Educational guide | ||||||||||||||||||||||
IDENTIFYING DATA | 2019_20 | |||||||||||||||||||||
Subject | SOFTWARE ANALYSIS I | Code | 01732009 | |||||||||||||||||||
Study programme | ||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||
6 | Compulsory | First | ||||||||||||||||||||
Language |
|
|||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||
Department | ||||||||||||||||||||||
Coordinador | ||||||||||||||||||||||
Lecturers | |
|||||||||||||||||||||
Web | http:// | |||||||||||||||||||||
General description | ||||||||||||||||||||||
Tribunales de RevisiĆ³n |
|
|||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
Type B | Code | Competences Transversal |
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Get technical skills for using the main tools for detecting and classifying malware. Perform simple reverse engineering exercises in the context of cybersecurity | A17026 |
B5218 B5219 |
C1 C2 C4 C5 |
Learn to communicate conclusions | B5214 B5215 B5216 B5217 |
C3 |
Contents |
Topic | Sub-topic |
Introduction to software analysis | |
Risk and vulnerability analysis | |
Attacks against computer systems | |
Malicious software and its main operating principles |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Personal tuition | 2 | 0 | 2 | ||||||
Laboratory practicals | 18 | 50 | 68 | ||||||
Assignments | 0 | 28 | 28 | ||||||
Lecture | 18 | 0 | 18 | ||||||
Objective short-answer tests | 3 | 4 | 7 | ||||||
Practical tests | 2 | 2 | 4 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Personal tuition | Monitoring student activity and progression. Advising, correcting and proposing improvement activities. |
Laboratory practicals | Programming exercises based on lectures under the supervision of the teacher. |
Assignments | Individual programming tasks that will be corrected by the teacher and defended by the student. |
Lecture | Explanation of theoretical knowledge with the active participation of students. |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Assignments | Coding and individual defense of the code. | 40% | |
Objective short-answer tests | Individual assessment of theoretical contents. | 30% | |
Practical tests | Evaluation of experience obtained by performing the practical assignments of the course. | 20% | |
Others | Part of the final mark assigned by the teacher depending on students active participation in the course. | 10% | |
Other comments and second call | |||
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic | |
Complementary | |
Recommendations |