Advanced Search

Royal Decree 686/2011 May 13, Is Establishing Six Certificates Of Professionalism Of The Professional Family Computing And Communications That Are Included In The National Repertory Of Professional Certificates.

Original Language Title: Real Decreto 686/2011, de 13 de mayo, por el que se establecen seis certificados de profesionalidad de la familia profesional Informática y comunicaciones que se incluyen en el Repertorio Nacional de certificados de profesionalidad.

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

TEXT

Law 56/2003, of 16 December, of Employment, establishes, in its article 3, that it corresponds to the Government, on a proposal of the current Ministry of Labour and Immigration, and prior report of this Ministry to the Sectoral Conference of Employment and Industrial Affairs, the elaboration and approval of the regulatory provisions in relation to, among others, occupational and continuing vocational training in the State field, as well as the development of such management.

Article 26.1 of Law 56/2003 of 16 December 2003, following the amendment by Royal Decree-Law 3/2011 of 18 February 2011 of urgent measures for the improvement of employability and reform of policies In the field of employment, it is concerned with the vocational training subsystem for employment, in which, since the entry into force of Royal Decree 395/2007 of 23 March, which regulates it, the arrangements for vocational training in the field of employment have been integrated labour-training and continuing training. This subsystem, according to the legal provisions laid down in the Organic Law of the European Communities, of Qualifications and Vocational Training, will be carried out in the framework of the National System of Qualifications and Vocational Training. of the National Employment System.

For its part, the Organic Law of June 19, the Organic Law of 19, understands the National System of Qualifications and Vocational Training as the set of instruments and actions necessary to promote and develop the integration of offers of vocational training and the assessment and accreditation of professional skills. The main instruments of this System are the National Catalogue of Professional Qualifications and the procedure for recognition, evaluation, accreditation and registration of the same. Article 8 of the Organic Law of 19 June provides that certificates of professional competence prove the professional qualifications of those who have obtained them and that they will be issued by the competent administration, with a view to official and valid throughout the national territory. In addition, Article 10.1 indicates that the General Administration of the State, in accordance with the provisions of Article 149.1.30. and 7. of the Constitution and after consulting the General Council of Vocational Training, shall determine the qualifications and certificates of professionalism, which shall constitute the offers of vocational training referred to in the National Catalogue of Professional Qualifications.

The National Catalogue of Professional Qualifications, according to Article 3.3 of Royal Decree 1128/2003 of 5 September, which regulates the National Catalogue of Professional Qualifications, in the wording given to the By the same token, Royal Decree 1416/2005 of 25 November provides the basis for drawing up the training offer leading to the acquisition of vocational training qualifications and certificates of professionalism and the modular training offer. the cumulative associated with a competition unit, as well as other training offers adapted to collectives with specific needs. In accordance with Article 8.5 of the same royal decree, the training offer of certificates of professionalism shall be in accordance with the minimum quality indicators and requirements which guarantee the fundamental aspects of a system. training, to be established by mutual agreement between the educational and labour administrations, after consultation of the General Council for Vocational Training.

Royal Decree 34/2008 of 18 January, governing certificates of professionalism, as amended by Royal Decree 1675/2010 of 10 December 2010, has updated, in line with the regulations mentioned above, the regulation of the certificates set out in the previous Royal Decree 1506/2003 of 28 November 2003 laying down the guidelines for certificates of professionalism, which have been repealed.

In that Royal Decree 34/2008, as amended by Royal Decree 1675/2010, the structure and content of the certificates of professionalism are defined, from the National Catalogue of Professional Qualifications and the guidelines established by the European Union, and it is established that the Public Service of State Employment, with the collaboration of the National Focal Points, will prepare and update the certificates of professionalism, which will be approved by royal decree.

In this regulatory framework it is appropriate for the Government to establish six certificates of professionalism of the professional family Informatics and communications of the professional area of Systems and telematics, which will be incorporated into the Repertoire National of certificates of professionalism by levels of professional qualification, taking into account the professional competence required by the productive activities, as set out in Article 4.4 and in Annex II to Royal Decree 1128/2003, Cited above.

With the entry into force of this royal decree, two of the new certificates of professionalism that are now established, that of Microcomputer Systems and the Assembly and repair of microcomputer systems, replace their antecedent, the certificate of professionalism of the occupation of Microcomputer Systems Technician, established by Royal Decree 1598/1997 of 17 October, which consequently is repealed.

In the process of drawing up this royal decree has issued report the General Council of Vocational Training, the General Council of the National Employment System and has been informed the Sectoral Conference of Employment and Labor.

In its virtue, on the proposal of the Minister of Labour and Immigration and after deliberation of the Council of Ministers at its meeting of May 13, 2011,

DISPONGO:

Article 1. Object and scope of application.

This royal decree aims to establish three certificates of professionalism of the professional family Informatics and communications which are included in the National Directory of certificates of professionalism, regulated by the Royal Decree 34/2008 of 18 January, governing certificates of professionalism, as amended by Royal Decree 1675/2010 of 10 December 2010.

Such certificates of professionalism are official and valid throughout the national territory and do not constitute a regulation of professional practice.

Article 2. Certificates of professionalism that are established.

The certificates of professionalism that are established correspond to the professional family Informatics and communications and are the ones below, whose specifications are described in the annexes that are indicated:

Professional Family: COMPUTING AND COMMUNICATIONS

-Annex I. Computer Security-Level 3.

-Annex II. Microcomputer systems-Level 2.

-Annex III. Mounting and repairing microcomputer systems-Level 2.

-Annex IV. Implementation and management of computer elements in domotic/inmotic systems, access control and presence, and video surveillance-Level 3.

-Annex V. Internet Service Administration-Level 3.

-Annex VI. Computer Systems Programming-Level 3.

Article 3. Structure and content.

The content of each professionalism certificate responds to the structure set out in the following sections:

(a) In paragraph I: Identification of the certificate of professionalism.

(b) In paragraph II: Professional profile of the certificate of professionalism.

(c) In paragraph III: Training of the certificate of professionalism.

(d) In paragraph IV: Prescriptions of trainers.

e) In paragraph V: Minimum requirements for spaces, facilities and equipment.

Article 4. Requirements for access to the training of certificates of professionalism.

1. The competent labour administration shall be responsible for verifying that the trainees have the training and professional qualifications to take advantage of the training in accordance with the terms set out in

following paragraphs.

2. In order to qualify for the training of the training modules for certificates of professionalism in vocational qualification levels 2 and 3, students must meet one of the following requirements:

a) Be in possession of the Graduate Degree in Secondary Education Required for Level 2 or Bachelor's degree for Level 3.

b) Be in possession of a certificate of professionalism of the same level of the module or training modules and/or the certificate of professionalism to which you wish to access.

(c) Be in possession of a level 1 certificate of professionalism of the same family and professional area for level 2 or of a level 2 professionalism certificate of the same family and professional area for level 3.

d) Meet the academic requirement of access to mid-grade training cycles for level 2 or higher grade level 3, or have exceeded the corresponding access tests regulated by the administrations education.

e) Having passed the university access test for over 25 years and/or 45 years.

f) Having sufficient training or professional knowledge to enable training to be used.

Article 5. Trainers.

1. The requirements on training and professional experience for the delivery of certificates of professionalism are those set out in paragraph IV of each certificate of professionalism and must be complied with both in person and in person. distance.

2. In accordance with Article 13.3 of Royal Decree 34/2008 of 18 January, they may be recruited as experts for the provision of certain training modules specified in paragraph IV of each of the Annexes to the certificates of professionalism, qualified professionals with professional experience in the field of the unit of competence to which the module is associated.

3. In order to prove the required teaching competence, the trainer or expert must be in possession of the certificate of professionalism of occupational trainer or equivalent training in didactic training methodology for adults.

The requirement set out in the preceding paragraph will be exempt:

(a) Those who are in possession of the official university degrees of graduate in Pedagogy, Psychopedagogy or Master in any of their specialties, of a graduate degree in the field of the Psychology or Pedagogy, or an official postgraduate degree in the fields mentioned above.

b) Those who hold an official university degree other than those referred to in the preceding paragraph and who are also in possession of the Certificate of Pedagogical Aptitude or Professional Specialization Didactics and the Certificate of Pedagogical Qualification. In addition, the holders of the Master's Master's degree for the exercise of the regulated Professions of the compulsory secondary education and the secondary school, vocational training and the official schools of the Languages.

(c) Those who credit a proven teaching experience of at least 600 hours in the last seven years in vocational training for employment or the education system.

4. Trainers who provide distance training must have training and experience in this mode, in the use of information and communication technologies, as well as to meet the specific requirements set out for each of them. certificate of professionalism. To this end, the competent authorities shall develop specific programmes and actions for the training of these trainers.

Article 6. Contracts for training.

1. The theoretical training of contracts for training may be carried out at a distance up to the maximum of hours likely to be developed in this modality, which is established for each training module in the certificate of professionalism.

2. The training of training modules which are not developed at a distance may be carried out in the workplace or in face-to-face training.

Article 7. Distance learning.

1. Where the training module includes distance learning, it shall be carried out with didactic supports authorised by the competent labour administration to enable a system-based learning process for the participant to be met by the accessibility and design requirements for all and will necessarily be complemented with tutorial assistance.

2. The training of the training modules taught through distance learning will be organised in groups of up to 25 participants.

3. Training modules which, in their entirety, are developed at a distance will require at least one final test of an in-person nature.

Article 8. Centers authorized for your partition.

1. Training centres and institutions which provide training leading to a certificate of professionalism must comply with the requirements of trainers and the minimum requirements for spaces, facilities and equipment. established in each of the training modules which constitute the certificate of professionalism.

2. Centres providing exclusively the theoretical training of contracts for training shall be exempt from the requirements on spaces, facilities and equipment as laid down in the previous paragraph, in any event to be ensured by the institutions. persons with disabilities the necessary technological supports and the elimination of potential physical and communication barriers.

Article 9. Correspondence with vocational training qualifications.

The accreditation of the units of competence obtained through the improvement of the professional modules of the vocational training qualifications will provide the effects of exemption from the module or training modules of the certificates of professionalism associated with those competition units set out in this royal decree.

Additional disposition first. Level of certificates of professionalism in the European Qualifications Framework.

Once the relationship between the national qualifications framework and the European qualifications framework is established, the corresponding level of professionalism certificates set out in this royal decree will be determined. within the European Qualifications Framework.

Additional provision second. Equivalences with previous professionalism certificates.

The equivalence to all effects of the following certificates of professionalism is declared:

Certificate of professionalism to be repealed

Equivalent certificates of professionalism

Royal Decree 1598/97 of 17 October, establishing the certificate of professionalism of the occupation of Microcomputer Systems Technician.

Systems microcomputer.

System Assembly and Repair microcomputer

First transient disposition. Modification of training plans and training actions.

In the training plans and in the training actions that are already approved, under the Order TAS, 718/2008, of March 7, for which the Royal Decree 395/2007, of March 23, is developed, for which the subsystem is regulated In the case of training for employment, training in the field of supply and the establishment of the regulatory bases for the award of public grants for financing, on the date of entry into force of this royal decree, which include training associated with the certificate of professionalism which is now repealed, it may be replaced by the is associated with the new certificates of professionalism declared equivalent in the second provision second, subject to the approval of the Administration which approved it and subject to compliance with the requirements of the trainers and the requirements minimum spaces, facilities and equipment set out in the certificate.

Second transient disposition. Low in the Specialty File.

The specialty corresponding to the certificate of professionalism repealed will cause low in the file of specialties from the nine months after the entry into force of this royal decree. During this period, this certificate shall remain valid for the purposes specified in this royal decree. In any event, the training actions linked to this certificate must be initiated before the end of the nine-month period.

Transitional provision third. Request for the issue of the repealed certificates of professionalism.

1. Persons who, as provided for in the first transitional provision of Royal Decree 34/2008 of 18 January, have completed with a positive assessment the training associated with the certificate of professionalism which is hereby repealed, during the period of the same, they shall have a period of five years to request their expedition, to count from the entry into force of the present royal decree.

2. They may also apply for the issue within five years of completion with a positive assessment of the training of such a certificate of professionalism:

a) People who, having taken part of that formation during the actual decree that is now repealed, complete the same after their repeal.

b) Persons who undertake the training of this certificate of professionalism under the training plans and the training actions that are already approved at the date of entry into force of this royal decree, under the Order CAS 718/2008, dated March 7.

Transitional disposition fourth. Provisional accreditation of centres.

The training centres which at the entry into force of this royal decree were included in the registers of the competent and approved administrations to provide training in the relevant training courses the certificate of professionalism which is now repealed, shall be deemed to be provisionally accredited for the purposes of the distribution of training actions linked to the certificates of professionalism established in this royal decree and declared equivalent in the second additional provision, subject to authorisation by the Competent administration. This accreditation will have effects for one year from the entry into force of this royal decree and until the completion, if any, of the approved training actions. After this period, in order to be able to provide training aimed at obtaining the certificates of professionalism established in this royal decree, the training centres must ask the competent authorities for their accreditation, which must comply with the requirements set out in the certificates.

Single repeal provision. Regulatory repeal.

Royal Decree 1598/97 of 17 October, establishing the certificate of professionalism of the technical occupation of microcomputer systems, is hereby repealed.

Final disposition first. Competence title.

This Royal Decree is dictated by the powers conferred on the State in Article 149.1.1., 7. and 30. of the Spanish Constitution, which attributes to the State exclusive competence for the regulation of the basic conditions guaranteeing the equality of all Spaniards in the exercise of rights and in the fulfilment of constitutional duties; labour law; and the regulation of conditions for obtaining, issuing and approving of academic and professional qualifications and basic standards for the development of Article 27 of the Constitution, in order to ensure compliance with the obligations of the public authorities in this field.

Final disposition second. Regulatory development.

The Minister of Labor and Immigration is authorized to dictate how many provisions are necessary for the development of this royal decree.

Final disposition third. Entry into force.

This royal decree will enter into force on the day following its publication in the "Official State Gazette".

Given in Madrid, 13 May 2011.

JOHN CARLOS R.

The Minister of Labor and Immigration,

VALERIAN GOMEZ SANCHEZ

ANNEX I

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: MICROCOMPUTER systems

Code: IFCT0209.

Professional Family: Informatics and Communications.

Professional Area: Systems and telematics.

Professional qualification level: 2

Professional reference qualification:

IFC078_2 Microcomputer Systems (Royal Decree 295/2004 of 20 February 2004, as amended by Royal Decree 1201/2007 of 14 September 2004).

Relationship of competency units that configure the certificate of professionalism:

UC0219_2: Install and configure base software on microcomputer systems.

UC0220_2: Install, configure, and verify local network elements according to established procedures.

UC0221_2: Install, configure, and maintain general purpose computer packages and specific applications.

UC0222_2: Facilitate the user to use general purpose computer packages and specific applications.

General competition:

Install, configure, and maintain microcomputer systems for use in addition to supporting the user in managing applications on such systems as part of an organization's IT support service.

Professional Environment:

Professional scope:

Develops your professional activity in the following areas:

-Companies or entities that use computer systems for their management, within the microcomputing department.

-Small businesses that market and/or repair software and software or as a self-employed professional.

Productive Sectors:

This is present in the following types of companies:

-Companies or entities of any size that use computer systems for their management and that can be framed in any productive sector.

-Computer and communications service providers and distributors.

-Companies engaged in the marketing of microcomputer equipment.

-Companies providing technical assistance services microcomputing.

-In different public administrations, as part of the organization's IT support.

Relevant Occupations and Jobs:

3812.1023 Technician on microcomputer systems.

Microcomputer Equipment Installer.

Microcomputer Repairer.

Microcomputing Commercial.

Support personnel.

Teleassistance Operator.

Duration of the associated training: 600 hours

Relationship of training modules and training units.

MF0219_2 (transverse): Installing and configuring operating systems. (140 hours)

• UF0852: Installing and updating operating systems. (80 hours)

• UF0853: Exploitation of the functionalities of the microcomputer system. (60 hours)

MF0220_2 (Cross): Deployment of local network elements. (160 hours)

• UF0854: Installing and configuring the nodes of a local area network. (90 hours)

• UF0855: Verification and resolution of incidents in a local area network. (70 hours)

MF0221_2: Installing and configuring computer applications. (60 hours)

MF0222_2: Microcomputer applications. (200 hours)

• UF0856: User assistance in the use of office and email applications. (40 hours)

• UF0857: Elaboration of text documents. (50 hours)

• UF0858: Calculation of spreadsheets. (50 hours)

• UF0859: Presentation of presentations. (30 hours)

• UF0860: Elaboration and modification of images or other graphic elements. (30 hours)

MP0177: Non-working professional practice module for Microcomputer Systems. (40 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: INSTALLING AND CONFIGURING BASE SOFTWARE ON MICROCOMPUTER SYSTEMS

Level: 2

Code: UC0219_2

Professional realizations and realization criteria

RP1: Perform operating system installation processes for use on microcomputer systems, following specifications received.

CR1.1 The characteristics of the operating systems are classified, to decide the version to install and the type of installation, depending on the technical specifications received.

CR1.2 Operating system installation requirements are checked, to verify that there is sufficient resources and compatibility on the installation's target computer, following the procedure set.

CR1.3 The installation target team prepares to locate the operating system, enabling the infrastructure on mass storage devices, according to the technical specifications received.

CR1.4 The operating system is installed by applying the processes indicated in the installation manuals that accompany it, to obtain a computer equipment in a functional state, following the established procedure.

CR1.5 The operating system is configured for operation, within the specified parameters, following the established procedures and indicated in the technical documentation.

CR1.6 The utilities included in the operating system are installed for use, according to the technical specifications received.

CR1.7 Installation verification is performed to check the functionality of the operating system, by starting and stopping testing, and performance analysis, following established procedures.

CR1.8 The documentation of the performed processes is made and archived for later use, following the internal models set by the organization.

CR1.9 The associated specific technical documentation is interpreted, if any, in the most frequently used foreign language in the sector.

RP2: Update the operating system to ensure its operation, following technical specifications received and organization procedures.

CR2.1 Base software versions, system add-ons, and device drivers are checked to ensure their suitability, following the established procedure.

CR2.2 The outdated versions of the base software, system add-ons and device drivers are identified to proceed to update and ensure their functionality, following technical specifications and established procedures.

CR2.3 Add-ons and "patches" for the operation of the base software are installed and configured, indicating the system administrator to maintain security on the system, according to the established procedures.

CR2.4 Update verification is performed, to test the functionality of the operating system by starting and stopping tests, and performance analysis, according to established procedures.

CR2.5 The documentation of the performed processes is made and archived for later use, according to the rules set by the organization.

RP3: Explain microcomputer system functionality by using base software and standard applications, taking into account usage needs.

CR3.1 The functions and applications provided by the base software are identified for use, according to the instructions in the technical documentation and usage needs.

CR3.2 File system operations are performed using the interface provided by the operating system, following technical specifications and according to usage needs.

CR3.3 The configuration tools provided by the operating system are run to select options from the workbench, according to specifications received and usage needs.

CR3.4 Application execution processes are performed, to exploit the functions of each of them according to operational and functional needs.

CR3.5 The messages provided by the base software are interpreted, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications given by the organization.

CR3.6 The procedures for the use and management of the peripherals connected to the microcomputer system, by the users, are performed to exploit their functionalities, following the technical documentation and procedures stipulated by the organization.

Professional Context

Production and/or service creation media

Computer equipment. Peripherals. Operating systems. Utilities and applications built into operating systems. Update versions of operating systems. Technical documentation associated with the operating systems. Free software.

Work products or results

Computer equipment with installed and configured operating systems. Operating systems configured and operating. Logically organized computer equipment. Updated operating systems.

Information used or generated

Manuals and technical documentation of operating systems. Operating system upgrade manuals. Manuals for applications included in the operating system. Operating system installation, configuration, and upgrade reports. The security and quality plan of the organization.

Competition Unit 2

Naming: INSTALL, CONFIGURE, AND VERIFY LOCAL NETWORK ELEMENTS ACCORDING TO ESTABLISHED PROCEDURES

Level: 2

Code: UC0220_2

Professional realizations and realization criteria:

RP1: Install and configure local network nodes and software to implement internal communications services, following established procedures.

CR1.1 The physical map of the network is interpreted to identify the elements that make up the local network, based on the specifications received.

CR1.2 Network equipment modules are installed to provide the connectivity features specified according to the physical configuration indicated and following the established procedures.

CR1.3 Active network elements (routers and switches) are logically configured to implement services using software tools and techniques according to the specifications received.

CR1.4 The protocol and service management programs are installed and configured, to implement the internal communications services according to the technical specifications of the manufacturers and applying the procedures set.

CR1.5 Network node software is installed and configured to provide connectivity between those nodes according to the specifications received.

CR1.6 The installation and configuration processes of the local network devices are documented for registration using the formats indicated by the organization according to the established procedure.

CR1.7 The specific technical documentation associated with the software and devices is interpreted, if any, in the most frequent foreign language in the sector.

RP2: Verify the operation and operational parameters of the hubs and other interconnection devices in the network, to ensure the service they provide according to established procedures.

CR2.1 The operation of the local network interconnect devices is checked, to verify the network operation using the specific hardware and software tools, according to the established procedures.

CR2.2 The status of the interconnect devices is checked, to verify that they are active and accessible by accessing them through the network management tools, according to established procedures.

CR2.3 Allowed and prohibited connection options are checked to ensure security of services, using specific tools according to the specifications received.

CR2.4 Network resource access is checked to secure the service, following established procedures to verify that the allowed resources are accessed.

CR2.5 The configuration of the interconnect devices is verified locally and remotely, to ensure their functionality according to established procedures.

RP3: Configure communications protocols for network device integration, as instructed by the organization's administrator and operational specifications.

CR3.1 The values of the configurable parameters of the communications protocols are set, to integrate each node in the network according to the established procedures and following the routing and security policies of the organization.

CR3.2 The protocols associated with the installed network applications are configured on the servers, to support the services implemented according to the installation manuals and following the specifications received.

CR3.3 The routers and switches are configured, so that they manage protocols and services according to specifications received and predefined work procedures.

CR3.4 The encryption software is installed and configured on the nodes in the network to be determined, according to the specifications received and procedures set to create virtual private networks.

CR3.5 The functional tests of the configuration of the communications devices are performed to ensure the conformity of the same with respect to the requirements set forth in the operational specification of the organization.

CR3.6 The protocol configuration is documented for registration, using the formats indicated by the organization according to the procedure set.

RP4: Manage the detected incidents on the network devices to correct or report them, based on the established protocols and the predefined take action procedures.

CR4.1 Incident notification systems are observed, to address possible alarms according to the operational and security procedures of the organization.

CR4.2 The location of the element in which the incident occurred is performed by interpreting the information received and the technical documentation to isolate the physical and logical problem, according to the documentation the technical and operational protocols of the organisation in the face of contingencies.

CR4.3 The symptoms reported by the user or the incident management systems are verified to obtain a diagnosis of the problem according to the technical documentation.

CR4.4 The detected and isolated incidence is diagnosed and its solution is proposed, to rehabilitate disrupted or impaired services, according to quality regulations and contingency plans.

CR4.5 The incident that has not been isolated is reported to the senior level of responsibility for its management according to the organization's protocols and procedures for contingencies.

CR4.6 The repair of the incident is performed with the appropriate tools and respecting the security rules established by the organization.

CR4.7 The documentation of the detection, diagnosis, and solution of the incident is made to record the same according to the protocols of the organization.

CR4.8 The status information of the incident is transmitted to the end user to complete the process of its management according to the rules of the organization.

Professional Context

Production and/or service creation media

Network Parsers. Cabling certifiers. Manual tools for electrical and mechanical work. Software tools for connectivity testing. Software tools for network item inventory control. Computers, printers and peripherals. Operating systems. Hubs, switches, routers. Network cards. Cables and connectors. Network client software. Network management software. Software that owns the network devices. Office tools. Map of the network.

Work products or results

Communication equipment connected to the data lines. Local network installed and configured according to specifications. Inventory and descriptive record of physical network communications devices and their configuration.

Information used or generated

Map of the network. Inventory of the organization's hardware. Work orders. Network documentation. Installation manuals for the devices. Device configuration manuals. Operational specifications of the organisation. Quality manual. Standards and quality criteria of the organisation. Safety plan. Maintenance plan. Environmental regulations. Safety and hygiene regulations at work. Reliable and up to date network documentation.

Competition Unit 3

Naming: INSTALL, CONFIGURE, AND MAINTAIN GENERAL PURPOSE COMPUTER PACKAGES AND SPECIFIC APPLICATIONS.

Level: 2

Code: UC0221_2

Professional realizations and realization criteria

RP1: Install, configure, and update general purpose computer packages, utilities, and specific applications for later exploitation by users and according to the guidelines received.

CR1.1 The configuration of parameters and definitions in the data network infrastructure teams is done individually with the values set in the design. The software package check provided for the installation or upgrade and the associated documentation ensures compatibility with the features of the machine and the operating system on which it will be installed and the specifications set.

CR1.2 The application or utility is installed and configured by following the established procedure and using the tools of the application itself or the operating system.

CR1.3 The incidents that appear are resolved by querying the technical documentation or by using the network administrator

CR1.4 The technical documentation is interpreted with correction both if it is edited in Spanish, in the own language of the Autonomous Community or in the technical language of customary use.

CR1.5 Performing the established tests ensures that all packages are installed and that the application works correctly in all its aspects (peripheral access, network access, etc.)

CR1.6 If the application or utility requires it, the established tests will also verify the connection of the client application to the server.

CR1.7 Testing also ensures that the installation of the application or utility has not harmed the operation of other previously installed applications

CR1.8 Software update is performed efficiently by ensuring team integrity and availability of information

CR1.9 The incidents in the installation are documented in the formats set for that effect.

CR1.10 The relevant installation or configuration details are reflected in the team documentation, according to the procedure set, for subsequent query

CR1.11 Documentation and media for software installation are detailed and referenced in the generated documentation and are conveniently saved for later use

RP2: Assist the user by solving problems that arise in the exploitation of applications by identifying their nature and by solving the incidence in the appropriate time and with the expected quality level.

CR2.1 User assistance takes into account established interpersonal communication techniques, to identify the required performance, meeting user demands and demands and ensuring the outcome of the action.

CR2.2 The affected software components are reinstalled, updated, or configured with the appropriate parameters according to the specifications set out in the technical documentation and usage needs.

CR2.3 The technical documentation is interpreted with correction both if it is edited in Spanish, in the own language of the Autonomous Community or in the technical language of customary use.

CR2.4 The integrity of the information and the continuity in the operation are guaranteed during the resolution of the problem, taking the preventive measures of safety and activating the possible operating procedures alternatives.

CR2.5 The original information is restored and updated, following the established protocol, for the system to be back in operation.

CR2.6 The operation of the restored system is verified by performing the established tests.

CR2.7 The actions performed are documented in the formats established for this purpose to facilitate their monitoring, updating the incident repository and the technical documentation of the installation and configuration of the system.

Professional Context

Production and/or service creation media

Computers, printers, scanners, and other peripherals. Software for applications. Security and antivirus software. Upgrade software. Patches. Diagnostic software tools. Software for the detection, diagnosis and repair of errors by telematic means. Installation and upgrade software tools. Aid programmes. Software for backup and recovery. Media for backups.

Work products or results

Installed and properly configured computer packages. Operational and updated installation procedures. Assistance to users in the face of application performance problems. Elements for installation (programs, manuals, licenses) stored and controlled. Reports of stored and controlled incidents. Adaptation of the office or office application to new system configurations.

Information used or generated

Application or application software installation manuals. Application exploitation guide. Incident and historical parts of incidents. Documentation for the installation. Request for user assistance. Company rules on customer service. Legislation on data protection and intellectual property, business rules on data confidentiality, etc.

Competition Unit 4

Naming: MAKE IT EASIER FOR THE USER TO USE GENERAL PURPOSE COMPUTER PACKAGES AND SPECIFIC APPLICATIONS.

Level: 2

Code: UC0222_2

Professional realizations and realization criteria

RP1: Facilitate users to exploit the software packages through training for use.

CR1.1 Users are started in the use of new applications or versions after installation in order to ensure an effective transition.

CR1.2 The installation of an application or new version is complete with the elaboration of operating instructions.

CR1.3 Users are advised on utility handling (antivirus, compression programs, etc.)

CR1.4 Users are advised in the security policy application (backup, folder protection, shared folder usage, etc.)

RP2: Facilitate users to exploit the computing packages by working directly.

CR2.1 Document templates, spreadsheets, and presentations are performed according to the instructions received and are made available to users

CR2.2 The document templates, spreadsheets, and presentations made are known to the users and are located so that their access is easy and convenient.

CR2.3 The data import/export operations between applications are performed by ensuring their integrity.

CR2.4 The images and graphics that are needed in the production of documents are obtained by simple programming and/or image retouching programs.

CR2.5 The documents, spreadsheets and presentations made by the users are adapted, if necessary, to the corporate models.

CR2.6 The generated corporate models are encoded and archived (in digital format) for later use or query, as set out in the configuration management system to preserve historical files documentation.

Professional Context

Production and/or service creation media

Computers, printers, scanners, and other peripherals. Software for applications. Security and antivirus software. Upgrade software. Patches. Diagnostic software tools. Application template generation tools. Template creation wizards and help programs. Software for backup and recovery. Media for backups.

Work products or results

Assist users with application usage issues. User instructions for a new application or version. Reports of stored and controlled incidents. Templates and documents created according to the company's standardization manual, and documentation for users. Created and operational input/output forms, and usage documentation.

Information used or generated

Application or application software installation manuals. Application exploitation guide. Incident and historical parts of incidents. Documentation for the installation. Request for user assistance. Document normalization rules. Company rules on customer service. Legislation on data protection and intellectual property, business rules on data confidentiality, etc.

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: INSTALLING AND CONFIGURING OPERATING SYSTEMS.

Code: MF0219_2

Professional qualification level: 2

Associated with the Competition Unit:

UC0219_2 Install and configure base software on microcomputer systems.

Duration: 140 hours.

FORMATIVE UNIT 1

Naming: INSTALLING AND UPGRADING OPERATING SYSTEMS

Code: UF0852

Duration: 80 hours

Competition Reference: This training unit corresponds to RP1 and RP2.

Assessment Capabilities and Criteria

C1: Classify the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main architectures of microcomputer systems detailing the mission of each of the functional blocks that compose them.

CE1.2 Explain the concept of the operating system and identify the functions it performs in the microcomputer system.

CE1.3 Distinguished the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.

CE1.4 Classify operating systems and versions that are used in computer equipment detailing their main features and differences, according to technical specifications.

CE1.5 Identify the phases involved in the installation of the operating system by checking the computer equipment requirements to ensure the installation capability.

C2: Apply installation and configuration processes for operating systems to activate the functionality of the computer equipment, according to specifications received.

CE2.1 In practical scenarios, properly characterized, the installation of an operating system on a computer equipment for its operation:

-Check that the computer equipment meets the requirements and has the resources required for the base software installation.

-Prepare the installation's target team by formatting and creating the partitions indicated in the specifications.

-Install the operating system by following the steps in the technical documentation.

-Configure the system with the indicated parameters.

-Install the utilities indicated in the specifications.

-Verify the installation by starting and stopping tests.

-Document the work done.

CE2.2 Identify the procedures that are used to automate the installation of operating systems on computers of the same features by using cloning software tools and other unassisted installation tools.

CE2.3 In practical scenarios, properly characterized, the installation of an operating system on computer equipment with the same characteristics, according to specifications received:

-Prepare one of the computers to install the operating system and the indicated utilities.

-Install and configure the operating system by following the steps in the technical documentation.

-Install the utilities indicated in the specifications.

-Select the software tool to perform team cloning.

-Proceed to obtain the installed system images for later distribution.

-Implement, by means of disk image management tools, those obtained in multiple teams of equal characteristics to the original to enable them to activate their functional resources.

-Perform boot and stop tests to verify the installations.

-Document the work done.

CE2.4 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it as a help in the installation of the operating system.

C3: Update the operating system of a computer to include new functionality and solve security problems, based on technical specifications.

CE3.1 Identify software components of an operating system capable of readjustment to perform your upgrade, taking into account your technical specifications.

CE3.2 Identify and classify the sources for obtaining update items to perform the operating system patch and update deployment processes.

CE3.3 Describe the procedures for updating the operating system by taking into account the security and integrity of the information in the computer equipment.

CE3.4 In practical scenarios, properly characterized, perform the updating of an operating system for the incorporation of new functionalities, according to specifications received:

-Identify the components to upgrade from the operating system.

-Check software upgrade requirements.

-Update the specified components.

-Verify the processes performed and the absence of interferences with the other system components.

-Document the update processes.

Contents

1. Architectures of a microcomputer system.

-Functional schema of a computer.

-Subsystems.

-The central processing unit and its elements.

-Internal memory, types, and features.

-Input and output units.

-Storage devices, types, and features.

-Buses.

-Types.

-Features.

-Correspondence between Physical and Logical Subsystems.

2. Functions of the computer operating system.

-Basic concepts.

-Processes.

-The files.

-The system calls.

-The core of the operating system.

-The command interpreter.

-Functions.

-User interface.

-Managing resources.

-File administration.

-Administration of tasks.

-Support service.

3. Elements of a computer operating system.

-Process management.

-Memory management.

-The Input and Output system.

-File system.

-Protection system.

-Communications system.

-Order interpretation system.

-Command line.

-Graphical interface.

-System programs.

4. Current computer operating systems.

-Classification of operating systems.

-Free software.

-Features and usage.

-Differences.

-Versions and distributions.

5. Installing and configuring computer operating systems.

-Requirements for the installation. Hardware and software compatibility.

-Installation phases.

-Configuring the boot device in the BIOS.

-Formatting of disks.

-Partitioning of disks.

-Creating the file system.

-Configuring the operating system and devices.

-Installing and configuring utilities and applications.

Installation types.

-Minimum installations.

-Standard installations.

-Custom installations.

-Facilities served or unattended.

-Network installations.

-Restoring an image.

-Verification of the installation. Start and stop tests.

-Installation and configuration documentation.

6. Physical replication of partitions and hard disks.

-Backup programs.

-Cloning.

-The functionality and objectives of the replication process.

-Security and prevention in the replication process.

-Disk partitions.

-Partition types.

-Management tools.

-Image creation and deployment tools and system replicas:

-Information sources.

-Image deployment procedures and system replicas.

7. Updating the computer operating system.

-Classification of update sources.

-Automatic update.

-Support and help centers.

-Update procedures.

-Updating operating systems.

-Updating software components.

-Critical components.

-Security components.

-Drivers.

-Other components.

-Verifying the update.

-Update documentation.

FORMATIVE UNIT 2

denomination: EXPLOITATION OF THE FUNCTIONALITIES OF THE MICROCOMPUTER SYSTEM.

Code: UF0853

Duration: 60 hours

Competition Reference: This training unit corresponds to RP3

Assessment Capabilities and Criteria

C1: Use the applications that are provided by the operating systems, for the operation of the operating systems according to technical specifications.

CE1.1 Use the applications provided by the operating system describing its characteristics for the use and operation of the operating system, taking into account its technical specifications and functional needs.

CE1.2 Use the applications provided by the operating system for disk organization and file system, according to received technical specifications.

CE1.3 Use the accessibility options that current operating systems have, to set up accessible environments for people with disabilities, according to technical and functional specifications.

CE1.4 Configure workbench options using the tools and applications that the operating system provides, following specifications received and usage needs.

CE1.5 Describe the applications provided by the operating system for the operation of the functionalities of the peripherals connected to the system, according to the needs of use.

CE1.6 Classify messages and warnings provided by the microcomputer system to discriminate its importance and criticality, and apply response procedures according to given instructions.

CE1.7 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it as a help in operating the operating system.

Contents

1. Operating system utilities.

-Features and functions.

-Setting up the workbench.

-Administering and managing file systems.

-Managing processes and resources.

-Managing and editing files.

2. Disk organization and file system.

-The file system.

-FAT.

-NTFS.

-Storage logical drives.

-Structures of data.

-Folders or directories.

-Ficheros.

-File types.

-Folders and system files.

-Structure and configuration of the file explorer.

-File operations.

-Creation.

-Copy and move.

-Removing and recovering.

-Search for files.

3. Configuring accessibility options.

-Options for facilitating screen display.

-Use of narrators.

-Options to make keyboard or mouse use easier.

-Voice recognition.

-Using visual and text alternatives for people with hearing difficulties.

4. Configuration of the computer system.

-Setting up the workbench.

-Customizing the visual environment.

-Regional configuration of the team.

-Customizing basic peripherals.

-Other.

-Print administrator.

-Device Manager.

-System protection.

-Advanced system configuration

5. Using the system tools.

-Disfragmented disk.

-Security Copies.

-Free space.

-Programming of tasks.

-Restoring the system.

6. Process and resource management.

-System messages and warnings.

-System events.

-System performance.

-Task Manager.

-System log editor.

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

40

Unit 2-UF0853

60

30

Sequence:

To access the formative unit 2 must have been passed the formative unit 1.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: DEPLOYING LOCAL NETWORK ELEMENTS.

Code: MF0220_2

Professional qualification level: 2

Associated with the Competition Unit:

UC0220_2: Install, configure, and verify local network elements according to established procedures

Duration: 160 hours

FORMATIVE UNIT 1

Naming: INSTALLING AND CONFIGURING THE NODES OF A LOCAL AREA NETWORK.

Code: UF0854

Duration: 90 hours

Competition Reference: This training unit corresponds to RP1, RP3.

Assessment Capabilities and Criteria

C1: Classify the communications elements that make up a local network, to identify the components that make up the physical map.

CE1.1 Explain the topologies of a local network taking into account existing architectures and technologies.

CE1.2 List the elements that can be found on the physical map of a local network based on the scope and network infrastructures used.

CE1.3 write each of the component elements of a local network, taking into account its associated features and functionalities.

CE1.4 In a case scenario of a local network already installed to elaborate its physical and logical map according to received specifications.

CE1.5 Identify the legal and technical regulations that affect the implementation of local networks according to the procedures given.

CE1.6 Interpret the technical documentation associated with the communication elements, even if it is edited in the most frequent foreign language in the sector, using it.

C2: Apply the installation and configuration procedures for local network nodes, as well as protocol managers and other programs that support communications services.

CE2.1 List and explain the characteristics of the protocols that are configured in a local network taking into account the technology and standards used

CE2.2 Explain the node routing system that is used in the local network based on the network technologies used.

CE2.3 In a scenario of installing and configuring the nodes in a network to implement internal communications services, according to received specifications:

-Interpret the technical documentation by identifying the elements that make up the installation.

-Identify the different network sockets of the nodes and their representation in the connection cabinet.

-Select the appropriate tools to perform the installation.

-Install the network adapters along with their corresponding controllers.

-Install and configure network protocols to use according to the specifications received.

-Install and configure the various network services according to the specifications received.

-Document the activities performed.

CE2.4 Apply the specified configuration to the active elements (switches and routers), making use of specified procedures.

CE2.5 Identify the legal and technical regulations that affect the implementation of local networks according to given specifications.

C3: Set the configuration of the communication protocols parameters on the nodes in the network, for integration into the network itself, following given procedures.

CE3.1 Identify the parameters of the communications protocols to be configured, their function, and their range of allowed values.

CE3.2 Interpret the specifications of a particular communication protocol configuration, taking into account the needs of node integration in the network and the implementation of the corresponding services.

CE3.3 List the procedure to follow to apply a default configuration to a network node.

CE3.4 Configure the different communications protocols according to given technical specifications.

CE3.5 Identify the configuration parameters of the protocols with transmission and encryption security features, for integration into secure networks taking into account the security criteria given.

CE3.6 Document the processes to be performed in the configuration of the protocols on the nodes of the local network according to given specifications.

Contents

1. Local area network architecture.

-Classification of networks based on the territory they cover.

-Characteristics of a local network.

-Local area network architecture.

-Basic topologies.

-Logical and physical topology.

-Method of cable access.

-Communications protocols.

-Most used local area network architectures.

-Norms.

-Standardization committees.

-Local area network standards.

-Common Telecommunications Infrastructure.

2. Elements of a local area network.

-Features and functions

-Workstations.

-Servers.

-Network cards.

-Connectivity teams.

-Repeaters.

-Concentrators (Hubs).

-Switches (Switches).

-Enters (Routers).

-Gateways (Gateways).

-Bridges (Bridges).

-Wireless devices.

-Network operating systems.

-Transmission media.

-Copper media: Cables for braiding and coaxial.

-Optical media: Optical fiber cables.

-Wireless communications.

-The structured cabling.

-Structured cabling subsystems.

-TIA/EIA standards on structured cabling.

-UTP/STP Cable Standards.

-The physical and logical map of a local area network.

3. Protocols for a local area network.

-Introduction to the protocols.

-Open Systems Interconnection (OSI) model.

-The physical level.

-Link level protocols.

-Logical link control (LLC) protocols.

-Medium access control (MAC) protocols.

-contention protocols.

-Witness step protocols.

-Other.

-Ethernet.

-Introduction to Ethernet.

-Ethernet and the OSI model.

-MAC Routing.

-Ethernet Trama.

-Ethernet technologies.

-Other link level protocols: Token Ring, FDDI, etc.

-Network level protocols.

-Internet Protocol (IP).

-Introduction to IP

-IP address.

-Assignment of addresses.

-Routing

-Other Network Level Protocols (IPX, etc)

-Physical and logical addresses.

4. Installing and configuring the nodes in the local area network.

-The communications cabinet.

-Communications cabinet items.

-A representation in the network outlet cabinet of the nodes.

-Installing network adapters and controllers.

-Installing and configuring more common network protocols.

-Characteristic parameters.

-Configuring the TCP/IP protocol.

-TCP/IP configuration items.

-IP address.

-Subnet mask.

-Gateway.

-DNS server.

-WINS server.

-NetBIOS configuration.

-Assigning a working group.

-Other protocols configuration procedure: SPX/IPX, etc.

