Educational guide | ||||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2023_24 | |||||||||||||||||||||||||||||||||||||||
Subject | COMPUTER FORENSICS AND SECURITY AUDIT | Code | 01742015 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
3 | Compulsory | First | First |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | ING.MECANICA,INFORMAT.AEROESP. |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
acamv@unileon.es icrem@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http://ubuvirtual.ubu.es | |||||||||||||||||||||||||||||||||||||||
General description | ||||||||||||||||||||||||||||||||||||||||
Tribunales de RevisiĆ³n |
|
|||||||||||||||||||||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
A17953 | ||
Type B | Code | Competences Transversal |
Type C | Code | Competences Nuclear |
Learning aims |
Competences | |||
Students know how to apply security audit techniques and forensics in the cibersecurity field. | A17953 |
Contents |
Topic | Sub-topic |
Block I: COMPUTER FORENSICS AND SECURITY AUDIT | Unit 1: COMPUTER FORENSICS AND SECURITY AUDIT |
Block II: RISK MANAGEMENT | Unit 1: RISK MANAGEMENT |
Block III: DIGITAL EVIDENCES | Unit 3: DIGITAL EVIDENCES |
Block IV: EVIDENCE PROCESSING AND REPORTING | Unit 4: EVIDENCE PROCESSING AND REPORTING |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Assignments | 0 | 45 | 45 | ||||||
Presentations / expositions | 5 | 0 | 5 | ||||||
Personal tuition | 5 | 0 | 5 | ||||||
Forums of discussion | 0 | 3 | 3 | ||||||
Lecture | 12 | 0 | 12 | ||||||
Practical tests | 5 | 0 | 5 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Assignments | Autonomous and group activities must be done |
Presentations / expositions | Presentations |
Personal tuition | Individual tutorials |
Forums of discussion | Collaborative media participation as forums |
Lecture | Lectures and conferences |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Lecture | Individual evaluation (sumative) | 10% | |
Assignments | Reports, projects, problem and case solving | 50% | |
Presentations / expositions | Interview | 20% | |
Forums of discussion | Participation | 10% | |
Practical tests | Individual evaluation (sumative) | 10% | |
Other comments and second call | |||
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
Bill Nelson, Amelia Philips, Christopher Steuart, Guide to computer forensics and investigations, Processing Digital Evidence, Cengage Learning, Patrick Engebretson, The basics of hacking and penetration testing, Syngress, Elsevier, Peter Kim, The hacker playbook 2, Secure Planet LLC, |
Complementary |
Sara Baase, A gift of fire, Pearson, Ben Clark, Red Team Field Manual, , 2013 |
Recommendations |