Educational guide | ||||||||||||||||||||||
IDENTIFYING DATA | 2021_22 | |||||||||||||||||||||
Subject | CYBERSECURITY AND CIBERCRIME FOUNDATIONS | Code | 01732001 | |||||||||||||||||||
Study programme | ||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||
6 | Compulsory | First | ||||||||||||||||||||
Language |
|
|||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||
Department | ||||||||||||||||||||||
Coordinador | ||||||||||||||||||||||
Lecturers | |
|||||||||||||||||||||
Web | http:// | |||||||||||||||||||||
General description | ||||||||||||||||||||||
Tribunales de RevisiĆ³n |
|
|||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
Type B | Code | Competences Transversal |
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
A17028 |
|||
C1 C2 C3 C4 C5 |
|||
A17025 |
|||
B5214 B5215 B5216 B5217 B5218 B5219 |
Contents |
Topic | Sub-topic |
I. Security Definitions & Taxonomy |
|
II. Introduction to Cybersecurity |
|
III. Introduction to Cyberdefense | |
IV. Introduction to Cybercrime |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Seminars | 8 | 2 | 10 | ||||||
Portfolios/Learning folder | 8 | 27 | 35 | ||||||
Field work/trips | 4 | 11 | 15 | ||||||
Lecture | 23 | 22 | 45 | ||||||
Extended-answer tests | 3 | 20 | 23 | ||||||
Oral tests | 2 | 20 | 22 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Seminars | In-depth work on a particular topic. Further discussion of the lecture content, which is linked to professional skills |
Portfolios/Learning folder | Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally |
Field work/trips | Visits, work experience in companies and institutions in the sector, extra-classroom work (data collection, observations) which the student analyzes critically. Cybercrime laboratory. |
Lecture | Description of the contents of the subject |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Portfolios/Learning folder | Continuous assessment | 30% | |
Extended-answer tests | Written tests, where applicable. Summative assessment | 70% | |
Oral tests | Oral tests, where applicable. Summative assessment | 70% | |
Other comments and second call | |||
<p>At any given time, an explanation / clarification of the documents submitted by the student may be required. Students are supposed to know and accept the Regulations on Plagiarism of the University.</p> |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic | |
Complementary | |
Recommendations |