-Configuring security

-Identity authentication.

-Data encryption.

-Systematic configuration procedures.

-Installing and configuring network services.

-Network access services.

-File service.

-Print services.

-Post service.

-Other services.

-Procedure for applying configurations to routers and switches.

-Terminal emulation applications.

-Configuring terminal emulation applications.

-Applying configurations to routers and switches.

FORMATIVE UNIT 2

Naming: VERIFICATION AND RESOLUTION OF INCIDENTS IN A LOCAL AREA NETWORK.

Code: UF0855

Duration: 70 hours

Competition Reference: This training unit corresponds to RP2 and RP4.

Assessment Capabilities and Criteria

C1: Apply test and verification procedures for network connectivity elements and tools for these processes.

CE1.1 Explain the stages of a connectivity verification process on a local network.

CE1.2 List the tools used to verify connectivity in a local network, according to technologies implemented in local networks.

CE1.3 Explain the operational operation of network management tools to check the status of communications devices, taking into account the technical specifications of the tools.

CE1.4 In a case scenario of a local network already installed, verify the allowed and prohibited connection options, as well as access to the shared resources, following given procedures.

CE1.5 In a case scenario of a local network already installed: document the test and verification processes performed, according to technical specifications.

C2: Understand the incidents of local network communications elements, and proceed to your solution by following given specifications.

CE2.1 Describe the incidents that occur in the communications elements of the local networks, according to the communications technologies used and the elements involved with them.

CE2.2 List the procedures and tools used for incident detection of the communications elements of the local network, according to specifications of a defined contingency plan.

CE2.3 Describe the techniques and tools that are used to isolate and diagnose causes that have produced a reported incident on the network, as indicated in the contingency plan.

CE2.4 Explain the systematic incident resolution procedures of the communications elements of the local network, depending on the devices on which the incidents are detected.

CE2.5 In practical cases, properly characterized, solve simulated breakdowns within a local network, to proceed to its solution according to specifications received and following procedures given:

-Interpret the alarms generated by the incident detection system.

-Locate the element causing the incident.

-Resolve the incident by applying the preset procedures.

-Record the incident on the appropriate document.

Contents

1. Verifying and testing local area network connectivity elements.

-Verification and test tools.

-Verification and test tools for operating systems.

-TCP/IP commands.

-Getting IP Configuration.

-Realization of connection tests.

-Interpretation of responses.

-Systematic verification and test procedures for local network connectivity elements.

2. Types of incidents that can occur in a local area network.

-Link connectivity level incidents

-Network level incidents.

3. Detection and diagnosis of incidents in local area networks.

-Diagnostic tools for communications devices on local networks.

-Incident management processes in local networks.

4. Checking for twisted and coaxial pair cables.

-Cabling check tools categories.

-Parsers or cable testers.

-Features.

-Braided pair cable check procedure.

-Open circuit.

-Cortocircuit.

-Cross-threads.

-Cross-Pairs.

-Split pair.

-Detection of telephone voltages.

-Bypass.

-Ethernet port detection.

-Coaxial cable check procedure.

-Ethernet power detection procedure.

-Cable location procedures using tones.

5. Network-level incident checking and solution.

-Check tools.

-Detecting problems related to:

-Long and short ranges.

-Overtraffic.

-Netware.

-TCP/IP.

-Configuring the Host.

-Resolution of names.

-NetBIOS.

-Connection to the http or proxy server.

-Connection to the mail server.

-Connection to the print server.

-Other.

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

90

90

50

Unit 2-UF0855

70

40

Sequence:

To access the formative unit 2 must have been passed the formative unit 1.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: INSTALLING AND CONFIGURING COMPUTER APPLICATIONS.

Code: MF0221_2

Professional qualification level: 2

Associated with the Competition Unit:

UC0221_2: Install, configure, and maintain general purpose computer packages and specific applications.

Duration: 60 hours

Assessment Capabilities and Criteria

C1: Interpret information regarding the configuration of computer equipment to determine the proper installation of applications.

CE1.1 Describe the resources and components of a system that must be taken into account in the installation of an application.

CE1.2 Classify types of programs and applications according to their needs in equipment resources for optimal operation.

CE1.3 Interpret the technical documentation with correction whether it is published in Spanish, in the own language of the Autonomous Community or in the technical language of customary use.

CE1.4 In scenarios for installing applications on computer equipment:

-Identify and locate all the necessary elements for the application installation (magnetic media, keys, licenses, backpacks, procedures, and manuals)

-Interpret from the application installation documentation, the minimum and optimal requirements required based on the components that you want to install

-Determine the characteristics of the computer equipment required by the application (CPU speed, amount of memory, available disk space, specific hardware, and others) using the operating system tools

-Depending on the above conclusions, determine which type of installation can be performed, which parts cannot be installed and in which case, what modifications (hardware or software) should be performed to perform an installation optimal

-Document the activities performed and the results obtained

C2: Install, configure, and update office and office applications on a computer.

CE2.1 List the types of viruses, the way the infection is spread, and the effects they can cause on computer equipment.

CE2.2 Explain the operation of tools used for the prevention and repair of damage caused by computer viruses (antivirus).

CE2.3 Describe the basic precautions that users should take in computer security and infection prevention issues.

CE2.4 Describe the activities to be performed in the process of installing or updating an application on a computer.

CE2.5 In a properly characterized scenario of updating the available antivirus software:

-Check the antivirus version and virus patterns.

-Download the latest version of virus patterns from the Internet.

-Update the anti-virus installation/update magnetic media with the latest available pattern database.

-conveniently document the pattern database configuration data

-Document the activities performed and the results obtained.

CE2.6 In a scenario of installing or updating an antivirus program:

-Successfully install or update the antivirus program following the established procedure.

-Configure the program according to the requirements set.

-Update the antivirus version with the latest patterns available.

-Log the action taken on the team record sheet.

-Document the activities performed and the results obtained.

CE2.7 In a properly characterized scenario, in which you are asked to install or update a particular application on a computer:

-Successfully install or update the established components of the application following the procedure set by the manufacturer and/or the specifications received.

-Configure the application based on the features and resources of the computer on which it is installed.

-Customize the application to address different user preferences.

-Configure the application to take into account possible user disabilities, taking advantage of all the capabilities offered by the same application, operating system, and hardware installed for that purpose.

-Configure the directories that the application uses to facilitate access to pre-existing documentation, templates, or other relevant information.

-Check the operation of the application through systematic testing to ensure the proper functioning of the installed components and access to both the team's own resources and those shared in the network.

CE2.8 In a properly characterized scenario, in which the installation procedure does not give the expected results:

-Consult the technical documentation to identify the problem and find your solution.

-Consult the Internet (technical service pages, forums) to identify the problem and find your solution.

-Document the incident and the solution found in a format set for that purpose.

C3: Facilitate the use of computer applications through technical assistance in the face of program malfunction.

CE3.1 Describe the process of managing an incident since a warning is received until it is fully resolved.

CE3.2 List the most common type of breakdowns in a microcomputer system and associated symptoms and associate each possible solution and urgency levels in the repair.

CE3.3 Elaborate incident reports from alleged errors described by a user.

CE3.4 In a properly characterized scenario, in which a broken computer equipment and a description of the error are available:

-Play the problem on the computer.

-Clearly describe the incident associated with the equipment failure.

-Set the probable cause type (hardware, operating system, application, virus, mail, Internet access, others).

-Set the level of urgency to repair.

-Describe possible causes and solutions to the problem.

-List the items needed for repair.

-List the intended activities for the repair.

-Estimate the time required for computer equipment repair.

CE3.5 Retrieve, as far as possible, damage-damaged information.

CE3.6 Apply the established procedures for safeguarding information and recovering it after a repair.

CE3.7 On the assumption that the problem has been classified as a software failure (operating system or application):

-Identify the cause of the failure with the help of attendees, help programs, manuals, and Internet queries (FAQ, tutorials, forums)

-Identify and locate the items needed for repair (firmware, drivers, installation magnetic support, licenses, manuals, etc.) using the Internet in the event of not having them available.

-Perform the repair by following the appropriate procedures.

-Check, after the repair is complete, that the previously occurring malfunction does not occur.

-Document the activities performed and the results obtained.

CE3.8 On the assumption that the problem has been classified as an infection by a virus:

-Check that computer equipment has an antivirus program and that it is up-to-date (checking if the Internet is necessary), and if not, and if possible, install the latest version.

-Locate infected files using the antivirus program.

-Remove the virus by trying to save the most data.

-Document the activities performed and the results obtained.

Contents

1. Resources and components of a computer system.

-Operating system tools for obtaining information.

-Hardware Resources: Shared Conflicts and Resources, DMA, I/O, IRQ Channels, Memory, Forced Hardware.

-The device administrator.

-Information about devices and resources.

-Configure values and properties.

-Installing and uninstalling devices.

-Update and view device drivers.

-Printing installed device and/or system reports.

2. System requirements required by computer applications.

-Get sources.

-Hardware component requirements.

-Operating system requirements.

-Other requirements.

3. Software license types.

-Program types.

-Program types for licenses.

-Free-use applications.

-Temporary use applications.

-Developing applications (beta).

-Required license applications.

-Corporate application usage agreements.

-Licenses by code.

-Licenses using backpacks.

-Copyright and current regulations.

-Copyright.

-Patents, Brands and Industrial Property.

-The Organic Law on Data Protection and Computer Security.

-The Law of Intellectual Property.

4. Installation of computer applications.

-Components of an application.

-Format.

-Installation manual.

-User manual.

-Backup procedures.

-Installing and registering applications.

-Legal and illegal software. The law of intellectual property.

-Original software validation.

-Certificates of authenticity.

-Installing or upgrading components and applications.

-Ofimatics.

-Text processors.

-Spreadsheets.

-Slide presentation applications.

-Graphics processing applications.

-Other applications and components.

-Installing from a CD.

-Installing from the Internet.

-Using wizards in the installation.

-compressed files.

-Activating and registering applications.

-Uninstalling applications.

-Configuring more common office applications.

-Test and verification procedures for:

-Installed components.

-Access to own resources.

-Access to shared resources.

5. Software failure diagnosis and resolution.

-Methodology for troubleshooting.

-Documentation.

-Help and support on the web.

-Forums, blogs, communities, etc

-Diagnostic programs.

-Configuring system and application error reports.

-Identification of faults.

-Data and file loss.

-System stability.

-System malfunction.

-Team malfunction by changes in system or application configuration.

-malfunction of an application.

-The operating system does not start.

-Other.

-Common solution procedures.

-File and folder security copies.

-Reinstallation of drivers.

-Restoring the system and applications.

-Disabling hardware devices.

-Add or remove programs.

-Restoring the last valid configuration.

-Starting the equipment in error-proof mode.

-The recovery console.

-Backup.

-Restoring the system.

-Reinstallation of the operating system.

-Other.

6. Installing and configuring antivirus software.

-Computer viruses.

-Malicious software: Concepts and definitions.

-Evolution.

-Virus, worms, Trojans, others.

-Vulnerabilities in programs and patches.

-Types of files that can be infected.

-Spread media.

-Virus in mails, programs, and documents.

-Hiding of malicious software.

-Web pages.

-Email.

-Main memory of the computer.

-Boot sector.

-Files with macros.

-Effects and symptoms of infection.

-Computer viruses and operating systems.

-Critical operating system updates.

-Precautions to avoid infection.

-Defining antivirus software.

-Active components of the antivirus.

-Vaccine.

-Detector.

-Eliminator.

-General features of antivirus software packages.

-Anti-spyware protection.

-Protection against malicious software.

-Firewall protection.

-Protection from vulnerabilities.

-Protection from scams.

-Automatic updates.

-Backup and optimization of computer performance.

-Installing antivirus software.

-System requirements.

-Installing, configuring, and activating the software.

-Creating rescue disks.

-Uninstall.

-The main window.

-Status of the protections. Activation and deactivation.

-Types of analysis and reports.

-Automatic and manual update.

-Updating virus patterns and/or malware identifiers.

-Configuring the protections. Activation and deactivation.

-Analysis, virus removal, and data recovery.

-Updates.

-Access to services.

-Support.

-Obtaining information.

-Other options.

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Remote-

Formative Module-MF0221_2

60

30

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 4

Naming: MICROCOMPUTER APPLICATIONS.

Code: MF0222_2

Professional qualification level: 2

Associated with the Competition Unit:

UC0222_2 Facilitate the user to use general purpose computer packages and specific applications.

Duration: 200 hours

FORMATIVE UNIT 1

Naming: USER ASSISTANCE IN THE USE OF OFFICE AND OFFICE APPLICATIONS

Code: UF0856

Duration: 40 hours

Competition Reference: This training unit corresponds to RP1.

Assessment Capabilities and Criteria

C1: Facilitate the use of computer applications by assisting the user during the utilization period.

CE1.1 Apply appropriate personal communication techniques to achieve good communication with the user.

CE1.2 work a visual guide with the basic concepts of using an application, which describes basic procedures and precautions.

CE1.3 In different scenarios of simulated assistance to the user properly characterized:

-Properly interpret the user's need for explanations of the user.

-Define the intervention procedure.

-Develop the appropriate textual or visual guide to the problem posed.

-Add the user to the solution application.

C2: Manage e-mail and electronic calendar using office applications.

CE2.1 Describe the elements that make up an email.

CE2.2 List and describe the basic needs for managing pens and electronic agendas.

CE2.3 List the similarities and differences between email, Internet e-mail, and news forums "news".

CE2.4 Connect and synchronize calendars on computer computers with calendars on "palm"-type portable devices.

CE2.5 In a practical scenario of managing the address book:

-Import and export contacts.

-Organize contacts in folders and create distribution lists

-Dispose the address book to other programs for letter submission or label creation.

-Insert new contacts remove or modify existing ones

CE2.6 In an email management scenario:

-Import and export mail from/to other tools or other versions of the mail program.

-Create mail templates and corporate signatures.

-Organize mail into folders by following the criteria that are indicated.

-Perform old mail safeguards, recovery, and removal.

-Configure the application for automatic redirection of mail, avoid spam spam and other application functions

CE2.7 In an agenda management scenario:

-Include entries in the calendar.

-Organize meetings.

-Include tasks.

-Include warnings.

CE2.8 In a practical case, subscribe to news forums, synchronize the mails and participate in it to check its operation.

Contents

1. Communication techniques in user assistance.

-Communication types.

-Effects of communication.

-Obstacles or barriers to communication.

-Communication in the enterprise.

-Oral communication forms.

-Precision and clarity in language.

-User assistance.

-Training to users.

-Advice on handling utilities and applications.

-Security policies.

-Using technical support and its procedures.

-Making textual or visual guides for users.

-Software license types.

-Program Types

-Program types for licenses.

-Free-use applications.

-Temporary use applications.

-Developing applications (beta).

-Required license applications.

-Corporate application usage agreements.

-Licenses by code.

-Licenses using backpacks.

-Copyright and current regulations.

-Copyright.

-Patents, Brands and Industrial Property.

-The Organic Law on Data Protection and Computer Security.

-The Law of Intellectual Property.

2. Managing email and calendar.

-Definitions and terms.

-Operation.

-The format of an email.

-Header.

-Body of message

-Attachments.

-Configuring mail accounts.

-Email managers.

-Windows.

-Writing and sending a message.

-Sender.

-Recipient (A:, CC:, CCC)

-Subject.

-Message text.

-Attachments.

-Reading the mail.

-Mail response.

-Organization of messages.

-Mail printing.

-Address book.

-Filtering of messages.

-Web Mail.

-Templates and corporate signatures.

-Managing the address book.

-Import.

-Export.

-Add contacts.

-Create distribution lists.

-Make the list available for other office applications.

-Mail management.

-Organization of folders.

-Import.

-Export.

-Clear old messages by saving backups.

-Configuring the incoming mail.

-Protection of spam "spam".

-Core components of an e-mail management application and electronic calendars.

-News forums "news":

-Configuration.

-Usage.

-Message synchronization.

-Calendar programs in sync with "palm"-type portable devices.

-Installation.

-Usage.

-Synchronization.

-Managing the calendar.

-Dating.

-Calendar.

-Notices.

-Tasks.

-Notes.

-Organize meetings.

-Availability of the wizard.

3. Installing mail encryption programs.

-Download and install.

-Generating public and private keys.

-Key management.

-Configuration.

-Distribution and obtaining keys.

-Send encrypted/signed mails.

4. Obtaining electronic signature certificates.

-Concepts about communications security.

-Electronic certificates.

-Electronic signature.

-Certification service provider.

-Getting a certificate from a physical person.

-The certificate and email.

FORMATIVE UNIT 2

Naming: CRAFTING TEXT DOCUMENTS.

Code: UF0857

Duration: 50 hours

Competition Reference: This training unit corresponds to the RP2 as referred to in word processors.

Assessment Capabilities and Criteria

C1: Develop documents using word processor office applications.

CE1.1 Describe the fundamental characteristics of a document that can be performed by a word processor.

CE1.2 Describe how you can produce different documents: letters, trades, certificates, complaints, fax, minutes, calls, and other documents.

CE1.3 Explain the fundamental features that word processors provide for commenting and reviewing documents by many people.

CE1.4 Organize folders and computer documents so that they have convenient and effective access from the word processor.

CE1.5 Perform document localization, recovery, naming, and recording operations from a word processor.

CE1.6 Embed items from other applications (tables, charts, chunks of text) into the document.

CE1.7 Import documents from other word processors or earlier versions using the application tools.

CE1.8 Print documents from the word processor, using all the application and printer capabilities.

CE1.9 Develop templates, using the features provided by the word processor. Elaborate envelopes and labels by combining templates with fields in a database.

CE1.10 Develop simple macros and make them available to other users.

CE1.11 In a practical scenario, prepare a document from several files corresponding to parts of it, homogenizing the formats and using master documents and subdocuments.

Contents

1. Program of treatment of texts.

-Input and output of the program.

-Description of the Text Processor Interface.

-Document window.

-Status bar.

-Text treatment application help.

-Standard Toolbar.

-Using abbreviated key methods.

-Operations with document text.

-Generalities.

-Insert Text Mode.

-Overwrite mode.

-Deleted a character.

-Cursor offset.

-Different ways to select text.

-Copy and paste options.

-Search and replace text.

-Use and particularities of the clipboard.

-Inserting special characters.

-Insert date and time.

-Undo and redo the latest changes.

-Operations with application files.

-Creating a new document.

-Opening an existing document.

-Save changes to a document.

-Duplicate a document.

-Close a document.

-Compatibility of documents from different versions and applications.

-Handling the Window Menu. Handling multiple documents.

-Correcting the text.

-Choice of Sources.

-Type, style, size, color, underscore, and source effects.

-Spacing between characters.

-Shift to lowercase.

-Paragraph Handling.

-Alignment of paragraphs.

-Using different types of bloody.

-Paragraph and line spacing.

-Inserting Borders and Shading.

-Paragraph and text borders.

-Paragraph and text Sombreate.

-Inserting of Numbering and Bullets.

-Bullets.

-Lists numbered.

-Outline numbered.

-Handling of Tabulations.

-Tab types.

-Handling tab stops from the tab dialog box.

-Using the rule to set and modify tabs.

-Configuring and viewing pages.

-Page Setup.

-Margins.

-Page Orientation

-Paper size.

-Page layout.

-Using the rule to change margins.

-Viewing the document.

-Inserting headers and footers.

-Page numbering.

-Creating page borders.

-Inserting page and page breaks

-Inserting of newspaper columns.

-Inserting footnotes and endnotes.

-Creating tables.

-Inserting or creating tables in a document

-Edit and move within a table.

-Selection of cells, rows, columns, table.

-Modifying the size of rows and columns.

-Modifying cell margins

-Format application to a table.

-Changing the structure of a table.

-Correction of texts.

-Language selection.

-Correction of texts.

-Grammatical correction.

-Employment of spelling and grammar options.

-Using the custom dictionary.

-AutoCorrect.

-Choosing synonyms.

-Handling the Translator.

-Creating Macros.

-Macro recorder.

-Using macros.

-Printing documents.

-Print.

-Printer configuration.

2. Creating envelopes, labels, and model documents.

-Creating the model document for bulk shipping: letters, envelopes, tags, or email messages.

-Selecting recipients by creating or using data files.

-Creating envelopes and labels, configuration options.

-Mail merge: output to document, printer, or email.

3. Inserting images.

-From a file.

-Employing predesigned images.

-Using the clipboard.

-Fit images with text.

-Improves images.

-Insertion and operations with elaborate Formas.

4. Creating styles and managing templates.

-Standard styles.

-Assigning, creating, modifying, and deleting styles.

-Handling Templates and wizards.

-Using templates and wizards from the new file menu.

-Creating, saving, and modifying document templates.

5. Working with documents.

-Working with long documents

-Creating table of contents and indexes.

-Realization of cross-references.

-Garment of numbered titles.

-Making master documents and subdocuments.

-Merge documents.

-With spreadsheets.

-With databases.

-With charts.

-With presentations.

-Review documents and work with shared documents.

-Version management, change control, and revisions.

-Inserting comments.

-Comparison of documents.

-Protection of all or part of a document.

FORMATIVE UNIT 3

Naming: DRAWING SPREADSHEETS.

Code: UF0858

Duration: 50 hours

Competition Reference: This training unit corresponds to RP2 as referred to spreadsheets.

Assessment Capabilities and Criteria

C1: Develop documents using spreadsheet office applications.

CE1.1 Explain the basic concepts of a function: input, function, output

CE1.2 Organize folders and computer documents so that they have convenient and effective access from the spreadsheet.

CE1.3 Perform document localization, recovery, naming, and recording operations from a spreadsheet.

CE1.4 In different scenarios for crafting and editing documents using the features provided by a spreadsheet:

-Incorporate data in its different formats.

-Perform calculations with the data using formulas.

-Give the appropriate format for the correct presentation of the data.

-Verify the validity of data by parallel calculations.

-Resolve circular reference problems, divisions by zero, and others with the utilities provided by the application.

-Use references to other sheets in the document and to sheets of other documents.

-Incorporate elements of other applications (tables, charts, chunks of text) into the document.

-Include charts and maps of different types with spreadsheet data using the application wizards.

CE1.5 In different scenarios, use filters, schemas, and cell quiesce operations to properly present the data.

CE1.6 Import documents from other programs or earlier versions using the application tools.

CE1.7 Print documents from the spreadsheet, using all the application and printer capabilities.

CE1.8 Create user functions and simple macros and make them available to other users.

CE1.9 Develop templates by following the instructions received, with special emphasis on cell protection and clear presentation for a user to use them comfortably and without the possibility of error.

Contents

1. Spreadsheet application.

-Installing and starting the application.

-Configuring the application.

-Input and output of the program.

-Description of the spreadsheet interface.

-Spreadsheet application help.

-Display options.

-Using abbreviated key methods.

-Offset by the spreadsheet.

-Using keyboard and mouse.

-Large offsets.

-Offset bars.

-Introduction of data in the spreadsheet.

-Data types.

-Numeric.

-Alphanumeric.

-Date/Time.

-Formulas.

-Functions.

-Editing and modifying the spreadsheet.

-Selecting the spreadsheet.

-Ranges.

-Columns.

-Rows.

-Sheets

-Modification of data.

-Editing the contents of a cell.

-Deleted the contents of a cell or range of cells.

-Using the spell checker.

-Using search and replacement utilities.

-Insertion and removal.

-Cells.

-Rows.

-Columns.

-Spreadsheets.

-Coping or relocating:

-Cells or cell ranges.

-Spreadsheets.

-Quiescing and protecting cells.

-Storage and retrieval of a book.

-Creating a new book.

-Opening an existing book.

-Save changes to a book.

-Creating a duplicate of a book.

-Close a book.

-Range operations.

-Quick fill of a range.

-Multiple range selection (multiple range, three-dimensional range).

-Allocation of Range Names.

-Modifying the appearance of a spreadsheet

-Cell Format

-Number.

-Alignment.

-Source.

-Borders.

-Fill.

-Protection.

-Width and height of columns and rows

-Hide and display columns, rows, or spreadsheets.

-Format of the spreadsheet.

-Size and combination of cells.

-Colors and textures.

-Separation line types.

-Changing the name of a spreadsheet.

-Conditional formats.

-Autoformats or predefined styles.

-Handling Formulas.

-Operators and priority.

-Writing formulas.

-Copy of formulas.

-Relative, absolute, and mixed references.

-External references and links

-Troubleshooting the formulas

-Types of errors.

-Help tools in error resolution.

-Using Functions.

-Job of Predefined Mathematical Functions.

-Handling rules to use the predefined functions.

-Using the most common functions.

-Using the function wizard.

-Generating user functions.

-Using error tracing functions.

-Import from other applications.

-Databases.

-Presentations.

-Text documents.

2. Inserting charts and other elements.

-Elements of a chart.

-Creating a chart.

-Modifying a chart.

-Deleted from a chart.

-Inserting other elements within a spreadsheet

-Inserting images.

-Inserting predefined shapes.

-Creating artistic text.

-Inserting other elements.

-Using Templates and Macros.

-Creating and using templates.

-Creating and recording macros.

-Using macros.

3. Printing spreadsheets.

-Selection of Print Zones.

-Selection of print specifications.

-Page Setup.

-Margins.

-Orientation.

-Headers and footers and page numbering.

-Preview.

-Print Formas.

-Printer configuration.

4. Work with data.

-Data Validations.

-Realization of Schemas.

-Creating tables or data lists.

-Data list sorting, by one or more fields.

-Using Filters.

-Calculation of Subtotals.

5. Review and work with shared books

-Version management, change control, and reviews

-Inserting comments.

-Protecting a spreadsheet.

-Protection of a book.

-Creating and using Shared Books.

FORMATIVE UNIT 4

Naming: MAKING PRESENTATIONS.

Code: UF0859

Duration: 30 hours

Competition referent: This training unit corresponds to RP2 as referred to presentations.

Assessment Capabilities and Criteria

C1: Develop documents by using application office applications.

CE1.1 Explain the parts of a slide and the factors to be taken into account to achieve the correct transmission of the information in a presentation.

CE1.2 Organize folders and computer presentations so that they have convenient and effective access from the application.

CE1.3 Perform localization, recovery, naming, and recording operations from the application.

CE1.4 Develop presentation templates using the features provided by the application.

CE1.5 In different scenarios of crafting and editing presentations using the features provided by the application:

-Use the template that is set.

-Locate in the available catalog the figures that are best suited to what is required.

-Set the distribution of tables (texts, figures, tables and others) on the slides according to what is required, using

-different colors, textures, effects, and other features provided by the application

-Incorporate elements from other office applications

-Using the different slide transition techniques provided by the application

-Use editing operations that allow the application to copy, move site, and modify the dispositive.

CE1.6 Check, in a practical scenario, the features of the application related to inclusion of comments and tests.

CE1.7 Print presentations from the application, on paper or transparencies, using all the capabilities of the application and the printer.

CE1.8 Successfully connect the computer to the projection computer to start a presentation.

Contents

1. Design, organization, and file of presentations.

-The corporate image of a company.

-Importance

-Respect for organization style rules

-Design of presentations

-Clarity in the information.

-Persuasion in the transmission of the idea

-Evaluating the results.

-Organization and file of presentations.

-Confidentiality of information.

-Delivery of the work done.

2. Application of presentations.

-Running the application for presentations.

-Application output for presentations.

-Creating a presentation.

-Recording a presentation.

-Close a presentation.

-Opening a presentation.

-Structure of the screen.

-Description of the application views.

-Normal.

-Slide Sorter.

-Schema.

-Actions with slides.

-Insert new slide.

-Removing slides.

-Slide mirroring

-Slide sorting.

-Work with objects.

-Selecting objects.

-Displacement of objects.

-Removing objects.

-Modifying the size of the objects.

-Duplicate objects.

-Relocation of objects.

-Alignment and distribution of objects within the slide.

-Work with texts.

-Inserting text (from the slide, from the outline of the presentation)

-Modifying the text format.

-Selecting paragraph formats.

-Alignment.

-Lists numbered.

-Bullets.

-Styles.

-Managing Tables.

-Creating tables.

-Operations with rows and columns.

-Horizontal and vertical alignment of cells.

-Realization of Drawings.

-Lines.

-Rectangules and squares.

-Circles and ellipses.

-Autoshapes.

-Shadows and 3D.

-Rules and guides.

-Using pre-designed and inserted images.

-Creating charts

-Creating organizational charts and different chart styles.

-Creating Artistic Text.

-Inserting sounds and movies.

-Using Object Format.

-Fill

-Lines

-Shadow or 3D effects

-Presentation documentation.

-Inserting comments

-Preparing the Speaker Notes

-Selection of Designs or Presentation Styles.

-Using style templates.

-Combination of Colors.

-Creating slide funds.

-Patterns Employment.

3. Printing and presentation of slides.

-Printing and presenting slides on different media.

-Configuring the page.

-Headers, feet, and numbering.

-Configuring the different print formats.

-Selecting print options.

-Slide show taking into account place and infrastructure.

-Animation of items.

-Slide transition.

-Selection of time intervals.

-Configuring the presentation.

-Presentation with speaker

-Presentation on display

-Custom Presentations

-Connecting to a projector and configuration

-Presentation Essay

-Projection of the presentation.

FORMATIVE UNIT 5

Naming: CRAFTING AND MODIFYING IMAGES OR OTHER GRAPHIC ELEMENTS.

Code: UF0860

Duration: 30 hours

Competition Reference: This training unit corresponds to RP2 in terms of images and graphics.

Assessment Capabilities and Criteria

C1: Elaborate graphics by using office-making or image-retouched applications.

CE1.1 Describe the forms of graph representation (bitmaps, vectorials) and the most common formats.

CE1.2 Explain the concept of resolution in graphics, compression shapes, and possible quality losses.

CE1.3 Explain the basic concepts needed to obtain digital camera photos.

CE1.4 Explain the concepts of contrast, brightness, gamma, and filters associated with images.

CE1.5 Organize a content chart catalog that allows quick and effective access to images, graphics, and photos included in it.

CE1.6 Get images using digital photo cameras, scanners, Internet or other media, and incorporate them into the catalog.

CE1.7 Use the tools available to change the format of images and modify their resolution to adapt their size to particular uses, thus optimizing the optimal size/quality ratio.

CE1.8 In different scenarios, elaborate charts as specified, making use of all the features provided by the drawing application.

CE1.9 In different scenarios, retouching photographs as specified, making use of all the features provided by the photo editing application.

Contents

1. Obtaining images

-Description of the digital image.

-Forms of image and image representation.

-Bitmaps.

-Vectorial.

-Advantages and drawbacks of each type.

-Formats used for charting. Usage.

-Resolution and graphics quality.

-Formats tablets. Quality losses in compression.

-Color models.

-Scales and color ranges.

-RGB color model.

-CMYK color model.

-Other models.

-Scanning technique.

-Digital cameras.

-Components of a digital camera.

-Common controls.

-A digital camera status LCD.

-Installing stacks and memories.

-Initial configuration.

-Installing the digital camera software.

-Getting photos and video clips.

-Basic photo collection concepts.

-The focus.

-Optical and digital zoom.

-The flash.

-Modifying the image quality.

-Capture modes.

-Adjustments to blanks.

-ISO speed.

-saturation and sharpness adjustments.

-Other resources.

-Save images obtained to the computer system.

-Impression of images.

-Managing image catalogs.

-Creating catalogs

-Organization of the catalog

-Usage of the catalog.

-Incorporation of images to the catalog.

2. Using the Graphics Processing Applications.

-Description of the Graphical User Interface.

-Using the Tools to draw.

-Lines: straight, curved, broken.

-Geometric figures.

-Text.

-Realization of Transformations.

-Size of the objects.

-Giros.

-Join and unjoin objects.

-Connection and alignment between figures

-Pools and other operations.

-Choosing colors and textures.

-Using the Libreries of Figures.

-Importing and exporting images to different formats.

3. Using Photo Replay Applications.

-Description of the Graphical User Interface.

-Using tools to select and edit.

-Using transformation tools.

-Using color tools.

-Using paint tools.

-Using Filters.

-Using photo bookshops.

-Importing and exporting images to different formats.

Methodological guidelines

Distance training:

Training Units

40

Total duration in hours of the training units

N.

30

30

Unit 2-UF0857

50

40

50

40

30

30

20

Training Unit 5-UF0860

30

20

Sequence:

For access to the Formative Units 3, 4, and 5 it is recommended that you have exceeded the Formative Units 1 and 2.

The last three training units in the module can be programmed independently.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

NON-LABOUR PROFESSIONAL PRACTICE MODULES FOR MICROCOMPUTER SYSTEMS.

Code: MP0177

Duration: 40 hours

Assessment Capabilities and Criteria

C1: Install and configure the base software according to the protocols and procedures established in the enterprise.

CE1.1 Identify the phases involved in the operating system installation by checking the computer equipment requirements.

CE1.2 Perform the installation, configuration and/or upgrade of the operating system, as well as the utilities, according to the specifications received and the client's needs.

CE1.3 Verify the operation of the computer after the installation is performed.

CE1.4 Use the applications that provide the operating systems for the operation of the same.

CE1.5 Document the work done according to the company's procedures.

C2: Participate, in accordance with the instructions received, in the installation, configuration, commissioning, and maintenance of a local area network in accordance with the procedures established in the company.

CE2.1 Interpret the technical documentation associated with the communication elements.

CE2.2 Install and configure local network nodes, as well as protocol managers and other programs that support communications services according to established procedures.

CE2.3 Apply the test and verification procedures for network connectivity elements using the necessary hardware and software tools.

CE2.4 Participate in troubleshooting on the local network, using the tools and procedures established by the company.

CE2.5 Document the work done according to business requirements and procedures.

C3: Install, configure, and maintain general purpose computer packages and specific applications, according to the instructions received.

CE3.1 Install, configure, and update office and office applications on a computer in accordance with company specifications and taking into account the user position characteristics.

CE3.2 Solve the problems of application exploitation in the face of a malfunction of the equipment, in accordance with the established procedures and carrying out the safeguard of information and the recovery of the same, in the extent of the possible.

C4: Facilitate and assist the user in the use of office and office applications.

CE4.1 Develop visual guides with the basic concepts of using office and office applications.

CE4.2 Add users to the management of the office applications with which they work, solving their doubts or through the direct elaboration of works.

C5: Participate in the company's work process, following the rules and instructions set out in the job center.

CE5.1 Behave responsibly in both human relationships and the jobs to be performed.

CE5.2 Respect the procedures and rules of the work center.

CE5.3 Diligently undertake the tasks according to the instructions received by trying to bring them into line with the company's work rate.

CE5.4 Integrate into the production processes of the job center.

CE5.5 Use the established communication channels.

CE5.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Installation, configuration and maintenance of microcomputer systems according to company procedures.

-Installing and configuring the base software.

-Participation in the installation and configuration of local area networks.

-Collaboration in installing, configuring, maintaining, and assisting the user of software packages according to business procedures.

2. Integration and communication in the workplace

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the communication channels established in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

*Professional experience required in the scope of the Competition

If you have accreditation

If you do not have accreditation

MF0219_2: Installing and configuring systems

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomat, Technical Engineer, Technical Architect, or corresponding degree of degree or other equivalent qualifications.

• Higher technician of the professional computer and communications family.

• Level 3 certificates of professionalism of the Professional Systems and Telematics Area

1 year

3 years

MF0220_2: Deployment of local network elements.

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect, or corresponding degree or degree title other equivalent titles.

• Higher Technician of the IT professional family and communications.

• Professional area level 3 professionalism certificates

1 year

3 years

MF0221_2: Installing and configuring computer applications.

• Licensed, Engineer, Architect, or degree title or other equivalent titles.

• Diplomat, Technical Engineer, Technical architect or corresponding degree or other equivalent titles.

• Senior technician in the professional computer and communications family.

• Certificates of Systems and telematics professional area level 3 professionalism

1 year

3 years

MF0222_2: Microcomputer Applications.

• Licensed, Engineer, Architect or corresponding degree title or other equivalent titles.

• Diplomat, Technical Engineer, Technical Architect or corresponding degree of degree or other equivalent titles.

• Professional area level 3 certificates from the professional area of systems and telematics

1 year

3 years

* For the last three years.

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forming Space

Surface m²

15 pupils

25

60

60

75

Forming Space

M1

M2

M3

Classroom

X

X

X

X

Forming Space

Classroom

-Network-installed PCs and Internet connection.

-Wiring Armarium with patched panels and network-attached devices.

-Software base and network.

-Office software, Internet tools, and programs

-Security and antivirus software.

-Software for backups and recovery.

-Software for detection, diagnosis and repair.

-Software for connectivity testing.

-Local network element inventory control software.

-Printer and peripherals.

-Digital Camera.

-Network Analizers.

-Cabling certificates.

-Projection Canon.

-Rotafolios.

- Board.

-Classroom material.

-Table and chair for the trainer.

-Messes and chairs for students.

-Auxiliary furniture for classroom equipment

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training space equipment will be sufficient for a minimum of 15 students and must be increased, if applicable, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX II

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Denomination: Installation and Repair of Microcomputer Systems.

Code: IFCT0309

Professional Family: Informatics and Communications.

Professional Area: Systems and telematics.

Professional qualification level: 2

Professional reference qualification:

IFC298_2 Assembly and Repair of Microcomputer Systems (Royal Decree 1201/2007 of 14 September).

Relationship of competency units that configure the certificate of professionalism:

UC0953_2: Mount microcomputer equipment.

UC0219_2: Install and configure base software on microcomputer systems.

UC0954_2: Repair and expand microcomputer equipment.

General Competition

Mount, repair and expand, equipment and components that form a microcomputer system, verify the absence of interferences between them and ensure their operation, reacting to hardware and software breakdowns detected and applying corrective procedures.

Professional Environment:

Professional scope:

Develops its professional activity on its own, as well as for others in companies or public or private entities of any size, which have computer equipment for their management, and in companies or departments of computer.

Productive Sectors:

It is located mainly in the services sector, and mainly in the following types of companies: companies engaged in the marketing, assembly and repair of equipment and microcomputer services; companies that provide services Technical assistance microinformatics; telecentres networks; in the various public administrations, as part of the organization's IT support.

Relevant Occupations and Jobs:

3812.1023 Technician on Microcomputer Systems.

Microcomputer Equipment Installer.

Microcomputer Equipment Repairer.

Microcomputer System Peripheral Repairer.

Duration of the associated training: 510 hours

Relationship of training modules and training units.

MF0953_2: Microcomputer equipment assembly. (150 hours)

• UF0861: Assembly and component verification. (90 hours)

• UF0862: Installing and configuring microcomputer peripherals. (60 hours)

MF0219_2: (Cross) Installation and configuration of operating systems. (140 hours)

• UF0852: Installing and updating operating systems. (80 hours)

• UF0853: Exploitation of the functionalities of the microcomputer system. (60 hours)

MF0954_2: Microcomputer equipment repair. (180 hours)

• UF0863: Repair and extension of hardware and microcomputer hardware components. (80 hours)

• UF0864: Resolution of logical breakdowns in microcomputer equipment. (30 hours)

• UF0865: Printer repair. (70 hours)

MP0179: Non-work professional practice module for the installation and repair of Microcomputer Systems. (40 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: MOUNTING MICROCOMPUTER EQUIPMENT.

Level: 2

Code: UC0953_2

Professional realizations and realization criteria

RP1: Mount the hardware components that make up a microcomputer team according to established specifications, according to needs for use and in security conditions.

CR1.1 The mount specifications received are interpreted, in order to identify the components to be assembled.

CR1.2 The capabilities and features of the hardware components are identified for inclusion in the microcomputer equipment assembly.

CR1.3 The reception of equipment and components is done through the procedures of documentation, labeling, recording, storage and handling, ensuring their locations in environmental and safety conditions. appropriate according to the established rules.

CR1.4 The components are assembled using appropriate tools and tools, ensuring connections between them and verifying the attachment, following the procedures established by the organization, the recommendations of the manufacturer's installation, and the measures and elements for the prevention of occupational risks.

CR1.5 Components are assembled, treating packaging, waste and disposable components according to existing environmental regulations, thus ensuring safety and hygiene at work.

CR1.6 The identification and labeling of each of the components that make up the assembled equipment, and the entire set, is performed by making use of the established external and internal documentation systems.

CR1.7 The result of the assembly and assembly procedures of the equipment, as well as the detected incidents, are documented, for later use, following internal models established by the organization.

CR1.8 The specific technical documentation associated with the hardware components is interpreted, if any, in the most frequent foreign language in the sector.

RP2: Verify the assembly of components, to ensure the functionality of the microcomputer system, following the specifications set and according to security conditions.

CR2.1 The process of verification of the assembled components is carried out in accordance with the guidelines established by the organization, standard standards and legal regulations in both electrotechnical and safety and prevention of occupational risks.

CR2.2 The operating system is implanted according to the specifications received, to verify that the components that use drivers are recognized and do not cause conflicts.

CR2.3 The integration of the assembled components into the computer equipment is performed in the BIOS (Basic Input-Output System) to obtain the maximum performance of the equipment, according to the procedure set.

CR2.4 Team assembly verification to ensure that components are recognized and enabled by checking the POST (Power-On Self Test, Automatic Power Test) and operating system messages according to technical specifications and following the established procedure.

CR2.5 The components settings, both firmware and hardware, are set to ensure the operation of the equipment, according to the specifications received.

CR2.6 Equipment stability and safety tests are performed to verify their functionality by following the recommendations of the manufacturers, their own company, industrial standards and current regulations.

CR2.7 The measurement software is used to perform performance tests and evaluate and compare the characteristics of the equipment, according to established procedures.

CR2.8 The work performed as well as the incidents detected during the verification are documented for later use, following internal models established by the organization deriving the incidents to the service corresponding.

RP3: Install and configure microcomputer equipment peripherals, for operation, according to established specifications, according to the needs of use and under security conditions.

CR3.1 The reception and verification of the peripheral devices, their storage and handling, are carried out in the appropriate environmental and safety conditions, following the established procedure.

