion, derivative rules, differentiation of composed and inverse functions
    1.2Differentiation of trigonometric inverse functions
    1.3Cauchy’s rule
    1.4Higher order derivatives and Taylor’s polynomial
    1.5Parametric curves on the plane and derivatives
  2. Integral calculus in IR
    2.1Primitive definition, immediate primitive, primitive by parts, by variable substitution and rational fractions
    2.2Definite integral and properties
    2.3Fundamental Theorem of integral calculus
    2.4Computation of planar areas and volumes of solids of revolution
    2.5Computation of arc length curve
  3. Function of several real variables
    3.1Definition, domain, level contours, and graphic representation
    3.2Limits and continuity
    3.3Partial derivatives, differentiability, directional derivatives
    3.4Chain rule
    3.5.Extrema points
  4. First-order ordinary differential equations (ODE)
    4.1Definition, classification, general and particular solution
    4.2Separable ODE
    4.3Applications of ODE
S1 6 75 h
  1. Electrical circuits
    1.1 Electrical quantities
    1.2 Circuit Analysis Methods
  2. Digital electronics
    2.1. Decimal/Binary/Hexadecimal numbering systems
    2.2. Boolean algebra
    2.3. Logic gates
    2.4. Combinational logic design
    2.5 Karnaugh maps
  3. Sensors, Actuators and signal conditioning
    3.1. Sensors, Actuators: principles of operation and applications
    3.2. Operational amplifiers
    3.3. Applications
  4. Data Acquisition with microcontroller based- platforms
    4.1. Low-cost microcontroller systems: the Arduino platform
    4.2. Data acquisition and control with the Arduino platfor
S2 6 75 h

1.Theoretical Part
1.1-Introduction
1.2-Organization of operating systems
1.3-Processes and threads
1.4-Memory management
1.5-Filesystems
1.6-Asynchronous events
2.Practical Part
2.1-Presentation of UNIX/Linux systems
2.2-The shell (BASH)
2.3-System programming with the C programming language

S2 3 45 h
  1. Probability Distributions
    1.1 Random variable definition
    1.2 Discrete random variables
    1.3 Continuous random variables
    1.4 Discrete probability distributions (Bernoulli trials, binomial and Poisson)
    1.5 Continuous probability distributions (uniform, exponential, normal, t-student, qui-quadrado and F-Snedecor)
  2. Summary Data Analysis
    2.1 Preparation of a data set
    2.2 Frequencies distribution tables
    2.3 Numerical summaries (central and not central tendency, dispersion, skewness and outliers)
    2.4 Graphical representation
  3. Statistical Inference
    3.1 Point and interval estimation
    3.2 Confidence intervals
    3.3 Hypothesis testing
  4. Bivariate Data Analysis
    4.1 Contingency tables
    4.2 Linear Regression
S2 6 75 h
  1. Sets, functions, relations and algorithms
  2. Techniques of Counting
  3. Directed Graphs
  4. Binary trees
  5. Properties of the integers
  6. Languages, Grammars and Machines
  7. Ordered Sets and Lattices
  8. Boolean Algebra
S2 7 75 h
  • Object Oriented Programming Basic Concepts
  • Encapsulation
  • Inheritance
  • Polymorphism
  • Interfaces
    • Common behavior identification
    • Purely abstract classes (interfaces) that work as markers
    • Using generic types (while marked with the same interface)
  • Abstract Data Types
  • Exceptions and Serialization
    • Design of an exception hierarchy structure for a specific context
    • Persistence using streams
    • Text streams
    • Binary streams
    • Serialization as an approach to persist information in binary format
S2 6 75 h
  1. The Internet;
  2. IP services;
  3. WEB development introduction;
  4. Internet of Things (IoT);
  5. IoT netwoks and platforms;
  6. Internet security aspects;
  7. IoT innovative solutions development.
S2 2

