Guías Docentes Electrónicas
1. General information
Course:
SECURITY IN COMMUNICATIONS
Code:
59664
Type:
ELECTIVE
ECTS credits:
6
Degree:
385 - DEGREE IN TELECOMMUNICATI TECHNOLOGY ENGINEERING
Academic year:
2020-21
Center:
308 - SCHOOL POLYTECHNIC OF CUENCA
Group(s):
30 
Year:
4
Duration:
First semester
Main language:
Spanish
Second language:
Use of additional languages:
English Friendly:
Y
Web site:
Bilingual:
N
Lecturer: JOSE ANTONIO BALLESTEROS GARRIDO - Group(s): 30 
Building/Office
Department
Phone number
Email
Office hours
E. Politécnica Cuenca (2.16)
INGENIERÍA ELÉCTRICA, ELECTRÓNICA, AUTOMÁTICA Y COMUNICACIONES
926053863
josea.ballesteros@uclm.es
It will be stated at the beginning of the semester.

2. Pre-Requisites

It is advisable to study previously the courses 'Communication Networks I', 'Communication Networks II', 'Processing and Transmission'.

3. Justification in the curriculum, relation to other subjects and to the profession

Communication security is one of the working fields in public and private companies due to an increasing number of ciberattacks to people, companies, administrations, states, etc.


4. Degree competences achieved in this course
Course competences
Code Description
E26 The ability to construct, use and manage telecommunication networks, services, processes and applications, which are defined as systems for capturing, transporting, representing, processing, storing, managing and presenting multimedia information, from the viewpoint of transmission systems.
E31 The ability to analyse, encode, process and transmit multimedia information using analogue and digital signal processing techniques.
G02 Correct, oral and written, communication skills.
G06 Knowledge of basic subjects and technologies, enabling students to learn new methods and technologies, as well as providing great versatility to adapt to new situations
G07 The ability to tackle problems with initiative, making decisions, creativity, and to communicate and transmit knowledge, skills and abilities, including the ethical and professional responsibility of the activity of a Technical Telecommunications Engineer
G08 Knowledge to perform measurements, calculations, assessments, appraisals, surveys, studies, reports, task planning and other similar work in their specific telecommunications field
G13 The ability to look for and understand information, wether technical or commercial in different sources, to relate and structure it to integrate ideas and knowledge. Analysis, synthesis and implementation of ideas and knowledge.
5. Objectives or Learning Outcomes
Course learning outcomes
Description
Application of telecommunication systems in various fields of engineering.
Synthesis of capacities of several telecommunications engineering areas.
Correct use of oral and written expression to convey ideas, technologies, results, etc.
Use of ICT to achieve the specific objectives set in the subject.
Knowledge and respect of professional ethics and deontology.
Analysis, synthesis and compression of technical documentation and mastery of specific vocabulary.
Additional outcomes
Not established.
6. Units / Contents
  • Unit 1: Introduction
    • Unit 1.1: Law
    • Unit 1.2: Introduction to cyberattacks
    • Unit 1.3: Cryptography applications
  • Unit 2: Pentesting
    • Unit 2.1: Introduction to pentesting
    • Unit 2.2: Information gathering
    • Unit 2.3: Attack
    • Unit 2.4: Recommendations
    • Unit 2.5: Report
    • Unit 2.6: Pentesting devices
  • Unit 3: OSINT and Hacking with Search Engines
    • Unit 3.1: OSINT
    • Unit 3.2: Hacking with Search Engines: Google, Bing, Shodan
  • Unit 4: Hacking in networks
    • Unit 4.1: Security in Local Area Networks
    • Unit 4.2: Security in WiFi networks
  • Unit 5: Laboratory
    • Unit 5.1: Cryptography applications
    • Unit 5.2: Pentesting tools
    • Unit 5.3: Researching process with OSINT techniques
    • Unit 5.4: Attacks in Local Area Networks
    • Unit 5.5: Attacks in WiFi Networks
ADDITIONAL COMMENTS, REMARKS

Software: Packet Tracer, Kali linux.

Hardware: Router, Switch, Pentesting devices


7. Activities, Units/Modules and Methodology
Training Activity Methodology Related Competences (only degrees before RD 822/2021) ECTS Hours As Com Description
Class Attendance (theory) [ON-SITE] Lectures E26 E31 G02 G06 G08 0.75 18.75 N N
Problem solving and/or case studies [ON-SITE] Problem solving and exercises E31 G02 G06 G07 G08 0.7 17.5 Y N
Writing of reports or projects [OFF-SITE] Problem solving and exercises E31 G02 G06 G07 G08 1 25 Y N
Laboratory practice or sessions [ON-SITE] Practical or hands-on activities E26 E31 G02 G06 G07 G08 G13 0.7 17.5 Y N
Practicum and practical activities report writing or preparation [OFF-SITE] Practical or hands-on activities E26 E31 G02 G06 G07 G08 G13 0.5 12.5 Y N
Study and Exam Preparation [OFF-SITE] E26 E31 G02 G06 G07 G08 G13 2.1 52.5 N N
Individual tutoring sessions [ON-SITE] E26 E31 G02 G06 G07 G08 G13 0.08 2 N N
Progress test [ON-SITE] Assessment tests E26 E31 G02 G06 G07 G08 G13 0.17 4.25 Y N Practice exam (CTF) and a test
Total: 6 150
Total credits of in-class work: 2.4 Total class time hours: 60
Total credits of out of class work: 3.6 Total hours of out of class work: 90

As: Assessable training activity
Com: Training activity of compulsory overcoming (It will be essential to overcome both continuous and non-continuous assessment).