CR3.2 The peripheral devices, device drivers, and wiring wiring to be installed are verified, to ensure compatibility and agreement with the specifications received, following procedures set.

CR3.3 The peripheral devices are installed using the specific tools, ensuring: their connection with the computer equipment, electrical supply, stability, ergonomics and labeling, and applying safety criteria, quality and efficiency, according to established procedures.

CR3.4 The configuration of each peripheral for operation is performed by following the instructions in the associated technical documentation and installation specifications.

CR3.5 The device drivers and software utilities associated with the peripheral, if necessary, are installed and configured to ensure their operation as a component of the system, following specifications techniques.

CR3.6 Comprehensive tests to verify the operation of installed peripherals are performed according to established procedures.

CR3.7 The jobs performed, as well as the incidents detected during installation and configuration are documented, for later use, following internal models set by the organization.

CR3.8 The specific technical documentation associated with peripherals is interpreted, where appropriate, in the most frequent foreign language in the sector.

Professional Context

Production media

Protective elements (insulating shoes, goggles, gloves, static discharge, among others). Elements of protection and personal security. Equipment protection elements. Tools and tools for common use in electrical/electronic maintenance. Specific measurement and diagnostic tools for assembly. Computer components: chassis, plates, power supplies, cards, media and memory, among others. Peripherals: monitors, printers, scanners, reader and backup tapes, among others. Interconnection elements. Seats with special equipment for assembly. Computer equipment. Installation and diagnostic software. Operating systems installed on removable media ready for execution. Documentation software tools. Cloning tools.

Products and results

Computer equipment assembled, installed and verified according to the specifications received. Reliable equipment that complies with current regulations. Documented equipment. Equipment with possibilities of modification and enlargement. Recording and storing the items used for mounting.

Information used or generated

Albaranes and equipment reception documentation. Calibration documentation for measuring equipment. Rules on guarantees (coverages as per cases). Testing and control of samples according to sampling rules. Specifications for the assembly of computer equipment and peripheral devices. Rules on the labelling and serialisation of components. Installation manuals and technical information of the equipment and/or components. Base software manuals. Specific software manuals. Product catalogues, suppliers, prices. Manufacturer's assembly recommendations. Manufacturer's technical support. Parts of work. Incident and historical parts of mount incidents. Technical and performance documentation of the equipment. Installation and commissioning guide for the equipment. Safety and hygiene regulations. National electrotechnical regulations. International standards and standards (ISO, EIA, IEEE, among others). Internal regulations of the organization. Standards for the protection against electrostatic discharges (ESD). Performance reports. Reports of mounting incidents, cataloged and controlled. Mounting documentation (processes, schemas, component memory, among others) cataloged, stored, and controlled. Documentation of the installation and commissioning of the equipment for the clients.

Competition Unit 2

Naming: INSTALL AND CONFIGURE THE BASE SOFTWARE ON MICROCOMPUTER SYSTEMS.

Level: 2

Code: UC0219_2

Professional realizations and realization criteria

RP1: Perform operating system installation processes for use on microcomputer systems, following specifications received.

CR1.1 The characteristics of the operating systems are classified, to decide the version to install and the type of installation, depending on the technical specifications received.

CR1.2 Operating system installation requirements are checked, to verify that there is sufficient resources and compatibility on the installation's target computer, following the procedure set.

CR1.3 The installation target team prepares to locate the operating system, enabling the infrastructure on mass storage devices, according to the technical specifications received.

CR1.4 The operating system is installed by applying the processes indicated in the installation manuals that accompany it, to obtain a computer equipment in a functional state, following the established procedure.

CR1.5 The operating system is configured for operation, within the specified parameters, following the established procedures and indicated in the technical documentation.

CR1.6 The utilities included in the operating system are installed for use, according to the technical specifications received.

CR1.7 Installation verification is performed to check the functionality of the operating system, by starting and stopping testing, and performance analysis, following established procedures.

CR1.8 The documentation of the performed processes is made and archived for later use, following the internal models set by the organization.

CR1.9 The associated specific technical documentation is interpreted, if any, in the most frequently used foreign language in the sector.

RP2: Update the operating system to ensure its operation, following technical specifications received and organization procedures.

CR2.1 Base software versions, system add-ons, and device drivers are checked to ensure their suitability, following the established procedure.

CR2.2 The outdated versions of the base software, system add-ons and device drivers are identified to proceed to update and ensure their functionality, following technical specifications and established procedures.

CR2.3 Add-ons and "patches" for the operation of the base software are installed and configured, indicating the system administrator to maintain security on the system, according to the established procedures.

CR2.4 Update verification is performed, to test the functionality of the operating system by starting and stopping tests, and performance analysis, according to established procedures.

CR2.5 The documentation of the performed processes is made and archived for later use, according to the rules set by the organization.

RP3: Explain microcomputer system functionality by using base software and standard applications, taking into account usage needs.

CR3.1 The functions and applications provided by the base software are identified for use, according to the instructions in the technical documentation and usage needs.

CR3.2 File system operations are performed using the interface provided by the operating system, following technical specifications and according to usage needs.

CR3.3 The configuration tools provided by the operating system are run to select options from the workbench, according to specifications received and usage needs.

CR3.4 Application execution processes are performed, to exploit the functions of each of them according to operational and functional needs.

CR3.5 The messages provided by the base software are interpreted, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications given by the organization.

CR3.6 The procedures for the use and management of the peripherals connected to the microcomputer system, by the users, are performed to exploit their functionalities, following the technical documentation and procedures stipulated by the organization.

Professional Context

Production media

Computer equipment. Peripherals. Operating systems. Utilities and applications built into operating systems. Update versions of operating systems. Technical documentation associated with the operating systems. Free software.

Products and results

Computer equipment with installed and configured operating systems. Operating systems configured and operating. Logically organized computer equipment. Updated operating systems.

Information used or generated

Manuals and technical documentation of operating systems. Operating system upgrade manuals. Manuals for applications included in the operating system. Operating system installation, configuration, and upgrade reports. Safety and quality plan of the organization. Operating system installation, configuration, and upgrade reports.

Competition Unit 3

Naming: REPAIR AND EXTEND MICROCOMPUTER EQUIPMENT.

Level: 2

Code: UC0954_2

Professional realizations and realization criteria

RP1: Detect breakdowns in microcomputer equipment and proceed to solution, repair or replace the hardware components that are damaged, following the procedures established by the organization.

CR1.1 The cause of the abnormal behavior is established by performing initial functional tests to verify the symptoms listed in the breakdown part and to specify the characteristics of the breakdown, establishing the the physical or logical nature of the problem by assessing the possibility of repair or replacement, depending on the economic costs of the problem in such a way as to facilitate the subsequent documentation and economic management of the action.

CR1.2 The diagnostic software tools are installed and used to determine intermittent failures or problems in the operation of the system, according to established procedure.

CR1.3 The diagnostic hardware tools are installed and used to detect bugs in the microcomputer system components when the equipment is not powered on, according to established technical specifications.

CR1.4 The affected software components are reinstalled, updated, or configured with the indicated parameters, for operation, according to the technical specifications received.

CR1.5 The broken hardware components are repaired or replaced using specific tools and devices, ensuring electrical and electronic connections and mechanical fastening, making the necessary cables to make the connections, if applicable, to ensure their functionality in the system, following the procedures established by the organization and applying criteria of functionality, ergonomics, quality, safety and efficiency.

CR1.6 The breakdowns that have not been diagnosed, are reported at the highest level of responsibility for their management, following the protocols and procedures of the organization.

CR1.7 Packaging, waste and disposable components are treated for disposal or recycling, in accordance with environmental regulations on waste treatment.

CR1.8 System start and stop tests are performed, to verify and ensure the operation of repaired or replaced equipment and components, following established procedures.

CR1.9 The documentation on the management of the produced incidents is recorded for later use, following the internal models established by the organization.

RP2: Expand microcomputer equipment to add new functionality to the system, according to the specifications set.

CR2.1 The operations of updating components in microcomputer equipment for the extension of the same, are carried out by checking the possibilities of expansion and valuing the economic costs, following the procedure set.

CR2.2 The components are assembled using the specific tools and tools to ensure connections between them and verify the attachment, following the physical security regulations, the procedures established by the the manufacturer's organisation and technical specifications.

CR2.3 The compatibility of the new components is verified, to ensure the integrity of the equipment and data, by checking the operation of the updated equipment, following established technical specifications.

CR2.4 The performance of the safeguard copies is performed prior to the installation of the components to ensure system integrity, according to the specifications received.

CR2.5 The software associated with the upgrade is installed and configured to verify that the added components are recognized and do not cause conflicts, verifying and ensuring system operation through testing start and stop, following the procedure set.

CR2.6 The documentation on the extension and any incidents that might have occurred is recorded, for later use, following internal models set by the organization.

RP3: Diagnose and repair logical failures in microcomputer equipment, using specific software tools and following established procedures.

CR3.1 The cause of the abnormal behavior is established by performing initial functional tests, to verify the symptoms in the breakdown part and to specify the characteristics of the breakdown, establishing the logical nature of the problem, following established procedures.

CR3.2 Running processes are checked for excessive consumption of resources due to possible virus and malicious program attacks, following established technical specifications.

CR3.3 The security and detection software (antivirus and antispies) is used, to diagnose and repair possible damage and loss of information produced by viruses and malicious programs, following the procedure set.

CR3.4 Data recovery tools are used to rescue files accidentally deleted or affected by any breakdown or incident, following established procedures.

CR3.5 The file system is checked and verified using specific software tools, in order to maintain the integrity of the file, according to the technical specifications received.

CR3.6 The affected applications are reinstalled or reconfigured for operation, following technical specifications received and according to the established procedure.

CR3.7 The repair documentation that has been performed as well as the detected incidents are recorded for later use, following internal models set by the organization.

CR3.8 The breakdowns that have not been achieved are reported at the highest level of responsibility for their management, following the protocols and procedures of action established by the organization.

CR3.9 The associated specific technical documentation is interpreted, if any, in the most frequently used foreign language in the sector.

RP4: Identify and fix faults in printers and other peripheral devices using programs and tuning tools, following the recommendations set by the manufacturers.

CR4.1 The reception of the damaged peripherals is performed by the description of the breakdown produced, using standard documentation in order to establish the best possible procedure of action, according to the organization rules.

CR4.2 The cause of the abnormal behavior is established by performing initial functional tests, to verify the symptoms listed in the breakdown part and to specify the characteristics of the breakdown, establishing the the nature of the problem and the possibility of repair with its own means or at other facilities with a higher level of specialisation, as indicated in the organisation's action protocols.

CR4.3 The process of repairing and adjusting the components of the printers and other peripheral equipment is performed, to ensure the operation of the device, following the guidelines established by the organization, standards standard and legal regulations, both in electrotechnical aspects, as well as in the safety and prevention of occupational risks.

CR4.4 The damaged components are identified and replaced using specific tools, in order to enable all the functionalities of the device, taking into account the manufacturer's recommendations, following the procedures established by the organisation and applying criteria of functionality, ergonomics, quality, safety and efficiency.

CR4.5 The breakdowns that have not been achieved isolate are reported to the level of senior responsibility for their management, following the protocols and procedures of the organization.

CR4.6 The functional tests of the repaired peripheral are performed to verify and ensure the operation thereof, following established procedures.

CR4.7 The documentation of the repair performed, as well as of the incidents produced, is recorded for later use, following the protocols and procedures of action established by the organization.

Professional Context

Production media

Computer equipment. Protective elements (insulating footwear, goggles, gloves, static discharge, etc.). Tools and tools for common use in electrical/electronic maintenance. Computer components. Peripheral devices. Printers. Operating systems, drivers, utilities. Anti-virus and anti-spy software. Diagnostic hardware tools. Diagnostic software tools. Free software for computer maintenance.

Products and results

Computer equipment repaired. Extended computing equipment. Repaired and replaced printers and peripherals.

Information used or generated

Specifications for mounting peripheral devices. Technical documentation associated with the elimination of viruses and malicious software. Technical documentation and performance of peripheral devices. Technical manuals for printers. Rules on the labelling and serialisation of components. Installation manuals and technical information of the peripheral devices. Base software manuals. Specific software manuals. Product catalogues, suppliers, prices. Manufacturer's assembly recommendations. Manufacturer's technical support associated with the devices. Parts of work. Safety and hygiene regulations. National electrotechnical regulations. International standards and standards (ISO, EIA, IEEE, among others). Internal regulations of the company. Legislation on data protection and intellectual property, business rules on data confidentiality. Legislation on waste. Documentation associated with extensions and repairs performed.

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: MICROCOMPUTER EQUIPMENT ASSEMBLY.

Code: MF0953_2

Professional qualification level: 2

Associated with the Competition Unit:

UC0953_2 Mount microcomputer equipment.

Duration: 150 hours

FORMATIVE UNIT 1

Naming: ASSEMBLY AND COMPONENT VERIFICATION.

Code: UF0861

Duration: 90 hours

Competition Reference: This training unit corresponds to RP1, RP2.

Assessment Capabilities and Criteria

C1: Classify the components used in the assembly of the microcomputer equipment, identifying their functional parameters and characteristics, taking into account their technical specifications.

CE1.1 Identify the chassis formats that are used in the installation of computer equipment, indicating their features and functionality.

CE1.2 Describe the types of market power supplies used for installation in microcomputer equipment, identifying their functional parameters and utilization, taking into account their technical specifications

CE1.3 Classify motherboard types by identifying their features, connectivity, and usage recommendations, taking into account their technical specifications.

CE1.4 Describe current processor types by detailing their functional parameters, usage recommendations, and their influence on overall team performance.

CE1.5 Identify the RAM types of their features, technology, functional parameters, and usage recommendations to assess their influence on the overall performance of the equipment.

CE1.6 Define mass storage systems, indicating their technology, connection mode, functional parameters, usage recommendations, and their influence on the overall performance of the equipment, for use in the assembly of microcomputer equipment.

CE1.7 Describe the characteristics, functional parameters and influence, in the overall performance of the equipment, of the adapters that are used in the installation of microcomputer equipment for connection with others devices or with communications networks.

CE1.8 Define the characteristics of peripherals that connect to a microcomputer team detailing their most significant particularities and parameters.

CE1.9 In practical cases, properly characterized, they will interpret a request for the assembly of a microcomputer to carry out the assembly of the components, in order to guarantee the quality of the result:

-Find the features of components in distributors and manufacturers catalogs.

-Classify and select the components according to the characteristics set out in the application, the established budget and the approval and guarantee thereof.

-Check the compatibility of the components.

C2: Install the elements that make up the microcomputer equipment, applying quality, efficiency and safety criteria, according to the technical specifications received.

CE2.1 Describe the features of a microcomputer equipment assembly position and the tools and instruments required to perform assembly and component installation processes

CE2.2 Describe the procedures for the installation of microcomputer equipment according to its own technology and characteristics, taking into account defined quality and safety criteria.

CE2.3 In practical scenarios, properly characterized, the assembly of a microcomputer equipment for use, according to instructions received:

-Identify each of the functional blocks that make up the computer and associate them with the components to assemble on the computer.

-Choose the components that will form the computer.

-Apply the established security measures.

-Interpret the technical documentation of the components to assemble

-Perform assembly and tuning of components using the necessary tools and tools.

-Perform documentation for all aspects of the mount phase by using established documents and templates.

CE2.4 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it as a help in the assembly of components.

C3: Verify mounted microcomputer equipment and ensure its functionality, stability, security and performance, according to the given specifications.

CE3.1 Describe the specified test procedures to verify the functionality of the mount.

CE3.2 Identify and apply the initial configuration (SETUP) of the equipment to optimize its performance, according to the manufacturer's recommendations, technical characteristics, and established requirements.

CE3.3 Identify the BIOS configuration parameters (Basic Input/Output System) associated with each of the components to be recognized by the assembled team.

CE3.4 Classify the BIOS messages to locate possible mismatches in the assembly of the components, taking into account the technical specifications of the components.

CE3.5 Describe and apply the types of software tests that are performed to verify the functionality of equipment using specific software and measure to evaluate the capabilities.

CE3.6 In practical scenarios, properly characterized, perform the verification of the assembly of a microcomputer equipment to check its functionality, stability, security and performance, according to specifications received.

-Run an operating system from a removable storage device.

-Check the POST and operating system messages.

-Check that adapter and peripheral devices are recognized and enabled by the system, and do not present conflicts.

-Perform boot and stop tests to ensure the operation of the equipment.

-Perform the diagnosis of possible conflicts using verification and diagnostic software tools.

-Perform stability, security, and performance tests using the specific software tools.

-Perform installation and configuration documentation performed and results obtained using given formats and templates.

Contents

1. Application of safety measures against electrical risk.

-Electrical safety.

-Electrical risk prevention measures.

-Damage produced by electric shock.

-Security in the use of electrical components.

-Security in the use of manual tools.

2. Electronic tools and components.

-Static electricity. Electrostatic discharges (ESD).

-Industry standards related to electrostatic.

-Handling of Electrostatic Charges (ESDS) sensitive devices. ANSI/EIA-625

-Packaging of electronic products for shipping. ANSI/EIA-541.

-Symbols and labels for electrostatic sensitive devices. EIA-471.

-Protection of electronic devices from electrostatic phenomena. IEC 61340-5-1.

-Other standards.

3. Interpretation of the symbology applied to the microcomputer components.

-Standard symbology of the components.

-Electrical symbology.

-Electronic symbology.

-Symbology of national and international approvals.

-UNE-E-60617 (CEI-617).

-International standards and standards: ISO, EIA, IEEE, etc.

4. Internal components of a microcomputer equipment.

-Architecture of a microcomputer system.

-Components of computer equipment, types, features, and technologies.

-The chassis.

-Formats and types.

-Basic features.

-Functionality.

-The power supply.

-Types.

-Power and tensions.

-Ventilators.

-The motherboard.

-Features. Form factors.

-Elements of a motherboard.

-Zocalo of the microprocessor.

-Rains for memory.

-"Chipset".

-The clock.

-The BIOS.

-Expansion slots.

-External connectors.

-Internal connectors.

-Electrical connectors.

-Jumpers and DIP switches.

-Other integrated elements.

-Manufacturers.

-The processor.

-Current microprocessors.

-Main Features.

-Heat dippers and fans.

-Manufacturers.

-Memory.

-Fundamental parameters.

-Types, memory modules, and encapsulated.

-Internal storage units: technology, parameters, and connection.

-Hard disk.

-CD-ROM and DVD readers and recorders.

-Dishes.

-Other magnetic, optical or magneto-optical devices.

-Expansion cards. Features, connection, and connectors.

-OEM and RETAIL components

5. Basic peripherals assembly and equipment assembly

-The mount position.

-Usage.

-Devices and instruments.

-Tools for assembling equipment.

-Security.

-Mount guides.

-Fixing elements, types of screws.

-The process of assembling a microcomputer equipment.

-Microprocessor assembly.

-Assembly of memory modules.

-Power supply assembly.

-Base board assembly.

-Assembly of storage devices: Hard disks, optical drives, etc.

-Cabling the various components and devices.

-Assembly of expansion cards.

-The assembly outside the chassis.

-Checking new devices.

-Component checking.

-Description of basic peripheral devices.

-Basic peripheral device types.

-Technical and functional characteristics.

-Configuration parameters.

-Usage recommendations.

-Technical specifications.

-Installing and testing basic peripherals.

-Procedures for mounting peripherals.

-Identifying the installation requirements.

-Manufacturer documentation.

-Power supply.

-Cabling.

-Physical connections.

-Environmental conditions.

-Installing and configuring basic peripherals.

-Installing and configuring the graphics card.

-Installing drivers and software utilities.

-Performing functional and operational tests.

6. Commissioning and verification of computer equipment.

-The process of verifying microcomputer equipment.

-A computer boot process.

-Power-level startup.

-POST.

-POST error signals.

-Diagnostic and/or verification tools for operating systems.

-Tests and messages with operating systems on removable storage.

-Tests with diagnostic software.

-Integrity and stability tests in extreme conditions.

-Performance tests.

7. Configuring the BIOS.

-The SETUP. More used versions.

-The BIOS configuration main menu.

-Standard CMOS configuration.

-Advanced BIOS settings.

-Advanced configuration of the Chipset.

-Configuring integrated peripherals.

-Configuring energy management.

-Configuring PnP/PCI devices.

-System monitoring.

-Setting passwords.

-Default values.

8. Rules and regulations on Occupational Risk Prevention and ergonomics.

-General legal framework.

-Law 31/1995, Prevention of Occupational Risks.

-R.D. 39/1997, Prevention Services Regulation.

-Specific legal framework.

-R.D. 485/1997 on minimum requirements for safety and health signs at work.

-R.D. 486/1997 laying down minimum safety requirements for workplaces.

-R.D. 487/1997 on minimum safety and health requirements for the manual handling of loads involving risks, in particular back to the bar, for workers.

-R.D. 488/1997 on minimum safety requirements for work with equipment including display screens.

-R.D. 556/1989, for which minimum measures on accessibility in buildings are to be refereed.

-Basic text and technical guidelines of the INSHT on ergonomics.

9. Standards for the protection of the environment.

-Law 10/1998, of Waste. Definitions. Categories of waste.

-Law 11/1997, of Envases and Waste of Envases and its development. Definitions.

-R.D. 208/2005 on electrical and electronic equipment and waste management.

-Object, scope, and definitions.

-Waste treatment.

-Treatment operations: reuse, recycling, energy recovery and disposal.

-Categories of electrical or electronic equipment.

-Selective treatment of materials and components.

-Places to recycle and dispose of computer waste. Selective collection symbol.

-R.D. 106/2008 on batteries and accumulators and the environmental management of their waste.

-Object, scope, and definitions.

-Types of stacks and accumulators.

-Collection, treatment and recycling.

-Selective collection symbol.

-Rules on the handling and storage of polluting, toxic and combustible products. The Security Data Tokens.

-Identification of substances or preparations.

-Composition/component information.

-Identification of hazards.

-First aid.

-Fire fighting measures.

-Measures in case of spill or accidental release

-Manipulation and storage.

-Exposure and personal protection controls.

-Removal considerations.

-Transport information.

-Regulatory information.

FORMATIVE UNIT 2

Naming: INSTALLING AND CONFIGURING MICROCOMPUTER PERIPHERALS.

Code: UF0862

Duration: 60 hours

Competition Reference: This training unit corresponds to RP3.

Assessment Capabilities and Criteria:

C1: Install peripherals, for operation, in the microcomputer equipment, according to given specifications.

CE1.1 Classify the types of peripheral devices, identifying their technical and functional characteristics, configuration parameters, and usage recommendations, taking into account their technical specifications.

CE1.2 Identify requirements for performing installation procedures in terms of electrical power, wiring, physical connections, and environmental circumstances, as indicated in the technical documentation provided by the manufacturer.

CE1.3 Describe the procedures for installing the device drivers (drivers) and software utilities needed to exploit the capabilities of the peripheral, taking into account technical specifications of the device itself.

CE1.4 Classify functional and operational tests to be performed with the peripheral to ensure its operation, according to technical specifications

CE1.5 In practical cases where several peripherals are available for installation and connection to the microcomputer system, taking into account the technical specifications of each device.

-Check that the elements are available for installation, both in terms of cabling, connectors, and physical elements, as well as storage devices (floppy disks, disks, or other media) with the device drivers and software utilities will be required for installation.

-Verify that resources are available in the microcomputer system to make the connection to the device, both for ports, connectors, or bays, and for the availability of food and other environmental requirements.

-Perform the device installation by applying the security and protection media specified by the regulations and using specific tools for each case.

-Configure the device driver (driver) on the operating system.

-Apply the functional and operational test procedures to the installed device.

-Document the processes performed and their results.

CE1.1 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using aid in the installation of peripherals.

Contents

1. Description of peripheral devices.

-Types of peripheral devices.

-Printers.

-Scan.

-Optical readers.

-Altmark, microphones, and multimedia devices.

-Backup tape readers.

-Other.

-Technical and functional characteristics.

-Configuration parameters.

-Usage recommendations.

-Technical specifications.

2. Installation and testing of peripherals.

-Procedures for mounting peripherals.

-Identifying the installation requirements.

-Manufacturer documentation.

-Power supply.

-Cabling.

-Physical connections.

-Environmental conditions.

-Installing and configuring peripherals.

-Installing and configuring cards.

-Installing drivers and software utilities.

-Performing functional and operational tests.

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

30

90

30

Unit 2-UF0862

60

20

Sequence:

To access the formative unit 2 must have been passed the formative unit 1.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: INSTALLING AND CONFIGURING OPERATING SYSTEMS.

Code: MF0219_2

Professional qualification level: 2

Associated with the Competition Unit:

UC0219_2 Install and configure base software on microcomputer systems.

Duration: 140 hours.

FORMATIVE UNIT 1

Naming: INSTALLING AND UPGRADING OPERATING SYSTEMS

Code: UF0852

Duration: 80 hours

Competition Reference: This training unit corresponds to RP1 and RP2.

Assessment Capabilities and Criteria

C1: Classify the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main architectures of microcomputer systems detailing the mission of each of the functional blocks that compose them.

CE1.2 Explain the concept of the operating system and identify the functions it performs in the microcomputer system.

CE1.3 Distinguished the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.

CE1.4 Classify operating systems and versions that are used in computer equipment detailing their main features and differences, according to technical specifications.

CE1.5 Identify the phases involved in the installation of the operating system by checking the computer equipment requirements to ensure the installation capability.

C2: Apply installation and configuration processes for operating systems to activate the functionality of the computer equipment, according to specifications received.

CE2.1 In practical scenarios, properly characterized, the installation of an operating system on a computer equipment for its operation:

-Check that the computer equipment meets the requirements and has the resources required for the base software installation.

-Prepare the installation's target team by formatting and creating the partitions indicated in the specifications.

-Install the operating system by following the steps in the technical documentation.

-Configure the system with the indicated parameters.

-Install the utilities indicated in the specifications.

-Verify the installation by starting and stopping tests.

-Document the work done.

CE2.2 Identify the procedures that are used to automate the installation of operating systems on computers of the same features by using cloning software tools and other unassisted installation tools.

CE2.3 In practical scenarios, properly characterized, the installation of an operating system on computer equipment with the same characteristics, according to specifications received:

-Prepare one of the computers to install the operating system and the indicated utilities.

-Install and configure the operating system by following the steps in the technical documentation.

-Install the utilities indicated in the specifications.

-Select the software tool to perform team cloning.

-Proceed to obtain the installed system images for later distribution.

-Implement, by means of disk image management tools, those obtained in multiple teams of equal characteristics to the original to enable them to activate their functional resources.

-Perform boot and stop tests to verify the installations.

-Document the work done.

CE2.4 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it as a help in the installation of the operating system.

C3: Update the operating system of a computer to include new functionality and solve security problems, based on technical specifications.

CE3.1 Identify software components of an operating system capable of readjustment to perform your upgrade, taking into account your technical specifications.

CE3.2 Identify and classify the sources for obtaining update items to perform the operating system patch and update deployment processes.

CE3.3 Describe the procedures for updating the operating system by taking into account the security and integrity of the information in the computer equipment.

CE3.4 In practical scenarios, properly characterized, perform the updating of an operating system for the incorporation of new functionalities, according to specifications received:

-Identify the components to upgrade from the operating system.

-Check software upgrade requirements.

-Update the specified components.

-Verify the processes performed and the absence of interferences with the other system components.

-Document the update processes.

Contents

1. Architectures of a microcomputer system.

-Functional schema of a computer.

-Subsystems.

-The central processing unit and its elements.

-Internal memory, types, and features.

-Input and output units.

-Storage devices, types, and features.

-Buses.

-Types.

-Features.

-Correspondence between Physical and Logical Subsystems.

2. Functions of the computer operating system.

-Basic concepts.

-Processes.

-The files.

-The system calls.

-The core of the operating system.

-The command interpreter.

-Functions.

-User interface.

-Managing resources.

-File administration.

-Administration of tasks.

-Support service.

3. Elements of a computer operating system.

-Process management.

-Memory management.

-The Input and Output system.

-File system.

-Protection system.

-Communications system.

-Order interpretation system.

-Command line.

-Graphical interface.

-System programs.

4. Current computer operating systems.

-Classification of operating systems.

-Free software.

-Features and usage.

-Differences.

-Versions and distributions.

5. Installing and configuring computer operating systems.

-Requirements for the installation. Hardware and software compatibility.

-Installation phases.

-Configuring the boot device in the BIOS.

-Formatting of disks.

-Partitioning of disks.

-Creating the file system.

-Configuring the operating system and devices.

-Installing and configuring utilities and applications.

-Installation types.

-Minimum installations.

-Standard installations.

-Custom installations.

-Facilities served or unattended.

-Network installations.

-Restoring an image.

-Verification of the installation. Start and stop tests.

-Installation and configuration documentation.

6. Physical replication of partitions and hard disks.

-Backup programs.

-Cloning.

-The functionality and objectives of the replication process.

-Security and prevention in the replication process.

-Disk partitions.

-Partition types.

-Management tools.

-Image creation and deployment tools and system replicas:

-Information sources.

-Image deployment procedures and system replicas.

7. Updating the computer operating system.

-Classification of update sources.

-Automatic update.

-Support and help centers.

-Update procedures.

-Updating operating systems.

-Updating software components.

-Critical components.

-Security components.

-Drivers.

-Other components.

-Verifying the update.

-Update documentation.

FORMATIVE UNIT 2

Designation: EXPLOITATION OF THE FUNCTIONALITIES OF THE MICROCOMPUTER SYSTEM

Code: UF0853

Duration: 60 hours

Competition Reference: This training unit corresponds to RP3

Assessment Capabilities and Criteria

C1: Use the applications that are provided by the operating systems, for the operation of the operating systems according to technical specifications.

CE1.1 Use the applications provided by the operating system describing its characteristics for the use and operation of the operating system, taking into account its technical specifications and functional needs.

CE1.2 Use the applications provided by the operating system for disk organization and file system, according to received technical specifications.

CE1.3 Use the accessibility options that current operating systems have, to set up accessible environments for people with disabilities, according to technical and functional specifications.

CE1.4 Configure workbench options using the tools and applications that the operating system provides, following specifications received and usage needs.

CE1.5 Describe the applications provided by the operating system for the operation of the functionalities of the peripherals connected to the system, according to the needs of use.

CE1.6 Classify messages and warnings provided by the microcomputer system to discriminate its importance and criticality, and apply response procedures according to given instructions.

CE1.7 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using it as a help in operating the operating system.

Contents

1. Operating system utilities.

-Features and functions.

-Setting up the workbench.

-Administering and managing file systems.

-Managing processes and resources.

-Managing and editing files.

2. Disk organization and file system.

-The file system.

-FAT.

-NTFS.

-Storage logical drives.

-Structures of data.

-Folders or directories.

-Ficheros.

-File types.

-Folders and system files.

-Structure and configuration of the file explorer.

-File operations.

-Creation.

-Copy and move.

-Removing and recovering.

-Search for files.

3. Configuring accessibility options.

-Options for facilitating screen display.

-Use of narrators.

-Options to make keyboard or mouse use easier.

-Voice recognition

-Using visual and text alternatives for people with hearing difficulties

4. Configuration of the computer system.

-Setting up the workbench.

-Customizing the visual environment.

-Regional configuration of the team.

-Customizing basic peripherals.

-Other.

-Print administrator.

-Device Manager.

-System protection.

-Advanced system configuration

5. Using the system tools.

-Disfragmented disk.

-Security Copies.

-Free space.

-Programming of tasks.

-Restoring the system.

6. Process and resource management.

-System messages and warnings.

-System events.

-System performance.

-Task Manager.

-System log editor.

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

40

Unit 2-UF0853

60

30

Sequence:

To access the formative unit 2 must have been passed the formative unit 1.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: MICROCOMPUTER EQUIPMENT REPAIR.

Code: MF0954_2

Professional qualification level: 2

Associated with the Competition Unit:

UC0954_2 Repair and expand microcomputer equipment.

Duration: 180 hours

FORMATIVE UNIT 1

Naming: REPAIRING AND EXTENDING HARDWARE AND MICROCOMPUTER HARDWARE COMPONENTS.

Code: UF0863

Duration: 80 hours

Competition Reference: This training unit corresponds to RP1 and RP2.

Assessment Capabilities and Criteria

C1: Describe electrical, electronic and electromechanical components contained within devices of microcomputer equipment capable of adjustment, calibration and production of faults to discriminate causes of production of incidents.

CE1.1 Identify the components of analog and digital electronics and their most characteristic applications, to associate the metrics and equipment of measurement necessary, to estimate the functionality of a device, according to its technical specifications.

CE1.2 Interpreting the functional schemas of the circuits and components, and the symbology used, relating them to the actual elements for applying diagnostic and verification procedures to equipment with incidences functional.

CE1.3 Identify electrical, electronic, optical and electromechanical elements contained within the devices of a computer equipment capable of adjustment, calibration and/or repair, to carry out the actions of repair or replacement, depending on the information obtained through diagnostic processes and specifications received.

C2: Establish the cause of the breakdown of microcomputer system equipment and components, identifying their nature by using specified techniques and tools.

CE2.1 Describe the characteristics of a microcomputer equipment repair position and the tools and instruments to perform the task of detecting breakdowns with the required quality, efficiency and safety.

CE2.2 Describe the power, control and data signals of the connectors, buses and interfaces of the components of a computer equipment, indicating the procedure and the devices for the evaluation and estimation of their functional parameters, according to technical specifications of the device to be monitored.

CE2.3 Describe the process of disassembly of components, microcomputer equipment, and peripherals to be able to perform the actions on them.

CE2.4 Explain the typology and characteristics of the breakdowns in microcomputer equipment describing the general techniques and the specific means for their location in order to optimize the repair procedures breakdowns.

CE2.5 Describe the characteristics of the hardware and software tools that are used for the diagnosis of faults in the microcomputer system, taking into account their technical specifications.

CE2.6 In a practical case, properly characterized, perform the location of a fault to isolate the cause that produces and characterize it, according to received instructions:

-Set a first hypothesis based on the documentation provided.

-Detect the critical points of the team and/or component by querying the history of breakdowns and the maintenance statistics produced in this respect.

-Identify the symptoms and nature of the breakdown, characterizing it for the effects it produces.

-Perform measurements on test points set by manufacturers or defined by the specified procedure.

-Locate the functional block or component responsible for it.

-Identify the security elements that need to be taken into account.

-Use diagnostic software tools if intermittent failures occur on the system.

-Use diagnostic hardware tools if the computer does not power on.

-Connect an emulator and perform comparative tests with multiple motherboards.

-Perform the documentation of the activities performed and the results obtained using the formats and templates indicated.

CE2.7 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using aid in the diagnosis and resolution of breakdowns.

C3: Apply procedures to perform adjustment, repair, and verification of broken elements, ensuring the operation of the equipment or component.

CE3.1 Describe tools and equipment for the repair of a microcomputer equipment malfunction depending on the types of devices to be repaired, according to the technical specifications of the equipment itself.

CE3.2 Describe the components of the devices of a microcomputer system capable of adjustment, repair and replacement for troubleshooting, depending on the types of devices to be repaired.

CE3.3 In a practical scenario, properly characterized, perform the repair of a fault produced in an element of the microcomputer system, following a given procedure:

-Identify the component causing the breakdown.

-Apply the specified security measures.

-Evaluate the replacement of the broken down component or the possibility of its repair.

-Set a quote for replacement or repair, valuing repair costs for both parts and labor, according to given economic models.

-Activate mechanisms to ensure information integrity.

-Replace or repair the element (physical or logical) responsible for the failure.

-Perform the checks and settings specified in the software and configuration.

-Perform boot and stop tests to check the operation of the repaired item.

-Report the breakdown to a higher level if necessary.

-Document the activities performed and the results obtained using the formats and templates indicated.

CE3.4 Make the confection of diverse computer cabling by pressure, crimping or welding, of adapters, wrappers, connectors and whiplash to meet specific needs of connection difficult to obtain commercially, making use of the appropriate tools and checking that the connectivity obtained corresponds to the theoretical schemes of the same.

C4: Apply the procedures for the extension of computer equipment by ensuring the operation of the equipment or component, according to specifications received.

CE4.1 Identify the features of components without documentation or lack of associated or updated software in order to perform operations for the expansion of the equipment through the interpretation of the information on the labelling of the manufacturer (codes, symbology) and the search for and obtaining information via the Internet, taking into account the technical specifications available to us.

CE4.2 In a practical scenario, properly characterized, perform the evaluation of the feasibility of an extension to add new functionalities to a computer equipment, according to functional specifications received:

-Identify prerequisites and requirements.

-Detect possible interactions with other team components.

-Evaluate the difficulty of obtaining the components.

-Estimate the increase in overall performance that you get.

-Perform the necessary procedures to prevent loss of information.

-Estimate and document the economic cost of the upgrade.

CE4.1 In a practical scenario, properly characterized, expand a computer equipment to increase the functional capabilities of it according to given specifications and following the procedures indicated:

-Back up the hard disk data to ensure the integrity of the information.

-Identify the components to be updated.

-Apply the established security measures.

-Perform the extension, replacement, or upgrade of the specified components.

-Install and configure the software associated with the updated components.

-Perform both hardware and software checks and adjustments to verify the extension.

-Perform the documentation of the activities performed by indicating the initial configuration of the equipment and configuration after the extension.

Contents

1. Basic instrumentation applied to the repair of microcomputer equipment.

-Electricity and electronics concepts applied to the repair of microcomputer equipment.

-Electrical magnitudes and their measurement.

-Analog and digital signals.

-Analog components.

-Digital electronics

-Numeric and alphabetic representation systems.

-The printed circuit.

-Logical circuits and logical functions.

-Principle of digital integrated circuit runs

-Basic instrumentation.

-Polimeter.

-Description.

-Measure of resistances, stresses, and intensities.

-Oscyloscope.

-Operation.

-Terminology.

-Puesta in operation. Probes.

-Controls of an oscilloscope.

-Measurement techniques.

-Low frequency generator.

-Description.

-Using the Generator.

2. Operation of the devices of a computer system.

-Functional schemes for devices and peripherals on computer equipment.

-Electrical components. Functions.

-Electronic components. Functions.

-Electromechanical components. Functions.

-The magnetic storage media.

-Features.

-Components.

-Functional schemas.

3. Types of breakdowns in microcomputer equipment.

-Typology of breakdowns.

-Classification.

-Features.

-Typical Averies.

-Logical

-Physical.

-Procedures for detection and correction.

4. Diagnosis and location of breakdowns in computer equipment.

-Organigrams and procedures for the location of breakdowns.

-The diagnosis.

-Diagnostic techniques.

-Measure software.

-Diagnosis and detection.

-Diagnostic software tools.

-Types.

-Features.

-Commercial software.

-Diagnostic hardware tools.

-Types.

-Features.

-POST diagnostic cards.

-Connectivity of computer equipment

-Signal measures of the interfaces, buses, and connectors of the various components.

-Power.

-Control.

-Data.

-The external and internal connection of computer equipment.

-Types of cables.

-Connector types.

-Meaning the pins of the various interfaces and connectors.

-Cabling performance techniques.

5. Central unit hardware repair.

-The repair post.

-Features.

-Lab tools.

-Laboratory equipment.

-The repair budget.

-Component cost.

-Pricing criteria.

-Times

-Repair type

-Component type.

-The repair procedure.

-Hardware breakdown repair.

-the power supply.

-The motherboard.

-Related to memory.

-Storage drives.

-Sound cards.

-Graphics cards.

-Repair of basic peripherals and other hardware components.

6. Extension of a computer equipment.

-Updateable components.

-Logic

-Physical.

-The extension procedure.

-Assessment of the need.

-Component compatibility.

-Extension budget.

-Securing the information.

-Typical amplifiers of logical and physical computer equipment.

FORMATIVE UNIT 2

Naming: RESOLUTION OF LOGICAL BREAKDOWNS IN MICROCOMPUTER EQUIPMENT.

Code: UF0864

Duration: 30 hours

Competition Reference: This training unit corresponds to RP3.

Assessment Capabilities and Criteria

C1: Retrieve the functionality of the computer equipment by identifying and applying the logical breakdown repair procedures according to the specifications received.

CE1.1 Distinguished procedures that are used for resolution of logical breakdowns according to received specifications.

CE1.2 Identify processes that run on a computer to detect possible excessive memory and processor consumption.

CE1.3 Recognize the symptoms caused by the attack of viruses and malicious programs that can affect the computer equipment to proceed to its elimination using anti-virus and anti-spy software according to some specifications set.

CE1.4 Use data recovery tools to recover deleted files following received specifications.

CE1.5 In practical scenarios, properly characterized, repair a computer with simulated logical breakdowns according to technical specifications and procedures given:

-Check the file system using the specified software tools.

-Check the running processes.

-Check and remove the presence of virus and spyware using the software tools indicated.

-Reinstall and configure the affected software.

-Perform boot and stop tests to check system operation.

-Report the breakdown to a higher level of responsibility, if necessary.

-Document the activities performed and the results obtained using the given formats and templates.

Contents

1. The task manager and data recovery tools.

-The task administrator.

-The task administrator.

-Programs.

-Processes.

-Performance metrics.

-Installing and using data recovery tools.

-Data recovery. Concept and operation.

-Commercial data recovery tools.

-Installing tools.

-Data retrieval and retrieval procedure.

2. Resolution of logical breakdowns.

-The Master Boot Record (MBR), partitions, and active partition.

-System startup files.

-System configuration files.

-Optimizing the system.

-Backup.

-File transfer.

-Back-up tools.

-Cloning.

-Reset by cloning.

-Reinstalling, configuring, and upgrading components of software components.

3. Installing and configuring antivirus software.

-Computer viruses.

-Malicious software: Concepts and definitions.

-Evolution.

-Virus, worms, Trojans, others.

-Vulnerabilities in programs and patches.

-Types of files that can be infected.

-Spread media.

-Virus in mails, programs, and documents.

-Hiding of malicious software.

-Web pages.

-Email.

-Main memory of the computer.

-Boot sector.