English

  1. English as a lingua franca. Attitudes towards English.Expressions to convey linguistic and learning necessities.Brief notions of the
    characteristics that have led English to become a global language.
    2.Informal Conversation: Taking part in conversations about people, places and other topics; description of personal and professional
    profiles; identification of cultural differences.
    3.Contacts: Starting and keeping conversations about topics related to the professional context via telephone, email or face to face…
    Describing people and exchanging information.
    4.Meetings: Expressions to set up and organize meetings, make decisions, solve problems, present suggestions and lead meetings. Official
    register of information. Checking and clarifying facts and figures.
    5.Negotiating relationships: Expression of formality and informality. Expression of likes and dislikes about travelling on business. Discussing
    attitudes about meetings and cultural behaviours in different countries

Free Elective I

The optional elective curricular units must be selected from among the curricular units offered across all ESTG degree programmes and made available for this purpose, under the guidance of the higher education institution.

2nd Year | Common-core Syllabus
ID Name Semester ECTS Length
S1 6 75 h
  1. Fundamental concepts on the functioning of computer networks
  2. TCP/IP architecture and Internet functioning
  3. Fundamental topics on IPv6 and IPv4 technology
  4. Local network technologies, both wired and wireless
  5. Essential services for network and Internet communication
  6. Security services applied to small/medium-sized networks
  7. Designing secure computer network architecture solutions
  8. Planning secure local networks in domestic and business environments with essential services
S1 5 75 h

1 – Evolution of Human-Computer Interfaces and usability principles
2 – Analysis of users and tasks
3 – Humans and computers
4 – Conceptualization of interaction
5 – Prototyping
6 – Visual communication
7 – Evaluation of interfaces
8 – 3D Interfaces

S1 6 75 h
  1. Introduction to Information Systems and Databases
    1.1 Concepts
    1.2 File Management Systems: characteristics, advantages and disadvantages
    1.3 Database Systems: characteristics, architecture and components, data models
  2. SQL – Structured Query Language
    2.1 Data Manipulation (DML)
    2.2 Data Definition (DDL)
    2.3 Data Control (DCL)
  3. Relational Model
    3.1 Terminology
    3.2 Relational Integrity
    3.3 Relational Languages
    3.4 Views
    3.5 Relational DBMS rules
  4. Relational Databases Normalization
    4.1 Functional dependencies
    4.2 First, Second and Third Normal Form, Boyce-Codd Normal Form
    4.3 Strategy
  5. Entity–Relationship (E-R) Model
    5.1 Basic concepts
    5.2 E-R Diagram
    5.3 Rules for deriving relations
    5.4 Advanced concepts
  6. Tuning the database design
    6.1 Concepts and Objectives
    6.2 Denormalization
  7. Maintaining data integrity in client/server databases
    7.1 Declarative Integrity Constraints
    7.2 PL/SQL Programming: Triggers and Stored Procedures
  8. Transactions and concurrency control
S1 6 75 h
  • Brief review of OOP
  • Recursion
    • Concept of recursion
    • Advantages and disadvantages of its use
  • Analysis of algorithms
    • Compare different algorithms that solve the same problem
    • Big-Oh Notation (simplified)
  • Generic data structures
    • Tables (review)
    • Lists
    • Hash tables
    • Stacks and queues
    • Binary trees
S1 7 75 h
  1. Concurrent programming
    1.1 Introduction to concurrent programming
    1.2 Processes and threads
    1.3 Mechanisms for communication between threads
    1.4 Concurrency, mutual exclusion and synchronization
  2. Distributed programming
    2.1 Introduction to distributed systems
    2.2 Representation of information
    2.3 Programming sockets
    2.4 Study of application protocols
S2 6 75 h
  1. Introduction to Artificial Intelligence
    1.1.What Artificial Intelligence is
    1.2.State of the art
  2. Intelligent agents
    2.1.How they must behave
    2.2.Structure
    2.3.Environments
  3. Search and search spaces
    3.1.Problem solving through search
    3.1.1.State spaces
    3.1.2.Problem formulation
    3.2.Blind and informed search
    3.3.Informed search
  4. Metaheuristics
    4.1.Hill-climbing
    4.2.Simulated Annealing
    4.3.Genetic Algorithms
    4.4.Evolutionary Strategies
    4.5.Swarm Particles optimization
  5. Learning
    5.1.Types of learning
    5.2.Learning of general logic descriptions
    5.3.ID3 algorithm
  6. Neural networks
    6.1.Components of a neural network
    6.2.How a neural network works
    6.3.Perceptron training
    6.4.Multilayer neural networks
    6.5.Gradient Descent algorithm
    6.6.Back-propagation algorithm
S2 6 75 h
  1. Introduction to Software Engineering
    2: Software processes
    3: Agile software development
    4: Requirements engineering
    5: System modeling
    6: Architectural design
    7: Design and Implementation
    8: Project management
    9: Project planning
    10: Quality management
S2 6 60 h
  1. General concepts and architecture of the Web and Web Applications
  2. Specification and formatting of web content with HTML and CSS
  3. PHP language
  4. Forms and interaction between Web clients and servers
  5. Object Oriented Programming with PHP
  6. HTTP protocol and state in Web applications
  7. Laravel Framework
  • MVC design pattern;
  • Architecture and structure;
  • Models, Views, Controllers and Routes;
  • Templates with Blade;
  • Databases, Migrations, Seeds and Eloquent;
  • HTTP Requests and Responses, Storage, Uploads and Downloads;
  • Authentication and Authorization, Middleware and data validation;
  • Installation and use of external packages.
2nd Year | Information Systems
ID Name Semester ECTS Length
S2 6 75 h

