Joint programme description

Master’s Programme in International Cybersecurity and Cyberintelligence

Mobility path


The students will be organised in a cohort that will jointly move around the four universities in the master consortium. This way, they will stay:

  • at the University of Padova for the first semester (face-to-face classes), and extra classes for a single course taught from the University of Minho.
  • at Vilnius university for the second semester (face-to-face classes);
  • at the University of Granada for the third semester.
  • Finally, the fourth semester will be dedicated to master’s Thesis (with remote or local tutoring, as preferred by students), ending with the graduation week to be held face-to-face at the University of Minho.

Overall programme structure


Curriculum


The curriculum is structured into four semesters, for a total of 12 mandatory classes and 4 optional classes to be chosen among 12.

The core of the curriculum consists of the following mandatory classes:

  1. Fundamentals of cryptography (I semester, Padova)
  2. Digital Forensics (I semester, Padova)
  3. Secure software development (I semester, Padova)
  4. Fundamentals on international cybersecurity (I semester, Minho)
  5. Operating systems security (II semester, Vilnius)
  6. Security of applications (II semester, Vilnius)
  7. International management of cybersecurity (II semester, Vilnius)
  8. Research projects (II semester, Vilnius)
  9. Ethical hacking (III semester, Granada)
  10. Cyberprotection systems (III semester, Granada)
  11. Network security (III semester, Granada)
  12. International cyberintelligence (III semester, Granada)

The students will then choose one class among the following electives in the I semester (Padova):

  1. Mobile security
  2. Cyberphysical and IoT security
  3. Machine Learning techniques for event correlation
  4. Formal methods for cyberphysical systems
  5. Quantum cryptography and security
  6. Privacy preserving information access
  7. Law and data

one among the following electives in the II semester (Vilnius):

  1. Malware
  2. Rapid reaction and first response

and finally, two classes among the electives in the III semester (Granada):

  1. International cooperation in cyberspace
  2. Cyberwarfare
  3. Post-quantum cryptography

The IV semester will be mainly devoted to the thesis work, and writing. It will be spent by the students as an internship either in a company, or in a research institution.

The programme conclusion will be held at University of Minho with the thesis defence by all students which will be preceded by a practical laboratory exercise.

In addition to this, as an academic program, our master seeks to be agnostic, prioritising training in open-source tools and platforms. The following table includes the platforms and tools used, highlighting those that are used more intensively.

Platform/tool typeMembers
Cybersecurity frameworksNIST CSF, ISO/IEC 27000 family, CIS Controls, and FAIR (Factor Analysis of Information Risk)
Cyber Intelligence frameworks and toolsMISP, STIX/TAXII, MITRE ATT&CK, and Open Source Intelligence (OSINT) Platforms like: Shodan, VirusTotal, and Censys
Network security-oriented toolsWireshark, Nmap, Suricata, Zeek, iptables, pfSense
Computer security-oriented toolsClamAV, OSSEC, Sysmon, Cuckoo Sandbox
Vulnerability managementNessus, OpenVAS, Intruder, Nikto, Paros Proxy, and SQLMap
Event management systems (SIEM)OSSIM, Security Onion, Greylog, Wazuh, Prelude SIEM, QRadar Community Edition, and the ELK stack (Elasticsearch, Logstash, Kibana)
Identity management and access controlKeycloak, Shibboleth, Apache Syncope, FreeIPA, Okta, Kerberos, and Microsoft Azure Active Directory
Security verification of software and web applicationsOWASP ZAP (Zed Attack Proxy), Burp, Acunetix, BeEF,  Wfuzz
Incident response and forensic analysisTheHive Project, Carbon Black (Cb) Response, Cyphon, FireEye Mandiant, EnCase Forensic, and Autopsy
Encryption and CryptographyOpenSSL, VeraCrypt, and Hashcat
PentestingKali Linux, Parrot Security OS, Arch Linux (BlackArch), Burp Suite, Aircrack-ng, Metasploit Framework, Social-Engineer Toolkit (SET), and Faraday

For any questions:

Newsletter

Don’t miss any news, calls or opportunities from Arqus.
Subscribe now! The future begins today.

    Subscribe


    You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us.

    We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.

    Controller: University of Granada (as Coordinator of the Arqus European University Alliance). Legal basis: Arqus is entitled to process your data under the provisions of Article 6.1. (a) of the GDPR: “the data subject has given consent to the processing of his or her personal data for one or more specific purposes”. Purpose: to manage your subscription to mailing lists and to periodically send you the requested information by electronic means. Recipients: Mailchimp. Rights: access, object, rectification, erasure, restriction of processing, data portability. Additional information here.

    Select our profile:

    Apart from the general information, what specific news would you like to receive from Arqus?

    Controller: University of Granada (as Coordinator of the Arqus European University Alliance). Legal basis: Arqus is entitled to process your data under the provisions of Article 6.1. (a) of the GDPR: “the data subject has given consent to the processing of his or her personal data for one or more specific purposes”. Purpose: to manage your subscription to mailing lists and to periodically send you the requested information by electronic means. Recipients: Mailchimp. Rights: access, object, rectification, erasure, restriction of processing, data portability. Additional information here.