-Files with macros.

-Effects and symptoms of infection.

-Computer viruses and operating systems.

-Critical operating system updates.

-Precautions to avoid infection.

-Defining antivirus software.

-Active components of the antivirus.

-Vaccine.

-Detector.

-Eliminator.

-General features of antivirus software packages.

-Anti-spyware protection.

-Protection against malicious software.

-Firewall protection.

-Protection from vulnerabilities.

-Protection from scams.

-Automatic updates.

-Backup and optimization of computer performance.

-Installing antivirus software.

-System requirements.

-Installing, configuring, and activating the software.

-Creating rescue disks.

-Uninstall.

-The main window.

-Status of the protections. Activation and deactivation.

-Types of analysis and reports.

-Automatic and manual update.

-Updating virus patterns and/or malware identifiers.

-Configuring the protections. Activation and deactivation.

-Analysis, virus removal, and data recovery.

-Updates.

-Access to services.

-Support.

-Obtaining information.

-Other options.

FORMATIVE UNIT 3

Naming: PRINTER REPAIR.

Code: UF0865

Duration: 70 hours.

Competition Reference: This training unit corresponds to RP4.

Assessment Capabilities and Criteria

C1: Apply printer repair procedures using specific tools, to put them into operation, following given specifications.

CE1.1 Identify the most commonly used types of printers in the market by distinguishing features between them, according to technical specifications.

CE1.2 Describe the functional blocks of each type of printer, as well as the operation of its components, according to technical specifications.

CE1.3 Recognize the operating failures of each printer type to replace the fault-causing parts, taking into account the characteristics of the fault and following the established procedure.

CE1.4 Identify consumables, their replacement types and procedures to detect and fix possible printer breakdowns, taking into account the technical characteristics of the printers.

CE1.5 Distinguished procedures that are used for troubleshooting on printers, based on their technical specifications.

CE1.6 In practical scenarios, properly characterized, perform the repair of a printer for operation, following technical specifications and procedures given:

-Perform the tests set to identify the cause of the printer failure.

-Identify the components causing the failure.

-Perform component repair or replacement, or report the breakdown to a higher level of responsibility, if necessary.

-Perform operational tests to verify their functionality.

-Document the activities performed and the results obtained using the established formats and templates.

CE1.7 Interpret the associated technical documentation, even if it is edited in the most frequently used foreign language in the sector, using aid in the repair of peripherals.

Contents

1. The printers.

-Printers.

-Basic parameters.

-The page description languages.

-The connection interface.

-Printer types. Characteristics and differences.

-Impact printers.

-Ink printers.

-Laser printers.

-More usual brands and models.

2. Handling and replacing consumable items.

-Types and features.

-Ink Cartridges.

-Toner Cartridges.

-Paper Forms

-Pliegos of adhesive labels.

-Overcomes.

-Other.

-How to store consumable items.

-Consumable item replacement procedures.

-Security in handling and replacement of consumable items.

3. Repair matrix printers.

-Matric printers. Operation and technical details.

-Security in handling matrix printers.

-Warnings and precautions. Symbology.

-Installation, maintenance, paper handling, and printer handling instructions.

-Parts of a matrix printer.

-Mechanical, electronic, electrical, and environmental specifications.

-Functional blocks and function of their components.

-Consumables.

-Types of consumables.

-Loose sheets.

-Continuous role.

-Special role: labels, copy printed, envelopes.

-Replacing consumables.

-Replacing tape cartridges.

-Continuous paper replacement.

-Preventive and corrective maintenance.

-Cleaning the printer.

-Lubication.

-Problem detection.

-Error indicators.

-Monitor of states.

-Auto test.

-Hex dump.

-Troubleshooting.

-Power problems.

-Load or roll forward problems.

-Problems in the print position.

-Print problems or print quality.

-Network problems.

-Paper jam solution.

-Problems with optional accessories.

-Replacing maintenance kits.

-Printer transport.

4. Ink Injection Printer Repair.

-Security in the handling of inkjet printers.

-Warnings and precautions. Symbology.

-Installation, maintenance, handling of ink cartridges, and printer handling instructions.

-Parts of an inkjet printer.

-Mechanical, electronic, electrical, and environmental specifications.

-Functional blocks and function of their components.

-Cleaning the printer.

-Lubication.

-Consumables.

-Replacing consumables.

-Check the status of the ink cartridge through the control panel, light indicators, or through the printer driver.

-Replacing ink cartridges.

-Replacing the maintenance box.

-Preventive and corrective maintenance.

-Reviewing the injectors.

-Cleaning the injection head.

-Injection head alignment.

-Cleaning the printer.

-Troubleshooting.

-Diagnosis of the problem.

-Checking the status of the printer.

-Paper atascos.

-Problems with print quality.

-Multiple print problems.

-The paper does not advance.

-The printer does not print.

-Other problems.

-Printer transport.

5. Laser Printer Repair.

-Security in the handling of laser printers.

-Warnings and precautions. Symbology.

-Installation, maintenance, toner cartridge handling, printer handling, laser radiation, and ozone safety instructions.

-Pieces of a laser printer.

-Mechanical, electronic, electrical, and environmental specifications.

-Functional blocks and function of their components.

-Consumables.

-Replacing consumables.

-Preventive and corrective maintenance.

-Cleaning printer items.

-Lubication.

-Replacing toner cartridges.

-Replacing the photoconductor.

-Replacing the fuser unit.

-Replacing the used toner collector.

-Troubleshooting.

-Diagnosis of the problem.

-Checking the status of the printer.

-Paper atascos.

-Printing a printer status sheet.

-Operating problems.

-Problems with hard copy.

-Color printing problems.

-Problems with print quality.

-Multiple print problems.

-Memory problems.

-Other problems.

-Printer transport.

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

80

Unit 2-UF0864

10

10

10

Sequence:

The training units must be exceeded in a correlative manner.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

NON-WORKING PROFESSIONAL PRACTICE MODULES FOR THE ASSEMBLY AND REPAIR OF MICROCOMPUTER SYSTEMS.

Code: MP0179

Duration: 40 hours

Assessment Capabilities and Criteria

C1: Perform, in a company's job, the assembly, installation and verification of the elements that make up a microcomputer system, following the instructions received.

CE1.1 Get and interpret the information required for assembly, installation, or verification in the guides and/or catalogs of manufacturers and distributors.

CE1.2 Perform the assembly of microcomputer equipment for use using the necessary tools and tools of the job.

CE1.3 Perform the configuration of the computer, as well as the load of the base software.

CE1.4 Perform the installation of peripherals, configuring it appropriately.

CE1.5 Verify the assembly and installation by performing the appropriate tests, according to the guides and information of the teams, manufacturers and the company itself.

C2: Install and configure the base software according to the protocols and procedures established in the enterprise.

CE2.1 Identify the phases involved in the operating system installation by checking the computer equipment requirements.

CE2.2 Perform the installation, configuration and/or upgrade of the operating system, as well as the utilities, according to the specifications received and the client's needs.

CE2.3 Verify the operation of the computer after the installation is performed.

CE2.4 Use the applications that provide the operating systems for the operation of the same.

CE2.5 Document the work done according to the company's procedures.

C3: Perform the repair and extension of the microcomputer system's equipment and components, using the procedures, techniques and tools specified, according to the instructions received.

CE3.1 Establish the cause of equipment and component failure by using appropriate hardware and software techniques and tools, in accordance with established repair procedures.

CE3.2 Perform the adjustment, repair and verification of the damaged elements, ensuring the operation of the equipment or component, establishing a budget according to the models of the company.

CE3.3 Retrieve the functionality of the computer equipment by removing the presence of virus and spyware, reinstalling and configuring the affected software.

CE3.4 Perform the extension of computer equipment according to the specifications provided.

CE3.5 Perform printer repair for operation, according to the technical specifications provided.

C4: Participate in the company's work processes, following the rules and instructions set out in the job center.

CE4.1 Behave responsibly in both human relationships and the jobs to be performed.

CE4.2 Respect the procedures and rules of the work center.

CE4.3 Diligently undertake the tasks according to the instructions received by trying to bring them into line with the company's work rate.

CE4.4 Integrate into the production processes of the job center.

CE4.5 Use the established communication channels.

CE4.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Mount, repair and expand, equipment and components that form a microcomputer system, following company procedures.

-Assembly of computer and microcomputer systems in a business assembly position.

-Installing and configuring the base software used in the enterprise.

-Repair procedures for equipment and microcomputer components applied in the enterprise.

-Labelling, packing, storage, and moving of equipment, peripherals, and consumables.

2. Integration and communication in the workplace.

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the communication channels established in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

*Professional experience required in the scope of the Competition

If you have accreditation

If you do not have

MF0953_2: Microcomputer equipment assembly.

Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomat, Technical Engineer, Technical Architect, or degree degree or other equivalent titles.

• Higher Technician of the professional family of Informatics and communications.

• Certificates of professionalism of level 3 of the family Computer and communications professional.

1 year

3 years

MF0219_2: Installing and configuring operating systems.

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect, or corresponding degree or degree title other equivalent titles.

• Senior technician of the professional family Computing and communications.

• Professional level 3 certificates from the professional computer and communications family.

1 year

3

MF0954_2: Microcomputer equipment repair.

• Licensed, Engineer, Architect, or the title of corresponding degree or other equivalent titles.

• Diplomat, Engineer Technical, Technical Architect or corresponding degree degree or other equivalent titles.

• Senior Technical Family of Computer and Communications.

• Professional computer and communications family level 3 professionalism certificates.

1 year

3 years

* For the last three years.

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forming Space

Microcomputer Equipment Workshop

Surface m²

15 pupils

25

60

60

75

90

90

Forming Space

X

M1

M2

M3

X

X

X

Microcomputer Equipment Workshop

X

Forming Space

Classroom

-PCs installed in network and Internet connection.

-Base software.

-Office software and internet tools.

-Rotafolos.

-Pizarra.

-Classroom material.

-Table and chair for the trainer.

-Table and chair for students.

-Auxiliary Furniture for Classroom Equipment

Microcomputer Equipment Workshop

-Specific Furniture workshop (Work tables, bookshelves and cabinets, among others).

-Canon de projection.

-Wiring Armarium with patched panels, and network connection devices.

-Computer and peripheral equipment.

-Components for computer assembly.

-Elements and components for preventive and corrective maintenance.

-Operating systems.

-Tools and applications office.

-Internet Tools.

-Computer cloning software.

-Computer programs and applications.

-Hardware tools and testing software.

-Media cleaning tools and peripherals.

-Product labeling tools.

-Common usage tools and tools for mounting, maintenance and repair of equipment and peripherals.

- Basic instrumentation for the repair of microcomputer equipment.

-Security and safety elements.

-Component recycling containers: Pies and batteries, paper, plastics, metal.

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training space equipment will be sufficient for a minimum of 15 students and must be increased, if applicable, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX III

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: Computer Security

Code: IFCT0109

Professional Family: Informatics and Communications

Professional area: Systems and telematics

Professional qualification level: 3

Professional reference qualification:

IFC153_3 Computer Security (RD 1087/05 of September 16)

Relationship of competency units that configure the certificate of professionalism:

UC0486_3: Secure computer equipment.

UC0487_3: Audit communication networks and computer systems.

UC0488_3: Detect and respond to security incidents.

UC0489_3: Design and implement secure data access and transmission systems.

UC0490_3: Manage services on the computer system.

General competition:

Ensure the security of access and use of information recorded in computer equipment, as well as the system itself, protecting itself from possible attacks, identifying vulnerabilities and applying encryption systems to communications that are made to the outside and inside the organization.

Professional Environment:

Professional Scope:

Develops its professional activity in the area of systems of the IT department of public or private companies that use computer equipment, performing audit tasks, configuration and related topics IT security, for both the self-employed and self-employed.

Productive Sectors:

It is present in many productive sectors, especially in the service sector, although a marked feature of transectoriality is perceived. It is also present in the following types of companies:

-Companies in any sector and size that use computing equipment in their management processes.

-Companies that provide technical assistance services.

-Service outsourcing (outsourcing) companies.

Occupations or related jobs:

3820.1017 Informatic Application Programmer

3812.1014 Management Computing Technician

Computer security technician.

Computer Audit Technician.

Duration of the associated training: 500 hours

Relationship of training modules and training units:

MF0486_3: Computer Security. (90 hours)

MF0487_3: Computer Security Audit. (90 hours)

MF0488_3: Computer security incident management. (90 hours)

MF0489_3: Secure data access and transmission systems. (60 hours)

MF0490_3: (Cross) Management of services in the computer system. (90 hours)

MP0175: Non-Work Professional Practices Module for Computer Security. (80 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: SECURING COMPUTER EQUIPMENT

Level: 3

Code: UC0486_3

Professional realizations and realization criteria

RP1: Apply security policies for improved protection of servers and end-user equipment according to the needs of security use and conditions.

CR1.1 The implementation plan for the organization's computer system is analyzed by checking that it incorporates the necessary information regarding installation and updating procedures for equipment, backup and detection among others, as well as references of possibilities of use of the equipment and restrictions of the same and protections against attacks of viruses and other unwanted elements.

CR1.2 Access permissions by users to the various system resources are determined by means of the corresponding tools according to the Implementation and Security Plan of the computer system.

CR1.3 Server access is done by ensuring the confidentiality and integrity of the connection according to the organization's security rules.

CR1.4 User policies are analyzed by verifying that circumstances are reflected such as uses and restrictions assigned to teams and users, permitted and restricted network services, and areas of responsibility due to the use of computer equipment.

CR1.5 Security policy is transmitted to users, ensuring their correct and complete understanding.

CR1.6 The tasks performed are properly documented according to the procedures of the organization.

CR1.7 Information affected by data protection legislation is intended to verify that authorized users comply with the requirements indicated by the regulations and the distribution channels for such information are documented and authorized according to the security plan.

RP2: Configure servers to protect them from unwanted access according to the needs of use and within the organization's directives.

CR2.1 The location of the server on the network is in a protected and isolated zone according to the organization's security regulations and implementation plan.

CR2.2 The services offered by the server are activated and configured by deactivating unnecessary according to the organization's security regulations and implementation plan.

CR2.3 The access and permissions to the server resources by the users are configured according to the purpose of the server itself and the security regulations of the organization.

CR2.4 System activity and incident recording mechanisms are activated and the analysis procedures for such information are enabled.

CR2.5 Additional server modules are analyzed based on their capabilities and security risks that involve their use, reaching a compromise solution.

CR2.6 The authentication mechanisms are configured to provide security and integrity levels in the user connection according to the organization's security regulations.

CR2.7 User roles and privileges are defined and assigned by following the instructions in the organization's security regulations and operating plan.

RP3: Install and configure firewall on computers and servers to ensure security against external attacks according to the needs of use and within the organization's directives.

CR3.1 The firewall topology is selected based on the deployment environment.

CR3.2 Firewall hardware and software elements are chosen taking into account economic and performance factors.

CR3.3 Firewalls are installed and configured according to the level defined in the security policy.

CR3.4 Filtering rules and logging and alarm levels are determined, configured, and managed according to needs that are dictated by the organization's security regulations.

CR3.5 Firewalls are verified with test sets and are checked to exceed the specifications of the organization's security regulations.

CR3.6 Firewall installation and upgrade and performance procedures with the same are documented according to your organization's specifications.

CR3.7 Registration systems are defined and configured for review and study of potential attacks, intrusions, and vulnerabilities.

Professional Context

Production media

Corporate office applications. Password strength checkers. Port probes. System log file parsers. Firewall. Specific and/or general purpose equipment. Personal or server firewall. Authentication systems: weak: user-based and password-based and robust: based on physical devices and biometric measurements. Communication programs with cryptographic capabilities. Secure remote administration tools.

Products and results

Implementation plans reviewed according to organization directives. Network services audit reports for computer systems. Map and design of the corporate firewall topology. Firewall installation and configuration guide. Activity report detected in the firewall. Map and design of the backup copy system. Planning for backing up the backup copies. Backup copy realization report. Regulations for the elaboration of the firewall design. Elaboration of a security operative in accordance with the security policy.

Information used or generated

Telematics Infrastructure Security Policy. Installation, reference, and firewall usage manuals. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software.

Standards, regulations and standards (ISO, EIA, UIT-T, RFC-IETF). Inventory record of the hardware. Check record with the security measures applied to each computer system. The topology of the computer system to protect.

Competition Unit 2

Naming: AUDITING COMMUNICATION NETWORKS AND COMPUTER SYSTEMS

Level: 3

Code: UC0487_3

Professional realizations and realization criteria

RP1: Perform vulnerability analysis, using specific programs to control possible system security failures according to your usage needs and within your organization's directives.

CR1.1 The tools and types of vulnerability analysis tests are selected and adapted to the environment to be verified according to the organization's security specifications.

CR1.2 Programs and tests are updated to perform tests consistent with the possible security failures of hardware and software versions installed on the computer system.

CR1.3 Test results are analyzed and documented as indicated in the organization's regulations.

CR1.4 Password access systems are checked by specific tools according to the specifications of the security regulations.

CR1.5 The vulnerability analysis documentation contains exact references of the applications and services that have been detected operating on the system, the level of the installed patches, denial vulnerabilities service, detected vulnerabilities, and network map.

RP2: Verify compliance with current regulations and legal requirements regarding the protection of personal data to ensure confidentiality according to the needs of use and within the organization's directives.

CR2.1 Files with personal data are identified and assigned a security officer according to legal regulations.

CR2.2 The list of people authorized to access each file exists and is updated according to legal regulations.

CR2.3 File access control is checked by following the procedure set in the organization's security regulations.

CR2.4 The storage management of files and their backups is done in accordance with legal and organizational regulations.

CR2.5 The telematic access to the files is done using mechanisms that ensure confidentiality and integrity when required by the regulations.

CR2.6 The audit report collects the relationship of files with personal data and security measures applied and those that are pending application.

RP3: Check compliance of the security policy set to assert system integrity according to the needs of use and within the directives of the organization.

CR3.1 Security incident detection and management procedures are developed and included in the organization's security regulations.

CR3.2 The entry and exit points of the network are verified for use to be circumscribed to what is described in the organization's security regulations.

CR3.3 Systems security and protection programs are activated and updated according to manufacturers ' specifications.

CR3.4 Additional network entry and exit points are authorized and controlled based on the organization's security specifications and implementation plan.

CR3.5 The IT audit processes are reviewed, both internal in character, and those performed by personnel outside the organization.

CR3.6 Security policy procedures are verified in compliance by users.

Professional Context

Production media

Corporate office applications

Vulnerability probes.

Tools to ensure information confidentiality.

Programs that ensure the confidentiality and integrity of communications.

Applications for project management.

Password analysis programs.

Products and results

Vulnerability analysis reports

Weak password relationship.

Record of personal data files, according to current regulations

Services audit report and computer system access points.

Information used or generated

Personal data protection regulations.

Company security policy.

Security Analysis Methodologies (OSSTM, BS7799/ISO17799).

Security bulletins and vulnerabilities warnings available in electronic format.

The topology of the computer system to protect.

Competition Unit 3

Naming: DETECTING AND RESPONDING TO SECURITY INCIDENTS

Level: 3

Code: UC0488_3

Professional realizations and realization criteria

RP1: Implement procedures for incident response and implement mechanisms for intrusion detection according to guidelines from national and international incident response teams.

CR1.1 Incident detection and response procedures are documented, indicate security roles and responsibilities, and implement the requirements of the organization's security policy.

CR1.2 Systems are modeled to detect signs of suspicious behavior by selecting the recording mechanisms to activate, observing the defined alarms, characterizing the parameters of network utilization and inventorying the files to detect modifications.

CR1.3 The system log mechanisms are activated and the analysis procedures are scheduled for the same according to the organization's security specifications.

CR1.4 The intrusion detection systems are installed, updated, and configured based on the organization's security specifications.

CR1.5 The procedures for restoring the computer system are verified for recovery from a serious incident within the organization's needs.

RP2: Detect security incidents actively and preventively to minimize risk according to guidelines from national and international incident response teams.

CR2.1 Tools used to detect intrusions are analyzed to determine that they have not been compromised or affected by malicious programs.

CR2.2 The suspicious operating parameters are analyzed with specific tools according to the security regulations.

CR2.3 The software components of the system are periodically verified for integrity using specific programs.

CR2.4 The tests performed on the physical protection devices of the computer system verify the correct operation of the devices according to the security regulations of the organization.

CR2.5 Strange events and signs that might be considered an alert are collected in the daily activity report.

RP3: Coordinate the security incident response among the different areas involved to contain and resolve the incident according to the service requirements and within the organization's directives.

CR3.1 The detection of a security incident results in the procedures being performed in the organization's security regulations.

CR3.2 The system violated, is isolated, and the information is collected for forensic analysis of it according to the procedures of the organization's security regulations.

CR3.3 The targeted system is parsed by intrusion detection tools according to the organization's security procedures.

CR3.4 Intrusion is contained by applying the measures set out in the organization's security regulations.

CR3.5 The incident documentation is performed for further analysis and implementation of measures that prevent the replication of the overcome event.

CR3.6 The damage caused is determined and the possible actions are planned to continue the normal service delivery of the violated system according to the quality standards and the operating plan of the organization.

Professional Context

Production media

Corporate office applications. Vulnerability analyzers. Tools to ensure the confidentiality of information. Programs that guarantee the confidentiality and integrity of communications. Applications for project management. Password analysis programs. Network monitoring software. Workflow software for sending alarms and incidents to those responsible. IDS and their consoles. SNMP Console.

Products and results

Vulnerability analysis reports. Relationship of weak passwords. Registration of personal data files, according to current regulations. Audit report on services and access points to the computer system. Registration of activity. Security document. Alarm logging.

Information used or generated

Personal data protection regulations. Company security policy. Security analysis methodologies (OSSTM, BS7799/ISO17799). Security bulletins and vulnerability notices, mostly written in English, and available in electronic format. Working document based on security policy. Intrusion detection regulations. Security threat prevention regulations.

Competition Unit 4

Naming: DESIGNING AND IMPLEMENTING SECURE DATA ACCESS AND TRANSMISSION SYSTEMS

Level: 3

Code: UC0489_3

Professional realizations and realization criteria

RP1: Implement information security and encryption policies in data exchange operations to obtain secure connections according to the needs of use and within the directives of the organization.

CR1.1 Communications with other companies or through insecure channels use virtual private networks to ensure the confidentiality and integrity of such connections during transit through public networks as the specifications of the security regulations and network design of the organization.

CR1.2 The requirements for implementing the virtual private network solution are selected and communicated to the telephony operator to achieve appropriate solutions to the security plan.

CR1.3 Wireless connection protection techniques available on the market are evaluated and those most suitable are selected, taking into account the principle of proportionality and the safety standards of the organization.

CR1.4 The services accessible through the telematics network employing cryptographic techniques to ensure the integrity and confidentiality of communications are implemented according to the parameters of the security regulations of the organization.

CR1.5 Services accessible through the telematics network that do not incorporate cryptographic techniques to ensure communications security use encapsulation services.

CR1.6 Services that incorporate support for digital certificates for server identification are used to guarantee the user the identity of the server.

RP2: Implement digital signature systems to ensure the authenticity, integrity and confidentiality of data involved in a transfer of information using cryptographic systems and protocols as required and within the organization's directives.

CR2.1 Access to services through the telematics network uses authentication based on digital certificates of personal identity.

CR2.2 The process of obtaining and verifying signatures is applied in case it is necessary according to the requirements of the computer system and the business processes

CR2.3 The transmission of e-mail messages use digital certificates to sign and encrypt their content.

CR2.4 Digital document signing systems using digital certificates are implemented according to the organization's security regulations.

CR2.5 The digital time sealing systems, to ensure the existence of a document on a given date, are implemented according to the security rules of the organization.

CR2.6 Web components are digitally signed to ensure the integrity of these components.

RP3: Implement public key infrastructures to ensure security by system standards and within organization directives.

CR3.1 The certification hierarchy is designed based on the needs of the organization and the usage that is to be given to the certificates.

CR3.2 The certification practice statement and certification policy are written in a way that defines the procedures and rights and obligations of the certification authority and the users.

CR3.3 The certification authority system is installed by following the manufacturer's instructions.

CR3.4 Certification authority certificate and certification policy are available to users in the form and manner necessary, following the guidelines contained in the certification practice statement.

CR3.5 The private key of the certification authority remains secure and with the backup copies set forth in the certification practice statement.

CR3.6 The issuance of digital certificates is performed according to the uses that the certificate will receive and following the procedures indicated in the certification practice statement.

CR3.7 The certificate revocation service maintains accessible certificate validity information issued by the certification authority as indicated in the certification practice statement.

Professional Context

Production media

Programs for secure connection. Systems for implementing digital certification authorities. Virtual private network (VPN) servers and clients. Secure media for digital certificates. Web servers with SSL/TLS support. Traffic encapsulators with cryptographic support (HW and SW). Secure connection programs to telematic services. Email interfaces with support for secure mail.

Products and results

Certification policy. Declaration of certification practices. Listing of certificates issued and certificates revoked. Guidelines and recommendations for the implementation of secure communication systems. Digital certificate utilization guides.

Information used or generated

Legal regulations on digital signatures. Standards and recommendations, generally written in English. Public key infrastructure (PKI) installation manuals.

Competition Unit 5

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Level: 3

Code: UC0490_3

Professional realizations and realization criteria

RP1: Manage system configuration to ensure the performance of processes according to the needs of use and within the directives of the organization.

CR1.1 The processes involved in the system are identified to evaluate performance parameters.

CR1.2 The parameters that affect system components: memory, processor, and peripherals, among others, conform to usage needs.

CR1.3 Process execution priorities are tailored according to the organization's operating plan specifications.

CR1.4 Monitoring tools are implemented and configured by determining alarm levels based on the organization's operating plan.

RP2: Administer storage devices according to the needs of use and within the directives of the organization.

CR2.1 Storage devices are configured to be used for the various operating systems used in the computer system.

CR2.2 The storage structure is defined and implemented based on the needs of the various file systems and the organization's usage specifications.

CR2.3 The object naming requirements and usage restrictions for each storage device are properly documented.

CR2.4 Storage devices are integrated to provide a functional system to the user according to the organization's specifications.

RP3: Manage user tasks to ensure system access and resource availability according to the operating specifications of the computer system.

CR3.1 User access to the computer system is configured to ensure system security and integrity according to the organization's specifications.

CR3.2 User access to resources is administered by assigning permissions based on the needs of the organization.

CR3.3 The resources available to users are limited to the appropriate tools based on what is specified in the organization's usage rules.

RP4: Manage network services to ensure communication between computer systems according to operating needs.

CR4.1 The communications devices are verified in terms of their configuration and performance according to the organization's specifications.

CR4.2 Communications services are identified in the system with their corresponding processes to analyze resource consumption and verify that they are within the scope of the operating plan specifications of the organization.

CR4.3 The incidents in the communications services are detected and documented to inform those responsible for the operation of the system and the management of communications according to the protocols of the organization.

Professional Context

Production media

Operating systems. User administration tools and resource permission management. Performance control tools. Process monitoring tools. Memory usage monitoring tools. Storage device management monitoring tools. User management tools.

Products and results

System operating correctly. System performance appropriate to the operating parameters. Secure and integrated system for access and use of resources. Communications services in operation.

Information used or generated

Operating system and device operating manuals. Plan of operation of the organisation. Manuals of the monitoring tools used. Graphics and performance analysis. Access listings and user restrictions. Incident report. Action protocol to incidents.

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: SECURITY ON COMPUTER EQUIPMENT

Code: MF0486_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0486_3: Securing Computer Equipment

Duration: 90 hours

Assessment Capabilities and Criteria

C1: Analyze the organization's deployment plans to identify the elements of the system involved and the levels of security to implement.

CE1.1 Identify the structure of an implementation plan, explaining the contents listed in each section.

CE1.2 Distinguished systems that can appear in the deployment plan, describing the security capabilities they implement.

CE1.3 Describe the security levels listed in the deployment plan, by associating them with access permissions for deployment.

CE1.4 In a scenario where you are asked to analyze the implementation plan and its impact on the system:

-Determine the systems involved in the deployment plan.

-Analyze the security requirements for each system.

-Describe the security measures to be applied to each system.

-Meet the forms for the declaration of personal data files.

C2: Analyze and implement the physical and logical access mechanisms to the servers according to security specifications.

CE2.1 Describe the characteristics of the physical access control mechanisms, explaining their main functions.

CE2.2 Expose trace mechanisms, associating them with the server operating system.

CE2.3 Identify the logical access control mechanisms, explaining their main features (passwords, IP port filtering among others).

CE2.4 In a scenario of implementing a server according to specifications given:

-Determine the physical location of the server to ensure its functionality.

-Describe and justify the physical security measures to be implemented to ensure system integrity.

-Identify additional modules or applications to implement the level of security required by the server.

-Determine the threats to which the server is exposed, assessing the risk they pose, given the context of the server.

-Determine the permissions assigned to users and user groups for system utilization.

C3: Evaluate the function and need for each running service on the server according to the security specifications.

CE3.1 Identify the usual services in an organization's computer system, describing its mission within the computing and communications infrastructure.

CE3.2 Identify and describe the services required for the operation of a server, based on its mission within the organization's computer system.

CE3.3 Describe the threats of running services, applying the most restrictive permissions, which ensure their execution and minimize the risk.

CE3.4 In a convenient deployment scenario of a server with a set of services running with a mapping to a given operating plan:

-Indicate the relationships between that server and the rest of the organization's computer system.

-Extract the security requirements applicable to the server from the implementation plan.

-Determine the minimum services required for system operation.

C4: Install, configure, and administer a server firewall with the required features according to security specifications.

CE4.1 Classify firewall, network and local types, hardware and software, package and application types, describing their main features and features.

CE4.2 Describe the filtering rules of a server firewall, explaining the main parameters.

CE4.3 Explain the trace format of a server firewall, reflecting the relevant security information.

CE4.4 From a scenario of installing a server firewall on a local and remote access scenario:

-Determine the server security requirements.

-Set the server relationships to the other computers in the computer system.

-Develop the list of access rules to implement on the server.

-Compose a firewall test plan implemented.

-Run the test plan, writing the necessary corrections to correct the detected deficiencies.

Contents

1. Commonly accepted general criteria on the security of computer equipment

-Risk management-oriented security model related to the use of information systems

-Relation of the most frequent threats, the risks involved, and the most frequent safeguards

-Most common security technologies and safeguards

-Managing IT security as a complement to safeguards and technology measures

2. Business Impact Analysis

-Identifying business processes supported by information systems

-Assessing the requirements of confidentiality, integrity, and availability of business processes

-Determining the information systems that support business processes and their security requirements

3. Risk Management

-Applying the risk management and exposure process for the most frequent alternatives

-commonly accepted methodologies for identification and risk analysis

-Applying controls and safeguard measures to obtain a risk reduction

4. Security implementation plan

-Determining the existing security level of the systems versus the required level based on the security requirements of the business processes.

-Selecting safeguard measures to cover the security requirements of information systems

-Guide to the elaboration of the implementation plan for the selected safeguards

5. Personal data protection

-General principles of personal data protection

-Infractions and penalties provided for in current legislation on the protection of personal data

-Identifying and registering files with personal data used by the organization

-Elaboration of the security document required by the current legislation in the field of personal data protection

6. Physical and industrial security of the systems. System logical security

-Determining physical security perimeters

-More frequent physical access control systems to the organization's facilities and to the areas where the computer systems are located

-Security criteria for the physical placement of computer systems

-Exposure of more frequent elements to ensure the quality and continuity of the electrical supply to the computer systems

-Air conditioning and fire protection requirements applicable to computer systems

-Making the physical and industrial security regulations for the organization

-Most frequently used file systems

-Setting the access control of computer systems to the organization's communications network

-Configuring user directory policies and directives

-Setting access control lists (ACLs) to files

-Managing high, low, and user modifications and the privileges that are assigned

-Security requirements related to user access control to the operating system

-Weak, strong, and biometric user authentication systems

-Relation of the operating system audit records required to monitor and monitor access control

-Making access control regulations to computer systems

7. Service Identification

-Identifying the protocols, services, and ports used by the information systems

-Using open services and port analytics tools to determine those that are not required

-Using communications traffic analysis tools to determine the actual usage of the information systems for the various protocols, services, and ports

8. System robustness

-Modifying the default users and passwords of different information systems

-Configuring password and privilege management directives in the user directory

-Removing and closing expendable tools, utilities, services, and ports

-Configuring information systems to use secure protocols where possible

-Updating computer systems security patches

-Protecting information systems from malicious code

-Secure management of communications, shared folders, printers, and other shared system resources

-Monitoring the security and proper use of information systems

9. Firewall implementation and configuration

-Relation of different types of firewalls by location and functionality

-Security criteria for network segregation in the firewall using DMZ/DMZ

-Using Virtual Private Networks/VPNs to establish secure communications channels

-Defining cut rules in firewalls

-Relation of the firewall audit records required to monitor and monitor their correct operation and security events

-Setting firewall monitoring and testing

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Distance-

Formative Module-MF0486_3

90

40

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: COMPUTER SECURITY AUDITING

Code: MF0487_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0487_3: Audit communication networks and computer systems

Duration: 90 hours

Assessment Capabilities and Criteria

C1: Analyze and select the computer system's vulnerability detection and auditing tools by deploying those that conform to the IT security specifications.

CE1.1 Explain the differences between vulnerabilities and threats.

CE1.2 Enunciate the characteristics of the main types of vulnerabilities and existing malicious programs, describing their particularities.

CE1.3 Describe the operation of a vulnerability analysis tool, indicating the main techniques used and the reliability of the vulnerabilities.

CE1.4 Select the most appropriate security auditing tool based on the server or network and the security requirements.

CE1.5 From a practical assumption, to a given computer system in concrete implementation circumstances:

-Set the security requirements that each system must meet.

-Create a new test for the audit tool, based on the vulnerability specifications.

-Develop the test plan considering the type of server analyzed.

-Use multiple tools to detect potential vulnerabilities

-Analyze the result of the audit tool, discarding false positives.

-Compose the audit report, reflecting detected irregularities, and suggestions for regularisation.

C2: Apply procedures regarding compliance with current legal regulations.

CE2.1 Explain the current legal (regional, national, European and international) regulations applicable to personal data.

CE2.2 Expose the legal procedures for files with personal data, taking into account the quality of the files.

CE2.3 Describe the security levels set in the current legal regulations by associating them with the required requirements.

CE2.4 From a scenario, in which an organization information record structure is available:

-Identify files with personal data, justifying the level of security that corresponds to it.

-Develop the compliance audit plan for personal data protection legislation.

-Review documentation associated with files with personal data, identifying existing gaps.

-Develop the report for personal files, indicating the deficiencies found and the appropriate corrections.

C3: Plan and apply security measures to ensure the integrity of the computer system and the entry and exit points of the departmental network.

CE3.1 Identify the phases of the risk analysis, describing the objective of each of them.

CE3.2 Describe the terms associated with risk analysis (threat, vulnerability, impact, and countermeasures), establishing the relationship between them.

CE3.3 Describe network analysis techniques, explaining the selection criteria.

CE3.4 Describe common network firewall topologies, indicating their core functionalities.

Contents

1. Commonly accepted general criteria on computer auditing

-Audit function deontological code

-Relation of different types of audit in the framework of information systems

-Criteria to be followed for the composition of the auditor team

-Test types to be performed in the audit framework, substantive tests, and compliance tests

-Sample types to apply during the audit process

-Using the Computer Assisted Audit Tools (CAAT) type tools

-Explanation of requirements to be met by audit findings

-Applying common criteria to categorize findings as observations or non-conformities

-Relation of regulations and methodologies related to auditing commonly accepted information systems

2. Application of personal data protection regulations

-General principles of personal data protection

-European legislation contained in Directive 95 /46/EC

-National regulations collected in the penal code, Organic Law for Automated Data Processing (LORTAD), Organic Law on Data Protection (LOPD) and the Regulation on the Development of the Organic Law on Data Protection (RD). 1720/2007)

-Identifying and registering files with personal data used by the organization

-Explanation of security measures for the protection of personal data collected in Royal Decree 1720/2007

-Guide to the implementation of the mandatory biennial audit of organic law 15-1999 personal data protection

3. Risk analysis of information systems

-Introduction to risk analysis

-Major types of vulnerabilities, program failures, malicious programs, and their permanent update, as well as secure programming criteria

-Particularities of different types of malicious code

-Key elements of risk analysis and their relationship models

-Qualitative and quantitative risk analysis methodologies

-Identification of assets involved in risk analysis and their valuation

-Identifying threats that can affect previously identified assets

-Analysis and identification of existing vulnerabilities in information systems that would allow for the materialization of threats, including local analysis, remote white box and black box analysis

-Optimizing the audit and audit report and vulnerability audit process

-Identification of existing safeguard measures at the time of risk analysis and its effect on vulnerabilities and threats

-Setting the risk scenarios understood as active-threat pairs capable of materializing

-Determining the probability and impact of materialization of scenarios

-Setting the risk level for different asset and threat pairs

-Determination by the organisation of the risk assessment criteria, on the basis of which it is determined whether a risk is acceptable or not

-Relation of different risk management alternatives

-Guide to drawing up the risk management plan

-NIST SP methodology exposure 800-30

-Exposition of the Magerit version 2 methodology

4. Using tools for system auditing

-Ping, Traceroute type operating system tools, etc.

-Network analysis tools, Nmap, Netcat, NBTScan, etc.

-Nessus type vulnerability analysis tools

-WireShark, Dsniff, Cain & Abel type protocol-Analizers, etc.

-Acunetix, Dirb, Parosproxy, etc.

type Web pages.

-Brutus-type dictionary and brute force attacks, John the Ripper, etc.

5. Description of the firewall aspects in Computer Systems audits.

-General firewall principles

-Components of a network firewall

-Relation of different types of firewalls by location and functionality

-Network firewall architects

-Other network firewall architectures

6. Guides for the execution of the different phases of the information systems audit

-Guide to auditing existing security documentation and regulations in the audited organization

-Guide to crafting the audit plan

-Guide for Audit Tests

-Guide to crafting the audit report

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Distance-

Formative Module-MF0487_3

90

40

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: COMPUTER SECURITY INCIDENT MANAGEMENT

Code: MF0488_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0488_3: Detect and respond to security incidents

Duration: 90 hours

Assessment Capabilities and Criteria

C1: Plan and implement intrusion detection systems according to security rules.

CE1.1 Describe intrusion detection and prevention techniques, exposing the main parameters that can be used as detection criteria.

CE1.2 Determine the number, type and location of intrusion detection systems, ensuring traffic monitoring indicated in the implementation plan.

CE1.3 Select the rules of the intrusion detection system, depending on the computer system to monitor.

CE1.4 Determine the system alarm thresholds, taking into account the system usage parameters.

CE1.5 Develop detection rules, based on the characterization of intrusion techniques.

CE1.6 From a convenient convenient scenario where servers with local and remote access capability are located:

-Install and configure alarm collection software.

-Configure different levels of alarm collection.

CE1.7 In a collection of scenarios in a controlled environment of servers in multiple areas of a departmental network with Internet connection:

-Decide areas to protect.

-Install an intrusion detection system.

-Define and apply detection rules.

-Verify system operation by attacking protected areas.

-Prepare a report detailing conclusions.

C2: Apply the information analysis and attack containment procedures to a detected incident.

CE2.1 Analyze information for intrusion detection systems, extracting those security-relevant events.

CE2.2 Analyze the intrusion indicia, indicating the constraints necessary for the threat to materialize.

CE2.3 Classify the elements of the intrusion detection system alerts by setting the possible mappings between them, distinguishing the alerts by security times and levels.

CE2.4 From a practical assumption, in which they make attempts to break into the computer system:

-Collect alerts from intrusion detection systems.

-Relate events collected by intrusion detection systems.

-Determine those significant alerts.

-Develop the appropriate report indicating the possible intrusions and associated risk for the security of the organization's computer system.

CE2.5 Set up intrusion detection tools update processes to ensure their functionality according to manufacturers ' specifications.

C3: Analyze the extent of damage and determine recovery processes against a detected incident.

CE3.1 Describe the phases of the action plan against security incidents, describing the objectives of each phase.

CE3.2 Indicate the phases of the forensic analysis of computer equipment, describing the objectives of each phase.

CE3.3 Classify the evidence types of the forensic analysis of systems, indicating their characteristics, methods of collection and analysis.

CE3.4 Describe the various techniques for malicious program analysis, indicating use cases.

CE3.5 In a scenario, in which an intrusion has occurred on a computer system:

-Perform the collection of volatile evidence.

-Perform non-volatile evidence collection.

-Preliminary evidence analysis.

-Temporary file system activity analysis.

-Develop the final report, collecting the evidence found, the possible vulnerabilities used for intrusion and the activity performed by the intruder that has been detected in the system.

CE3.6 Standardize disaster recovery methods for computer equipment in the face of intrusion detection.

Contents

1. Intrusion detection and prevention systems (IDS/IPS)

-General incident management concepts, intrusion detection, and prevention

-Identifying and characterizing system operation data

-Most frequent architects of intrusion detection systems

-Relation of different types of IDS/IPS by location and functionality

-Security criteria for setting the IDS/IPS location

2. Implementation and production of IDS/IPS systems

-Previous analysis of the services, protocols, zones, and teams that the organization uses for its business processes.