1 – Introduction to information security
2 – Introduction to cryptography
3 – Modes of symmetric encryption
4 – Symmetric algorithms
5 – Length of keys
6 – Asymmetric cryptography – The case of RSA
7 – Hash functions
8 – MACs and key establishment
9 – SSL and TLS
10 – Secure Email – PGP e GPG
11 – CACert and SMIME
12 – The Portuguese citizen card

S2 6 75 h
  1. Oracle Database: metadata and data dictionary
  2. Performance Optimization
    2.1 Data integrity in denormalized databases;
    2.2 Indexing;
    2.3 Queries processing and optimization;
    2.4 Partitioning, parallel processing and multiprocessing.
  3. Data security
  4. Tasks of a DBA
  5. Server architecture
    5.1 Architecture components
    5.2 Instance Management
    5.3 Database files: control file, redo log files, data files
    5.4. Storage Structures
    5.5 Physical data storage
  6. Data replication, backup and recovery
  7. Non-Relational Database Management Systems
2nd Year | Information Technologies and Cybersecurity
ID Name Semester ECTS Length
S2 6 75 h
  1. Fundamentals of Linux operating system
  2. General methodology for system administration
  3. Perl for system administration
  4. Local and network filesystems:
  5. Logs management
  6. TCP/IP services: HTTP, DNS, DHCP, and SSH
  7. Security services: IDS, firewall, and VPN:
  8. Web-base administration
S2 6 75 h
  1. Virtualization
    a. Concepts, benefits and uses
    b. Type 1 and Type 2 Hypervisors
    c. Virtual machine creation methods
    d. Network and Storage virtualization
    e. Management of virtual environments and virtualization server teams
    f. Snapshots
  2. Cloud Computing
    a. Global Infrastructure
    b. Cloud services
    c. Types of cloud and types of cloud services
    d. Content storage and sharing
    e. Performance optimization, scalable environments and cost control
  3. Cloud Security
    a. Secure access to cloud resources
    b. Infrastructure security settings
    c. Application data protection
    d. Security, monitoring and logging Services
    e. Incident management and response
3rd Year | Common-core Syllabus
ID Name Semester ECTS Length
S1 6 60 h
  1. Server processing and client processing
  2. Web applications models
  3. JavaScript basic concepts and syntax
  4. ECMAScript 6 and advanced JavaScript concepts
  5. Document Object Model
  6. Asynchronous communication with AJAX
  7. REST APIs
  8. Cloud Deployment Strategies
  9. SPA model application framework (Vue)
  10. Node.js server
  11. Reactivity and bidirectional communication with WebSockets
S1 6 60 h
  1. Background and Introduction to Systems Integration
  2. Integration Patterns
  3. Agnostic data representation
  4. Service-oriented integration
  5. Messaging-oriented integration
S2 3

