Mandatory subject for the Technology Specific Information Technology Subject, it is advisable to have completed the Basic Training modules and the Common module to the Computing Branch (Modules I and II). It is therefore recommended to have clear the basic concepts of interconnection networks and configuration of networked devices (Networks I and Networks II), and programming concepts and operating systems.
This subject is integrated in the subject of Technologies and Information Systems of the curriculum. Computer security is a common competence in all the Computer Engineering plans, included in the White Paper and in all IEEE / ACM curricular recommendations. Safety is a specific competence, but it affects all subjects in the curriculum. The weak link principle states that a computer system is as safe as its most vulnerable point. This necessarily translates into a multidisciplinary subject, where aspects of very low level and aspects of very high level are considered. The IT Engineer must be aware of the plurality of problems that affect security, to be able to make the appropriate decisions of design, operation or maintenance.
Course competences | |
---|---|
Code | Description |
INS02 | Organising and planning skills. |
INS05 | Argumentative skills to logically justify and explain decisions and opinions. |
PER02 | Ability to work in multidisciplinary teams. |
SIS01 | Critical thinking. |
SIS03 | Autonomous learning. |
SIS04 | Adaptation to new scenarios. |
SIS05 | Creativity. |
TI07 | Ability to understand, apply, and manage the reliability and safety of digital systems. |
Course learning outcomes | |
---|---|
Description | |
Design of security and contingency plans in Data Processing Centers (DPCs). | |
Management of security in computing systems. | |
Knowledge about the latest techniques in transaction security, as well as current legislation regarding data protection. | |
Use of encryption and cryptography techniques to protect information. | |
Identification of vulnerabilities in the computer system, analyze and classify attacks. | |
Configuration of secure networks using firewalls and virtual private networks. | |
Additional outcomes | |
Not established. |
Training Activity | Methodology | Related Competences (only degrees before RD 822/2021) | ECTS | Hours | As | Com | Description | |
Class Attendance (theory) [ON-SITE] | Combination of methods | TI07 | 0.96 | 24 | N | N | ||
Class Attendance (practical) [ON-SITE] | Practical or hands-on activities | TI07 | 1.2 | 30 | N | N | ||
Project or Topic Presentations [ON-SITE] | Group Work | INS02 INS05 PER02 SIS01 SIS03 SIS04 SIS05 | 0.12 | 3 | Y | N | ||
Final test [ON-SITE] | Assessment tests | INS05 SIS01 | 0.2 | 5 | Y | Y | ||
Writing of reports or projects [OFF-SITE] | Group Work | INS02 INS05 PER02 SIS01 SIS03 SIS04 SIS05 | 0.8 | 20 | Y | N | ||
Study and Exam Preparation [OFF-SITE] | Self-study | INS02 INS05 PER02 SIS01 SIS03 SIS04 SIS05 TI07 | 2.56 | 64 | N | N | ||
On-line Activities [OFF-SITE] | Assessment tests | INS02 SIS04 | 0.16 | 4 | Y | N | ||
Total: | 6 | 150 | ||||||
Total credits of in-class work: 2.48 | Total class time hours: 62 | |||||||
Total credits of out of class work: 3.52 | Total hours of out of class work: 88 |
As: Assessable training activity Com: Training activity of compulsory overcoming (It will be essential to overcome both continuous and non-continuous assessment).
Evaluation System | Continuous assessment | Non-continuous evaluation * | Description |
Final test | 25.00% | 50.00% | |
Final test | 25.00% | 50.00% | |
Progress Tests | 50.00% | 0.00% | |
Total: | 100.00% | 100.00% |
Not related to the syllabus/contents | |
---|---|
Hours | hours |
Project or Topic Presentations [PRESENCIAL][Group Work] | 3 |
Final test [PRESENCIAL][Assessment tests] | 5 |
Writing of reports or projects [AUTÓNOMA][Group Work] | 4 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 5 |
Unit 1 (de 5): Introduction | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 4 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 2 |
Unit 2 (de 5): Ethical Hacking | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 4 |
Class Attendance (practical) [PRESENCIAL][Practical or hands-on activities] | 4 |
Writing of reports or projects [AUTÓNOMA][Group Work] | 16 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 11 |
Unit 3 (de 5): Web Auditory | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 4 |
Class Attendance (practical) [PRESENCIAL][Practical or hands-on activities] | 4 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 13 |
On-line Activities [AUTÓNOMA][Assessment tests] | 1 |
Unit 4 (de 5): | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 6 |
Class Attendance (practical) [PRESENCIAL][Practical or hands-on activities] | 9 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 11 |
On-line Activities [AUTÓNOMA][Assessment tests] | 1 |
Unit 5 (de 5): | |
---|---|
Activities | Hours |
Class Attendance (theory) [PRESENCIAL][Combination of methods] | 6 |
Class Attendance (practical) [PRESENCIAL][Practical or hands-on activities] | 13 |
Study and Exam Preparation [AUTÓNOMA][Self-study] | 22 |
On-line Activities [AUTÓNOMA][Assessment tests] | 2 |
Global activity | |
---|---|
Activities | hours |
Author(s) | Title | Book/Journal | Citv | Publishing house | ISBN | Year | Description | Link | Catálogo biblioteca |
---|---|---|---|---|---|---|---|---|---|
Fundamentos de Seguridad en Redes | Fundamentos de Seguridad en Redes | Cisco Press | 2008 | ||||||
Kurose, J., Ross, K. | Redes de Computadores. Un enfoque descendente basado en Internet | Pearson Education | 2003 | ||||||
William Stallings | Computer security. Principles and Practice | Pearson International Edition | 2008 | ||||||
William Stallings | Fundamentos de seguridad en redes | Pearson Prentice Hall | 2003 | ||||||
varios | Colección Pack Completa | 0xword | Colección de varios ejemplares | http://0xword.com/es/ |