-Defining intrusion attempt-break policies in IDS/IPS

-Analysis of IDS/IPS-registered events to determine false positives and characterize them in IDS/IPS cutting policies

-Relation of the IDS/IPS audit records required to monitor and monitor their correct operation and intrusion attempt events

-Setting the required levels of IDS/IPS update, monitoring, and testing

3. Control of malicious code

-Malicious code detection and containment systems

-Relation of different types of malicious code control tools depending on the topology of the installation and the paths of infection to control

-Security criteria for configuring protection tools against malicious code

-Determining requirements and techniques for updating protection tools against malicious code

-Relation of the audit records of the malicious code protection tools needed to monitor and monitor their correct operation and security events

-Setting up monitoring and testing of protection tools against malicious code

-Analyzing malicious programs using disassemblers and controlled execution environments

4. Response to security incidents

-Security incident-related information collection procedure

-Exposing the various techniques and tools used for the analysis and correlation of security information and events

-Intrusion verification process

-Nature and functions of national and international CERT type incident management bodies

5. Process of notification and management of intrusion attempts

-Setting up responsibilities in the process of notification and management of intrusion attempts or infections

-Categorization of incidents derived from intrusion attempts or infections based on their potential impact

-Criteria for determining the objective evidence in which incident management will be supported

-Setting up the process of detecting and recording incidents derived from intrusion or infection attempts

-Guide to the classification and initial analysis of the intrusion or infection attempt, contemplating the foreseeable impact of the intrusion or infection

-Setting the required level of intervention based on the foreseeable impact

-Guide to investigating and diagnosing the attempted intrusion or infection incident

-Setting up system resolution and recovery processing after an incident that is derived from an intrusion or infection attempt

-Process for communication of incident to third parties, if applicable

-Setting the incident closure process and the records needed to document the incident history

6. Computer forensic analysis

-General concepts and objectives of forensic analysis

-Lockard Principle Exposition

-Guide to the collection of electronic evidence:

volatile and non-volatile evidence

Evidence Labeling

Custody Chain

hidden files and directories

System Hidden Information

Recovering Deleted File Recovery

-Guide to the analysis of collected electronic evidence, including the study of hidden files and directories, hidden system information and recovery of deleted files

-Guide to selecting forensic analysis tools

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Distance-

Formative Module-MF0488_3

90

40

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 4

Naming: SECURE ACCESS AND DATA TRANSMISSION SYSTEMS

Code: MF0489_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0489_3: Design and implement secure data access and transmission systems

Duration: 60 hours

Assessment Capabilities and Criteria

C1: Evaluate the existing encryption techniques to choose the one required based on the required security requirements.

CE1.1 Describe the differences between private key and public key encryption algorithms, indicating their different uses.

CE1.2 Identify the different encryption modes, describing the main features.

CE1.3 Classify the different private key algorithms, describing their execution phases.

CE1.4 Classify the different public key algorithms, describing their execution phases.

CE1.5 Identify the different key exchange protocols, describing their operation.

C2: Implement cryptographic services and techniques on services that require it according to computer security specifications.

CE2.1 Justify the need to use cryptographic techniques in communications between computer systems based on the channels used.

CE2.2 Define encryption techniques to securely connect two networks by describing the necessary functionalities and requirements.

CE2.3 Define the techniques used to securely connect two computers (SSL and SSH tunnels), describing the necessary functionalities and requirements.

CE2.4 In a scenario, where you want to establish secure communication between two computer systems:

-Analyze the security requirements of the proposed communications architecture.

-Indicate the most indicated solution, justifying the selection.

-Install VPN and IPSec services to connect networks.

-Install SSL or SSH tunnel services to connect distant computers.

C3: Use digital certificate systems in those communications that require integrity and confidentiality according to security specifications.

CE3.1 Identify the attributes used in digital certificates for server, describing their settings and function.

CE3.2 Describe the modes of using digital certificates, associating them with security specifications: confidentiality, integrity, and accessibility.

CE3.3 Describe the structure of a digital sealing system, indicating the functions of the elements that integrate it.

C4: Design and implement digital certification services according to operating and security needs.

CE4.1 Describe the structure of the public key infrastructure, indicating the functions of the elements that integrate it.

CE4.2 Describe the services and obligations of the certification authority, relating them to the certificate policy and the certification practice statement.

CE4.3 Identify the mandatory and optional attributes of a digital certificate, describing the usual use of these attributes.

CE4.4 Describe the structure of a privilege management framework, indicating the functions of the elements that integrate it.

CE4.5 Determine the fields of the attribute certificates, describing their usual usage and the existing relationship with the digital certificates.

CE4.6 In a scenario, where you want to set a certification system for a computer system:

-Design a public key infrastructure, depending on your specifications.

-Justify the designed certification authority hierarchy.

-Issue the certificates following the procedures indicated in the Certification Practices Statement.

Contents

1. Cryptography

-Historical perspective and objectives of cryptography

-Information theory

-Security properties that can be controlled by application of cryptography: confidentiality, integrity, authenticity, non-repudiation, imputability and time stamp

-Key elements of public key and private key cryptography

-Features and attributes of digital certificates

-Identifying and describing the operation of the most frequently used key exchange protocols

-Most frequently used cryptographic algorithms

-Elements of digital certificates, commonly accepted formats, and their use

-Fundamental elements of summary functions and criteria for use

-Legal requirements included in law 59/2003, dated December 19, electronic signature

-Key elements of digital signature, different types of signature, and criteria for use

-Criteria for using flow and block encryption techniques

-Key exchange protocols

-Using PGP, GPG, or CryptoLoop type encryption tools

2. Applying a public key infrastructure (PKI)

-Identifying the components of a PKI and its relationship model

-Certification authority and its elements

-Certificate Policy and Certification Practice Statement (CPS)

-List of revoked certificates (CRLs)

-Running certificate signing (CSR) requests

-Privilege Management Infrastructure (PMI)

-Attribute certificate fields, include the description of their common uses and the relationship to digital certificates

-Applications that support the existence of a PKI

3. Secure communications

-Defining, purpose, and functionality of virtual private networks

-IPSec Protocol

-SSL and SSH protocols

-VPN SSL systems

-Encrypted Tunnels

-Advantages and drawbacks of different alternatives for the implementation of VPN technology

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Distance-

Formative Module-MF0489_3

60

40

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

TRAINING MODULE 5

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Code: MF0490_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0490_3: Manage services on the computer system

Duration: 90 hours

Assessment Capabilities and Criteria

C1: Analyze system processes in order to ensure proper performance for the parameters specified in the operating plan.

CE1.1 Identify the system processes and parameters that characterize them (parent processes, process status, resource consumption, priorities, and affected users among others) to determine their influence on the performance of the system.

CE1.2 Describe each of the tools provided by the system for process management to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a scenario where you have a computer system with a properly characterized process load:

-Use system tools to identify how many active processes exist and the particular characteristics of any of them.

-Perform activation, deactivation, and priority modification operations among others with a process using the system tools.

-Monitor system performance by using specific tools and setting alarms, which indicate risk situations.

C2: Apply administration procedures to storage devices to provide the user with a complete, secure, and available information record system.

CE2.1 Identify the various usable file systems on a given storage device to optimize the logging and access processes.

CE2.2 Explain the features of file systems based on the storage devices and operating systems used.

CE2.3 Describe the overall storage structure in the computer system by associating the devices with the different existing file systems.

CE2.4 In a scenario where you have an information storage system with multiple devices:

-Perform partitioning, where necessary, and the generation of the infrastructure of the file systems to be installed on each device.

-Implement the overall storage structure by integrating all devices and their corresponding file systems.

-Document the requirements and constraints of each file system in place.

C3: Manage system access and resources to verify the proper and safe use of them.

CE3.1 Identify system access capabilities by distinguishing remote access from local accesses.

CE3.2 Describe the tools that are used in the management of permissions to users for the use of system resources.

CE3.3 In a scenario that has the right of user administration:

-Identify a user's possible access to the system.

-Modify the permissions of using a system resource to a user.

-Define limitations of using a system resource to users.

C4: Evaluate the usage and performance of communications services to keep them within specified parameters.

CE4.1 Explain the configuration and operation parameters of communications devices to ensure their functionality within the system.

CE4.2 Relate the active communications services on the system to the devices used by them to analyze and evaluate performance.

CE4.3 In a practical scenario in which we take a computer system connected to the outside by means of several lines of communication:

-Identify communications devices and describe their characteristics.

-Verify the status of the communications services.

-Evaluate the performance of communications services.

-Detect and document the incidents produced on the system.

Contents

1. Security and regulatory management

-ISO 27002 Code of Best Practices for Information Security Management

-ITIL Information Technology Infrastructure Library Methodology

-Organic law for the protection of personal data.

-Regulations more frequently used for physical security management

2. Analysis of the systems processes

-Identifying business processes supported by information systems

-Fundamental features of electronic processes

Process States of a Process,

Signal Handling, Administration, and Change in Priorities

-Determining the information systems that support the business processes and the assets and services used by them

-Analysis of operating system capabilities for process and service monitoring

-Techniques used for resource consumption management

3. Demonstration of storage systems

-More frequent storage device types

-Features of available file systems

-Organization and overall storage structure

-System tools for managing storage devices

4. Using system performance monitoring metrics and indicators

-Criteria for establishing the overall framework for the use of metrics and indicators for monitoring information systems

-Identifying the objects for which indicators need to be obtained

-Aspects to define for indicator selection and definition

-Setting performance thresholds for information systems

-Collecting and analyzing data contributed by the indicators

-Consolidating indicators under a unified information system performance dashboard

5. Making the process of monitoring systems and communications

-Identifying communications devices

-Analysis of communications protocols and services

-Major configuration and operation parameters for communications equipment

-Monitoring and Response Processes

-Sniffer port and port usage monitoring tools

-Hobbit, Nagios, or Cacti system and service monitoring tools

-Security Information and Event Management Systems (SIM/SEM)

-Managing network and filtering element records (router, switch, firewall, IDS/IPS, etc.)

6. Selecting the registration system based on the requirements of the organization

-Determining the level of records required, retention periods, and storage needs

-Analysis of legal requirements in reference to registration

-Selecting safeguard measures to cover the security requirements of the system of records

-Assigning responsibilities for managing the record

-Storage alternatives for system logs and their performance, scalability, confidentiality, integrity, and availability features

-Guide to selecting the storage and custody system for records

7. Administering appropriate access control for information systems

-Analysis of the access requirements of the various information systems and shared resources

-commonly accepted principles for access control and different local and remote access types

-Legal requirements in reference to access control and privilege assignment

-Access profiles in relation to the functional roles of the organization's staff

-Active directory tools and LDAP servers in general

-Identity and Identity Management System (IAM) tools

-Single Sign On (SSO) Authentication Single Point Systems Tools

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Distance-

Formative Module-MF0490_3

90

40

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

COMPUTER SECURITY NON-WORK PROFESSIONAL PRACTICE MODULE

Code: MP0175

Duration: 80 hours

Assessment Capabilities and Criteria

C1: Provide technical support for security.

CE1.1. Provide technical assistance in the design and configuration of security solutions.

CE1.2. Support other areas in process design and re-engineering tasks to bring security insight.

CE1.3. Act as a liaison between the various areas of the company to coordinate multi-departmental security measures.

CE1.4. Analyze specific rules developed by specific technical areas for corporate security tools.

CE1.5. Coordinate the use of encryption tools and key management

CE1.6. Provide technical support to the appropriate steering committees.

CE1.7. Evaluate and keep permanently informed of the errors, reports, news, bulletins, etc. of security received and give the first level of support and distribution.

CE1.8. Develop operational policies and procedures in the field of information security and support the different areas of the organization for its production.

C2: Verify the correct application of security measures.

CE2.1. Perform the necessary verifications to determine the degree of vulnerability of the different technology platforms, as well as the other periodic security reviews of the information systems.

CE2.2. Keep the organization's risk analysis up to date

CE2.3. Coordinate technical security audits.

C3: Participate in the company's work processes, following the rules and instructions set out in the job center.

CE3.1 Behave responsibly in both human relationships and the jobs to be performed.

CE3.2 Respect the procedures and rules of the work center.

CE3.3 Diligently undertake the tasks according to the instructions received, trying to bring them into line with the work rate of the company.

CE3.4 Integrate into the production processes of the job center.

CE3.5 Use the established communication channels.

CE3.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Review of the information security situation

-Review internal security rules

-Reviewing user management, privileges, and password policy

-Review of backups

-Review of incidents that occurred

-Review of the situation regarding protection against malicious code

-Review of data network security

-Reviewing server and job security

-Review of physical security, electrical supply, air conditioning and fire protection as appropriate

2. Configuring security-related rules

-Configuring the security of the router

-Configuring the security of the switch

-Configuring firewall/firewall security

-Configuring the security of the intrusion detection system

-Configuring antivirus/security

3. Communication of security-related aspects

-Setting channels to keep the organization up to date on security

-Setting internal channels to coordinate security between departments in the organization

4. Security monitoring

-Monitoring communications

-Monitoring system performance

5. Application of security regulations and methodology

-Applying good security practice codes to the day-to-day management of information systems

-Integrating security requirements into the organization's business processes

6. Integration and communication in the workplace

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the organization's production process.

-Using the communication channels set in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

*Professional experience in the scope of the competency

If you have accreditation

If you do not have

MF0486_3:

Securing Equipment

• Licensed, Engineer, Architect or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect or the corresponding degree title or other equivalent titles.

1 year

3 years

MF0487_3:

Computer Security Audit

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect, or corresponding degree or degree title other equivalent titles.

2 years

4 years

MF0488_3:

Computer Security Incident Management

• Bachelor, Engineer, Architect or corresponding degree of degree or other equivalent qualifications.

• Diplomacy, Technical Engineer, Technical Architect or corresponding degree of degree or other titles equivalents.

1 year

3 years

MF0489_3:

Secure Systems data access and transmission

• Licensed, Engineer, Architect, or the corresponding degree title or other equivalent titles.

• Diplomat, Technical Engineer, Technical Architect or corresponding degree of degree or other equivalent titles.

1 year

3 years

MF0490_3:

Service Management on the computer system

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect or corresponding degree degree or other equivalent titles.

2 years

4 years

* For the last three years.

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forming Space

Surface m2

15 pupils

Surface m2

25 pupils

Classroom

45

60

Forming Space

M1

M2

M3

M4

M5

Classroom

X

X

X

X

X

Forming Space

Classroom

-Audio-visual equipment

-Network-installed PCs, projection canon, and internet

-Specialty-specific software

-Pizars to write with marker

-Rotafolios

-Classroom material

-Table and chairs for trainers

-Messes and chairs for pupils

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

Facilities and equipment must comply with the relevant industrial and hygiene regulations and respond to universal accessibility and safety measures for participants.

The number of units to be provided for the utensils, machines and tools specified in the training spaces shall be sufficient for a minimum of 15 students and must be increased, if appropriate, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX IV

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: DEPLOYMENT AND MANAGEMENT OF COMPUTER ELEMENTS IN DOMOTIC/INMOTIC SYSTEMS, ACCESS CONTROL AND PRESENCE, AND VIDEO SURVEILLANCE

Code: IFCT0409

Professional Family: Informatics and Communications

Professional area: Systems and Telematics

Professional qualification level: 3

Professional reference qualification:

IFC365_3 Implementation and management of computer elements in domotic/inmotic systems, access control and presence, and video surveillance (RD 1701/2007, 14 December)

Relationship of competency units that configure the certificate of professionalism:

UC0490_3: Manage services on the computer system

UC1219_3: Implant and maintain domotics-inmotic systems

UC1220_3: Implement and maintain access and presence control systems, and video surveillance

General competition:

Integrate and maintain computer and communications elements in automation systems of domotic and inmotic buildings, access control and presence and video surveillance at the level of hardware and software, assuring the operation of the different modules that make up them, in terms of quality and safety, in compliance with the regulations and regulations in force.

Professional Environment:

Professional scope:

Develops its professional activity on its own, as well as for others in companies or public or private entities of any size, dedicated to the design, implementation and maintenance of domotic/inmotic systems, access control and presence, and video surveillance.

Productive Sectors:

It is located mainly in the services sector, and mainly in companies whose activity aims to provide and maintain services related to the automation of housing and buildings, as well as with private security, relating to the implementation and maintenance of access and presence control systems, and video surveillance systems.

Occupations or related jobs:

An integrator of computer elements in home/inmotic systems.

An integrator of computer elements in access and presence control systems, and in video surveillance systems.

Expert for maintaining computer elements in access control and presence control systems, and in video surveillance systems.

Duration of the associated training: 540 hours.

Relationship of training modules and training units:

MF0490_3: (Cross) Service Management in the computer system (90 hours)

MF1219_3: Deployment and maintenance of domotic/inmotic systems (150 hours)

• UF1134: Installing and commissioning of a domotic/inmotic project (80 hours)

• UF1135: Domotic project connectivity: networks, systems and communication protocols; gateways (40 hours)

• UF1136: Documentation, maintenance, and incident management in a domotic project (30 hours)

MF1220_3: Deployment and maintenance of access and presence control systems, and video surveillance (220 hours)

• UF1137: Installation and commissioning of a Video Surveillance and Security system (90 hours)

• UF1138: Installation and commissioning of an Access and Presence Control system (90 hours)

• UF1139: Maintenance and Incident Management in Video Surveillance, Access Control, and Presence projects (40 hours)

MP0236: Non-working professional practice module for the implementation and management of computer elements in home/inmotic systems, access control and presence, and video surveillance (80 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Level: 3

Code: UC0490_3

Professional realizations and realization criteria

RP1: Manage system configuration to ensure the performance of processes according to the needs of use and within the directives of the organization.

CR1 .1. The processes involved in the system are identified to evaluate performance parameters.

CR1 .2. The parameters that affect system components: memory, processor, and peripherals, among others, conform to usage needs.

CR1 .3. Process execution priorities are tailored to the specifications of the organization's operating plan.

CR1 .4. Monitoring tools are implemented and configured by determining the levels of alarms based on the organization's operating plan.

RP2: Administer storage devices according to the needs of use and within the directives of the organization.

CR2 .1. The storage devices are configured to be used for the various operating systems used in the computer system.

CR2 .2. The storage structure is defined and implemented based on the needs of the various file systems and the organization's usage specifications.

CR2 .3. The object naming requirements and usage restrictions for each storage device are properly documented.

CR2 .4. The storage devices are integrated to provide a functional system to the user according to the specifications of the organization.

RP3: Manage user tasks to ensure system access and resource availability according to the operating specifications of the computer system.

CR3 .1. User access to the computer system is configured to ensure system security and integrity according to the organization's specifications.

CR3 .2. User access to resources is administered by assigning permissions based on the needs of the organization.

CR3 .3. The resources available to users are limited to the appropriate tools based on what is specified in the organization's usage rules.

RP4: Manage network services to ensure communication between computer systems according to operating needs.

CR4 .1. Communications devices are verified in terms of their configuration and performance according to the organization's specifications.

CR4 .2. Communications services are identified in the system with their corresponding processes to analyze resource consumption and verify that they are within the scope of the organization's operating plan specifications.

CR4 .3. Incidents in the communications services are detected and documented to inform those responsible for the operation of the system and the management of communications according to the protocols of the organization

Professional Context

Production media

Operating systems. User administration tools and resource permission management. Performance control tools. Process monitoring tools. Memory usage monitoring tools. Storage device management monitoring tools. User management tools.

Products and results

System operating correctly. System performance appropriate to the operating parameters. Secure and integrated system for access and use of resources. Communications services in operation.

Information used or generated

Operating system and device operating manuals. Plan of operation of the organisation. Manuals of the monitoring tools used. Graphics and performance analysis. Access listings and user restrictions. Incident report. Action protocol to incidents.

Competition Unit 2

Naming: IMPLANTING AND MAINTAINING DOMOTIC/INMOTIC SYSTEMS

Level: 3

Code: UC1219_3

Professional realizations and realization criteria

RP1: Configure and parameterize the computers and devices of the domotic/inmotic system for commissioning, according to the functional requirements of the project.

CR1.1 The specifications contained in the project of installation and/or integration of the domotic/inmotic system to be implemented are interpreted in order to identify the architecture, components and technologies involved on the system.

CR1.2 The verification and verification of the location and installation of the equipment, devices and infrastructure is performed to ensure the configuration, programming and commissioning of the domotic/inmotic system, the functional requirements of the project.

CR1.3 The physical and logical configuration and parameterization of the equipment and devices that form the domotic/inmotic system is planned and performed, in order to be put into service, in compliance with the established functional requirements for the project and in accordance with the procedures established by the organization.

CR1.4 The configuration of the different residential gateways, if any, is done to connect the various internal networks that make up the domotic/inmotic system with the public data networks, to access the services that provide and enable two-way access to the system from the outside according to project specifications.

CR1.5 The commissioning of the domotic/inmotic system is performed, following the testing protocol established by the organization and according to the functional specifications of the project.

CR1.6 The home/inmotic system commissioning report is made, including the configuration of the equipment, devices and commissioning tests performed, in order to record the information for later use, according to organization rules.

CR1.7 The associated specific technical documentation is interpreted, if any, in the most frequent foreign language in the sector.

RP2: Develop and maintain inventories of equipment and devices, and of the software that make up the home/inmotic system, to ensure their identification and location, following the rules established by the organization.

CR2.1 The inventory of hardware components and software applications is made to record the characteristics, location, and status of the components, according to the rules of the organization.

CR2.2 The systems and applications configurations of the domotic/inmotic system are recorded in the inventory, according to the procedure established by the organization, to facilitate the recovery work in case of failures.

CR2.3 The inventory is kept up to date by recording all changes in the home/inmotic system, both at the hardware level, as well as software and configuration, according to the procedure established by the organization.

CR2.4 The technical manuals of the domotic/inmotic system devices and equipment are recorded and referenced in the generated documentation, for later use, according to the procedure established by the organization.

RP3: Adjust control software and create programs to add functionality to the home/inmotic system, integrating them into the monitoring and control application (control software) using tools programming and software development standards, according to technical specifications and system needs.

CR3.1 The configuration and parameterization of the system control software is planned and performed for operation, according to the functional requirements set by the project, the protocols of configuration established by the software elements of the domotic/inmotic system and the procedures established by the organization.

CR3.2 The verification and verification of the location and installation of the monitoring and control equipment of the system, are performed to ensure its configuration, programming and implementation, following technical specifications of the project.

CR3.3 The programming of control software functionalities is performed taking into account the different techniques and languages of development and reference standards of domotic/inmotic control systems, using the tools provided by the system, according to technical specifications and usage needs.

CR3.4 The residential gateway, if any, is configured by implementing new services and applications, using software development standards for these services, according to specified needs.

CR3.5 The testing of the display and control functions of the system is performed to verify that they meet the specifications of the project, following the protocol established by the organization.

CR3.6 The implementation report of the monitoring and control application is made, including the activities carried out and the detected incidents, for later use, following the rules established by the organization.

RP4: Maintain the domotic/inmotic system at both hardware and software levels to ensure its operation, according to functional requirements and quality criteria set out in the project.

CR4.1 The specific procedures for the maintenance of equipment and devices that make up the domotic/inmotic system are defined to ensure their functionality, taking into account the technical specifications of the same.

CR4.2 The preventive maintenance plan for the domotic/inmotic system is developed to ensure continuity in the delivery of the service, in accordance with the specific procedures required by the components of the system, and by the organization.

CR4.3 The location of breakdowns and repair or replacement of the hardware and software components of the computer system that supports the home/inmotic system is performed to keep it operational, using tools specific, applying the standard procedures and complying with the safety standards established by the organisation.

CR4.4 The home identification and resolution manual for the domotic/inmotic system is developed and updated each time a new incidence is detected, indicating the most relevant information regarding the agreement with the specific procedures required by the system components, indicating tasks, times and expected results.

Professional Context

Production media

Laptop, desktop PC, and peripherals. Proprietary computer applications for domotic system configuration. Hardware elements software databases. Software applications for 2D and 3D design. IT applications for maintenance management. Measuring instruments: polymeter, timer, luxometer, among others. Reference standards for the development of domotic/inmotic systems. Domotic/inmotic systems and devices. Control software for domotic/immodic systems.

Products and results

Setting up and starting the inmotic/domotic system. Preventive maintenance of the hardware and software components of the domotic/inmotic system. Corrective maintenance of the hardware and software components of the domotic/inmotic system.

Information used or generated

Engineering project of the domotic/inmotic system. Technical documentation, installation manuals and use of hardware elements of the domotic/inmotic system. Technical documentation, installation manuals and use of the software applications of the domotic/inmotic system. Electrical installation documentation of the hardware elements of the domotic/inmotic system. Low voltage electrotechnical regulation (REBT). Regulation of common telecommunications infrastructure (ICT). Specifications of the domotic/inmotic system. Planning for the configuration and parameterization of the domotic/inmotic system. Topology documentation, configuration of elements (parameters, values, IP addresses, physical addresses) of the home/inmotic system. The invention relates to a process document for testing the home/inmotic system. Minutes of commissioning and delivery of the system. Procedure document for maintenance actions of the domotic/inmotic system. Preventive and corrective maintenance reports/actas/parts of the domotic/inmotic system. Domotic system operating user manual: domotic/inmotic system control hardware and software.

Competition Unit 3

Naming: IMPLEMENT AND MAINTAIN ACCESS AND PRESENCE CONTROL SYSTEMS, AND VIDEO SURVEILLANCE

Level: 3

Code: UC1220_3

Professional realizations and realization criteria

RP1: Interpret the technical specifications of the project and verify your installation to implement the access and presence control system, and video surveillance, according to the needs of the organization.

CR1.1 The risk analysis and specifications in the installation project of the access and presence control system, and video surveillance to implement, are interpreted in order to identify the architecture and system components to be implemented.

CR1.2 The planning of the operations to be developed is done in accordance with the human and material resources available, to optimize the process of implementation of the systems, taking into account the framework of the current regulations and design specifications.

CR1.3 The infrastructure (wiring, connection cabinets, power supplies) and control equipment, the collection and drive elements (barriers, electrical lockers, passing portilons, tornos, etc.) The invention also includes the use of the invention and the use of the same. The invention also includes a method for the use of the same and the use of the same. system.

CR1.4 The infrastructure (wiring, connection cabinets, power supplies), the characteristics and location of the image capture elements (cameras and domes, among others), of the detectors of the presence of the signal processing equipment (multiplexers, sequencers, matrices, videorecorders, videowall and keyboards, among others) and display devices (monitors) of the video surveillance systems, are verified throughout the assembly process with respect to functional characteristics, elements and zones to be protected to ensure system functionality, following system project specifications.

CR1.5 The installed equipment and devices that make up the access and presence control system are adjusted and configured to test their functionality and ensure their operation, according to technical specifications system project.

CR1.6 The installed equipment and devices, as well as the motorized elements of the video surveillance system are adjusted and configured, to ensure the integration of the same and the achievement of the objectives of the system, according to the functional and technical characteristics prescribed in the technical and design documentation.

CR1.7 The activities performed are documented in normalized format for later use, following the procedure set by the organization.

RP2: Implement the access control and presence control systems in the organization, according to the design requirements and specifications set out in the project.

CR2.1 The associated computer and peripheral equipment is physically configured, and the user control and management applications are installed and configured according to the access profiles established in the design specifications, to ensure the security and reliability of the system information, taking into account the specifications of the organisation and current regulations.

CR2.2 The access control terminals and the presence of the users and their biometric elements, are programmed and parameterized to fill in the rules of access control and presence, according to the profiles and access levels prescribed in the system project specifications.

CR2.3 The software application that centralizes system control, is installed and configured, and is verified to be compatible with the equipment you have to control, to ratify the functionality of the control system access and presence, according to the parameters set out in the design specifications.

CR2.4 The initial load of the data from the access and presence control system is performed and verified to ensure its integrity and compliance with the current legal regulations on data protection, according to the organization security.

CR2.5 The information recorded in the system is treated with query and reporting tools for a distribution of the same, ensuring continuity of service delivery and security in the access and use of such information, complying with data protection regulations and in accordance with the organization's contingency and security plans.

CR2.6 The backup generation tool for controls and records is integrated with the system and is configured for users to have access, according to security plans and the current legal regulations on data protection.

CR2.7 The start up report is made to accurately pick up the functionality parameters, as set out in the system documentation, as well as the adjustments made and the modifications that are suggested for risk analysis.

CR2.8 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP3: Implement the video surveillance systems in the organization, according to the design requirements and specifications set out in the project.

CR3.1 The associated computer and peripheral equipment are physically configured, and control, management and planning applications are installed and configured, according to the display sequences and the quality of the required images set out in the specifications, to ensure the functionality of the system and the integration of its elements.

CR3.2 The software application (camera management, recording process, planetria, remote access) centralizing the control of the video surveillance system is installed, configured and verified to verify that it meets the pre-set parameters and is compatible with the equipment you have to control, according to technical specifications.

CR3.3 The recorded and recorded information is treated with confidentiality parameters, to ensure the continuity of the rendering of the viewing and image recording services of the established zones, as the contingency plan in place in the organisation for information systems and taking into account data protection legislation.

CR3.4 The backup generation tool of the recordings made is integrated with the system and configured, so that users have access to the system, according to security plans and compliance the current legal regulations on data protection.

CR3.5 The start up report of the is made to accurately pick up the functionality parameters as set out in the system documentation, as well as the adjustments made and the modifications that are suggested for risk analysis.

CR3.6 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP4: Maintain access and presence control systems, and video surveillance, to ensure their functionality, as set out in the project's technical documentation.

CR4.1 The preventive maintenance plan is interpreted to ensure continuity in the delivery of the service, in accordance with the specific procedures required by the system components, indicating clearly the periodicity of their application.

CR4.2 The specific preventive maintenance procedures of the access and presence control systems are executed to ensure the optimal functionality of the access control systems, as indicated in the plan maintenance.

CR4.3 Specific procedures for preventive maintenance of video surveillance systems are executed, in accordance with the equipment and devices that make up the various parts of the system, to ensure the continuity in the service delivery and functionality of each of the components as indicated in the functional specifications and the maintenance plan.

CR4.4 Specific maintenance procedures are reviewed periodically to adapt the system to changes included in the risk analysis and to detect deficiencies and to propose safety improvements. the indications of the manufacturers and regulations of the organisation.

CR4.5 The location of breakdowns and repair of access and presence control systems, and video surveillance is carried out systematically using the standard procedures of the organization, respecting the security standards and established times, to avoid interruptions in service delivery and minimize the service's impact when they occur.

CR4.6 The updates to the hardware and software components of the access and presence control systems, and video surveillance, are made to add improvements and correct possible failures, taking into account the technical specifications of the manufacturers and regulations of the organisation.

CR4.7 The preventive maintenance plan of the access control and presence control systems, and video surveillance, is updated to accurately collect the results obtained in the application of the maintenance plan. preventive, as well as interventions against dysfunctions and system breakdowns, according to the organization's contingency plans.

CR4.8 The documentation generated in the application of preventive maintenance procedures is collected in the standard records for storage and subsequent treatment and distribution, following the protocol set by the organization.

Professional Context

Production media

Computer and peripheral equipment. Office tools. Planning software tools. Computer applications for the management of access control and presence detection systems. Computer applications for the management of video surveillance and planning cameras. Measuring instruments: polymeter, coaxial cable tester, wiring certifier, portable video monitor, luxometer. Equipment for access control and presence: heads of card readers (magnetic band, proximity, chip), biometric readers, control centers, actuators (electro-mills, barriers), presence detectors. Equipment for video surveillance systems: analog cameras, IP cameras, cameras, cameras, cameras, positioners, control keyboards, multiplexers, sequencers, analog and digital image recorders, monitors Analog and TFT, recording media (tapes, CDs, DVDs).

Products and results

Planning, execution, and monitoring of the implementation of access control and presence control systems, and video surveillance. Verification and implementation of access control systems and presence and video surveillance systems. Preventive and corrective intervention procedures required for the maintenance of access control systems and presence, and video surveillance. Preventive maintenance of access and presence control systems, and video surveillance. Repair of faults in access control systems and presence, and video surveillance systems.

Information used or generated

Risk analysis. Technical specifications of the installation projects. Technical documentation of equipment and devices and recommendations of manufacturers, in printed or electronic support. Installation manuals and user guides. Regulation on private security. Manuals for the use and operation of equipment and devices. Manuals for the associated software. Information about network configuration and IP addressing. Reports on the implementation of the systems. Service and intervention parts for systems maintenance. Current legislation on data protection and private security.

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Code: MF0490_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0490_3: Manage services on the computer system

Duration: 90 hours

Assessment Capabilities and Criteria

C1: Analyze system processes in order to ensure proper performance for the parameters specified in the operating plan.

CE1.1 Identify the system processes and parameters that characterize them (parent processes, process status, resource consumption, priorities, and affected users among others) to determine their influence on the performance of the system.

CE1.2 Describe each of the tools provided by the system for process management to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a scenario where you have a computer system with a properly characterized process load:

-Use system tools to identify how many active processes exist and the particular characteristics of any of them.

-Perform activation, deactivation, and priority modification operations among others with a process using the system tools.

-Monitor system performance by using specific tools and setting alarms, which indicate risk situations.

C2: Apply administration procedures to storage devices to provide the user with a complete, secure, and available information record system.

CE2.1 Identify the various usable file systems on a given storage device to optimize the logging and access processes.

CE2.2 Explain the features of file systems based on the storage devices and operating systems used.

CE2.3 Describe the overall storage structure in the computer system by associating the devices with the different existing file systems.

CE2.4 In a scenario where you have an information storage system with multiple devices:

-Perform partitioning, where necessary, and the generation of the infrastructure of the file systems to be installed on each device.

-Implement the overall storage structure by integrating all devices and their corresponding file systems.

-Document the requirements and constraints of each file system in place.

C3: Manage system access and resources to verify the proper and safe use of them.

CE3.1 Identify system access capabilities by distinguishing remote access from local accesses.

CE3.2 Describe the tools that are used in the management of permissions to users for the use of system resources.

CE3.3 In a scenario that has the right of user administration:

-Identify a user's possible access to the system.

-Modify the permissions of using a system resource to a user.

-Define limitations of using a system resource to users.

C4: Evaluate the usage and performance of communications services to keep them within specified parameters.

CE4.1 Explain the configuration and operation parameters of communications devices to ensure their functionality within the system.

CE4.2 Relate the active communications services on the system to the devices used by them to analyze and evaluate performance.

CE4.3 In a practical scenario in which we take a computer system connected to the outside by means of several lines of communication:

-Identify communications devices and describe their characteristics.

-Verify the status of the communications services.

-Evaluate the performance of communications services.

-Detect and document the incidents produced on the system.

Contents

1. Security and regulations on computer systems

-ISO 27002 Code of Best Practices for Information Security Management

-ITIL Information Technology Infrastructure Library Methodology

-Organic law for the protection of personal data.

-Regulations more frequently used for physical security management

2. Computer systems processes

-Identifying business processes supported by information systems

-Fundamental features of electronic processes

□ States of a process,

□ Signal handling, administration, and changes in priorities

-Determining the information systems that support the business processes and the assets and services used by them

-Analysis of operating system capabilities for process and service monitoring

-Techniques used for resource consumption management

3. Storage systems for computer systems

-More frequent storage device types

-Features of available file systems

-Organization and overall storage structure

-System tools for managing storage devices

4. Using system performance monitoring metrics and indicators

-Criteria for establishing the overall framework for the use of metrics and indicators for monitoring information systems

-Identifying the objects for which indicators need to be obtained

-Aspects to define for indicator selection and definition

-Setting performance thresholds for information systems

-Collecting and analyzing data contributed by the indicators

-Consolidating indicators under a unified information system performance dashboard

5. Making the process of monitoring systems and communications

-Identifying communications devices

-Analysis of communications protocols and services

-Major configuration and operation parameters for communications equipment

-Monitoring and Response Processes

-Sniffer port and port usage monitoring tools

-Hobbit, Nagios, or Cacti system and service monitoring tools

-Security Information and Event Management Systems (SIM/SEM)

-Managing network and filtering element records (router, switch, firewall, IDS/IPS, etc.)

6. Selecting the registration system based on the requirements of the organization

-Determining the level of records required, retention periods, and storage needs

-Analysis of legal requirements in reference to registration

-Selecting safeguard measures to cover the security requirements of the system of records

-Assigning responsibilities for managing the record

-Storage alternatives for system logs and their performance, scalability, confidentiality, integrity, and availability features

-Guide to selecting the storage and custody system for records

7. Administering appropriate access control for information systems

-Analysis of the access requirements of the various information systems and shared resources

-commonly accepted principles for access control and different local and remote access types

-Legal requirements in reference to access control and privilege assignment

-Access profiles in relation to the functional roles of the organization's staff

-Active directory tools and LDAP servers in general

-Identity and Identity Management System (IAM) tools

-Single Sign On (SSO) Authentication Single Point Systems Tools

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Distance-

Formative Module-MF0490_3

90

40

Access criteria for students

They shall be those set out in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: IMPLANTATION AND MAINTENANCE OF DOMOTIC/INMOTIC SYSTEMS

Code: MF1219_3

Professional qualification level: 3

Associated with the Competition Unit:

UC1219_3 Implement and maintain domotic/inmotic systems.

Duration: 150 hours

FORMATIVE UNIT 1

Naming: INSTALLING AND STARTING A DOMOTIC PROJECT/INMOTICO

Code: UF1134

Duration: 80 hours

Competition Reference: This training unit corresponds to RP1 and RP3 except for the configuration and connectivity of the communication gateways.

Assessment Capabilities and Criteria

C1: Interpret the technical and functional specifications of a project of installation and/or integration of domotic/inmotic systems.

CE1.1 Describe the functional requirements of the domotic/inmotic project, detailing the equipment and devices involved in each of the functionalities.

CE1.2 Identify the various technologies used in home/inmotic systems installations.

CE1.3 Distinguished and classify the different architectures and means of transmission used (twisted pair, via radio, electrical grid) in the domotic systems.

CE1.4 Verify the elements that make up the installation and infrastructure of a domotic/inmotic system for putting into service and its configuration, according to the functional specifications of the project.

CE1.5 In a practical case, duly characterized, from the technical documentation that defines the project of installation and/or integration of a domotic/inmotic system:

-Identify the functional requirements of the project.

-Identify elements of the home/inmotic system, both hardware and software.

-Identify the various networks that form the home/inmotic system.

-Check that the system elements meet the functional requirements.

-visually verify the installation.

-Document the jobs performed according to given specifications.

C2: Identify the functional parameters of the equipment and devices of the home/inmotic system and, in a practical case, perform its commissioning, according to the technical specifications of the project.

CE2.1 Identify the characteristics of the standards and protocols involved in the domotic/inmotic system for correct configuration.

CE2.2 Describe the technical and functional characteristics of the domotic/inmotic system devices and devices, including the domotic standard or proprietary system to which they belong, identifying the parameters of configuration and indicating the impact of a project modification on a project.

CE2.3 Configure the hardware and software components of the home/inmotic system, using the system-specific tools to which they belong.

CE2.4 In a practical case, properly characterized, configured and parameterized the equipment and devices that form the domotic/inmotic system, to be put into service, according to technical specifications:

-Identify the equipment and devices of the home system to be deployed and put into service.

-Configure the hardware and software elements of the home/inmotic system using proprietary software tools.

-Test system equipment functionality.

-Develop a system startup report.

CE2.5 Interpret the documentation inherent in equipment and devices, even if it is edited in the most frequently used foreign language in the sector, using it.

C3: Identify the parameters and configuration tools of the control software, and add new functionalities to the domotic/inmotic system, according to given technical specifications.

CE3.1 Explain the features and functionalities of the home/inmotic system configuration software, depending on your technical specifications.

CE3.2 Identify equipment and control software of the domotic/inmotic system, with its features and functionalities, including the domotic standard or proprietary system to which they belong.

CE3.3 Describe the configuration parameters of each module of the control software of the domotic/inmotic system, indicating the impact that a modification of the same, taking into account specifications techniques and functional.

CE3.4 Identify the programming tools that are provided by the domotic/inmotic systems, based on the domotic standards and proprietary systems to which they belong.

CE3.5 In a practical case, properly characterized, configure the control software and add new functionalities to the domotic/inmotic system, according to given technical specifications:

-Verify the equipment that will contain the control software.

-Install and configure the control software.

-Add new functionality using the system's own programming or configuration tools.

-Apply development techniques to add new functionality to your system.

-Perform tests to verify the functionality of the control software.

-Develop the startup report by following the specified formats.

Contents

1. General concepts of home automation/Inmotica

-Defining domain-related concepts.

-Application of home automation to housing as part of the "digital home".

-Description of the different networks that form a building and its integration with the home automation.

-Application scope analysis and application examples.

-Historical development and current state of the home automation.

-Analysis of the Influential actors of the home automation.

-Identification of organisms and associations related to home automation.

2. Application of Electricity and Electronics to Domotic Systems

-Relation of basic electronic/electrical concepts and elements.

-Interpretation of manuals as well as the features and functions of appliances provided by manufacturers (including in other languages).

-Analysis of basic control systems (automatons) and their evolution towards domotic systems.

3. Study and Classification of the most representative Domotic Systems

-Classification of domotic systems according to their means of transmission.

-Classification according to its architecture.

-Classification according to its Topology.

-Classification according to your protocol.

-Standard systems.

-Own Systems.

-Analysis, evaluation, and connection of a domotic project:

-Protocol restrictions and their functionality.

-Restrictions of your devices and devices.

-Parameters to evaluate the physical media (distances, interferences, attenuation, etc.).

-Identification of the problem due to the environment and the location of the system (environment).

-Appliances for appliances (Ips).

-Assessment of the influence of the human factor.

4. Elements of the Project/Domotic System

-Description of the hardware (Devices) components of the domotic system.

-A description and characteristics of the transmission medium (communication support) of the home system.

-Analysis, description, and features of the software Programming and parameterization of the elements of the domotic system.

-Interpretation of manuals as well as the characteristics and functions of the apparatus provided by the manufacturers. (even in other languages).

-Interpretation of a domotic project.

5. Requirements and needs of the domotic system

-Defining the topology of conventional installations.

-Analysis of the adaptation needs of installations to new technologies.

-Modifications and requirements required to integrate domotic systems.

-Study of the application of applicable regulations in domotic installations:

-REBT "Electronic Low Voltage Regulation".

-ICT "Common Telecommunications Infrastructure".

-World and European standards.

-Analysis of the relationship of domotic installations and current ICT regulations.

-Normalization and regulatory needs.

-Adaptation to reach the IHD "Digital Home Infrastructure".