Seminar

Set of thematic seminars distributed over the course and defined in each academic year.
Structuring and preparing technical documentation and respective oral presentation.
Set of outdoor activities (to be carried out and people outside the community IPL)
Set of indoor activities (for people within the community IPL)

Free Elective III

The optional elective curricular units must be selected from among the curricular units offered across all ESTG degree programmes and made available for this purpose, under the guidance of the higher education institution.

S2 2

Innovation and Entrepreneurship

  1. Introduction to Entrepreneurship Innovation (types, motivation, culture)
  2. Opportunities and ideas
    2.1. sources of ideas
    2.2. Creativity
    2.3. Ideas versus entrepreneurs
  3. The inner entrepreneur
    3.1 Continuous improvement
    3.2 Innovation
  4. Business or project test (pretotype)
  5. Team and project management
  6. Intellectual Property
  7. Financing
  8. Organizational management and business plan
    8.1. Business strategy
    8.2. Marketing strategy
    8.3. Business plan

Free Elective IV

The optional elective curricular units must be selected from among the curricular units offered across all ESTG degree programmes and made available for this purpose, under the guidance of the higher education institution.

S2 14 45 h

The course does not have defined contents, since it depends on the project that each student (or each group of students) develops. In fact, there are multiple proposals (one per group of two students, but proposals for single elements can also be made).

3rd Year | Information Systems
ID Name Semester ECTS Length
S1 6 75 h
  1. Introduction to enterprise applications: software architectures and software patterns;
  2. Patterns of enterprise application development used in the presentation layer;
  3. Patterns of enterprise application development used in the business logic layer;
  4. Object Relational Mapping and patterns of enterprise application development used in the data access layer;
  5. Concurrency definitions and problems: most used software patterns;
  6. Patterns for distributed objects;
  7. The Java Enterprise Edition (JEE) platform.
S1 6 75 h
  1. Introduction to Decision Support Systems
  2. OLAP and Data Warehousing
  3. Data Warehousing Process
  4. Extraction, Transformation and Loading of Data
  5. Dimensional Modelling
  6. Analytics e data mining
S1 6 75 h
  1. Introduction to software development agile methods
  2. eXtreme Programming
  3. Scrum
  4. Kanban
  5. Software Projects Agile Management
  6. Software Architectures
  7. Software design – software design patterns and refactoring
  8. Software Tests according to an agile perspective
S2 6

Knowledge Engineering

  1. Introduction to Data Mining
  2. Methodologies for the Data Mining Process
  3. Data Exploration
  4. Data Preparation
  5. Data Reduction
  6. Data Mining Algorithms
  7. Model Evaluation and Selection
  8. Privacy, Security and Challenges

Free Elective II

The optional elective curricular units must be selected from among the curricular units offered across all ESTG degree programmes and made available for this purpose, under the guidance of the higher education institution.

S2 5

Business Information Systems

  1. The Digital Firm:
    1.1 Managing the Digital Firm;
    1.2 Information Systems in the Organisation;
    1.3 Organizations, Management and Strategy;
    1.4 E-commerce and e-business;
    1.5 Social and ethical issues in the digital firm;
  2. Information Systems for the Organisation:
    2.1 Knowledge Management;
    2.2 Supported decision-making;
  3. Implementing Information Systems:
    3.1 The value of Information Systems;
    3.2 Redesigning an Organisation;
    3.3 Change Management;
  4. Managing Information Systems:
    4.1 Security and control;
    4.2 International Information Systems

Free Elective V

The optional elective curricular units must be selected from among the curricular units offered across all ESTG degree programmes and made available for this purpose, under the guidance of the higher education institution.

