Educational guide
IDENTIFYING DATA 2021_22
Subject MATHEMATICS FOR CYBERSECURITY II - DATA, NETWORK AND INTERNET MATHEMATICS Code 01732013
Study programme
Descriptors Credit. Type Year Period
6 Optional Second
Language
Castellano
Prerequisites
Department
Coordinador
E-mail
Lecturers
Web http://riasc.unileon.es
General description
Tribunales de RevisiĆ³n
Tribunal titular
Cargo Departamento Profesor
Tribunal suplente
Cargo Departamento Profesor

Competencies
Type A Code Competences Specific
Type B Code Competences Transversal
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
A17038
B5218
B5219
C1
C2
C4
C5
A17051
B5218
B5219
C1
C2
C4
C5
B5214
B5215
B5216
B5217
C3

Contents
Topic Sub-topic
Linear Algebra Data Analysis Linear Algebra Data Analysis
Spectral network theory Spectral network theory
Applications Social Networks
Cloud computing
Critical Infrastructures
Trustworthy user-controlled systems

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Portfolios/Learning folder 5 30 35
 
PBL (Problem Based Learning) 16 19 35
 
Lecture 17 28 45
 
Extended-answer tests 3 15 18
Oral tests 2 15 17
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Portfolios/Learning folder Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally
PBL (Problem Based Learning) Strategy consisting of students resolving problems and reflecting on their learning experiences, normally working collaboratively
Lecture Description of the contents of the subject

Personalized attention
 
Portfolios/Learning folder
Lecture
Extended-answer tests
Oral tests
Description
Via email or using moodle

Assessment
  Description Qualification
Portfolios/Learning folder Continuous assessment 30%
Extended-answer tests Written tests, where applicable. Summative assessment 20%
Oral tests Oral tests, where applicable. Summative assessment 20%
Others Individual tests. Summative assessment 50%
 
Other comments and second call
<p>At any given time, an explanation / clarification of the documents submitted by the student may be required. <br />Students are supposed to know and accept the Regulations on Plagiarism of the University.</p><style type=&quot;text/css&quot;>

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic G Strang, Introduction to applied mathematics, Wellesley-Cambridge Press, 1986
Douglas B. West, Introduction to graph theory, Prentice Hall, 2001 o posterior
Dan A Smovici, Linear Algebra Tools for Data Mining, World Scientific, 2012 o posterior

Complementary


Recommendations


Subjects that it is recommended to have taken before
MATHEMATICS FOR CYBERSECURITY I - CRYPTOGRAPHY / 01733002