6. Added functionality and values of home automation

-The functionality of installations prior to domotic systems.

-Security contributions and enhancements.

-Improvements in comfort.

-Energy efficiency and resource control.

-Communication and networking, leisure and multimedia.

7. Control and management of a domotic system:

-Design a display or functional unit of control and system management.

-Managing air conditioning and lighting.

-Intelligent resource management: energy efficiency.

-Data processing in the home automation network: schedules and events.

-Defining and studying the needs of scenes and macros in a domotic system.

-Description and definition of the data capture and storage, consumption, and historical capture systems on a domotic system.

-Defining the logical functions and timing of the home system.

8. Simulation of the development of a domotic project following the guidelines that are indicated.

-Project observation in a global way: systems that involve, devices to install, reserved spaces, infrastructure, channelings and connectivity of the elements to be made to the idea of the scope of the same.

-Realization of a prior study of the needs, characteristics and functionalities of the project to be implemented. Check that the system brings us all we need.

-Analysis of the proposed solution and physical installation of the devices and the totality of their connections, both with the home system and with the other systems involved.

-Domotic system programming.

-Check that the system works according to project requirements, and otherwise, application of the detection and error correction methods, and then recheck the system.

-Realization of the commissioning report and necessary documentation.

FORMATIVE UNIT 2

Naming: DOMOTIC PROJECT CONNECTIVITY: NETWORKS, SYSTEMS, AND COMMUNICATION PROTOCOLS; GATEWAYS

Code: UF1135

Duration: 40 hours

Competition Reference: This training unit corresponds to RP1 and RP3 as regards communication gateways.

Assessment Capabilities and Criteria

C1: Debut communication (one-way or two-way) to a domotic installation by configuring and parameterizing the different gateways, communication networks, and/or systems with which interaction is needed the specifications and needs of the technical project to enable the services and functionalities defined therein.

CE1.1 Identify the various system networks as well as the interconnections between the elements of each system and the system communication needs.

CE1.2 Explain the features and functionalities of the communication gateways by identifying the different types, technologies, and configuration parameters and connection of the domotic system with the external networks.

CE1.3 Describe the services that can be added to the home/inmotic system through the communication gateways.

CE1.4 In a practical case, properly characterized, configured and parameterized and put into service the gateways that endow the domotic/immotic system of connectivity, according to technical specifications.

Contents

1. Relationship of communication networks with home automation

-Description of the different communication networks on the market.

-Assessing system needs based on project indications.

-Valuation of the possibilities and advantages of a smart home/building with two-way communication capability.

2. Integration of home automation with communication networks and other technologies to manage and/or monitor: Setting up the pass/s:

-TCP/IP network (WAN and LAN)

-RTC phone network

-Multimedia Network-Digital Home

-GSM/GPRS Network

-PAN Networks: BlueTooth

-IR Network

-Integration of cameras and security systems

-Wireless Technologies

-Access control and proximity systems

-Gateways to other management networks: Lighting, Climate.

-Interaction systems for people with disabilities or disabilities. Parameterization of environment-adapted control interfaces, warnings, and surveillance.

-Other technologies to consider

FORMATIVE UNIT 3

Naming: DOCUMENTATION, MAINTENANCE AND MANAGEMENT OF INCITENCES IN A DOMOTIC PROJECT

Code: UF1136

Duration: 30 hours

Competition Reference: This training unit corresponds to RP2 and RP4.

Assessment Capabilities and Criteria

C1: Identify inventory management procedures and tools, and develop and maintain the inventory of the domotic/inmotic system by following given specifications.

CE1.1 Identify the steps to be followed in the process of inventorying a domotic/inmotic system, both during initial implantation and during subsequent maintenance.

CE1.2 Describe the features and functionality of the software tools that are used for inventory management.

CE1.3 Describe the procedures for extracting information from the elements that make up the domotic/inmotic systems, depending on their technical specifications.

CE1.4 In a practical case, properly characterized, elaborated and maintained the inventory of the equipment and devices that form the domotic/inmotic system:

-Identify equipment and devices, as well as the configurations and software associated with inventory.

-Use inventory management-specific software tools.

-Register all system information and changes that occur in the inventory.

-Perform tests to verify the functionality of the control software.

-Develop the startup report by following the specified formats.

C2: Develop and apply maintenance procedures for the domotic/inmotic system, taking into account the quality criteria set out in the project and the recommendations of manufacturers of the elements that compose it.

CE2.1 Identify and detail the preventive maintenance operations of the domotic/inmotic system and each of the equipment and devices that form it, depending on the technical specifications of the equipment and devices.

CE2.2 Describe the standardized procedures and tools that are used to locate and fix the breakdowns of the home/inmotic system components, both hardware and software.

CE2.3 In a practical case, properly characterized, maintain the domotic/inmotic system according to given technical specifications:

-Identify the maintenance tasks of the teams and devices involved.

-Develop the maintenance plan for each of the system elements.

-Use specific tools to locate hardware and software breakdowns.

-Resolve any incidents that occur by applying the normalized procedures.

-Update the incident identification and detection manual.

Contents

1. Documentation for a domotic/inmotic installation.

-Using Report Generation Tools

-Verifying the final status of the project installation and upgrade including modifications to the original project

-Developing the End Inventory of Devices and Devices: Software and Hardware

-Performing a backup and backup of configurations of the different devices and systems integrated into the project.

-Creating and maintaining the incident book

-Creating the installation user manual

-Elaboration of the documentation for the project that is indicated

2. Maintenance of a domotic/inmotic installation.

-Puesta about installation and testing protocol.

-Maintaining a domotic system at the Hardware Level

-Maintaining a domotic system at the Software Level

-Tele-maintenance (Remote programming and maintenance)

-Maintenance of installation prevention through home automation management.

3. Incident management in a domotic/inmotic installation.

-Detection of faults in a domotic system

-Localization of problems due to hardware:

□ Device or connection failure

□ False in the medium of transmission

□ False-originated environment and system location

-Problem Localization Due to Software:

□ Communication and protocol failures

□ Functionality failures

□ previously unevaluated states

-Solution: Procedures and recommendations for replacing (or adding) devices in the installation

-Solution: Procedures and recommendations for updating, modifying software or firmware on the installation

Methodological guidelines

Distance training:

Training Units

Formative Units 2-UF1135

Number of total hours of the module

Hours of hours maximum

remote training

Formative Units 1-UF1134

80

30

40

10

Formative Units 3-UF1136

30

20

Sequence

To access the formative unit 2 must have been passed the formative unit 1. To access the formative unit 3 must have been passed the formative unit 2.

Access criteria for students

They shall be those set out in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: IMPLEMENTATION AND MAINTENANCE OF ACCESS AND PRESENCE CONTROL SYSTEMS, AND VIDEO SURVEILLANCE

Code: MF1220_3

Professional qualification level: 3

Associated with the Competition Unit:

UC1220_3 Implement and maintain access and presence control systems, and video surveillance.

Duration: 220 hours

FORMATIVE UNIT 1

Naming: INSTALLATION AND COMMISSIONING OF A VIDEO SURVEILLANCE AND SECURITY SYSTEM

Code: UF1137

Duration: 90 hours

Competition referent: This training unit corresponds to RP1 in terms of video surveillance and RP3.

Assessment Capabilities and Criteria

C1: Interpret the technical and functional specifications of the video surveillance system installation project, as well as risk analysis by identifying the information needed to implement its implementation.

CE1.1 Describe the technical specifications and specifications of the video surveillance system installation project.

CE1.2 Explain the characteristics, functions and elements of the risk analysis to carry out the implementation of a video surveillance system taking into account the technical specifications of the project.

CE1.3 Describe the project planning techniques needed to implement the system: human resources, delivery times, established costs, and justification for variations among others.

CE1.4 In a practical case, based on the technical documentation that defines the video surveillance installation project, properly characterized, identified and described:

-The location of the computers and devices on the different subsystems.

-The means and tools required to apply the implementation processes.

-The power distribution system, protection elements, and the uninterruptible power supply.

-Envelopes, frames, cabinets, and wiring elements.

-The type of pipes and their distribution in plants, horizontal and vertical distribution.

-The characteristics of the wiring and connection of the elements.

-The driver identification and signalling systems and the connection elements of the equipment present in the installation.

-Computer and peripheral equipment used for system administration.

-The computer configuration, management, and monitoring application of the subsystems, as well as properly updated drivers (device handlers or drivers).

C2: Identify the infrastructure and verify the installation of the video surveillance system for deployment, according to technical specifications.

CE2.1 Identify the equipment, devices, and elements that make up the video surveillance system infrastructure, as well as connections to other systems or communication networks.

CE2.2 Describe the interconnection between the wiring enclosures and/or between the buildings where the video surveillance system equipment is located.

CE2.3 Explain physical adjustment techniques for equipment, devices, and elements that make up the video surveillance system infrastructure, as well as connections to other systems or communication networks.

CE2.4 Explain the need to integrate the video surveillance system.

CE2.5 In a practical case, duly characterized, verify the installation of the video surveillance system, according to technical specifications of the project:

-Identify the computers and devices that make up the computers.

-Check electrical and wiring connections between equipment and devices.

-Verify the tuning of computers and devices on your systems.

-Document the jobs performed according to specified formats.

C3: Service equipment and devices of the video surveillance system, as well as their applications and configurations, taking into account the associated technical specifications.

CE3.1 Describe the features and functionalities of the devices and equipment that form the video surveillance system, identifying their configuration parameters.

CE3.2 Identify the main functions performed by the computer system that is used for the management and monitoring of the video surveillance system.

CE3.3 Explain the features and functionalities of the control, management, and planning applications that are used in the video surveillance system, identifying the installation and configuration parameters.

CE3.4 Describe the functionality of the software application that centralizes the control of the video surveillance system, identifying the installation and configuration parameters.

CE3.5 Citar data protection legislation when dealing with recorded and recorded information in the video surveillance system.

CE3.6 Describe the functionality of backup generation tools that are used in video surveillance systems, identifying installation and configuration parameters.

CE3.7 In a practical case, duly characterized, to service the video surveillance system, according to the specifications of the project:

-Identify devices and equipment in the video surveillance system.

-Configure the computer system.

-Install the software applications of the entire video surveillance system.

-Configure the CCTV system parameters on the controllers.

-Configure the CCTV system parameters on the write servers.

-Test system functionality.

-Develop the documentation plan through the Engineering journal

-Develop the security document by taking into account the rules marked by the LOPD.

CE3.8 Interpret the documentation inherent in equipment and devices, even if it is edited in the most frequently used foreign language in the sector, using it.

Contents

1. Video surveillance systems

-Defining CCTV and video surveillance systems

-Applying video systems to security

-Identifying the main application fields by studying actual cases

-Description of the evolution of video surveillance systems

2. Video and image processing

-Defining the concepts of light, image, and video

-Description of lens types and their main features

-Analysis of the analog video and image signal

□ Training, processing and transmission of the analog image

□ Analog video features and formats

□ Advantage and drawbacks of analog video

-Digital image and video signal analysis

□ Training, processing and transmission of the digital image

□ Analog video features and formats

□ Advantages and drawbacks of digital video

-Video Token Evaluation Parameters

3. Video Surveillance and Analogical Security Systems

-Hardware: cameras and system devices

-Support, cabling, and topology of the video surveillance analog system

-Configuring, managing and viewing methods on analog systems

-Topology, Scalability, and Infrastructure of an Analog System

-Analog system features

4. Video Surveillance and Digital Security Systems

-Hardware: cameras and system devices

-Support, cabling, transport technologies, and digital video surveillance system topology

-Configuring, managing and viewing methods on digital systems

-Topology, scalability, and Infrastructure of a digital system

-Digital system features and connectivity to other networks

-Analog integration in the digital world: Mixed systems

5. Storage of the Information obtained

-Storage systems in analog format

-Digital format storage systems

-Dimensions of the storage system based on project requirements

-Data protection and security and information provided by the system:

□ Protection by an uninterruptible power system the devices of all video surveillance installation

□ Security Copies and Data Loss Prevention Systems

Q Redundancy

□ Protected access and privilege management in video surveillance systems

□ Authentication of information. Watermark

□ Updated security copies of the system control information. Access, surveillance zones, Databases, schedules, etc.

6. Functionality and Management of the Video Surveillance System

-Recording Methods

Q A Demand

□ Planned

□ Continuous

□ By Events

□ Motion Detection

-Display configurations

-Smart Event Search

-Generating events

-Security: Managing alerts and warnings; Interaction with other systems and/or communication networks or CRA (alarms receiving Central)

-Analysis, processing and obtaining relevant information: Smart Video: Video processed by computer software tools:

□ People's Count

□ Facial Recognition

□ Tracking objects and people

□ Matriculation Reader

□ Notices on missing/appearing objects

□ Analysis of trajectories and paths

□ Getting reports and statistics

□ Detecting failed situations

□ Image Processing

□ Other

7. Planning of the process of undertaking and implementation of a video surveillance project

-Evaluation of the recommendations and key points prior to undertaking a video surveillance project

□ Systems and functionality constraints

□ Limitations of video capture, video transmission, communication, and storage devices.

□ Problematic of the media (distances, interferences, attenuation, etc.)

Problematic due to media and system location (environment)

□ Appliance Protections (Ips)

□ Human Factor

-Evaluating risk levels and threat types

-Assessment of surveillance needs and level of protection

-Situation Analysis: What to watch for?

-Approach: How and when to watch? From where to watch? Who has to watch?

-System structuring and finding the optimal location of the devices

-System functionality approach

-Integrating with other systems and networks: reactions and capabilities to a detection or event

-Device selection criteria

-Interpretation and evaluation of the project and the infrastructure required to undertake it

-Estimation of required runtime, resources, and personnel

-Interpretation of manuals as well as the characteristics and functions of the apparatus provided by the manufacturers. (even in other languages)

-Verification of Compliance with Regulations and Regulations on Private Security and Organic Law on Data Protection

-System configuration and commissioning of both software and hardware, according to the required specifications and functionalities.

-Documentation generated or used in the process:

□ Used:

-Project: memory, plans, specifications and required requirements

-Project of the installations to Watch

-Technical regulations

-Applied legal regulations

q Generated

-Start Report

-Tracking and Incident Book

-Faithful reflection of the final state of the installation

-System Configuration Report

-Security Report in accordance with the LOPD

8. Simulation of the development of a video surveillance project following the guidelines that are indicated

-Project observation in a global way: systems that involve, devices to install, reserved spaces, infrastructure, channelings and connectivity of the elements to be made to the idea of the scope of the same.

-Realization of a prior study of the needs, characteristics and functionalities of the project to be implemented. Check that the system brings us all we need.

-Analysis of the proposed solution and physical installation of the devices and the totality of their connections, both with the video surveillance system and with the other systems involved

-Parameterization and tuning of the video surveillance system

-Check that the system works according to project requirements, and otherwise, application of the detection and error correction methods, and then recheck the system.

-Realizing the commissioning report and required documentation

FORMATIVE UNIT 2

Naming: INSTALLING AND STARTING AN ACCESS AND PRESENCE CONTROL SYSTEM

Code: UF1138

Duration: 90 hours

Competition Reference: This training unit corresponds to RP1 for access control and presence and RP2.

Assessment Capabilities and Criteria

C1: Interpret the technical and functional specifications of an access control and presence control system installation project as well as risk analysis by identifying the information needed to carry out implementation.

CE1.1 Describe the technical specifications and specifications of the installation project of the access and presence control system.

CE1.2 Explain the characteristics, functions and elements of the risk analysis to carry out the implementation and maintenance of an access control system and presence taking into account the technical specifications of the project.

CE1.3 Describe the project planning techniques needed to implement the system: human resources, delivery times, established costs, and justification for variations among others.

CE1.4 In a practical case, based on the technical documentation that defines the project of installation and maintenance of an access control system and presence, duly characterized, identify and describe:

-The location of the computers and devices on the different subsystems.

-The means and tools required to apply the implementation processes.

-The power distribution system, protection elements, and the uninterruptible power supply.

-Envelopes, frames, cabinets, and wiring elements.

-The type of pipes and their distribution in plants, horizontal and vertical distribution.

-The characteristics of the wiring and connection of the elements.

-The driver identification and signalling systems and the connection elements of the equipment present in the installation.

-Computer and peripheral equipment used for system administration.

-The configuration, management, and monitoring application of properly updated drivers.

C2: Identify the infrastructure and verify the installation of the access control systems and presence for deployment, according to technical specifications.

CE2.1 Identify the equipment, devices, and elements that make up the infrastructure of the access and presence control systems as well as the connections to other systems or communication networks.

CE2.2 Describe the interconnection between the wiring enclosures and/or between the buildings where the access control and presence control system equipment is located.

CE2.3 Explain physical tuning techniques for the equipment, devices, and elements that make up the infrastructure of the access control and presence control systems as well as the connections to other systems or communication networks.

CE2.4 Explain the need to integrate the access and presence control system.

CE2.5 In a practical case, duly characterized, verify the installation of the access control systems and presence, and video surveillance, according to technical specifications of the project:

-Identify the computers and devices that make up the computers.

-Check electrical and wiring connections between equipment and devices.

-Verify the tuning of computers and devices on your systems.

-Document the jobs performed according to specified formats.

C3: Putting in service the access control and presence control systems and devices, as well as their applications and configurations, taking into account the associated technical specifications.

CE3.1 Describe the features and functionalities of the devices and equipment that form the access and presence control system, identifying their configuration parameters.

CE3.2 Identify the main functions that the computer system performs that is used for the management and monitoring of the access and presence control system.

CE3.3 Explain the features and functionalities of the software applications of the access and presence control system, both the software that centralizes the system and the control and user management software, identifying its installation and configuration parameters.

CE3.4 Schedule and parameterize the access control and presence terminals, and their biometric elements, following technical requirements of the project.

CE3.5 Explain the initial load and presence control system load processes.

CE3.6 Describe the functionality of the backup generation tools that are used in the access and presence control systems, identifying the installation and configuration parameters.

CE3.7 Perform queries and reports on the information recorded in the access and presence control system, using specific system-specific tools, taking into account data protection legislation.

CE3.8 In a practical case, properly characterized, put into service the system of access control and presence, according to technical specifications of the project:

-Identify system devices and devices.

-Configure the computer system.

-Install the software applications of the entire access and presence control system.

-Configure the access control system parameters on the access control terminals and controllers.

-Configure the access control system parameters on the servers.

-Configure the access control system parameters in the portillions.

-Test system functionality.

-Develop the documentation plan through the engineering journal.

-Develop the security document by taking into account the rules marked by the LOPD.

CE3.9 Interpret the documentation inherent in equipment and devices, even if it is edited in the most frequently used foreign language in the sector, using it.

Contents

1. Access and presence control systems

-Defining access and presence control systems. More important features.

-Assessing the needs and reasons for the integration of an access and presence control system

-Identifying the main application fields by studying actual cases

2. Components and features of the systems and devices that form access control and presence.

-Automated mechanical systems integrated in access management

□ Electro locks

□ Doors and Barriers

□ Torniquets and Tornos

□ Ramps and Elevators

□ Systems designed for the disabled

□ Other types of activations or events

-Identification/Authentication Devices, Systems, and Technologies

G Control Clocks and/or Pricing

□ Keyboard: Access Codes and Passwords

□ Card Readers

-Bar Codes

-Magnetic Band

□ proximity readers

-Collocation cards or chips. RFID technology

-Bluetooth

-Other

□ Biometric Sensors and Biometric Identity; How to identify unique traits and factors in each person

-Digital Footprint Reader

-Palm reader or hand structure

-Facial Recognition

-Iris recognition

-Retina recognition

-Voice recognition systems

-System Control Devices, Software, and Data

□ System integration and control hardware

□ Connectivity and cabling. Infrastructure, operation, and topology of access and presence control systems

□ System management and monitoring point:

-Configuring and parameterizing the system

-Hardware or Software Solution.

-Report extraction tools

-Data processing software.

-Databases and control information

3. Capabilities and Applications of the access and presence control systems

-Control, monitoring and managing access priorities in facilities, identifying relevant people and data accessing, knowing the status of access, and having the ability to manage them.

-Control of schedules and efficiency in companies or production processes.

-Data processing:

□ Generation of statistics and occupancy data

□ Service and time tarification

-Localization, control and detection systems for people in a closed environment; non-intrusive errant control

-Medical control systems, data access, and automated information update capability. (Applicable or similar processes)

-Managing alarms and events

□ Unwanted Accesses

□ Alerts not allowed or out of time

□ System malfunction or malfunction alarms

□ Interaction with other systems and/or communication networks or CRA (Central alarm receiver)

-Distribution and logistics control solutions

-Event Assistance Management Solutions

4. Protection and security of the system and data and information provided by the system:

-Securing, through an uninterruptible power system, the devices of the entire access and presence control installation

-Data loss prevention systems and backups

-Redundancy

-Protected access and privilege management on access and presence control system management and monitoring systems

□ Updated security copies of the system control information. Access, surveillance zones, Databases, schedules, etc.

5. Process of the connection and implementation of an access control project and presence

-Evaluating the recommendations and key points prior to an access and presence control project

□ Systems and functionality constraints

□ Problematic of the media (maximum number of devices, distances, interferences, attenuation, etc.)

Problematic due to media and system location (environment)

□ Appliance Protections (Ips)

□ Human Factor

-Evaluating risk levels and threat types

-Assessment of service needs and definition and functionality to be implemented

-Interpretation and evaluation of the project and the infrastructure required to undertake it

-Estimation of required runtime, resources, and personnel

-Interpretation of manuals as well as the characteristics and functions of the apparatus provided by the manufacturers. (even in other languages)

-Situation Analysis: Which accesses to control?

-Approach and planning: How and when are they controlled? From where to control and manage the system?

-System structuring and finding the optimal location of the devices

-System functionality approach

-Integrating with other systems and networks: Reactions and capabilities to a detection or event

-Check compliance with regulations and regulations on private security and Organic Data Protection Law

-System configuration and commissioning of both software and hardware, according to the required specifications and functionalities.

-Documentation generated or used in the process:

□ Used:

-Project: memory, plans, specifications and required requirements

-Project of installations to control

-Technical regulations

-Applied legal regulations

q Generated

-Start Report

-Tracking and Incident Book

-Faithful reflection of the final state of the installation

-System Configuration Report

-Security Report in accordance with the LOPD

6. Simulation of the development of an access control project and presence following the guidelines that are indicated

-Project observation in a global way: systems that involve, devices to install, reserved spaces, infrastructure, channelings and connectivity of the elements to be made to the idea of the scope of the same.

-Realization of a prior study of the needs, characteristics and functionalities of the project to be implemented. Check that the system brings us all we need.

-Analysis of the proposed solution and physical installation of the devices and the totality of their connections, both with the access control system and the other systems involved

-Parameterization and tuning of the access control system

-Check that the system works according to project requirements, and otherwise, application of the detection and error correction methods, and then recheck the system.

-Realizing the commissioning report and required documentation

FORMATIVE UNIT 3

Naming: MAINTENANCE AND INCIDENT MANAGEMENT IN VIDEO SURVEILLANCE, ACCESS CONTROL AND PRESENCE PROJECTS

Code: UF1139

Duration: 40 hours

Competition Reference: This training unit corresponds to RP4.

Assessment Capabilities and Criteria

C1: Describe maintenance procedures and resolve the incidents of access control and presence control systems, and video surveillance, to keep the system operational.

CE1.1 Describe the maintenance processes of the equipment and devices that form the access control and presence detection systems, and video surveillance identifying the optimal functionality parameters.

CE1.2 Develop and update maintenance procedures by setting the number of preventive reviews and the actions to perform on each system review.

CE1.3 Identify new features and improvements of the hardware and software components of the access control and presence detection systems, and video surveillance that exist on the market, to propose updates compatible.

CE1.4 Classify the typology and characteristics of the physical and logical breakdowns that occur in the access control and presence detection systems, and video surveillance systems.

CE1.5 Describe the general techniques and specific technical means necessary for the location of physical and logical breakdowns in the access control and presence detection systems, and video surveillance systems.

CE1.6 In several practical cases simulated, properly characterized, for the diagnosis, location and resolution of faults in the systems of access control and presence, and of video surveillance:

-Interpret the system documentation, identifying the different functional blocks and specific components that compose it.

-Identify the symptoms of the breakdown by characterizing it for the effects it produces.

-Perform an intervention plan on the system to determine the cause or causes that cause the breakdown.

-Locate the element (physical or logical) responsible for the breakdown and perform the replacement (using similar or equivalent components) or modification of the element, configuration and/or program, applying the required procedures and at an appropriate time.

-Perform the checks, modifications and adjustments of the system parameters, according to the specifications of the technical documentation of the system, using the appropriate tools, that allow for their tuning in each case.

-Develop a report-memory of the activities developed and results obtained, structuring it in the necessary sections for an adequate documentation of the same (description of the process followed, means used, measures, functional explanation, and schemas).

Contents

1. Maintenance processes in video surveillance systems

-Defining the tasks and processes of maintaining and inspecting the correct operation of the hardware devices in the system.

□ Maintenance of video treatment hardware and cameras

□ Checking for interconnection, fastening, cabling, and monitoring and control devices

□ Maintenance of storage systems

□ Maintenance of the Uninterruptible Power and Protection Systems or SAI.

-Defining the tasks and processes of maintaining and inspecting the correct operation of the system software. Verifying that it works according to the specified requirements

□ Checking the operation of video surveillance system data management, visualization, recording and processing software

□ Checking the correct software-level parameterization of system devices: cameras, servers, communication, etc.

□ Upgrade on the required case of management software

□ Checking the backup system and accessing system information.

□ Security system check, privilege level, and system protection

□ Updating the firmware of the devices that require it

-Checking the proper functioning of integration with connected communication systems and networks and certification of compliance with the Organic Law on Data Protection and Technical Regulations.

□ Maintenance of hardware and physical devices for communication or integration with other networks:

-Communication Gateways

-Interconnected input and output modules between systems

□ Testing and protocols for evaluation and proper operation of software-level communication

□ Upgrade the system to continue to comply with technical and legal regulations at the time of maintenance if needed

-Generating the new documentation or Updating the already existing documentation after maintenance operations

-Check that the staff in charge makes correct use of the system, if not, advise correct alternatives, teach or references to the management manuals.

2. Incidents and alerts on video surveillance projects

-Hardware failure incidents: Reinstallation process for broken devices

-Software Failure Incidents: Process reconfiguration/update/replacement of the management software.

-Error handling or malfunction alerts.

□ Error detection systems and tools, both at the hardware and software level

□ System debugging and reconfiguration processes

□ Testing and commissioning of the new system configuration

-Environment Modification Incidents. Adaptation to new configurations.

□ Changing the scenario to watch due to furniture, trees, shrubs, or other physical obstacles to the proper functioning of the system.

□ Altering of the structure to watch. Repositioning and new system configuration processes

□ Managing changes in the configuration required by the place address

-Watch video system, management, and remote modifications

-Generation of new documentation or update of existing documentation after incident management operations

-Updating and improving the status of the video surveillance system

-System status assessment

-System enhancement proposals

-Application of new functionalities: Processes for the update/extension/integration of the surveillance video system

3. Maintenance processes and tasks in access and presence control systems

-Defining the tasks and processes of maintaining and inspecting the correct operation of the hardware devices in the system.

□ Mechanical maintenance of physical access control devices: Barriers, doors, tornos, and other mechanical devices in the system

□ Electrical and electronic maintenance of control automations: Cerrings, cards, and electronic and computer components of the system

□ Checking identification and authentication systems: Verify keyboard operation and functionality, card readers, proximity, biometrics, and other identification and authentication devices

□ Checking for Interconnect, Fastening, Cabling, and Monitoring Infrastructure, Warnings, and Control Devices

□ Maintenance of Data Management and Storage System Support

□ Maintenance of the Uninterruptible Power and Protection Systems or SAI.

-Defining the tasks and processes of maintaining and inspecting the correct operation of the system software. Verifying that it works according to the specified requirements

□ Checking the operation of management software, monitoring and data processing tools, reporting and statistics, etc. To work according to project specifications

□ Checking the correct software-level parameterization of system devices

□ Upgrade on the required case of management software

□ Checking the backup system and accessing system information.

□ Security system check, privilege level, and system protection

□ Updating the firmware of the devices that require it

-Checking the proper functioning of integration with connected communication systems and networks and certification of compliance with the Organic Law on Data Protection and Technical Regulations.

□ Maintenance of hardware and physical devices for communication or integration with other networks:

-Communication Gateways

-Interconnected input and output modules between systems

□ Testing and protocols for evaluation and proper operation of software-level communication

□ Upgrade the system to continue to comply with technical and legal regulations at the time of maintenance if needed

-Generating the new documentation or Updating the already existing documentation after maintenance operations

-Check that the staff in charge makes correct use of the system, if not, advise correct alternatives, teach or references to the management manuals.

4. Incident and alert management

-Hardware failure incidents: Re-installation of failed devices

-Software Failure Incidents: Process reconfiguration/update/replacement of the management software.

-Error handling or malfunction alerts.

□ Error Detection Systems and Tools, both at the hardware and software level

□ System Debugging and reconfiguration processes

□ Testing and commissioning of the new system configuration

-Environment Modification Incidents. Adaptation to new configurations.

□ Altering of the structure to be controlled. Repositioning and new system configuration processes

□ Managing changes in the configuration required by the place address

-Access and Presence Control System Remote Notices, Management, and Modifications

-Generating the new documentation or Updating the already existing documentation after incident management operations

-Updating and improving the status of the access control system

-System status assessment

-System enhancement proposals

-Application of new functionality: Processes for access control system upgrade/extension/integration

Methodological guidelines

Distance training:

Training Units

Number of total hours of the module

Hours of hours maximum

capable of training

Formative Units 1-UF1137

90

40

Units formative 2-UF1138

90

40

Formative Units 3-UF1139

40

20

Sequence

To access the formative unit 3 must have been passed the formative unit 1 and 2.

Access criteria for students

They shall be those set out in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

NON-WORKING PROFESSIONAL PRACTICE MODULE IMPLEMENTATION AND MANAGEMENT OF COMPUTER ELEMENTS IN DOMOTIC/INMOTIC SYSTEMS, ACCESS CONTROL AND PRESENCE, AND VIDEO SURVEILLANCE

Code: MP0236

Duration: 80 hours

Assessment Capabilities and Criteria

C1: Analyze a domotic and inmotic project, video surveillance, and access control and presence in a real case.

CE1.1 Analyse the different protocols and processes carried out from the initial approach of a project to its completion, paying particular attention to the professional way of carrying out all the operations involved in the process. Both from the hardware point of view (connections, splices, smart distribution of devices, precautions to be taken, etc.) as software, programming methods, ways to improve the efficiency of the installation, etc.

CE1.2 Identify the devices or systems with which the company works and know how to define its scope and the functionalities that they contribute to the project.

CE1.3 Justify the design and documentation of a new project, whether from Domotica and/or Video Surveillance and/or Access Control and Presence.

CE1.4 Identify the physical connection of an installation according to the project documentation.

CE1.5 Participate in the programming of the various devices, receiving tutored information while performing the installation of a real installation.

C2: Provide technical support and manage incidents in Domotica, Video Surveillance, and Access Control and Presence systems.

CE2.1 Recognize an installed and functioning system, identify the different devices that compose it, and the topology that they make up.

CE2.2 Analyze the system infrastructure, power and communication pipes and cables for the different devices that form the system.

CE2.3 Detect the source of a malfunction, as well as identify the repair methods by performing the necessary replacement, reconfiguration, or integration operations.

CE2.4 Perform the periodic maintenance and monitoring tasks required for the proper operation of the installed systems, helping to draft the required documentation.

C3: Upgrade, extend, and integrate new systems or functionality into existing installations

CE3.1 Learn to evaluate the impact that the implementation of a new system or functionality produces in an existing installation.

CE3.2 Evaluate infrastructure needs when implementing new systems in existing installations.

CE3.3 Participate in the integration of a new system within an existing installation

CE3.4 Assist in evaluating and checking the correct functioning and optimal functional interaction of new systems with existing facilities.

CE3.5 Learn how to detect potential conflicts that can occur when implementing a new system with the systems already laid out in the installation.

C4: Participate in the company's work processes, following the rules and instructions set out in the job center.

CE4.1 Behave responsibly in both human relationships and the jobs to be performed.

CE4.2 Respect the procedures and rules of the work center.

CE4.3 Diligently undertake the tasks according to the instructions received, trying to bring them into line with the work rate of the company.

CE4.4 Integrate into the production processes of the job center.

CE4.5 Use the established communication channels.

CE4.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Development of new domotic and inmotic projects

-Detailed analysis of the different systems offered by the market with which the company in question works.

-Using the tools required for the installation of those systems. Both hardware and software

-Analysis of the needs, characteristics, and peculiarities of a new project.

-Developing the different documents that make up the project.

-Observing the process of installing and connecting the different devices.

-Analysis of programming and tuning of the system. Non-intrusive cooperation following the directions of the company tutor

-Participation in incident detection and management processes

-Participation in the writing and updating of the relevant documentation for the project and the final work.

2. Maintenance of existing domotic and inmotic installations.

-Identification of installed and operating systems. Identifying the different devices and networks that integrate the system

-Analysis of the registry, pipeline, and backup spaces that make up the installation.

-Analysis of the system power and communication network topology.

-System failure detection, whether of software or hardware.

-Healing of detected faults.

-Developing the documentation required for the project's documentary record.

-Performing maintenance tasks for the proper operation of the systems.

-Analysis of the functionalities offered by an installed system, as well as possible improvements that could be incorporated.

-Optimizing the functionality of the different devices.

3. Introduction of new systems in domotic and inmotic installations

-Compatibility between existing systems and systems to be implemented.

-Analysis of infrastructure needs when implementing new systems.

-Identifying the added values that arise when implementing new systems in combination with existing ones.

-Solution of conflicts between newly implemented and existing systems.

-Creating the documentation required to correctly reflect modifications made to the installation when implementing a new system.

4. Integration and communication in the workplace.

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the organization's production process.

-Using the communication channels set in the job center.

-Adequation to the company's work rate.

-Tracking risk prevention, occupational health and environmental protection regulations

IV. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

Professional Experience Required in the scope of the competence

MF0490_3:

Managing services on the computer system

• Bachelor, Engineer, Architect or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect, or corresponding degree title or other equivalent titles.

2 years

MF1219_3: Deployment and Maintenance of Domotic/Inmotic Systems

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomat, Technical Engineer, Technical Architect or degree degree corresponding or other equivalent titles.

2 years

MF1220_3: Implanting and maintaining access control and presence control systems, and Video surveillance.

• Licensed, Engineer, Architect or corresponding degree title or other equivalent titles.

• Diplomat, Technical Engineer, Architect Technician or corresponding degree title or other equivalent titles.

2

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forming Space

Surface m2

15 pupils

Surface m2

25 pupils

Classroom

45

Workshop

80

150

Forming Space

M1

M2

M3

X

X

X

X

Workshop

X

X

Forming Space

Classroom

-Audio-visual equipment

-Canon with projection

-Screen for projection

-Rotafolios or whiteboard with roaders

-Server functions order for practical cases

-Computer-in-network functions for practical cases

-Classroom material

-Table and chair for trainer

- Students ' tables and

workshop

-Measurement instruments: polymeter, coaxial wiring tester, certifier cabling, portable video monitor, luxometer.

- Electricity, Electronics and Informatics Workshop.

-Work panels adapted according to the system or domotic systems selected for training

-Access control equipment and presence: heads of card readers (magnetic stripe, proximity, chip), biometric readers, control centers, actuators (electro locks, barriers), presence detectors.

-Equipment for systems video surveillance: analogue cameras, IP cameras, cameras, optical cameras, cabins for cameras, positioners, control keyboards, multiplexers, sequencers, analog and digital image recorders, analog and TFT monitors, recording media (tapes, CDs, DVDs)

-Computer configured specifically for the delivery of this certificate (in the same way as the management classroom computers)

-Internet access, telephone and GSM/GPRS/UMTS connectivity (SIM cards

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training spaces will be sufficient for a minimum of 15 students and must be increased, in their case, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX V

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: INTERNET SERVICES ADMINISTRATION

Code: IFCT0509

Professional Family: Informatics and Communications

Professional area: Systems and telematics

Professional qualification level: 3

Professional reference qualification:

IFC156_3 Internet Service Administration (RD 1087/05, September 16)

Relationship of competency units that configure the certificate of professionalism:

UC0495_3: Install, configure, and administer the software to manage a Web environment.

UC0496_3: Install, configure, and administer electronic messaging services.

UC0497_3: Install, configure, and administer file and media transfer services.

UC0490_3: Manage services on the computer system.

General competition:

Install, configure, administer, and maintain common provisioning and information sharing services using the communications resources that the Internet offers.

Professional Environment:

Professional scope:

Develops its professional activity in companies or entities of a public or private nature of any size that have an infrastructure of intranet, Internet or extranet networks for the exchange of information, the activity takes place in the area of systems of the IT department performing their work both for the account of others and for their own account.

Productive Sectors:

Given the wide distribution of Internet services, a cross-sectoral basis is observed in this qualification, with particular relevance in the services sector, located in the following types of companies:

Public bodies and companies in any production sector that for their size and organization need to have their own services based on Internet technologies.

Internet service provider companies.

Outsourcing (outsourcing) companies and data centers.

Companies dedicated to the development of Web pages and applications.

Occupations or related jobs:

Internet Service Manager.

Web environment manager (webmaster).

Electronic messaging service manager (postmaster).

Internet Systems Technician.

Duration of the associated training: 590 hours

Relationship of training modules and training units:

MF0495_3: Web Services Administration (180 hours)

• UF1271: Installing and configuring Web server software (90 hours)

• UF1272: Administration and auditing of Web services (90 hours)

MF0496_3: Electronic messaging service administration (120 hours).

• UF1273: Selecting, installing, and configuring the electronic messaging server software (60 hours)

• UF1274: Administration and auditing of electronic messaging services (60 hours)

MF0497_3: Administration of file transfer services and multimedia content (120 hours).

• UF1275: Selecting, installing, configuring, and administering file transfer servers (70 hours)

• UF1276: Selecting, installing, configuring, and administering multimedia servers (50 hours)

MF0490_3: (Cross) Service Management in the computer system (90 hours)

MP0267: Internet Service Administration (80 hours) non-work professional practice module

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: INSTALLING, CONFIGURING, AND ADMINISTERING THE SOFTWARE TO MANAGE A WEB ENVIRONMENT

Level: 3

Code: UC0495_3

Professional realizations and realization criteria

RP1: Install and configure Web server software to allow access to published information according to company security policies.

CR1.1 Service specification documents are interpreted by identifying the characteristics to be gathered by the operating environment.

CR1.2 The Web server is chosen and installed, configuring the hardware, software, connectivity parameters, and system permissions according to the manufacturer's specifications, implementation plan, and security and quality of the organization.

CR1.3 Secure server certificates are requested from the certificate authority and are installed and maintained following the security requirements specified for the organization's service and policies.

CR1.4 The content to be published is installed on the server by following the design specifications and the organization's security policy.

CR1.5 The verification of the installation and configuration of the Web server is performed by running a series of tests according to the organization's quality standards.

CR1.6 The final configuration data, content location, access and security URLs are documented in accordance with the organization's internal rules.

CR1.7 The operation manual is written to allow for service failure recovery, so that the service quality and availability parameters are guaranteed.

CR1.8 The technical documentation of the different web servers that can be used is interpreted whether it is edited in Spanish or the official languages of the Autonomous Communities or is in the language Most frequent foreign use in the sector.

RP2: Install and configure Web server modules and extensions to serve added functionality according to the needs of the languages and tools used in the development of the information to be published.

CR2.1 The modules and extensions to be installed in the operating environment are chosen by looking for the highest agreement between design and manufacturer specifications, and following the policies of the organization.

CR2.2 The server's hardware, software, connectivity, and permissions configuration are defined according to the design and manufacturer requirements.

CR2.3 The modules and extensions are installed following the manufacturer's guidelines and the organization's security policy.

CR2.4 Additional content to be published is installed on the server following the design specifications and security policy of the organization.

CR2.5 Installed and configured Web server modules and extensions are tested to demonstrate their functionality and correct integration according to the organization's quality standards.

CR2.6 The final configuration data, content location, access and security URLs are documented in accordance with the organization's internal rules.

CR2.7 The operating manual is written to allow for proper recovery from service failures, so that the service quality and availability parameters are guaranteed.

CR2.8 The technical documentation of the different modules and extensions of the web server that can be used is interpreted whether it is edited in Spanish or the official languages of the Autonomous Communities as well as is in the foreign language of most frequent use in the sector.

RP3: Manage and audit Web services to ensure and optimize their performance according to the organization's usage needs and exploitation plans.

CR3.1 Running Web services and installed software modules are checked by performing the test battery specified in the design and by the quality standards of the organization.

CR3.2 Quality of service and usability parameters are checked using the appropriate software tools according to the rules of the organization.

CR3.3 Web server performance and performance failures are diagnosed by indicating whether this is a configuration, development, or resource issue, and writing the corresponding incident report and the possible solution the same.

CR3.4 The content to be published is updated following the policies of the organization and taking into account the current legal regulations.

CR3.5 The Web service statistics server is chosen and installed by searching for the highest agreement between design and manufacturer specifications, and following the policies of the organization.

CR3.6 Data sources, analysis periodicity, report types, and permissions are configured on the statistics server by following the design specifications and security policy of the organization.

CR3.7 The configuration parameters are adjusted to address or improve performance or performance failures, following the design and manufacturer specifications and complying with internal security and safety standards. quality.

CR3.8 The application of the service operation procedures is checked by performing periodic inspections and simulating breakdowns according to the organization's security procedures.

CR3.9 The configuration documentation and operation procedures are updated with changes that occur in incident resolution.

RP4: Install, configure, and administer the application server and connect to database manager systems to enable application execution and database interaction based on the needs of the organization.

CR4.1 The application server and database access connection software to be installed in the operating environment are chosen by looking for the highest agreement between design and manufacturer specifications, and following the policies of the organization.

