Educational guide | ||||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2023_24 | |||||||||||||||||||||||||||||||||||||||
Subject | SYSTEMS AUDITING | Code | 01747010 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
4 | Compulsory | First | Second |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | ING.MECANICA,INFORMAT.AEROESP. |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
acamv@unileon.es icrem@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http://agora.unileon.es | |||||||||||||||||||||||||||||||||||||||
General description | In this subject, audit and forensics techniques are studied. It includes fundamentals as well as risk management, digital evidence collection and evidence processing and reporting | |||||||||||||||||||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
A18795 | ||
A18811 | ||
A18812 | ||
Type B | Code | Competences Transversal |
B5729 | ||
B5730 | ||
B5731 | ||
B5732 | ||
B5733 | ||
B5734 | ||
B5735 | ||
B5736 | ||
B5737 | ||
B5738 | ||
B5739 | ||
B5740 | ||
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Student knows the fundamentals about audit of security systems | A18811 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
A18812 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
|
A18795 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
|
A18812 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
|
A18795 |
B5729 B5730 B5731 B5732 B5733 B5734 B5735 B5736 B5737 B5738 B5739 B5740 |
C1 C2 C3 C4 C5 |
Contents |
Topic | Sub-topic |
1. Audit and Forensics Overview 2. Auditing Techniques 3. Risk Management 4. Forensic Technologies 5. Digital Evidence Collection 6. Evidentiary Processing and Reporting | |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Practicals using information and communication technologies (ICTs) in computer rooms | 35 | 43 | 78 | ||||||
Lecture | 17 | 0 | 17 | ||||||
Mixed tests | 5 | 0 | 5 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Practicals using information and communication technologies (ICTs) in computer rooms | Learning activities using computer tools in order to understand the practice of the theoretical concepts |
Lecture | Learning activities to introduce the main concepts of the subject that can be individuals or in groups. |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Practicals using information and communication technologies (ICTs) in computer rooms | Assessment of the acquired competences (Summative assessment) | 30-70% | |
Lecture | Assessment of the acquired competences (Summative assessment) | 30-70% | |
Other comments and second call | |||
<p>Second call will consist in an assessment of the acquired competences </p> |
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
Patrick Engebretson, The basics of hacking and penetration testing, Syngress, Elsevier, 2ª Edición Peter Kim, The hacker playbook 2, Secure Planet LLC, 2014 |
Complementary |
Sara Baase, A gift of fire, Pearson, 4ª Edición Ben Clark, Red Team Field Manual, , 2013 |
Recommendations |