3rd Year | Information Technologies and Cybersecurity
ID Name Semester ECTS Length
S1 6 75 h
  1. Advanced IPv6
    • – Fundamentals
    • – Differences from the IPv4 Protocol
    • – Addressing
    • – Transition Mechanisms
    • – Importance of Multicast in IPv6
  2. Routing Protocols
    • – OSPF and BGP
    • – Routing Optimization Mechanisms
    • – Practical Configuration Scenarios
  3. Quality of Service (QoS) / Quality of Experience (QoE)
    • – QoS Models
    • – Classification and Marking
    • – Congestion Management
    • – Congestion Control
    • – Traffic Policing
    • – Traffic Shaping
    • – Application Scenarios
  4. Multi-service Networks
    • – Fundamentals
    • – MPLS
    • – Multicast
    • – Integration Scenarios
  5. Emerging Technologies
    • – Segment Routing
    • – L3VPN
    • – Application Scenarios
S1 6 75 h

Cybersecurity terminology and concepts

  • Fundamental cybersecurity principles
  • Cybersecurity in the context of computer crime
  • Cybersecurity vulnerabilities
  • Cybersecurity threat landscape
    Cryptology
  • Classic and modern symmetric cryptography techniques
  • Confidentiality
  • Asymmetric cryptography
  • Key distribution
  • Authentication functions and modes
    Authentication
  • Digital certificates and signatures
  • Users, entities and devices
  • Authentication protocols
    Communications security
  • Wi-Fi, TLS
  • IoT devices
  • Cybersecurity measures
    Cybersecurity policies
  • security standards and frameworks
S1 5

Data Centers Management

  1. Data Center Infrastructures
  2. High Availability and Load Balancing
  3. Disaster Recovery Plans
  4. Data Center Monitoring Protocols and Applications
  5. Distributed File Systems
  6. Centralized Backup Systems
  7. Security in Data Center Infrastructures and Technologies

Free Elective II

The optional elective curricular units must be selected from among the curricular units offered across all ESTG degree programmes and made available for this purpose, under the guidance of the higher education institution.

S2 5

Intelligent and Cybersecure Systems Engineering

  1. . General aspects of planning and designing Information Technology solutions
  2. Infrastructure planning and design of a local and wide-area computer network
  3. Planning and design of IT network interconnection infrastructures and support services
  4. Planning and designing IoT solutions
  5. Planning secure IT solutions
  6. Smart Services to support IT solutions
  7. Prototyping and evaluation of secure and intelligent IT solutions

Free Elective V

The optional elective curricular units must be selected from among the curricular units offered across all ESTG degree programmes and made available for this purpose, under the guidance of the higher education institution.

S2 6 75 h

C1 – Implementation of Network Functions in a virtualized environment.
C2 – Implementation of network configuration and management solutions.
C3 – Analysis of Software-Defined Networking architecture and the security strategies to implement in them.
C4 – Implementation of resource control and orchestration solutions through free/open-source software platforms, Openstack,
OpenDayLight, and Kubernetes.
C5 – Implementation of secure control solutions for Mikrotik devices.
C6 – Integration of different container virtualization solutions.
C7 – Use of Nokia’s ContainerLab virtualization solution.
C8 – Use of neural networks (AI) for security analysis of connections and anomaly detection.
C9 – Implementation of development projects for the management and configuration of physical/virtual infrastructures.


Entry Requirements

For further information about international students’ applications,
please see International Applicants
or contact the International Students’ Office by email at: estudante.internacional@ipleiria.pt

Accreditation

State: Accredited
Number of years of accreditation: 6
Publication Date: 06/06/2025

A3ES Accreditation

Application Fee

60€

Enrolment Fee

General contingent: 30€
International student contingent: 100€

Tuition Fee

General contingent 697 €
International student contingent 3000€


Online Application

Use the button bellow to start your application.