![]() |
Educational guide | |||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2024_25 | |||||||||||||||||||||||||||||||||||||||
Subject | NETWORK DATA SECURITY | Code | 00717027 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
6 | Compulsory | Third | Second |
|||||||||||||||||||||||||||||||||||||
Language | ||||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | ING.ELECTR.DE SIST. Y AUTOMATI |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
halam@unileon.es mcbenc@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http://agora.unileon.es | |||||||||||||||||||||||||||||||||||||||
General description | This course teaches students to create robust security solutions to protect data processing systems and communication networks. Through practical and theoretical methods, students will learn to strengthen information security against modern threats. | |||||||||||||||||||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||||||||||||||||||||
Competencias |
Code | |
A18975 | |
A18985 | |
B5800 | |
B5806 | |
B5809 | |
B5813 | |
C4 | CMECES4 That students can transmit information, ideas, problems and solutions to both a specialised and non-specialised audience |
C5 | CMECES5 That students have developed those learning skills necessary to undertake further studies with a high degree of autonomy |
Learning aims |
Competences | |||
Knows how to design and implement security solutions that guarantee the confidentiality, integrity, availability and authenticity of data processing systems in a network ecosystem. | A18975 |
B5800 B5806 B5809 B5813 |
C4 C5 |
Knows how to design and implement security solutions that guarantee the confidentiality, integrity, availability and authenticity of data processing systems in a network ecosystem. Know the standards, regulations and legal framework applicable to the design and management of secure network data services. | A18985 |
B5800 B5806 B5813 |
C5 |
Contents |
Topic | Sub-topic |
BLOCK I. INTRODUCTION TO CYBERSECURITY, FUNCTIONAL AREAS. | TOPIC 1. BASIC CONCEPTS AND FUNCTIONALITIES OF CYBERSECURITY. TOPIC 2: FUNCTIONAL AREAS OF CYBERSECURITY. TOPIC 3: FUNDAMENTAL TOOLS FOR CYBERSECURITY. |
BLOCK II: DATA PRIVACY IN NETWORK ENVIRONMENTS. | Topic 1: DEFINITION AND PRINCIPLES OF CYBERSECURITY. Topic 2: FUNCTIONAL AREAS OF CYBERSECURITY. Topic 3: CURRENT CHALLENGES AND TRENDS. |
BLOCK III: Security and trust in data access, exchange and analysis. | Topic 1: IDENTITY AND ACCESS MANAGEMENT. Topic 2: SECURITY IN DATA EXCHANGE. Topic 3: TRUST AND CYBERSECURITY. Topic 4: SECURITY CONSIDERATIONS FOR DATA ANALYSIS |
BLOCK IV: STANDARDS, REGULATIONS AND APPLICABLE LEGAL FRAMEWORK. | Topic 1: IDENTITY AND ACCESS MANAGEMENT. Topic 2: SECURITY IN DATA EXCHANGE. Topic 3: TRUST AND CYBERSECURITY. Topic 4: SECURITY CONSIDERATIONS FOR DATA ANALYSIS. |
BLOCK V: DATA ANALYSIS TECHNIQUES IN CYBERSECURITY AND CYBERINTELLIGENCE. | Topic 1: DIGITAL FORENSIC ANALYSIS. Topic 2: DETECTION OF ANOMALIES AND ATTACK PATTERNS. Topic 3: CYBER INTELLIGENCE. Topic 4: SECURITY ANALYSIS TOOLS AND PLATFORMS. |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
PBL (Problem Based Learning) | 8 | 0 | 8 | ||||||
Laboratory practicals | 28 | 42 | 70 | ||||||
Personal tuition | 3.5 | 0 | 3.5 | ||||||
Lecture | 25 | 37.5 | 62.5 | ||||||
Mixed tests | 6 | 0 | 6 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
PBL (Problem Based Learning) | Problem formulation and discussion. |
Laboratory practicals | Practical implementation of the contents covered in the master sessions. |
Personal tuition | Time reserved to answer and resolve students' doubts. Individually. |
Lecture | Presentation of the contents of the subject. |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Laboratory practicals | The correct performance of the practices in the laboratory will be assessed. | 25% | |
PBL (Problem Based Learning) | Completion and quality of documentation of related problem-based learning activities will be assessed. | 10% | |
Mixed tests | Questionnaires about master sessions. | 40% | |
Others | To pass through continuous evaluation, you must obtain at least a 4 out of 10 in each evaluated test. _________________________________ Inappropriate attitude in the classroom, laboratory or evaluation tests will be penalized with 20% of the final grade. |
||
Other comments and second call | |||
In the extraordinary call, a test will be carried out that evaluates the theoretical and practical skills acquired by the student (70%) and the quality of the memory and the presentation of the work, if any, will be evaluated (30%). EVALUATION TESTS During the evaluation tests, it will not be possible to use any material or device that has not been expressly authorized by the teacher. If any irregularity occurs during the corresponding exam or evaluation test, the exam will be immediately withdrawn, the student will be expelled and graded as a fail. In any case, the provisions of the internal regulations of the ULE included in the document "Guidelines for action in cases of plagiarism, copying or fraud in exams or evaluation tests" will be followed (Approved Permanent Commission of the Government Council 01/29 /2015). |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
![]() ![]() ![]() ![]() ![]() |
Complementary | |
Recommendations |
Subjects that it is recommended to have taken before | ||
|