Educational guide
IDENTIFYING DATA 2023_24
Subject TRUSTWORTHY SYSTEMS Code 01747006
Study programme
1746 - Máster Universitario de Investigación en Ciberseguridad (OL)
Descriptors Credit. Type Year Period
5 Compulsory First First
Language
Castellano
Prerequisites
Department ING.MECANICA,INFORMAT.AEROESP.
Coordinador
ALVAREZ APARICIO , CLAUDIA
E-mail calvaa@unileon.es
agueh@unileon.es
Lecturers
ALVAREZ APARICIO , CLAUDIA
GUERRERO HIGUERAS , ANGEL MANUEL
Web http://agora.unileon.es
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente ING.MECANICA,INFORMAT.AEROESP. MATELLAN OLIVERA , VICENTE
Secretario ING.MECANICA,INFORMAT.AEROESP. SANCHEZ GONZALEZ , LIDIA
Vocal ING.MECANICA,INFORMAT.AEROESP. PANIZO ALONSO , LUIS
Tribunal suplente
Cargo Departamento Profesor
Presidente CONDE GONZALEZ , MIGUEL ANGEL
Secretario ING.MECANICA,INFORMAT.AEROESP. FERNANDEZ LLAMAS , CAMINO
Vocal ING.MECANICA,INFORMAT.AEROESP. RODRIGUEZ DE SOTO , ADOLFO

Competencies
Type A Code Competences Specific
  A18793
  A18808
  A18809
  A18811
Type B Code Competences Transversal
  B5729
  B5730
  B5731
  B5732
  B5733
  B5734
  B5735
  B5736
  B5737
  B5738
  B5739
  B5740
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
A18793
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
A18793
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
A18809
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
A18808
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
A18809
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
A18808
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
A18811
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5
A18811
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5736
B5737
B5738
B5739
B5740
C1
C2
C3
C4
C5

Contents
Topic Sub-topic
Part 1: hardening operating systems. 0.- Basics of security on operating systems.
1.- Handling of the OS's own tools (Linux): basics, administration, task planning, services, system information, automation (shell script), update and application of patches, access control, log management, etc.
2.- Containerization of applications.
Part 2: hardening computer networks 0.- Basics of network security and reliability.
1.- Communications encryption.
2.- Filtering of communications.
3.- DMZs.
Part 3: Reliable Systems Analysis 1.- Detection of intrusions and vulnerabilities.
2.- Honeypots

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Practicals using information and communication technologies (ICTs) in computer rooms 45 55 100
 
 
Lecture 20 0 20
 
Mixed tests 3 0 3
Practical tests 2 0 2
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Practicals using information and communication technologies (ICTs) in computer rooms Practical application of the theoretical concepts using ICTs.
Lecture Exposure by the teacher of theoretical, practical, and methodological concepts. The exhibitions may be accompanied by audio-visual material: slides, online video resources.

Personalized attention
 
Practicals using information and communication technologies (ICTs) in computer rooms
Lecture
Description
Personalized attention can be carried out to clarify the theoretical, practical, and methodological concepts. They cannot be used to repeat concepts exposed in classes that the student has not attended.

Assessment
  Description Qualification
Practicals using information and communication technologies (ICTs) in computer rooms Software development/configuration 30-70%
Lecture Written exam 30-70%
Others Optional tests 0% - 20%
 
Other comments and second call
<p>To pass the course, it will be necessary to obtain a grade of at least 50% of the maximum in both the exam and the practicals.</p><div><div>The works and practices presented may be reviewed with an anti-plagiarism computer program that can carry out checks between the works of the students of the current and previous call and against external sources. In the case of plagiarism, the work will be classified as suspended. During the evaluation tests, the use of electronic resources (calculators, tablets, telephones, computers, etc.) will not be possible, except for those tests that, upon the express indication of the teacher, require the use of any of these resources. In the event of any irregularity during the examination or corresponding evaluation test, the exam will be withdrawn immediately, the student will be expelled and the grade will be suspended. In any case, it will comply with the provisions of the internal regulations of the ULe included in the document "Guidelines for action in cases of plagiarism, copying or fraud in exams or evaluation tests" (Approved Standing Committee of the Governing Council 29/01/2015).</div><div><br /></div><div>The assessment of the practices will follow one of the following criteria (optionally both). The first will be an individual test that will consist of either a modification of the practice presented, or an exposition of it. The second will be the assessment of the own practice by the teacher.</div><div><br /></div><div>In the second call, there will be an evaluation test of theoretical and practical content. The qualification of the practical tests will be kept if they have been passed with at least 50% of the maximum of the qualification in the first call and the delivery of the not passed practices will be required for their subsequent evaluation in the same terms as in the first call (individual test and/or assessment of the practice).</div></div>

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic

Complementary


Recommendations