CR4.2 The software, connectivity, and permission settings are defined according to the design and manufacturer requirements and the organization's implementation rules.

CR4.3 The application server software and the connection to the databases are configured by following the manufacturer's guidelines and the organization's security policy.

CR4.4 Service applications are installed on the application server following the design specifications and security policy of the organization.

CR4.5 Running both client and server software modules and connecting to databases is checked by performing the test battery specified in the design and internal rules of the organization.

CR4.6 The final configuration and security data is documented in accordance with the organization's internal rules.

CR4.7 The operation manual is written to allow for proper service failure recovery so that the service quality and availability parameters are guaranteed.

CR4.8 The technical documentation of web and application servers, and of the database management systems that can be used is interpreted whether it is edited in Spanish or the official languages of the Autonomous Communities as if it is in the foreign language of most frequent use in the sector.

Professional Context

Production media

Computer equipment, usually, of type server. Operating systems and configuration parameters. Server software: Web, applications, statistics. Software packages with additional functionality. Database connection modules: ODBC and JDBC among others. Digital certificates. Firewall. Database manager systems. Security tools.

Products and results

Web services for all types of Internet, intranet, or extranet scope. Web services for all content types: static or dynamic content and applications. Secure Web services. Web hosting/hosting services.

Information used or generated

Service design documentation. Software product documentation. Internal standards of quality and safety. Service Level Agreements (SLAs). Systems and services configuration documentation. Traceability, update and maintenance documentation. Test batteries. Manuals for the use and operation of computer systems. Software installation and configuration manuals associated with this competition unit. Operation manuals for the database manager systems. Manuals for the languages and tools used to generate the information to be published. Software administration manual associated with this competition unit. Training course materials. Software help systems. Technical support supports. Test plan and failure report. Legal regulations for the publication of information. Legal rules for the ownership of information. Web server operating manual. Event history.

Competition Unit 2

Naming: INSTALLING, CONFIGURING, AND ADMINISTERING ELECTRONIC MESSAGING SERVICES

Level: 3

Code: UC0496_3

Professional realizations and realization criteria

RP1: Install and configure electronic messaging services to provide intercommunication facilities to users according to the organization's directives.

CR1.1 Service specification documents are interpreted correctly by identifying the characteristics to be gathered by the operating environment.

CR1.2 The electronic messaging server is chosen, installed and configured the hardware, software, connectivity and permissions on the computer equipment according to the specifications of the manufacturer and according to the specifications of the organization.

CR1.3 Security items are installed and configured following the manufacturer's guidelines, service specifications, and organization security policy.

CR1.4 The verification of the installation and configuration of the electronic messaging servers is performed by running a series of tests.

CR1.5 The final configuration and security data is documented in accordance with the organization's internal rules.

CR1.6 The technical documentation of the different electronic messaging servers that can be used is interpreted both if it is edited in Spanish or the official languages of the Autonomous Communities as well as is in the foreign language of most frequent use in the sector.

RP2: Administer electronic messaging services to ensure the distribution of messages between users according to the policies of the organization.

CR2.1 User profiles and accounts, mailboxes, administrators, moderators, lists, and rooms are configured on the corresponding server, following the design specifications and security policy of the organization.

CR2.2 The operation manual is written to allow for proper service failure recovery so that the service quality and availability parameters are guaranteed.

CR2.3 Security program alarms are configured according to the parameters set by the company's security regulations.

RP3: Audit e-messaging services to ensure quality of service and diagnose and fix faults in the service according to the needs of the organization.

CR3.1 Electronic messaging services are audited to ensure optimal performance of the electronic messaging servers according to the needs of the organization.

CR3.2 Quality of Service parameters are checked using the appropriate software tools according to the organization's security regulations.

CR3.3 Performance and performance failures are correctly diagnosed by identifying the source of the problem and indicating the potential solution of the problem, documenting the process according to the standards and quality of the organization.

CR3.4 The configuration parameters are adjusted to address or improve performance or performance failures, following the design and manufacturer specifications and complying with internal security and safety standards. quality.

CR3.5 The configuration documentation and operation procedures are updated with the changes that occur in the incident resolution.

CR3.6 Information exposed on electronic messaging servers according to the organization's plans does not violate any legal regulations.

Professional Context

Production media

Computer equipment, usually, of type server. Server software: mail, instant electronic messaging, news, forums, chat, and peer-to-peer among others. Firewall. Operating systems and configuration parameters. IT security tools.

Products and results

Personal electronic messaging services. Virtual community services. File sharing services. Newsletter services.

Information used or generated

Service design documentation. Software product documentation. Internal standards of quality and safety. Service Level Agreements (SLAs). Systems and services configuration documentation. Manuals for the use and operation of computer systems. Software installation manuals associated with this competition unit. Software administration manuals associated with this competition unit. Training course materials. Software help systems. Technical support supports. Test plan and failure report. Legal regulations for the publication of information. Legal rules for the ownership of information. The operation manuals of the electronic messaging servers. Event history.

Competition Unit 3

Naming: INSTALL, CONFIGURE, AND ADMINISTER FILE AND MEDIA TRANSFER SERVICES

Level: 3

Code: UC0497_3

Professional realizations and realization criteria

RP1: Install, configure file transfer services to facilitate the use of information repositories according to the needs of the organization.

CR1.1 The file transfer server is chosen, installed, and configured hardware, software, connectivity parameters and system permissions according to the manufacturer's specifications, requirements of the organization's implementation and security service and regulations.

CR1.2 The directory structure, contents, and permissions are deployed on the server following the design specifications, the organization's security policy, and the current legal regulations.

CR1.3 Installation verification and file transfer server configuration is performed by running the required tests according to the quality and implementation regulations of the organization.

CR1.4 Service quality parameters are verified by running system tests according to the organization's quality and security regulations.

CR1.5 The final configuration data, directory structure, access and security URLs are documented in accordance with the internal rules of the organization.

RP2: Manage file transfer services based on the needs specified in the organization's operating plan.

CR2.1 The operation manual is written to allow for proper service failure recovery so that the service quality and availability parameters are guaranteed.

CR2.2 The application of the service operation procedures is checked by performing periodic inspections and simulating breakdowns.

CR2.3 The configuration of system logs (logs) and alarms in the execution of the service are performed taking into account the performance parameters required in the operating plan.

CR2.4 The locations of the information served are controlled and audited in terms of both the contents and the permissions defined in them according to the organization's security specifications.

CR2.5 Execution and performance failures are diagnosed and documented indicating the causes of the incident and its possible solution according to the organization's regulations.

RP3: Install, configure audio and video services according to the given specifications, and take into account the bandwidth available on the communications lines.

CR3.1 Service specification documents are interpreted correctly by identifying the characteristics to be gathered by the operating environment.

CR3.2 Audio and video transfer servers on demand and video conferencing are chosen, installed, and configured hardware, software, connectivity parameters, and system permissions according to the manufacturer requirements, service specifications and the organization's implementation and security regulations.

CR3.3 The structure and location of contents, connection parameters, and permissions are configured on the audio and video servers on demand and video conferencing following the design specifications and the security of the organization and in accordance with the current legal regulations, making the documentation related to the configuration.

CR3.4 The verification of the installation and configuration of the audio and video servers on demand and video conferencing are performed by the execution of the necessary tests according to the quality regulations and implementation of the organization.

CR3.5 Service quality parameters are verified by performing the required tests according to the organization's quality and safety regulations.

RP4: Manage audio and video services according to the organization's operating plan specifications and requirements imposed by the available resources.

CR4.1 The operation manual is written to allow for service failure recovery, so that the service quality and availability parameters are guaranteed.

CR4.2 The application of the service operation procedures is checked by performing periodic inspections and simulating breakdowns.

CR4.3 Performance and performance failures are diagnosed and repaired indicating whether this is a configuration, system resource, server or connectivity software problem and drafting the corresponding incident report.

CR4.4 Resource consumption is controlled by assigning the maximum number of concurrent users to the maximum bandwidth consumption services and availability on the communications lines as per the specifications of the the operating plan of the organization

Professional Context

Production media

Server-type computer equipment. Communications lines. Server software: directory, FTP, audio and video streaming, video conferencing and collaborative working environments in real time among others. Software packages with additional functionality. Firewall. Security tools. Operating systems and configuration parameters.

Products and results

File Transfer Services. Audio and video services on demand. Video conferencing services and collaborative work environments.

Information used or generated

Service design documentation. Software product documentation. Internal standards of quality and safety. Service Level Agreements (SLAs). Systems and services configuration documentation. Manuals for the use and operation of computer systems. Software installation manuals associated with this competition unit. Software administration manuals associated with this competition unit. Training course materials. Software help systems associated with this competition unit. Technical support supports. Test plan and failure report. Legal regulations for the publication of information. Legal rules for the ownership of information. The operating manuals of the servers associated with this competition unit. Event history.

Competition Unit 4

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Level: 3

Code: UC0490_3

Professional realizations and realization criteria

RP1: Manage system configuration to ensure the performance of processes according to the needs of use and within the directives of the organization.

CR1.1 The processes involved in the system are identified to evaluate performance parameters.

CR1.2 The parameters that affect system components: memory, processor, and peripherals, among others, conform to usage needs.

CR1.3 Process execution priorities are tailored according to the organization's operating plan specifications.

CR1.4 Monitoring tools are implemented and configured by determining alarm levels based on the organization's operating plan.

RP2: Administer storage devices according to the needs of use and within the directives of the organization.

CR2.1 Storage devices are configured to be used for the various operating systems used in the computer system.

CR2.2 The storage structure is defined and implemented based on the needs of the various file systems and the organization's usage specifications.

CR2.3 The object naming requirements and usage restrictions for each storage device are properly documented.

CR2.4 Storage devices are integrated to provide a functional system to the user according to the organization's specifications.

RP3: Manage user tasks to ensure system access and resource availability according to the operating specifications of the computer system.

CR3.1 User access to the computer system is configured to ensure system security and integrity according to the organization's specifications.

CR3.2 User access to resources is administered by assigning permissions based on the needs of the organization.

CR3.3 The resources available to users are limited to the appropriate tools based on what is specified in the organization's usage rules.

RP4: Manage network services to ensure communication between computer systems according to operating needs.

CR4.1 The communications devices are verified in terms of their configuration and performance according to the organization's specifications.

CR4.2 Communications services are identified in the system with their corresponding processes to analyze resource consumption and verify that they are within the scope of the operating plan specifications of the organization.

CR4.3 The incidents in the communications services are detected and documented to inform those responsible for the operation of the system and the management of communications according to the protocols of the organization.

Professional Context

Production media

Operating systems. User administration tools and resource permission management. Performance control tools. Process monitoring tools. Memory usage monitoring tools. Storage device management monitoring tools. User management tools.

Products and results

System operating correctly. System performance appropriate to the operating parameters. Secure and integrated system for access and use of resources. Communications services in operation.

Information used or generated

Operating system and device operating manuals. Plan of operation of the organisation. Manuals of the monitoring tools used. Graphics and performance analysis. Access listings and user restrictions. Incident report. Action protocol to incidents.

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: WEB SERVICES ADMINISTRATION

Code: MF0495_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0495_3: Install, configure, and administer the software to manage a Web environment

Duration: 180 hours

FORMATIVE UNIT 1

Naming: INSTALLING AND CONFIGURING THE WEB SERVER SOFTWARE

Code: UF1271

Duration: 90 hours

Competition Reference: This formative unit corresponds to RP1 and RP2

Assessment Capabilities and Criteria

C1: Select the Web server, its modules, and extensions to verify that they meet the execution requirements of the given Web applications.

CE1.1 Describe the operating parameters of a Web server in a given installation scenario.

CE1.2 Describe the features of a Web server by comparing it to other existing Web servers on the market.

CE1.3 Identify and describe the functions of the most common modules and extensions on your Web servers.

CE1.4 Relate the quantitative and qualitative parameters of configuration with the corresponding system requirements.

CE1.5 From a scenario where you have a Web service in production:

-Identify the functionality required on the Web server.

-Estimate the expected load and performance.

-Identify the security level and requirements.

-Select the Web server and the required extensions.

-Estimate system requirements and indicate the most appropriate hardware and software platforms.

C2: Install and configure the Web server on the computer system to provide information distribution capabilities.

CE2.1 Describe user authentication and content access mechanisms.

CE2.2 Describe the start and stop processes, and log rotation (logs).

CE2.3 From a Web service scenario to install according to the required operating premises:

-Check that the system gathers the required features for the installation of the Web server and the specified service.

-Set the storage structure of resources, access and execution permissions, and required environment variables on the system.

-Install the server software and set the start and stop processes, and log rotation according to the specifications of the computer system administrator.

-Configure the access mechanisms on the Web server: protocols, IP addresses, domains, virtual servers, and ports according to indications received by the network administrator.

-Enable the specified user authentication mechanisms.

-Verify the Web server installation and expected functionality.

-Generate operation and recovery documentation for failures.

CE2.4 Explain the concept, features, and functionality of secure server certificates.

CE2.5 Describe the steps to be taken to request, install, and maintain secure server certificates.

C3: Install, configure, and integrate Web server modules and extensions into your computer system.

CE3.1 Describe the functions of the main modules and extensions of the Web servers that are intended to cover specific functionalities on a given Web site.

CE3.2 Identify the configuration parameters of the main modules and extensions of the Web servers to install based on the specifications received.

CE3.3 Describe the interrelationship of modules and extensions with the Web server and other possible services and applications, both on the system itself and on external systems.

CE3.4 From a Web service scenario to install in a properly characterized information distribution scenario:

-Implement the software for Web server modules and extensions.

-Configure the access and execution permissions for additional resources.

-Configure the parameters that optimize the performance of the set.

-Configure and check communication with other services and applications, local or remote.

-Drill down the tests to perform to check the correct installation and configuration of the Web server modules and extensions.

-Meet operation and recovery documentation for failures.

Contents

1. Basic concepts of server systems.

-Supported operating systems.

-TCP/IP Foundations

-Client/Server Structure.

2. Handling the http protocol.

-Operation and structure.

-Description of requests or request methods.

-Status codes.

-Headers.

-Content encoding. Code pages.

-Realizing HTTP requests on the Internet using a proxy, livehttpheaders, or similar method, analyzing the protocol used.

3. Web server selection.

-Operating parameters.

-Web server features.

-Top functionalities.

-System requirements:

hardware.

software.

Connectivity.

4. Basic Web server installation and configuration.

-Installing the Web server:

Installation Procedures.

Installing Server installation on the operating system.

Verifying Installation Verification.

-Control of the service. Start and stop.

-Creating DNS entries

-Basic configuration parameters:

Description Basic parameter description.

virtualized hosting (virtual hosting)

Name-based virtualized hosting (Name-based virtual hosting)

logging

-Basic configuration directives:

Listener Port

root Directory

Other Basic configuration directives.

-Configuration tools.

-Maintenance of the service.

5. Web server modules and extensions.

-Description of Web server modules and extensions.

-Language support:

CGI

Script Engine (ASP.NET, PHP ...)

6. Web server security analysis

-Description of the basic concepts of the web server:

Routes and permissions. Read permission vs execute permission.

Directory Listing.

MIME Types allowed.

-Access control by source IP.

-User access control:

Credential Exchange Methods (Basic Authentication /Digest /NTLM)

Credential Store. (LDAP, Database, text files, Windows)

Configuring Password-protected directory configuration.

-Identifying Secure Connections using https:

Security Certificates.

Encrypting Encryption Algorithms.

Certification Entities

Generating a CSR

Generation of a self-signed certificate.

Installing a certificate installation.

Client Certificate Access Control.

FORMATIVE UNIT 2

Naming: ADMINISTERING AND AUDITING WEB SERVICES

Code: UF1272

Duration: 90 hours

Competition Reference: This training unit corresponds to RP3 and RP4

Assessment Capabilities and Criteria

C1: Manage Web server-managed content, access and performance according to regulations design specifications of the organization and current legislation.

CE1.1 Describe content update and version control procedures according to procedures.

CE1.2 Describe permission management techniques: profiles, groups, and roles among others, meeting the specifications of internal computer security standards.

CE1.3 Explain Web server performance optimization procedures and their add-ons to the computer system.

CE1.4 Describe the main function and characteristics of a Web Statistics server.

CE1.5 From a Web service scenario in production:

-Define the organization of the contents on the Web server.

-Set the update and version control procedures.

-Analyze the Web server performance parameters.

-Set action plans to adapt the server to use variations and contingency plans.

CE1.6 Explain the current legal regulations that affect the information published on the Web server.

C2: Install, configure, and administer the application server on the computer system as a data provider for Web services.

CE2.1 Describe the functions of an application server and its configuration parameters.

CE2.2 Explain the application deployment procedure on an application server.

CE2.3 From a convenient Web service scenario to installing with connection to databases and counting with an application server:

-Implement application server software and database access modules.

-Configure the parameters that optimize the performance of the set.

-Implement the Web service application on the server, checking the correct startup, operation, and stop.

-Configure and check communication with other services and applications, local or remote.

-Verify the application server installation.

-Generate operation and recovery documentation for failures.

C3: Select, install, and configure access methods to database managers to use their resources on dynamic Web sites.

CE3.1 Describe methods of accessing more common database manager systems and their connection procedures with a Web server.

CE3.2 Describe interrelation and communication mechanisms between the various elements of a three-layer Web architecture.

CE3.3 From a Web service scenario to install with connection to databases:

-Implement the database access modules.

-Configure the parameters that optimize the performance of the database access system.

-Configure and check communication with other services and applications, local or remote.

-Verify the connection to the database and the Web service application.

-Generate operation and recovery documentation for failures.

C4: Apply audit and incident resolution procedures on the operation of a Web service.

CE4.1 Describe and sort the performance determinants of a Web platform.

CE4.2 Explain the procedures for quantifying and measuring the quality of service provided.

CE4.3 Explain incident diagnostic procedures in Web services production environments.

CE4.4 Describe the incident resolution techniques in Web services production environments in detail.

CE4.5 In a scenario where we have a Web service in production:

-Verify that the operations defined in the procedure manuals are performed on a timely and convenient basis.

-Set the performance and availability measurement mechanisms of the service.

-Analyze the quality parameters of the service to determine the degree of compliance with the specifications.

-Apply the corrective measures of the deficiencies found.

CE4.6 In a scenario where we have a Web service in place of incident:

-Apply diagnostic techniques and tools to identify the cause of malfunction.

-Apply urgent containment measures to maintain the maximum possible level of service and limit potential damage.

-Set procedures for the final resolution of the problem and the recovery of the situation prior to the incident.

-Analyze the cause of the incident and set procedures to prevent another similar situation or resolve it in less time.

CE4.7 Define the steps to be taken in the installation and configuration of a statistics server.

Contents

1. Web server content administration.

-Content update procedures:

FTP FTP

FTPS

SFTP

Introduction to Content Management Systems (CMS)

-Content organization.

-Version control.

-Permission management techniques:

profiles.

groups.

roles.

-Web server performance optimization procedures:

Optimization Techniques.

Quality Service Quality and usability parameters.

Optimization Tests for Optimization.

Web Load Generation Simulation with specific tools.

-Statistics servers:

The structure and fields of a log file.

Session Concept.

Session Tracking Mechanisms.

Installing a simple logs analyzer

-Legal rules related to publishing Web content:

The Logs Safeguard.

LOPD.

2. Web services application server.

-Description of functions and configuration parameters:

Recommended Parameters based on scenario.

-Deployment procedures:

Check Boot Check, Operation and Stop.

Verifying Installation Verification.

-Analysis and elaboration of the operation documentation.

3. Access to database manager systems.

-Most frequently used database engines in Web applications (ORACLE, SQL Server, mySQL):

Access Protocols.

Security Models (By IP, by user password, integrated security, combination of these ...)

-Access Bibilotechs:

ODBC, JDBC, DSN-Less ODBC, OleDB.

Installing Access Modules (Install ODBC drivers, create a DSN, ...)

-Communication mechanisms in a 3-layer Web architecture:

SOAP, RPC, WebServices.

-Verifying the connection to the database.

4. Description of distributed architectures on multiple servers.

-3-layer model.

-Fault tolerance.

-Load delivery.

-Session state stores. (ASP.NET state service ...)

-Cache stores. (Memcached ...)

-Proxy Servers.

5. Managing server and application updates.

-Development and preproduction environment.

-Update deployment procedures.

6. Audit and incident resolution on Web services.

-Measurement of the quality of the service provided:

Quality Parameters.

Service Availability.

Service Delivery Agreements (SLAs).

-Managing vulnerabilities in Web applications:

Web Application vulnerability detection tools (P.e. Nikto).

-Production incident diagnostics:

Monitors Monitoring.

Performance Measurement Tools (Windows system counters, apache mod_status ...)

-Incident resolution techniques:

Containment Measures. Workarounds.

root cause-root analysis.

Proactive Problem Management

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

90

40

90

40

Unit 2-UF1272

90

30

Sequence:

To access the formative unit 2 must have been passed the formative unit 1.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 2

Naming: ADMINISTERING ELECTRONIC MESSAGING SERVICES

Code: MF0496_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0496_3: Install, configure, and administer electronic messaging services.

Duration: 120 hours

FORMATIVE UNIT 1

Naming: SELECTING, INSTALLING, AND CONFIGURING THE ELECTRONIC MESSAGING SERVER SOFTWARE

Code: UF1273

Duration: 60 hours

Competition Reference: This training unit corresponds to RP1.

Assessment Capabilities and Criteria

C1: Select the electronic messaging servers based on the needs of the organization.

CE1.1 Describe the basic operation of email, forums, chat, and instant electronic messaging servers.

CE1.2 Describe the most significant features of electronic messaging servers, to determine their suitability for a particular service.

CE1.3 Relate the quantitative and qualitative parameters of the configuration of the electronic messaging servers with the corresponding system requirements.

CE1.4 From an electronic messaging service scenario to install:

-Identify the functionality required in the service specification.

-Estimate the load and expected performance.

-Identify the security level and requirements.

-Select the server or servers that are most appropriate to the requirements.

-Estimate system requirements and indicate the most appropriate hardware and software platforms.

C2: Install and configure the electronic messaging servers on the computer system.

CE2.1 Explain configuration methods on the system: Storage of resources, user profiles, access and execution permissions, and environment variables, among others to match the installation parameters and configuring the electronic messaging server.

CE2.2 Describe user authentication mechanisms and their mapping to the electronic messaging service.

CE2.3 Explain the mechanisms of access to servers: protocols, routing, and ports, among others to access the electronic messaging service.

CE2.4 Describe the start and stop processes, and log rotation processes as far as the electronic messaging service is concerned.

CE2.5 From an electronic messaging service scenario to install:

-Check that the system gathers the features required for the installation of the servers.

-Set the storage structure of resources, access and execution permissions, and required environment variables on the system.

-Install the server software and set the start and stop processes, and log rotation (logs).

-Configure the access mechanisms on the electronic messaging server: protocols, IP addresses, domains, and ports.

-Set the DNS server configuration for the location of the service.

-Enable the specified user authentication mechanisms.

-Verify the electronic messaging server installation.

-Generate operation and recovery documentation for failures.

Contents

1. Basic concepts about electronic messaging.

-Email:

Formatting a mail message.

The flow of a mail message.

Network Protocols: DNS. SMTP. POP. IMAP. Other proprietary protocols.

Client and Server Applications: MUA. MTA. POP/IMAP servers and others

Threats and containment methods: Spam and Virus. Antivirus/antispam filters, SPF, Domain Keys, SenderId. Other threats.

-Instant electronic messaging.

-Forums.

-Chat.

-Mail Lists.

2. Installing a mail system.

-Mail system design:

Functional Functional, Operational, and Security Requirements.

Legal Normative.

Hardware Selection and Software Selection.

-Installing the server operation:

Minimum Install Installation.

Securization (bastions).

-Installing and configuring the SMTP server (MTA):

Software Installation.

Configuration as MX: Configuration parameters. Protocols and access ports. Domains and accounts.

Configuration as MTA: Configuration parameters. Protocols and access ports. User authentication.

Installing and configuring an antivirus/antispam filter system.

Start and stop processes.

logs (logs).

-Installing and configuring the POP/IMAP server:

Software Installation.

Configuration Parameters. Protocols and access ports.

User Authentication.

Start and stop processes.

logs (logs).

-Installing and configuring the Web server (Webmail):

Software Installation.

Configuration Parameters. Protocols and access ports.

User Authentication.

Start and stop processes.

logs (logs).

-Elaboration of the Operation Manual.

FORMATIVE UNIT 2

Naming: ADMINISTERING AND AUDITING ELECTRONIC MESSAGING SERVICES

Code: UF1274

Duration: 60 hours

Competition Reference: This training unit corresponds to RP2 and RP3.

Assessment Capabilities and Criteria

C1: Manage the electronic messaging servers to ensure continuity in the service according to the security specifications.

CE1.1 Define the user account management procedures in the electronic messaging service.

CE1.2 Explain the storage resource management and mailbox management techniques for the electronic messaging server.

CE1.3 Describe the communication of electronic messaging servers with other servers and applications.

CE1.4 Explain service and user IT protection techniques according to the specifications of the IT security standards.

CE1.5 Describe metrics for server performance optimization.

CE1.6 From a scenario of an electronic messaging service in production:

-Define the user account management policy.

-Implement the security tools that are most appropriate to the requirements of the service and the operating conditions.

-Analyze the server performance parameters.

-Set action plans to adapt the server to use variations and contingency plans.

CE1.7 Explain the current legal regulations affecting the information handled by the electronic messaging server.

C2: Apply audit and incident resolution procedures on electronic messaging services.

CE2.1 Describe and classify the performance determinants of an electronic messaging server.

CE2.2 Explain the procedures for quantifying and measuring the quality of service provided.

CE2.3 Explain incident diagnostic procedures in electronic messaging service production environments.

CE2.4 Describe in detail incident resolution techniques in electronic messaging service production environments.

CE2.5 From a scenario of an electronic messaging service in production:

-Verify that the operations defined in the procedure manuals are performed on a timely and convenient basis.

-Set the performance and availability measurement mechanisms of the service.

-Analyze the quality parameters of the service to determine the degree of compliance with the specifications.

-Apply the corrective measures of the deficiencies found.

CE2.6 From a scenario of an electronic messaging service in production in an incident situation:

-Apply diagnostic techniques and tools to identify the cause of malfunction.

-Apply urgent containment measures to maintain the maximum possible level of service and limit potential damage.

-Set procedures for the final resolution of the problem and the recovery of the situation prior to the incident.

-Analyze the cause of the incident and set procedures to prevent another similar situation or resolve it in less time.

Contents

1. Administering the mail system.

-System administration:

User Account Management.

Storage Resource Management.

Managing Mailbox Management.

-Optimizing system performance:

Performance Determinants of Performance: Hardware. Operating System. Applications.

Operating System Performance Adjustments.

Application Performance Adjustments: SMTP server. POP/IMAP server. Web server, antivirus/antispam filters.

Escalating a Mail System: Service Separation. Load balancing, high availability.

-System monitoring:

Configuring a monitoring system configuration.

Monitors Monitoring the most important performance parameters in your system.

-System securitization:

Legal Normative Equation (LSSI, LOPD) and organization security policies.

Good Practice Codes (ISO 27002)

Disaster Recovery and Service Continuity Recovery.

security Copies.

Managing Update Management.

Protection Services: Firewall. Security Tools (Nmap, Nessus/OpenVAS, Brutus).

2. Audit and resolution of incidents on electronic messaging services.

-Audit:

Test Plan Plan.

Service Availability.

Service Delivery Agreements (SLAs).

High availability on mail systems.

-Incident resolution techniques:

Containment Measures. Workarounds.

root cause-root analysis.

Proactive problem management.

-Analysis and use of tools for incident resolution:

Monitors Monitoring.

logs.

Operating Systems Tools.

Tools Tools for Applications.

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

30

60

30

Unit 2-UF1274

60

20

Sequence:

To access the formative unit 2 must have been passed the formative unit 1.

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: MANAGING FILE TRANSFER SERVICES AND MULTIMEDIA CONTENT

Code: MF0497_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0497_3: Install, configure, and administer file and media transfer services.

Duration: 120 hours

FORMATIVE UNIT 1

Naming: SELECTING, INSTALLING, CONFIGURING, AND ADMINISTERING FILE TRANSFER SERVERS

Code: UF1275

Duration: 70 hours

Competition Reference: This training unit corresponds to RP1 and RP2.

Assessment Capabilities and Criteria

C1: Select the file transfer servers based on the requirements demanded by the organization.

CE1.1 Describe the operation of file transfer servers

CE1.2 Describe the most significant features of file transfer servers, to determine their suitability for a particular service.

CE1.3 Relate the quantitative and qualitative parameters of file transfer server configuration with the corresponding system requirements.

CE1.4 From a file transfer service scenario to install:

-Identify the functionality required in the service specification.

-Estimate the expected load and performance.

-Identify the security level and requirements.

-Select the server or servers that are most appropriate to the requirements.

-Estimate system requirements and indicate the most appropriate hardware and software platforms.

C2: Install, configure, and integrate the file transfer server into the computer system.

CE2.1 Explain the configuration methods on the file transfer server system, such as resource storage, user profiles, access permissions, and environment variables among others.

CE2.2 Describe the usual user authentication mechanisms on these servers.

CE2.3 Explain the mechanisms of access to the servers: protocols, routing, ports on these servers.

C3: Manage server-managed assets and assets to ensure service continuity, proper performance, and security specifications.

CE3.1 Describe content update and version control procedures

CE3.2 Describe user account and permission management techniques.

CE3.3 Explain storage resource management techniques.

CE3.4 Describe metrics for server performance optimization.

CE3.5 From a production file transfer service scenario in production:

-Define the organization of the contents on the file transfer server.

-Set the update and version control procedures.

-Implement the information access control system.

-Analyze the server performance parameters.

-Set action plans to adapt the server to usage variations.

CE3.6 Explain the current legal regulations that affect the information published on the file transfer server.

C4: Apply audit and incident resolution procedures to the file transfer service.

CE4.1 Describe and sort the performance determinants of a file transfer server.

CE4.2 Explain the procedures for quantifying and measuring the quality of service provided.

CE4.3 Explain incident diagnostic procedures in file transfer service production environments.

CE4.4 Describe the incident resolution techniques in file transfer service production environments in detail.

CE4.5 From a production file transfer service scenario in production:

-Verify that the operations defined in the procedure manuals are performed on a timely and convenient basis.

-Set the performance and availability measurement mechanisms of the service.

-Analyze the quality parameters of the service to determine the degree of compliance with the specifications.

-Apply the corrective measures of the deficiencies found.

CE4.6 From a scenario of a production file transfer service scenario in incident situation:

-Apply diagnostic techniques and tools to identify the cause of malfunction.

-Apply urgent containment measures to maintain the maximum possible level of service and limit potential damage.

-Set procedures for the final resolution of the problem and the recovery of the situation prior to the incident.

-Analyze the cause of the incident and set procedures to prevent another similar situation or resolve it in less time.

Contents

1. Characteristics of the different file transfer servers.

-Transfer of files on the Internet.

-File formats.

-Specific file transfer protocols.

-Applications. Server and Client.

-Bandwidth and access types.

-File services:

NFS NFS.

CIFS/Samba.

Samba.

2. Installing and Configuring file transfer servers.

-Operating and types of servers.

-HW and SW usual platforms:

usual HW Requirements

Common SW Requirements

-Main configuration features and parameters:

routing.

ports.

Encryption. Permissions.

quotas.

-Managing storage:

Quotas and watermarks.

External Storeroom.

Virtual Directories

-Configuring access:

Creating User Creation and Permissions.

anonymous Access.

Authenticated Access.

Auto Create Permissions Masks.

Access Security access.

-System requirements for installing file transfer servers on different platforms:

3. Server administration

-Updating content.

-Version control.

-User accounts.

-System logs (logs).

4. Audit of the service.

-Quality of service measurement and evaluation methodology.

-Server flows.

-Quality parameters.

-Test Plan.

-Availability of the service.

-SLAs.

-High availability in file transfer.

-Current legal regulations on information published on file transfer servers.

5. Incident resolution techniques.

-Incident diagnostic techniques.

-Containment measures. Workarounds.

-Root-cause analysis.

-Proactive problem management.

-Tools for incident resolution:

Monitors Monitoring.

logs.

FORMATIVE UNIT 2

Naming: SELECTING, INSTALLING, CONFIGURING, AND ADMINISTERING MULTIMEDIA SERVERS

Code: UF1276

Duration: 50 hours

Competition Reference: This training unit corresponds to RP3 and RP4.

Assessment Capabilities and Criteria

C1: Select the multimedia content servers based on the requirements demanded by the organization.

CE1.1 Describe the operation of multimedia content servers.

CE1.2 Describe the most significant features of the multimedia content servers, to determine their suitability for a particular service.

CE1.3 Relate the quantitative and qualitative parameters of the configuration of the multimedia content servers with the corresponding system requirements.

CE1.4 From a convenient multimedia content service scenario to install:

-Identify the functionality required in the service specification.

-Estimate the expected load and performance.

-Identify the security level and requirements.

-Select the server or servers that are most appropriate to the requirements.

-Estimate system requirements and indicate the most appropriate hardware and software platforms.

C2: Install, configure, and integrate the multimedia content server into your computer system.

CE2.1 Explain the configuration methods in the multimedia content server system, such as resource storage, user profiles, access permissions, and environment variables among others.

CE2.2 Describe the usual user authentication mechanisms on these servers.

CE2.3 Explain the mechanisms of access to the servers: protocols, routing, ports on these servers.

CE2.4 From a multimedia service scenario to install:

-Check that the system gathers the features required for the installation of the servers.

-Set the storage structure of the required resources, access permissions, and environment variables on the system.

-Install the server software and set the start and stop processes, and log rotation (logs).

-Configure access mechanisms on the server: protocols, IP addresses, access URLs, domains, and ports.

-Enable the specified user authentication mechanisms.

-Verify the installation of the media server.

-Generate operation and recovery documentation for failures.

C3: Manage server-managed assets and assets to ensure service continuity, proper performance, and security specifications.

CE3.1 Describe content update and version control procedures

CE3.2 Describe user account and permission management techniques.

CE3.3 Explain storage resource management techniques.

CE3.4 Describe the communication of multimedia servers with other servers and applications.

CE3.5 Describe metrics for server performance optimization.

CE3.6 Starting from a scenario of multimedia service in production:

-Define the organization of content on the media server.

-Set the update and version control procedures.

-Implement the information access control system.

-Analyze the server performance parameters.

-Set action plans to adapt the server to usage variations.

CE3.7 Explain the current legal regulations that affect the information published on the multimedia content server.

C4: Apply audit and incident resolution procedures in the multimedia content service.

CE4.1 Describe and sort the performance determinants of a multimedia server.

CE4.2 Explain the procedures for quantifying and measuring the quality of service provided.

CE4.3 Explain incident diagnostic procedures in multimedia service production environments.

CE4.4 Describe in detail incident resolution techniques in multimedia service production environments.

CE4.5 Starting from a scenario of multimedia service in production:

-Verify that the operations defined in the procedure manuals are performed on a timely and convenient basis.

-Set the performance and availability measurement mechanisms of the service.

-Analyze the quality parameters of the service to determine the degree of compliance with the specifications.

-Apply the corrective measures of the deficiencies found.

CE4.6 From a scenario of a multimedia service scenario in production in incident situation:

-Apply diagnostic techniques and tools to identify the cause of malfunction.

-Apply urgent containment measures to maintain the maximum possible level of service and limit potential damage.

-Set procedures for the final resolution of the problem and the recovery of the situation prior to the incident.

-Analyze the cause of the incident and set procedures to prevent another similar situation or resolve it in less time.

Contents

1. Features of the various multimedia file transfer servers.

-File types and media contents.

-Specific multimedia file transfer protocols.

-Applications for multimedia services:

Windows Media Windows.

Real Time.

Flash Flash.

others.

-Bandwidth and access types for multimedia content.

-Streaming:

difusion.

mission-to-mission.

2. Installing and configuring multimedia file transfer servers.

-Media server types and operation.

-HW and SW common platforms for multimedia:

usual HW requirements.

Common SW Requirements.

-Main configuration features and parameters:

routing.

ports.

permissions Permissions.

-Configuring access to multimedia content:

anonymous Access.

Authenticated Access.

Auto Create Permissions Masks.

Access Security access.

-System requirements for installing multimedia file transfer servers on different platforms:

3. Managing the media server.

-Updating multimedia content.

-Version control.

-User accounts.

-System logs (logs).

4. Audit of the multimedia service.

-Measuring and evaluating the quality of multimedia services.

-Media server-specific performance and parameters.

-Specific tests for multimedia services.

-Availability of multimedia services.

-High availability in multimedia file transfer services.

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

70

30

70

30

Unit 2-UF1276

50

20

Sequence:

To access the formative unit 2 must have been passed the formative unit 1.

Access criteria for students

According to those set out in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 4

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Code: MF0490_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0490_3: Manage services on the computer system

Duration: 90 hours

Assessment Capabilities and Criteria

C1: Analyze system processes in order to ensure proper performance for the parameters specified in the operating plan.

CE1.1 Identify the system processes and parameters that characterize them (parent processes, process status, resource consumption, priorities, and affected users among others) to determine their influence on the performance of the system.

CE1.2 Describe each of the tools provided by the system for process management to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a scenario where you have a computer system with a properly characterized process load:

-Use system tools to identify how many active processes exist and the particular characteristics of any of them.

-Perform activation, deactivation, and priority modification operations among others with a process using the system tools.

-Monitor system performance by using specific tools and setting alarms, which indicate risk situations.

C2: Apply administration procedures to storage devices to provide the user with a complete, secure, and available information record system.

CE2.1 Identify the various usable file systems on a given storage device to optimize the logging and access processes.

CE2.2 Explain the features of file systems based on the storage devices and operating systems used.

CE2.3 Describe the overall storage structure in the computer system by associating the devices with the different existing file systems.

CE2.4 In a scenario where you have an information storage system with multiple devices:

-Perform partitioning, where necessary, and the generation of the infrastructure of the file systems to be installed on each device.

-Implement the overall storage structure by integrating all devices and their corresponding file systems.

-Document the requirements and constraints of each file system in place.

C3: Manage system access and resources to verify the proper and safe use of them.

CE3.1 Identify system access capabilities by distinguishing remote access from local accesses.

CE3.2 Describe the tools that are used in the management of permissions to users for the use of system resources.

CE3.3 In a scenario that has the right of user administration:

-Identify a user's possible access to the system.

-Modify the permissions of using a system resource to a user.

-Define limitations of using a system resource to users.

C4: Evaluate the usage and performance of communications services to keep them within specified parameters.

CE4.1 Explain the configuration and operation parameters of communications devices to ensure their functionality within the system.

CE4.2 Relate the active communications services on the system to the devices used by them to analyze and evaluate performance.

CE4.3 In a practical scenario in which we take a computer system connected to the outside by means of several lines of communication:

-Identify communications devices and describe their characteristics.

-Verify the status of the communications services.

-Evaluate the performance of communications services.

-Detect and document the incidents produced on the system.

Contents

1. Security and regulatory management

-ISO 27002 Code of Best Practices for Information Security Management

-ITIL Information Technology Infrastructure Library Methodology

-Organic law for the protection of personal data.

-Regulations more frequently used for physical security management

2. Analysis of the systems processes

-Identifying business processes supported by information systems

-Key features of electronic processes:

Process States of a Process,

Signal Handling, Administration, and Change in Priorities

-Determining the information systems that support the business processes and the assets and services used by them

-Analysis of operating system capabilities for process and service monitoring

-Techniques used for resource consumption management

3. Demonstration of storage systems

-More frequent storage device types

-Features of available file systems

-Organization and overall storage structure

-System tools for managing storage devices

4. Using system performance monitoring metrics and indicators

-Criteria for establishing the overall framework for the use of metrics and indicators for monitoring information systems

-Identifying the objects for which indicators need to be obtained

-Aspects to define for indicator selection and definition

-Setting performance thresholds for information systems

-Collecting and analyzing data contributed by the indicators

-Consolidating indicators under a unified information system performance dashboard

5. Making the process of monitoring systems and communications

-Identifying communications devices

-Analysis of communications protocols and services

-Major configuration and operation parameters for communications equipment

-Monitoring and Response Processes

-Sniffer port and port usage monitoring tools

-Hobbit, Nagios, or Cacti system and service monitoring tools

-Security Information and Event Management Systems (SIM/SEM)

-Managing network and filtering element records (router, switch, firewall, IDS/IPS, etc.)

6. Selecting the registration system based on the requirements of the organization

-Determining the level of records required, retention periods, and storage needs

-Analysis of legal requirements in reference to registration

-Selecting safeguard measures to cover the security requirements of the system of records

-Assigning responsibilities for managing the record

-Storage alternatives for system logs and their performance, scalability, confidentiality, integrity, and availability features

-Guide to selecting the storage and custody system for records

7. Administering appropriate access control for information systems

-Analysis of the access requirements of the various information systems and shared resources

-commonly accepted principles for access control and different local and remote access types

-Legal requirements in reference to access control and privilege assignment

-Access profiles in relation to the functional roles of the organization's staff

-Active directory tools and LDAP servers in general

-Identity and Identity Management System (IAM) tools

-Single Sign On (SSO) Authentication Single Point Systems Tools

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours # Distance-

Formative Module-MF0490_3

90

40

Access criteria for students

They shall be those established in Article 4 of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

INTERNET SERVICE ADMINISTRATION NON-WORK PROFESSIONAL PRACTICE MODULE

Code: MP0267

Duration: 80 hours

Assessment Capabilities and Criteria

C1: Provide technical support in the implementation and administration of Web services, electronic messaging, and file transfer.

CE1.1 Provide technical assistance in designing and configuring Web services (Apache and IIS).

CE1.2 Provide technical assistance in the design and configuration of electronic messaging services.

CE1.3 Provide technical assistance in the design and configuration of file transfer services.

