You need to activate javascript for this site.
Menu Conteúdo Rodapé
  1. Home
  2. Courses
  3. Web, Mobile and Cloud Computing
  4. Cybersecurity


Code 16226
Year 2
Semester S2
ECTS Credits 6
Workload PL(30H)/T(30H)
Scientific area Informatics
Entry requirements .
Learning outcomes The objectives of this course unit are to introduce and practice the correct use of information security related concepts and mechanisms, as well as to study security vulnerabilities in systems interconnected via computer networks, and audit tools and mitigation techniques for these vulnerabilities.
At the end of this course unit the student should be able to:
Study computer security problems from a practical and contemporary perspective, as well as describing and implementing best practices and solutions that minimize the impact of potential threats, or search for these solutions independently;
Configure security tools, including firewalls and intrusion detection systems;
Integrating mechanisms of information security in software applications he/she is developing;
Properly utilize encryption algorithms, authentication mechanisms, digital signatures, protection systems and administrative domains and implementation of secure virtual private networks.
Syllabus 1. Symmetric and Asymmetric Encryption
1.1. Symmetric Key Algorithms
1.2. Asymmetric Key Algorithms
1.3. Modes of Operation for Block Ciphers
1.3. Problems Associated with the Distribution and Agreement of Encryption Keys: the Diffie-Hellman Key Agreement Protocol
1.4. Hash Functions and Data Origin Authentication Codes

2. Usage and Management of Public Keys
2.1 Public Key Infrastructure; Web of Trust
2.2. Case Study: PGP (Pretty Good Privacy)
2.3. Digital Signatures
2.4. Case Study: Portuguese Citizen Card

3. Vulnerabilities
3.1 Vulnerabilities on Distributed Systems
3.2 Vulnerabilities and Attacks on Local Area Networks and Large Scale

4. Firewalls - Mode of Operation and Configuration
5. Intrusion Detection Systems
6. Virtual Private Networks - SSL / TLS and IPSec
7. Wireless Network Security 802.11
Main Bibliography Pedro R. M. Inácio, Apontamentos teóricos e guias práticos laboratoriais de Segurança Informática, 2022.
André Zúquete, Segurança em Redes Informáticas, FCA - Editora de Informática, 6ª Edição (actualizada e aumentada), 2021.
William Stallings e Lawrie Brown, Computer Security: Principles and Practice, Prentice Hall, 2008.
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 5th printing, August 2001 (disponível on-line em
Margaret Cozzens, Steven J. Miller, The Mathematics of Encryption : An Elementary Introduction, American Mathematical Society (AMS), 2013.
William Stallings, Cryptography and Network Security, 4/E, Prentice Hall, 2006.
Henrique São Mamede, Segurança Informática nas Organizações, FCA - Editora de Informática, 2006.
Teaching Methodologies and Assessment Criteria The contents of this Course Unit are discussed in lecture classes and the practical part of those contents is explored in laboratory classes. Each type of class has two hours of weekly contact. The practical classes have lab guides that students perform in the computers of the lab, which include the usage of several technologies related with information and network security. Moreover, the proposed practical works(individual and group) are designed so that the students develop their technical skills via the development of secure software applications.

Evaluation is performed resorting to three main elements:
- one written test for knowledge evaluation, worth 50% of the final grade (29/05/2024);
- one practical test, worth 25% of the final grade (week of 06/05/2024);
- one practical team work with a presentation, worth 25% of the final grade (26/05/2024).
Language Portuguese. Tutorial support is available in English.
Last updated on: 2024-02-26

The cookies used in this website do not collect personal information that helps to identify you. By continuing you agree to the cookie policy.