8. Evaluation criteria and Grading System
Evaluation System Continuous assessment Non-continuous evaluation * Description
Assessment of problem solving and/or case studies 10.00% 0.00%
Laboratory sessions 65.00% 0.00%
Progress Tests 25.00% 0.00% Practice exam (CTF) and a test
Total: 100.00% 0.00%  
According to art. 4 of the UCLM Student Evaluation Regulations, it must be provided to students who cannot regularly attend face-to-face training activities the passing of the subject, having the right (art. 12.2) to be globally graded, in 2 annual calls per subject , an ordinary and an extraordinary one (evaluating 100% of the competences).

Evaluation criteria for the final exam:
  • Continuous assessment:
    Those described in the 'evaluation system' table
  • Non-continuous evaluation:
    Those described in the 'evaluation system' table

Specifications for the resit/retake exam:
It is possible to retake the 'progress test' with a practice exam (CTF) and a test. The criteria for other activities will be published after the final exam. The evaluation criteria will be those described in the 'evaluation system' table.
Specifications for the second resit / retake exam:
If the student passed the laboratory sessions in advance, the evaluation criteria will be 70% laboratory sessions and 30% writing test. In other case, details to resit/retake laboratory sessions will be communicated previously and the evaluation criteria will be 70% laboratory sessions and 30% writing test
9. Assignments, course calendar and important dates
Not related to the syllabus/contents
Hours hours
Study and Exam Preparation [AUTÓNOMA][] 52.5
Individual tutoring sessions [PRESENCIAL][] 2
Progress test [PRESENCIAL][Assessment tests] 4.25

Unit 1 (de 5): Introduction
Activities Hours
Class Attendance (theory) [PRESENCIAL][Lectures] 4
Problem solving and/or case studies [PRESENCIAL][Problem solving and exercises] 3.5
Writing of reports or projects [AUTÓNOMA][Problem solving and exercises] 5

Unit 2 (de 5): Pentesting
Activities Hours
Class Attendance (theory) [PRESENCIAL][Lectures] 4
Problem solving and/or case studies [PRESENCIAL][Problem solving and exercises] 3.5
Writing of reports or projects [AUTÓNOMA][Problem solving and exercises] 5

Unit 3 (de 5): OSINT and Hacking with Search Engines
Activities Hours
Class Attendance (theory) [PRESENCIAL][Lectures] 4
Problem solving and/or case studies [PRESENCIAL][Problem solving and exercises] 3.5
Writing of reports or projects [AUTÓNOMA][Problem solving and exercises] 5

Unit 4 (de 5): Hacking in networks
Activities Hours
Class Attendance (theory) [PRESENCIAL][Lectures] 6.75
Problem solving and/or case studies [PRESENCIAL][Problem solving and exercises] 7
Writing of reports or projects [AUTÓNOMA][Problem solving and exercises] 10

Unit 5 (de 5): Laboratory
Activities Hours
Laboratory practice or sessions [PRESENCIAL][Practical or hands-on activities] 17.5
Practicum and practical activities report writing or preparation [AUTÓNOMA][Practical or hands-on activities] 12.5

Global activity
Activities hours
10. Bibliography and Sources
Author(s) Title Book/Journal Citv Publishing house ISBN Year Description Link Catálogo biblioteca
Astudillo B., Karina Hacking Ético : !cómo convertirse en hacker ético en 21 días RA-MA, 978-84-9964-767-8 2018 Ficha de la biblioteca
González Pérez, Pablo (1976-) Pentesting con Kali Linux rolling release 2017 / 0xWord, 978-84-697-6035-2 2017 Ficha de la biblioteca
González Pérez, Pablo (1976-) Ethical Hacking : Teoría y práctica para la realización de u OxWord Computing, 978-84-617-0576-4 2014 Ficha de la biblioteca
Rambla, Juan Luis G. Ataques en redes de datos IPv4 e IPv6 / Juan Luis García Ram ZeroXword Computing, 978-84-617-9278-8 2018 Ficha de la biblioteca
Ramos Varón, Antonio Ángel Hacking práctico de redes wifi y radiofrecuencia / Ra-Ma, 978-84-9964-296-3 2015 Ficha de la biblioteca
Ramos Varón, Antonio Ángel Seguridad perimetral, monitorización y ataques en redes / Ra-Ma, 978-84-9964-297-0 2014 Ficha de la biblioteca
Rando González, Enrique. Hacking con buscadores : Google, Bing & Shodan / ZeroXword Computing, 978-84-616-7589-0 2014 Ficha de la biblioteca
Santo Orcero, David Kali linux / RA-MA, 978-84-9964-729-6 2018 Ficha de la biblioteca



Web mantenido y actualizado por el Servicio de informática