Deloitte

In recent years, the number of companies that have decided to invest in the protection of cyber attacks has increased by 33%. A recent report from the European Union provides for the creation of 1 million jobs related to cybersecurity by the year 2020. In 2015 cybersecurity was identified in the World Economic Forum as one of the main risks to the world economy.

Due to all this and given the growing demand for qualified professionals, the IMF Business School, Deloitte and Camilo José Cela University, developed this Master in Cybersecurity, which intends to shape the needs of the interested parties, having opted for high online training. Level, with the ease of being able to be done anywhere. It is unique in the market, is fully online and is endorsed by a prestigious University.

The best students of the course will be selected by Deloitte for the professional internship at CyberSOC Deloitte, with a high probability of permanent incorporation into Deloitte after the internship.

This master allows to acquire skills to:

  • Obtain, maintain and process digital evidence using specific procedures and tools
  • Develop techniques and use tools that maximize the skills and knowledge to perform intrusion tests on systems and networks
  • Get an overview of the world of cybersecurity by explaining the most relevant attacks and how to mitigate them
  • Know the world of reverse engineering and Malware analysis, understanding the processes and protocols that lead to the operation of files that work in networks and low-level systems
  • Assimilate sufficient knowledge to manage and define clear security policies and procedures for the mobile component of an information system
  • To know the fundamentals of monitoring and correlation of security events, through the study, preparation and interpretation of real reports
  • Develop safe programming developments and improve security auditing skills and application source code analysis and evaluation

Access Requirements

Bachelor's or equivalent professional experience

Recipients

New Graduates in Computer Science or Telecommunications who wish to develop their professional career in the field of computer security Professionals who require a higher level of specialization and / or wish to improve their technical skills in the area

Program

Module I

Cyber ​​intelligence

  1. Cyber-intelligence and Cybersecurity
  2. Administrative and organizational measures
  3. Technical mitigation measures
  4. Introduction to communications
  5. Case study: Cyber ​​intelligence

Module II

Ethical Hacking

  1. Introduction to Ethical Hacking
  2. Recognition (Recon)
  3. Fingerprinting
  4. Scanning
  5. Web Attacks
  6. Metasploit
  7. Exploration
  8. Post Exploration

Module III

Secure Development

  1. HTTP protocol
  2. Life Cycle of Software Development Insurance (SDLC)
  3. OWASP General
  4. OWASP Top 10
  5. JAVA
  6. PHP
  7. NET
  8. Good habits

Module IV

Forensic Analysis

  1. Legal aspects - code of ethics
  2. Introduction to forensic analysis
  3. Taking of evidence - cloning and integrity
  4. Windows system bugs
  5. Network Forensics - Analysis of Network Logs and Network Traffic
  6. Intrusion prevention implementation
  7. Forensic analysis in electronic mail
  8. Managing and Analyzing Windows Logs

Module V

Reverse Engineering

  1. Introduction to Reverse Engineering
  2. Compilers
  3. Reconstruction of code I - data structures
  4. Reconstruction of code II - common code structures
  5. Binary File Formats and Dynamic Connectors
  6. Static analysis: decoders and code reconstructors
  7. Dynamic Analysis: Code Debuggers
  8. Practical applications

Module VI

SIEM Technologies

  1. Introduction to SIEM: Logs and events
  2. Logging
  3. Security events: aggregate or correlate
  4. Event Search: Querys
  5. Control Panels
  6. Alerts and Tickets
  7. Reporting: reports
  8. Open Source Manufacturers and Solutions

Module VII

Security on Smartphones

  1. Introduction to security on mobile platforms
  2. Security in wireless networks
  3. Security on Android
  4. IOS Security
  5. Security in Windows

Module VIII

Master's End Work

Course

English course

Basic, Pre-intermediate, Intermediate or Advanced
The student can choose one of the four levels

Methodology

The Master in Cybersecurity offers a totally flexible methodology adapted to your needs, regardless of geographical location or availability of time.

E-Learning Methodology: All content will be available on the campus virtual campus 24 hours a day, 7 days a week, without any mandatory schedule so it becomes extremely flexible. In this way, it is easy to reconcile an active professional life with an excellent academic formation.

All contents are updated with great technical rigor, are easy to understand and have a clear practical vocation.

The IMF Business School offers its students:

  • Personal tutorials (chat, phone, email)
  • Webinars
  • Discussion and discussion groups through forums and chats
  • Self evaluation tests
  • Case studies and documentation
  • Virtual Library

Evaluation

Continuous evaluation as the CyberSecurity Master study is progressed. Each module is evaluated through the combination of online exams and case study development.

Obtaining the double degree, Master IMF Business School + Master Camilo José Cela University, is subject to overcoming all modules.

Tutors

The Course Tutors Panel is comprised primarily of corporate and academic professionals who can pass on to students real work experience and practical examples from their experience in business activity.

Download the programmatic content to know the Panel of Tutors.

Career Opportunities

At the end of our Master in Cyber ​​Security you will be prepared to exercise as:

  • Security Analyst
  • Specialist in Cyber-intelligence and Cyberfraud
  • Source Code Developers and Analysts
  • Cybersecurity Consultant
  • Ethical Hacker
  • Forensic Analyst
  • Malware Analyst
Program taught in:
  • Portuguese (Brazil)

See 44 more programs offered by IMF Business School Portugal »

This course is Online
Start Date
Open Enrollment
Duration
720 
Part-time
Price
Deadline
By locations
By date
Start Date
Open Enrollment
End Date
Application deadline

Open Enrollment

Location
Application deadline
End Date