Educational guide
IDENTIFYING DATA 2023_24
Subject COMPUTER FORENSICS AND SECURITY AUDIT Code 01742015
Study programme
1742 - M.U. EN INTELIGENCIA DE NEGOCIO Y BIG DATA EN ENTORNOS SEGUROS - A DISTANCIA
Descriptors Credit. Type Year Period
3 Compulsory First First
Language
Castellano
Prerequisites
Department ING.MECANICA,INFORMAT.AEROESP.
Coordinador
CAMPAZAS VEGA , ADRIAN
E-mail acamv@unileon.es
icrem@unileon.es
Lecturers
CAMPAZAS VEGA , ADRIAN
CRESPO MARTINEZ , IGNACIO SAMUEL
Web http://ubuvirtual.ubu.es
General description
Tribunales de RevisiĆ³n
Tribunal titular
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. MATELLAN OLIVERA , VICENTE
Secretario ING.MECANICA,INFORMAT.AEROESP. PANIZO ALONSO , LUIS
Vocal CONDE GONZALEZ , MIGUEL ANGEL
Tribunal suplente
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. RODRIGUEZ DE SOTO , ADOLFO
Secretario ING.MECANICA,INFORMAT.AEROESP. FERNANDEZ LLAMAS , CAMINO
Vocal MATEMATICAS GARCIA SIERRA , JUAN FELIPE

Competencies
Type A Code Competences Specific
  A17953
Type B Code Competences Transversal
Type C Code Competences Nuclear

Learning aims
Competences
Students know how to apply security audit techniques and forensics in the cibersecurity field. A17953

Contents
Topic Sub-topic
Block I: COMPUTER FORENSICS AND SECURITY AUDIT Unit 1: COMPUTER FORENSICS AND SECURITY AUDIT
Block II: RISK MANAGEMENT Unit 1: RISK MANAGEMENT
Block III: DIGITAL EVIDENCES Unit 3: DIGITAL EVIDENCES
Block IV: EVIDENCE PROCESSING AND REPORTING Unit 4: EVIDENCE PROCESSING AND REPORTING

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Assignments 0 45 45
 
Presentations / expositions 5 0 5
Personal tuition 5 0 5
Forums of discussion 0 3 3
 
Lecture 12 0 12
 
Practical tests 5 0 5
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Assignments Autonomous and group activities must be done
Presentations / expositions Presentations
Personal tuition Individual tutorials
Forums of discussion Collaborative media participation as forums
Lecture Lectures and conferences

Personalized attention
 
Lecture
Assignments
Description
Doubts can be solved by asking the lecturer

Assessment
  Description Qualification
Lecture Individual evaluation (sumative) 10%
Assignments Reports, projects, problem and case solving 50%
Presentations / expositions Interview 20%
Forums of discussion Participation 10%
Practical tests Individual evaluation (sumative) 10%
 
Other comments and second call

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic Bill Nelson, Amelia Philips, Christopher Steuart, Guide to computer forensics and investigations, Processing Digital Evidence, Cengage Learning,
Patrick Engebretson, The basics of hacking and penetration testing, Syngress, Elsevier,
Peter Kim, The hacker playbook 2, Secure Planet LLC,

Complementary Sara Baase, A gift of fire, Pearson,
Ben Clark, Red Team Field Manual, , 2013


Recommendations