Mandatory subject for the Technology Specific Information Technology Subject, it is advisable to have completed the Basic Training modules and the Common module to the Computing Branch (Modules I and II). It is therefore recommended to have clear the basic concepts of interconnection networks and configuration of networked devices (Networks I and Networks II), and programming concepts and operating systems.
This subject is integrated in the subject of Technologies and Information Systems of the curriculum. Computer security is a common competence in all the Computer Engineering plans, included in the White Paper and in all IEEE / ACM curricular recommendations. Safety is a specific competence, but it affects all subjects in the curriculum. The weak link principle states that a computer system is as safe as its most vulnerable point. This necessarily translates into a multidisciplinary subject, where aspects of very low level and aspects of very high level are considered. The IT Engineer must be aware of the plurality of problems that affect security, to be able to make the appropriate decisions of design, operation or maintenance.
Course competences | |
---|---|
Code | Description |
INS2 | Organising and planning skills. |
INS5 | Argumentative skills to logically justify and explain decisions and opinions. |
PER2 | Ability to work in multidisciplinary teams. |
SIS1 | Critical thinking. |
SIS3 | Autonomous learning. |
SIS4 | Adaptation to new scenarios. |
SIS5 | Creativity. |
TI7 | Ability to understand, apply, and manage the reliability and safety of digital systems. |
Course learning outcomes | |
---|---|
Description | |
Configuration of secure networks using firewalls and virtual private networks. | |
Knowledge about the latest techniques in transaction security, as well as current legislation regarding data protection. | |
Design of security and contingency plans in Data Processing Centers (DPCs). | |
Management of security in computing systems. | |
Identification of vulnerabilities in the computer system, analyze and classify attacks. | |
Use of encryption and cryptography techniques to protect information. | |
Additional outcomes | |
Not established. |
Training Activity | Methodology | Related Competences (only degrees before RD 822/2021) | ECTS | Hours | As | Com | R | Description * |
Class Attendance (theory) [ON-SITE] | Combination of methods | TI7 | 0.96 | 24 | Y | N | Y | |
Class Attendance (practical) [ON-SITE] | Practical or hands-on activities | TI7 | 1.2 | 30 | Y | N | Y | |
Project or Topic Presentations [ON-SITE] | Group Work | INS2 INS5 PER2 SIS1 SIS3 SIS4 SIS5 | 0.12 | 3 | Y | N | N | |
Final test [ON-SITE] | Assessment tests | INS5 SIS1 | 0.2 | 5 | Y | Y | Y | |
Writing of reports or projects [OFF-SITE] | Group Work | INS2 INS5 PER2 SIS1 SIS3 SIS4 SIS5 | 0.8 | 20 | Y | N | Y | |
Study and Exam Preparation [OFF-SITE] | Self-study | INS2 INS5 PER2 SIS1 SIS3 SIS4 SIS5 TI7 | 2.56 | 64 | Y | N | Y | |
On-line Activities [OFF-SITE] | Assessment tests | INS2 SIS4 | 0.16 | 4 | Y | N | Y | |
Total: | 6 | 150 | ||||||
Total credits of in-class work: 2.48 | Total class time hours: 62 | |||||||
Total credits of out of class work: 3.52 | Total hours of out of class work: 88 |
As: Assessable training activity Com: Training activity of compulsory overcoming R: Rescheduling training activity
Grading System | |||
Evaluation System | Face-to-Face | Self-Study Student | Description |
Progress Tests | 50.00% | 0.00% | |
Final test | 25.00% | 0.00% | |
Final test | 25.00% | 0.00% | |
Total: | 100.00% | 0.00% |
Not related to the syllabus/contents | |
---|---|
Hours | hours |
Project or Topic Presentations [PRESENCIAL][Group Work] | 3 |
Final test [PRESENCIAL][Assessment tests] | 5 |
Writing of reports or projects [AUTÓNOMA][Group Work] | 20 |
On-line Activities [AUTÓNOMA][Assessment tests] | 4 |
Unit 1 (de 3): Introduction | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 4 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 2 |
Unit 2 (de 3): Ethical Hacking | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 4 |
Class Attendance (practical) [PRESENCIAL][Practical or hands-on activities] | 10 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 24 |
Unit 3 (de 3): Web Auditory | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 10 |
Class Attendance (practical) [PRESENCIAL][Practical or hands-on activities] | 18 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 24 |
Global activity | |
---|---|
Activities | hours |
Author(s) | Title | Book/Journal | Citv | Publishing house | ISBN | Year | Description | Link | Catálogo biblioteca |
---|---|---|---|---|---|---|---|---|---|
Estándares de la serie ISO/IEC | www.aenor.es, www.iso.org y www.iso27000.es | ||||||||
Catherine Paquet | Implemeting Cisco IOS Network Security | Cisco Press | 2009 | ||||||
Fundamentos de Seguridad en Redes | Fundamentos de Seguridad en Redes | Cisco Press | 2008 | ||||||
Kurose, J., Ross, K. | Redes de Computadores. Un enfoque descendente basado en Internet | Pearson Education | 2003 | ||||||
Michael Walkings, Kevin Wallace | CCNA Security Official Exam Certification Guide | Cisco Press | 2008 | ||||||
William Stallings | Computer security. Principles and Practice | Pearson International Edition | 2008 | ||||||
William Stallings | Fundamentos de seguridad en redes | Pearson Prentice Hall | 2003 | ||||||
varios | Colección Pack Completa | 0xword | Colección de varios ejemplares | http://0xword.com/es/ |