C2: Participate with the appropriate support of the auditing and maintenance of Web services, electronic messaging, and file transfer.

CE2.1 Collaborate in the maintenance of the company's Web services, monitoring the corresponding systems, and participating with the technical department in the resolution of incidents.

CE2.2 Collaborate on the maintenance of the company's electronic messaging services, monitoring the corresponding systems, and participating with the technical department in the resolution of incidents.

CE2.3 Collaborate on the maintenance of the company's file transfer services, monitoring the corresponding systems, and participating with the technical department in the resolution of incidents.

C3: Participate in the company's work processes, following the rules and instructions set out in the job center.

CE3.1 Behave responsibly in both human relationships and the jobs to be performed.

CE3.2 Respect the procedures and rules of the work center.

CE3.3 Diligently undertake the tasks according to the instructions received, trying to bring them into line with the work rate of the company.

CE3.4 Integrate into the production processes of the job center.

CE3.5 Use the established communication channels.

CE3.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Web Services implementation and administration.

-Check installation requirements, and support server choice.

-Collaborate on the installation and configuration of Web servers.

-Support checking and testing, as well as system documentation.

2. Implementation and administration of Electronic Messaging Services.

-Check installation requirements, and support server choice.

-Collaborate on the installation and configuration of electronic messaging services.

-Support checking and testing, as well as system documentation.

3. File Transfer Services implementation and administration.

-Check installation requirements, and support server choice.

-Collaborate on the installation and configuration of file transfer services.

-Assist in the installation and configuration of multimedia file transfer services, taking into account their particularities.

-Support checking and testing, as well as system documentation.

4. Audit and maintenance of Web Services, electronic messaging, and file transfer.

-Support system performance and optimization analysis.

-Collaborate on system updates and monitoring, as well as the incident resolution process.

-Participate in the generation of all documentation.

5. Integration and communication in the workplace.

-Responsible behavior in the job center.

-Respect to the procedures and rules of the job center

-Interpreting and diligently performing the instructions received

-Recognition of the organization's production process.

-Using the communication channels set in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

Professional Experience Required in the scope of the competency

MF0495_3: Install, configure, and administer the software to manage a Web environment

• Licensed, Engineer, Architect or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect, or corresponding degree title or other equivalent titles.

1 year

MF0496_3: Install, configure, and administer electronic messaging services

• Licensed, Engineer, Architect, or corresponding degree title or other titles equivalent.

• Diplomat, Technical Engineer, Technical Architect or degree degree or other equivalent titles.

1 year

MF0497_3: Install, configure, and administer file transfer services and

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect, or corresponding degree title or other equivalent titles.

1

MF0490_3: Manage services on the computer system

• Licensed, Engineer, Architect, or the title of corresponding grade or other equivalent titles.

• Diplomate, Technical Engineer, Technical Architect or corresponding degree of degree or other equivalent titles.

2 years

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forming Space

Surface m2

15 pupils

Surface m2

25 pupils

Classroom

45

60

Forming Space

M1

M2

M3

X

X

X

Forming Space

Classroom

-Audio-visual equipment

-Canon and projection screen

-Server functions for practical cases

- Computers in networking functions for case studies

-Internet

-Pizarra to write with pen or Rotafolos

-Classroom material

-Table and chair for trainer

-Messes and chairs for pupils

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training spaces will be sufficient for a minimum of 15 students and must be increased, in their case, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.

ANNEX VI

I. IDENTIFICATION OF THE CERTIFICATE OF PROFESSIONALISM

Naming: COMPUTER SYSTEM PROGRAMMING

Code: IFCT0609

Professional Family: Informatics and Communications

Professional area: Systems and telematics

Professional qualification level: 3

Professional reference qualification:

IFC303_3 Programming of computer systems (RD 1201/2007, of 14 September)

Relationship of competency units that configure the certificate of professionalism:

UC0490_3: Manage services on the computer system.

UC0964_3: Create software items for system and resource management

UC0965_3: Develop software elements with component-based programming technologies.

General competition:

Develop software components from specific specifications, providing operating system administration and monitoring functions, for managing the resources of a computer system, and interacting with other systems using object-oriented development technologies and components.

Professional Environment:

Professional scope:

Develops its professional activity on its own, as well as for others in companies or public or private entities of any size, that have computer equipment for its management, in the area of systems or development of the IT department.

Productive Sectors:

It is located mainly in the services sector, and mainly in the following types of companies: companies or entities that use computer systems for their management; companies that have as business objective the marketing services for analysis, design and construction of IT applications; large organizations, being part of the computer systems maintenance and programming team.

Occupations or related jobs:

2711.1019 Systems Analyst, top level

2712.1030 Programmer Analyst, mid-level

2712.1012 Application Analyst, mid-level

3820.1017 Informatic Application Programmer

Systems Programmer.

Component Programmer.

Duration of the associated training: 590 hours

Relationship of training modules and training units:

MF0490_3: (Cross) Management of services in the computer system. (90 hours)

MF0964_3: Developing software items for system management. (210 hours)

• UF1286: Development and optimization of software components for systems administrative tasks. (90 hours)

• UF1287: Development of software components for device management (drivers). (60 hours)

• UF1288: Development of software components for communications services. (60 hours)

MF0965_3: Software development based on component-oriented technologies. (210 hours)

• UF1289: Software element design with component-based technologies (90 hours)

• UF1290: Implementing and integrating software elements with component-based technologies (90 hours)

• UF1291: Deployment and commissioning of software components (30 hours)

MP0274: Computer Systems Programming Non-Work Professional Practices Module (80 hours)

II. PROFESSIONAL PROFILE OF THE CERTIFICATE OF PROFESSIONALISM

Competition Unit 1

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Level: 3

Code: UC0490_3

Professional realizations and realization criteria

RP1: Manage system configuration to ensure the performance of processes according to the needs of use and within the directives of the organization.

CR1.1 The processes involved in the system are identified to evaluate performance parameters.

CR1.2 The parameters that affect system components: memory, processor, and peripherals, among others, conform to usage needs.

CR1.3 Process execution priorities are tailored according to the organization's operating plan specifications.

CR1.4 Monitoring tools are implemented and configured by determining alarm levels based on the organization's operating plan.

RP2: Administer storage devices according to the needs of use and within the directives of the organization.

CR2.1 Storage devices are configured to be used for the various operating systems used in the computer system.

CR2.2 The storage structure is defined and implemented based on the needs of the various file systems and the organization's usage specifications.

CR2.3 The object naming requirements and usage restrictions for each storage device are properly documented.

CR2.4 Storage devices are integrated to provide a functional system to the user according to the organization's specifications.

RP3: Manage user tasks to ensure system access and resource availability according to the operating specifications of the computer system.

CR3.1 User access to the computer system is configured to ensure system security and integrity according to the organization's specifications.

CR3.2 User access to resources is administered by assigning permissions based on the needs of the organization.

CR3.3 The resources available to users are limited to the appropriate tools based on what is specified in the organization's usage rules.

RP4: Manage network services to ensure communication between computer systems according to operating needs.

CR4.1 The communications devices are verified in terms of their configuration and performance according to the organization's specifications.

CR4.2 Communications services are identified in the system with their corresponding processes to analyze resource consumption and verify that they are within the scope of the operating plan specifications of the organization.

CR4.3 The incidents in the communications services are detected and documented to inform those responsible for the operation of the system and the management of communications according to the protocols of the organization.

Professional Context

Production media

Operating systems. User administration tools and resource permission management. Performance control tools. Process monitoring tools. Memory usage monitoring tools. Storage device management monitoring tools. User management tools.

Products and results

System operating correctly. System performance appropriate to the operating parameters. Secure and integrated system for access and use of resources. Communications services in operation.

Information used or generated

Operating system and device operating manuals. Plan of operation of the organisation. Manuals of the monitoring tools used. Graphics and performance analysis. Access listings and user restrictions. Incident report. Action protocol to incidents.

Competition Unit 2

Naming: CREATING SOFTWARE ITEMS FOR SYSTEM AND RESOURCE MANAGEMENT

Level: 3

Code: UC0964_3

Professional realizations and realization criteria

RP1: Develop software components that implement operating system management tools and services, using system programming-oriented languages, to support administrative tasks as needed Given functionality.

CR1.1 The technical specifications of the service or management tool to implement, are analyzed to identify the resources for the development of the component according to the functional needs detected.

CR1.2 The diagrams and pre-development documentation are performed, to be used as support for building the components according to the organization's specifications.

CR1.3 Component code development is performed, assisted by the use of editing and debugging tools to optimize performance according to organization specifications.

CR1.4 Software components that implement management tools and services are scheduled to support the functions defined according to the technical specifications of the design provided.

CR 1.5 The test plan is made in order to check the functionality of the developed components, according to established quality specifications and criteria.

CR1.6 The services and tools software components developed are tested and purged, to correct errors using the programming environment debugging tools according to the quality criteria set.

CR1.7 The documentation of the software components of services and management tools is done, to complete the recording of the information produced following the patterns, regulations and procedures specified in the design.

CR1.8 The associated specific technical documentation is interpreted, if any, in the most frequent foreign language in the sector.

RP2: Encode and use system library functions in software component development, to optimize developments according to technical and functional specifications.

CR2.1 The documented functions of system libraries are identified and cataloged, to make it easier to locate information for them according to development needs.

CR2.2 The functions of the system libraries are used in the development of new software components, to improve the performance of the developments by reusing the written and tested code, according to the the technical specifications of each function and the invocation requirements for them.

CR2.3 Software components are developed with the specified requirements, to be included in libraries for later use and distribution, according to technical needs and specifications.

CR2.4 The functional and structural tests of the completed component are planned and performed, to check and secure the development goals according to the technical and quality specifications of the organization.

CR2.5 The documentation of the developed operating system libraries is done to complete the registration needs by following the patterns, regulations, and procedures specified in the design.

RP3: Develop software components using systems-oriented languages, according to specifications set to handle hardware devices.

CR3.1 The technical documentation with the hardware device specifications is interpreted to identify the features and parameters of the device handler programming, according to the design supplied.

CR3.2 The technical documentation of the software tools to be used and the operating system is interpreted to identify the characteristics and parameters of the device handler programming according to the design supplied.

CR3.3 The programming tools are used to develop and debug the possible errors of the developed code, according to the quality criteria of the organization.

CR3.4 The test of the device handler is planned and performed in the possible scenarios in which it can be implanted, to ensure its functionality and the absence of conflicts with the rest of the components of the system, according to technical specifications and quality regulations of the organization.

CR3.5 The technical and user documentation of the developed handler is made according to the parameters and regulations of the organization.

CR3.6 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP4: Confect software components that implement communications services, to link different systems according to development standards.

CR4.1 Service specifications are interpreted to discriminate the elements that will intervene in the development of the component as communications ports between the selected standard systems and protocols, among others, according to specifications and needs of the service.

CR4.2 The component development is performed in client/server environments, to implement the communications service functionality according to the technical and functional specifications provided.

CR4.3 The component encoding is done using programming and debugging tools, to optimize the development phase according to organization specifications.

CR4.4 The component is subjected to test batteries in replicas of the possible scenarios of its subsequent implantation, to ensure functionality and integrity according to quality and safety criteria of the organization.

CR4.5 The development and testing documentation is made following the patterns, regulations, and procedures specified in the design.

Professional Context

Production media

Anti-virus firewall and proxy servers.

Integrated development environments.

Computer equipment, peripherals, and hardware devices.

Change control tools.

Test Tools.

Debug tools.

Development tools or integrated environments (IDE).

Application Distribution Tools.

Programming item documentation tools.

Office Tools.

4GL languages.

Structured languages.

Object-oriented languages.

Concurrent programming languages.

Products and results

Executable code and source code for the developed software.

Procedures and test cases developed.

Test Programs.

Operating system and configured and parameterized applications according to needs.

Information used or generated

Documentation on cases and test data developed.

Technical documentation of the software design to be developed.

Technical and user documentation of the developed software.

Software operating manuals.

Operating system programming interface (API) manuals.

Manuals for the programming tool used.

Operating system usage manuals.

Programming Environment Manuals (IDE).

Programming Language Manuals used.

Hardware manuals for the hardware to be scheduled.

Corporate standards for software development, testing, quality control.

Computer applications help systems.

Technical supports for assistance (telephone, Internet, messaging, and forums, among others).

Competition Unit 3

Naming: DEVELOPING SOFTWARE ELEMENTS WITH COMPONENT-BASED PROGRAMMING TECHNOLOGIES

Level: 3

Code: UC0965_3

Professional realizations and realization criteria

RP1: Perform the design of the software component, for further development based on the specified component technology.

Professional Context

Production media

Integrated development environments.

Computer and peripheral communications equipment.

Change control tools.

Debug tools.

Development tools or integrated environments (IDE).

Application Distribution Tools.

Programming item documentation tools.

Change, Incident, and Configuration Management Tools.

Test Tools.

Office Tools.

4GL languages.

Data manipulation languages.

Structured languages.

Object-oriented languages.

File and messaging transfer services.

Operating systems and configuration parameters.

Products and results

Executable code and source code for the developed software.

Software installation and/or deployment package developed.

Procedures and test cases.

Test programs performed.

Operating system with optimal performance and proper utilization of your resources.

Operating system and configured and parameterized applications according to needs.

Information used or generated

Documentation on cases and test data developed.

Technical documentation of the software design to be developed.

Technical and user documentation of the developed software.

Operating system programming interface (API) manuals.

Operating system usage manuals. Manuals for the use and operation of computer systems.

Programming Environment Manuals (IDE).

Programming Language Manuals.

Programming Language Manuals used.

Technical manuals for the communications devices on which you are scheduled to program.

Corporate standards for software development, testing, quality control. Technical support supports (telephone, Internet, messaging and forums, among others).

III. TRAINING OF THE CERTIFICATE OF PROFESSIONALISM

FORMATIVE MODULE 1

Naming: MANAGING SERVICES IN THE COMPUTER SYSTEM

Code: MF0490_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0490_3: Manage services on the computer system

Duration: 90 hours

Assessment Capabilities and Criteria

C1: Analyze system processes in order to ensure proper performance for the parameters specified in the operating plan.

CE1.1 Identify the system processes and parameters that characterize them (parent processes, process status, resource consumption, priorities, and affected users among others) to determine their influence on the performance of the system.

CE1.2 Describe each of the tools provided by the system for process management to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a scenario where you have a computer system with a properly characterized process load:

-Use system tools to identify how many active processes exist and the particular characteristics of any of them.

-Perform activation, deactivation, and priority modification operations among others with a process using the system tools.

-Monitor system performance by using specific tools and setting alarms, which indicate risk situations.

C2: Apply administration procedures to storage devices to provide the user with a complete, secure, and available information record system.

CE2.1 Identify the various usable file systems on a given storage device to optimize the logging and access processes.

CE2.2 Explain the features of file systems based on the storage devices and operating systems used.

CE2.3 Describe the overall storage structure in the computer system by associating the devices with the different existing file systems.

CE2.4 In a scenario where you have an information storage system with multiple devices:

-Perform partitioning, where necessary, and the generation of the infrastructure of the file systems to be installed on each device.

-Implement the overall storage structure by integrating all devices and their corresponding file systems.

-Document the requirements and constraints of each file system in place.

C3: Manage system access and resources to verify the proper and safe use of them.

CE3.1 Identify system access capabilities by distinguishing remote access from local accesses.

CE3.2 Describe the tools that are used in the management of permissions to users for the use of system resources.

CE3.3 In a scenario that has the right of user administration:

-Identify a user's possible access to the system.

-Modify the permissions of using a system resource to a user.

-Define limitations of using a system resource to users.

C4: Evaluate the usage and performance of communications services to keep them within specified parameters.

CE4.1 Explain the configuration and operation parameters of communications devices to ensure their functionality within the system.

CE4.2 Relate the active communications services on the system to the devices used by them to analyze and evaluate performance.

CE4.3 In a practical scenario in which we take a computer system connected to the outside by means of several lines of communication:

-Identify communications devices and describe their characteristics.

-Verify the status of the communications services.

-Evaluate the performance of communications services.

-Detect and document the incidents produced on the system.

Contents

1. Security and regulatory management in computer systems

-ISO 27002 Code of Best Practices for Information Security Management

-ITIL Information Technology Infrastructure Library Methodology

-Organic law for the protection of personal data.

-Regulations more frequently used for physical security management

2. Analysis of computer system processes

-Identifying business processes supported by information systems

-Key features of electronic processes:

Process States of a Process,

Signal Handling, Administration, and Change in Priorities

-Determining the information systems that support the business processes and the assets and services used by them

-Analysis of operating system capabilities for process and service monitoring

-Techniques used for resource consumption management

3. Demonstration of storage computing systems

-More frequent storage device types

-Features of available file systems

-Organization and overall storage structure

-System tools for managing storage devices

4. Using metrics and performance monitoring indicators for computer systems

-Criteria for establishing the overall framework for the use of metrics and indicators for monitoring information systems

-Identifying the objects for which indicators need to be obtained

-Aspects to define for indicator selection and definition

-Setting performance thresholds for information systems

-Collecting and analyzing data contributed by the indicators

-Consolidating indicators under a unified information system performance dashboard

5. Making the process of monitoring systems and communications

-Identifying communications devices

-Analysis of communications protocols and services

-Major configuration and operation parameters for communications equipment

-Monitoring and Response Processes

-Sniffer port and port usage monitoring tools

-Hobbit, Nagios, or Cacti system and service monitoring tools

-Security Information and Event Management Systems (SIM/SEM)

-Managing network and filtering element records (router, switch, firewall, IDS/IPS, etc.)

6. Selecting the registration system based on the requirements of the organization

-Determining the level of records required, retention periods, and storage needs

-Analysis of legal requirements in reference to registration

-Selecting safeguard measures to cover the security requirements of the system of records

-Assigning responsibilities for managing the record

-Storage alternatives for system logs and their performance, scalability, confidentiality, integrity, and availability features

-Guide to selecting the storage and custody system for records

7. Administering appropriate access control for information systems

-Analysis of the access requirements of the various information systems and shared resources

-commonly accepted principles for access control and different local and remote access types

-Legal requirements in reference to access control and privilege assignment

-Access profiles in relation to the functional roles of the organization's staff

-Active directory tools and LDAP servers in general

-Identity and Identity Management System (IAM) tools

-Single Sign On (SSO) Authentication Single Point Systems Tools

Methodological guidelines

Distance training:

Formative Module

Number of total hours of the module

Maximum hours Distance-

Formative Module-MF0490_3

90

40

Access criteria for students

They will be those established in the Royal Decree that regulates the certificate of professionalism of the professional family to which this annex accompanies.

FORMATIVE MODULE 2

Naming: DEVELOPING SOFTWARE ITEMS FOR SYSTEMS MANAGEMENT

Code: MF0964_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0964_3 Create software items for system and resource management

Duration: 210 hours

FORMATIVE UNIT 1

Naming: DEVELOPING AND OPTIMIZING SOFTWARE COMPONENTS FOR SYSTEMS ADMINISTRATIVE TASKS

Code: UF1286

Duration: 90 hours

Competition Reference: This training unit corresponds to RP1 and RP2.

Assessment Capabilities and Criteria

C1: Analyze the technical specifications provided for the development to be performed, checking their validity and optimization.

CE1.1 Classify the main architectures of operating systems (monolithic, modular, microkernel, distributed systems) and their characteristics, to identify the management and management needs of such systems technical specifications.

CE1.2 Explain the sections of a requirement analysis, detailing the basic diagrams used for functional and data specification according to methodologies and design standards.

CE1.3 Analyze the technical specifications of the service or management tool that you want to implement, to identify the required resources of the component according to the given functional specifications.

CE1.4 Perform the diagrams prior to the development phase by following the specified technical specifications and quality criteria.

CE1.5 In a practical scenario, to interpret a given requirement analysis for the development of a software item, taking into account the management needs of the computer system resources:

-Define the software modules to be made from the requirements catalog and technical specifications.

-Set the relationships between modules by determining inputs, outputs, and data flows according to the functional design and system specifications.

-Determine the structures required to represent the information specified in the requirements.

-Create the necessary structures to track requirements during the encoding of the software item according to specified quality criteria.

C2: Develop software items for system resource management, using system programming languages and tools.

CE2.1 List structured tools and languages, oriented to program development for system resource management, detailing their characteristics.

CE2.2 Describe the operating techniques and principles of memory systems, detailing your organization in hierarchies, to develop software elements that use them according to the functional specifications provided.

CE2.3 Classify input/output architectures, buses and microprocessors in systems, explaining the techniques and functional processes used for the development of software elements, according to specifications Given functionality.

CE2.4 Distinguished the functions of the system libraries for the development of new software components, reusing the code already developed and implementing new elements in these libraries or obtaining components isolated, according to specified optimization and quality criteria.

CE2.5 Describe the types of tests, both functional and structural, and the debugging processes to which a developed component and the tools used, to verify its functionality and integration with all other components of the system, according to specified quality criteria.

CE2.6 Classify tools used in development phases: code generation, creation of executable modules, version control, debugging and testing, documentation and packaging for distribution for optimize generation and ensure the quality of development products, according to specified safety and quality criteria.

CE2.7 In several scenarios to develop software elements for managing system resources, given technical specifications:

-Design the algorithms associated with the software element using structured development techniques.

-Encode software modules from algorithms designed using tools and structured languages.

-Encode data structures using the functionality provided by the structured language.

-Use the resources and libraries available in the development tools to perform the encoding of the algorithms.

-Design and code the necessary error handlers to ensure the optimal operation of the software module.

-Design and code components that allow concurrent access to system resources.

-Debug the developed modules using the available tools.

-Design and apply test batteries on the developed modules to test their correct operation and document the results obtained.

-Document the modules developed to facilitate their review and future modifications and extensions.

-Perform the implementation of the modules by documenting the detected process and incidents.

CE2.8 Interpret the technical documentation associated with tools and programming languages, even if it is edited in the most frequent foreign language in the sector, using it as a development aid.

Contents

1. Description of the services, structure and administration of Operating Systems

-Definition and basic concepts about Operating Systems:

Understanding Basic Services Description Offered by an Operating System

Memory Management. Virtual Memory

Running Program Execution and Process Management

Storage Management. File Systems

Input/Output Device Management

Network Management

Error Management

Security Management

Audit (system logs)

Start Boot Processes (boot) and System End (shutdown)

-Structural Features of Operating Systems:

monolithic monolithic systems

Microkernels

Modular and Layered Systems

Virtual Machines

Distributed Systems

-Common usage administrative tools on Operating Systems:

graphical User Interfaces

command Interpreters

2. Programming of operating systems. Common usage languages and libraries

-System Calls (System Calls):

definition

Direct Use and Application Programming Interfaces (APIs)

Top System Call Types:

-Process Control

-Managing files

-Device management

-System information

-Communications

Description and use of common usage standard APIs for system calls:

-Win32 API (Windows Systems)

-POSIX API (Unix Systems, Linux, Mac)

-Java API (Multiplatform)

-System utilities and commands:

Top Types:

-Operations with files and directories

-Status Functions

-Editing and manipulating files

-Support for programming languages (compilers, linkers, assemblers, interpreters, etc.)

-Running programs

-Communications, messaging, remote file sharing, etc.

Using utilities and commands using common usage scripting languages

-Windows scripting

-Linux/Unix scripting

3. The life cycle of the systems management software

-Software lifecycle models.

Cascading (waterfall)

Iterative

Incremental

V-type

Component Based (CBSE)

Fast Development (RAD)

Advantages and drawbacks. Guidelines for the selection of the most appropriate methodology.

-Description of the phases in the software lifecycle:

Requirements Analysis and Specification

-Requirements types: functional/non-functional, user, interface, security, and performance

-Models for requirements analysis

-Requirements documentation

-Validation of requirements

-Requirements Management

design Design:

-Models for system design: context and architecture, processes, data, objects, user interfaces, components, and deployments

-Design diagrams: entity-relationship diagrams, flowcharts, context diagrams, and UML. Common usage UML diagrams in system design

-Documentation: Documentation and documentation generation tools

Implementation. General software development concepts:

-Basic principles of software development

-Software development techniques: prototype-based, component-based, rapid development methods, and other development techniques

Validation, Verification, and Testing:

-Validation and verification of systems: planning, formal methods of verification, and automated methods of analysis

-Software testing: types, test design, application scope, test automation, tools, and standards on software testing.

-Software quality:

Software Quality Principles

Metrics and Software Quality:

-Concept of metrics and their importance in measuring quality

-Top metrics in software lifecycle phases

Standards for Quality Factor Description:

-ISO-9126

-Other standards. Comparative

4. Developing the systems management software

-Specification analysis for systems management software development:

Identification of required components according to specifications

Analyzing Reusable Components

Analyzing Component Integration Analysis in System Architecture

Identifying the functional and data models of components

-Programming techniques present in commonly used languages applicable to the development of systems management software:

Structured Programming:

-primitive and structured types

-Variables. Scope of use

-arithmetic and logical operators

-Control structures. Loops, conditionals, and selectors

-Functions and procedures. Parameters by value and reference.

-Recursivity

-Basic element programming: strings, dates, and files.

-Type Conversions

-Error handling (exceptions)

-Common-use structured languages

Object Oriented Programming:

-Classes and objects

-Inheritance, polymorphism, and dynamic method overload

-Properties: selectors (get), modifiers (set), and references (let)

-Common-use object-oriented languages

-Systems management software programming techniques:

Code Reuse code.

-Using system libraries

-Calls to utilities and system applications

Specific Techniques applicable to basic system services:

-Process management programming: multitask, lock control (deadlock), and interprocess communication

-Memory management programming: memory hierarchies, memory paging, memory segmentation, swapping, memory sharing, security and virtual memory

-Programming of file systems: access to files and directories, attributes, and protection mechanisms

-Programming of the input and output systems: interrupt management, direct-to-memory (DMA) access, input/output ports, and memory allocation

-Security programming: variable control, buffer overflow control, assertions, preconditions, and post-conditions.

Optimization Techniques

-System management software development quality control:

Applicable Metrics

Requirements Verification

Continuous Improvement Process

-Common usage tools for systems software development:

Programming Language-oriented Editors

Compilators and linkers

Program Generators

Debuggers

Software test and validation test

Code Optimizers

Empackers

Software Documentation Generators

Software Deployment:

-Managers and package repositories. Versioning and dependency control

-Software Distribution

-Software Update Managers

versioning Control

Common Usage Integrated Development Environments (IDE):

-Windows systems specific

-Unix system specific

-Multiplatform

FORMATIVE UNIT 2

Naming: DEVELOPING SOFTWARE COMPONENTS FOR DEVICE HANDLING (DRIVERS)

Code: UF1287

Duration: 60 hours

Competition Reference: This training unit corresponds to RP3.

Assessment Capabilities and Criteria

C1: Use the techniques and standards used in the development, distribution and deployment of device handlers (drivers), for the integration of peripherals into the computer system according to technical specifications and Given functionality.

CE1.1 Interpret the technical documentation of the software tools to be used and the operating system where the device handler will be implemented, even if it is edited in the most frequently used foreign language in the sector, using help, to identify features and parameters for device handler programming according to the design provided.

CE1.2 Use the techniques, standards, and programming tools to develop the device handler and debug possible errors in the developed code, according to technical specifications of the tools and functional needs given.

CE1.3 Perform the test of the device handler elaborated in the possible scenarios in which it can be implanted, to ensure its functionality and the absence of conflicts with the rest of the elements of the system according to Given quality technical specifications and standards.

CE1.4 Confect the technical and user documentation of the developed handler according to given parameters and regulations.

CE1.5 In a practical scenario to modify a device handler in which a change is to be made to its design, according to given functional specifications:

-Modify the code to incorporate the required changes by following the specified quality criteria.

-Check, by performing tests, that the modification has been successfully incorporated and that it has not altered the functionality of the other handlers, in particular, and the system in general.

-Perform the update of all documentation that is affected by the proposed change.

-Design the device handler using structured development techniques and the appropriate standards for the device type.

-Code device handlers using the selected tool, applying the design previously obtained and using structured languages.

-Implement the device handler by documenting the generated code, the results obtained, and the detected incidents.

Contents

1. The core of the operating system

-Core general architecture

-Core Subsystems:

Process Management

Memory Management

File Systems

Device Control

communications

-Security aspects of core element development

-Core version compatibility considerations

2. Programming device drivers

-General operation of a device driver

-Main device driver types:

character

Block Block

package Pack

-Basic device driver programming techniques

Basic Device Data Structures

Device Error Management

Device Memory Management

Interrupts Control

Managing inbound and outbound port management

Using Direct-to-Memory Access (DMA) and buses

-Debug and test techniques:

Traces Printing

Error Monitoring Error

Specific driver debugging techniques for common-use operating systems:

-Windows

-Unix

Applying Software Quality Standards Application to Device Driver Development

-Build and load device drivers

-Distribution of device drivers

-Features in device development on commonly used operating systems:

Windows Systems

Unix Systems

Installing device drivers installation modes on common usage operating systems. Plug & Play Devices:

-Installing devices on Windows

-Installing devices on Unix systems

-Tools:

Deploying Device Driver Development Environments on Common Use Operating Systems

Tools Device Driver Purge and Verification Tools

-Device handler documentation:

Developing technical specifications following specific guidelines for common operating systems

Installing Installation Manual Elaboration

Manual Usage Manual Elaboration

FORMATIVE UNIT 3

Naming: DEVELOPING SOFTWARE COMPONENTS FOR COMMUNICATIONS SERVICES

Code: UF1288

Duration: 60 hours

Competition Reference: This training unit corresponds to RP4.

Assessment Capabilities and Criteria

C1: Implement intersystem communications services by applying software element development techniques and standards, according to given technical and functional specifications.

CE1.1 Classify communications service architectures to distinguish services provided in peer-to-peer (point-to-point) environment server/client environments.

CE1.2 Describe the protocols and ports used for intersystem communication, taking into account the support they offer to communications services.

CE1.3 Identify the main APIs (Aplication Program Interface) and libraries and their use for development through structured programming.

CE1.4 Perform component encoding using appropriate programming and debugging tools to optimize the development phase according to given technical specifications.

CE1.5 Submit the component to test batteries in replicas of the possible scenarios of their subsequent deployment, to verify the absence of conflicts and their integration with the other components of the system, according to some quality and safety criteria given.

CE1.6 Classify defined standards for the development of cross-system communications services according to different criteria: standardization organizations, service types, and supported protocols, among others.

CE1.7 List the main security issues in the field of communications and describe the strategies to be applied, for the development of components that implement secure services according to standards and specifications given.

CE1.8 In several scenarios where components are to be developed for the establishment of intersystem communications services, given technical specifications:

-Select the appropriate tool for the development of communications components.

-Design the component using structured development techniques and the defined standards.

-Encode the software item using the selected tool, applying the design previously obtained and using structured languages.

-Debug and test the component by ensuring its optimal operation.

-Design batteries for possible attacks against the service and test them for possible vulnerabilities.

-Implement the components to verify the communications service by documenting the detected results and incidents.

-Document the developed code, the tests performed, and the result of the components ' implementation processes.

Contents

1. Concurrent programming

-Process programming and execution threads:

Process Management

Threads and Synchronization

-Asynchronous event programming:

tokens

timer Timers

-Process Communication Mechanisms:

pipes (pipes)

Traffic Lights

Memory Sharing

messages

-Synchronization:

Threads Synchronization Functions between threads

Sync Synchronization problems. Locks (Deadlocks)

-Access to devices:

Read Read and Write Functions

Input and Output Ports

2. Communications fundamentals

-Network programming models:

The client/server model

The Distributed Object Model

Message-based models. Introduction to Web Services

-The physical level:

Physical Devices

Physical Level Protocols

-The link level:

Ethernet Networks

Physical Addresses

-The transport level:

TCP/IP protocol

Routing Routing Schemas

The transport level. TCP and UDP protocols. Other common usage protocols.

ports

Basic Network Services

3. Communications service programming

-Communications applications and utilities. Communications standards:

Communications Standardization Bodies

Communications on Common Use Operating Systems

Communications Service Types

Common Usage Communications Protocols

Wireless Communications Standards

-Common usage communications bookshops:

APIs for Windows environments

APIs for Unix environments

-Communications component programming:

Socket Programming:

-Basic functions

-Examples of use. TCP and UDP sockets

-Client/server programming using sockets

Protocol Handler Programming

-Communications Services Debug Techniques:

Guidelines for Test Design

Scan for vulnerabilities and ports

logs Review of logs

Other debugging techniques

Communications Services Test and Debug Tools

-Communications performance:

IP Quality of Service

Bandwidth Control

Networking Network Monitoring Tools

4. Communications security

-Security principles in communications:

Security Mechanisms

Top vulnerabilities and threats

-Tools for network security management. Scanners

-IP Security

-Application level security. The SSL protocol

-Security in wireless networks

Methodological guidelines

Distance training:

Training Units

Total duration in hours of the training units

N.

90

40

90

40

Unit 2-UF1287

60

30

60

Table_table_izq"> 30

Sequence:

To access the formative Units 2 and 3 must have been passed the Formative Unit 1

Access criteria for students

They shall be those set out in Article four of the Royal Decree governing the certificate of professionalism of the professional family to which this Annex accompanies.

FORMATIVE MODULE 3

Naming: SOFTWARE DEVELOPMENT BASED ON COMPONENT-ORIENTED TECHNOLOGIES

Code: MF0965_3

Professional qualification level: 3

Associated with the Competition Unit:

UC0965_3 Develop software elements with component-based programming technologies

Duration: 210 hours

FORMATIVE UNIT 1

Naming: DESIGNING SOFTWARE ITEMS WITH COMPONENT-BASED TECHNOLOGIES

Code: UF1289

Duration: 90 hours

Competition Reference: This training unit corresponds to RP1.

Assessment Capabilities and Criteria

C1: Identify the features and architectures of development technologies, oriented to components for creating and modifying software elements integrated in these environments, according to standards and normalizations existing.

CE1.1 Describe the development techniques and methods involved in the development paradigm, oriented to components for making and modifying software elements, according to the standards of this technology.

CE1.2 Classifying tools and languages oriented to objects used in component-oriented development, describing their characteristics to identify those that are specific to the creation or modification of the software items, according to the given functional specifications.

CE1.3 Classify component model standards, describing gateways to interoperate between heterogeneous components, to perform the integration tasks of the developed elements according to specifications functional and technical.

CE1.4 Identify diagramming and documentation techniques for software development based on component-oriented technologies, according to design standards for component-oriented methodologies.

CE1.5 In a practical case to develop components within a given architecture and with precise functional specifications:

-Perform diagramming and documentation prior to component development, to optimize component creation processes according to received specifications.

-Identify the different interfaces and techniques used for component intercommunication, in order to apply them to the development of new components.

-Define the interfaces of the software component to be developed for intercommunication with the other components of the system, according to technical specifications of the component architecture and functional needs.

-Design the component structure using the component creation standards, according to technical specifications of the architecture used and functional needs.

-Confect design documentation by following the specified patterns, regulations, and procedures.

Contents

1. Object orientation

-Principles of object orientation. Comparison with structured programming:

Hiding Information Hiding

The Abstract Data Type (ADT). Encapsulation of data.

Message Step

-Basic object orientation concepts:

classes:

-Attributes, status variables, and class variables

-Methods. Requirements and invariants.

-Exception management

-Class Aggregation

objects:

-Creating and destroying objects

-Calling methods of an object

-Visibility and use of state variables

-References to objects

-Persistence of objects

-Memory optimization and garbage collection

Inheritance:

-Legacy concept. Superclasses and subclasses.

-Multiple Inheritance

-Abstract Classes

-Heritage types: inheritance of implementation, inheritance of interfaces and types, and other types of inheritance

-Polymorphism and dynamic binding

-Guidelines for the correct use of inheritance

modularity:

-Library of classes. Scope of use of names

-Benefits of using modules or packages

Genericity and Overload:

-Concept of Genericity

-Overload Concept. Types of overhead

-Comparison between genericity and overhead

-Object-oriented development:

Common Use-Oriented Development Languages

Development Tools

-Modeling languages in object-oriented development:

The Unified Modeling Language (UML)

Charts Diagrams for Object-Oriented Systems Modeling

2. The orientation to components

-Conceptual Foundations:

Component Definition

Comparison of components and objects

Modules

interfaces:

-Types of interfaces

-Versioning of interfaces

-Interfaces as contracts

Component Escalation

Component Status

-Component architectures:

Objects Based on Objects. Composition and use of objects

multicap

middleware based on middleware

Based on Distributed Objects

-Component design:

Component Design Principles:

-Non-cyclic dependencies

-Principle "open/closed"

-Reusability

-Configurability

-Abstraction

-Dependencies

Reusability Techniques:

-Patterns

-Bookshops

-Interfaces

-Messages protocols and schemas

-Using programming languages

-Structures and structures hierarchies

-Systems architects

Component Model Model:

-Specifying services: transactions, security, persistence, and remote access

-Interface Specification

-Specifying the implementation

-Specifying the deployment units (modules)

Component Integration Models:

-References and identity of objects, components, and interfaces

-Localization services

-Exchange Models: Distributed Objects, Intermediate Layer (Middleware), and Web Services Interaction and Integration

-Comparison between exchange methods on major component frameworks: OMG: CORBA, OMA, Java: JavaBeans, EJBs, and Microsoft: COM, OLE/ActiveX, .NET

Diagramation and Component Documentation:

-Information model: conceptual diagrams, component architecture diagrams, and deployment diagrams.

-Dynamic model: interaction and activity diagrams, use case diagrams, and status diagrams.

FORMATIVE UNIT 2

Naming: IMPLEMENTING AND INTEGRATING SOFTWARE ELEMENTS WITH COMPONENT-BASED TECHNOLOGIES

Code: UF1290

Duration: 90 hours

Competition Reference: This training unit corresponds to RP2.

Assessment Capabilities and Criteria

C1: Build software elements from the needs specifications and with the development conditions of the component technology used.

CE1.1 Explain development and implementation approaches for building components by applying the principle of reuse.

CE1.2 Describe the process of adapting an existing component to include it in the architecture you want to reuse, according to technical specifications of the component technology used.

CE1.3 Enunciate the design process features of a new component to include in the architecture you want to use, ensuring future reuse.

CE1.4 Classify programming and debugging tools to optimize the development phase of components according to given specifications.

CE1.5 Identify the elements and parameters of the component interface, for development with specific tools and languages, to implement the communications path with the rest of the components according to the standards of definition of architecture interfaces.

CE1.6 Perform the component installation processes, checking that you run the required actions and their availability for the applications that invoke it, according to technical specifications of the architecture.

CE1.7 In a practical case to develop reusable software components, given functional and technical specifications:

-Design the new component to meet the given functional specifications.

-Check that the functionality of the designed component can be extended for future reuse.

-Implement the component using tools and object-oriented languages.

-Debug and test the developed component using the available tools.

-Document the component and its interfaces to facilitate future reuse.

CE1.8 In a practical case to develop software by reusing components, given functional and technical specifications:

-Use component repositories to locate those that conform to the given specifications and can be reused.

-Design the modifications to be made to the existing component to meet the given specifications.

-Modify the component using tools and object-oriented languages.

-Debug and test the modified component using the available tools.

-Document modifications made to the component and its interfaces to facilitate future reuse.

CE1.9 Interpret the technical documentation associated with the programming tools, even if it is edited in the most frequent foreign language in the sector, using it as a development aid.

Contents

1. Component development

-Component development languages:

Comparative to object-oriented languages

Component-oriented languages:

-Description of intefaces

-Assembled

-Architecture description

-Main components of component-oriented development:

-Modularity

-Independent deployment

-Relocation

-Security

-Separation between interface and implementation

-Component frameworks (frameworks):

Components Component Infrastructure Models:

-Connection-Oriented

-Context-Oriented

-Oriented to Aspects

Description Of Common Usage Component Intrastructures:

-OMG: CORBA, OMA

-Java: JavaBeans, EJBs

-Microsoft: COM, OLE/ActiveX, .NET

-Component development methods:

Using Object-Oriented Language Usage

Component Infrastructure Selection

-Building software using components:

-Definition of interfaces. Interface description languages

-Reusing components.

-Common-use infrastructure assembly techniques

-Development-specific techniques:

Components Components on the web server tier. Dynamic Pages

Components Components in the application server tier.

Components in the client application tier:

-Graphic interface components

-Document-oriented components

Components in the Web Services Layer

Mobile Components for Mobile Devices

-Tools for component development:

Integrated Component Development Environments

Configuring Common Use Tools Configuration and Installation:

-Java Environment

-.NET Environment

Managing Lifecycle Management in Component Development using Common Use Tools:

-Using component repositories. Registering components

-Reusing components for building software systems

-Defining component metadata. Interface descriptors

-Security Model

-Installing components

-Debugging and testing components

2. Distributed components

Distributed Programming Distributed in Common Use Infrastructures:

-Multithreading (multithreading) programming

-Synchronous and asynchronous communications

Exchange Models:

-Calls to remote procedures

-Oriented to messages

-Resource Oriented

FORMATIVE UNIT 3

Naming: DEPLOYING AND OPERATING SOFTWARE COMPONENTS

Code: UF1291

Duration: 30 hours

Competition Reference: This training unit corresponds to RP3.

Assessment Capabilities and Criteria

C1: Apply the component deployment and integration procedures in a component-oriented technology environment, according to technical specifications of the architecture.

CE1.1 Describe the techniques available for performing the component search process, which meet the requirements imposed in the initial design.

CE1.2 Classify the assessment and component selection methods, based on a series of requirements imposed by the initial design specifications.

CE1.3 Perform structural tests to verify that the selected component communicates with the other components and does not produce conflicts, based on quality and security criteria, and the preremove design.

CE1.4 Define the procedures for deployment and adaptation to perform the implementation of the software element, according to requirements of the developed component and following quality, safety and specifications criteria architecture.

CE1.5 Describe the integration, configuration, and interconnection processes of the selected components, so that they can build the final application according to the quality and security criteria specified in the design initial.

CE1.6 Monitor the performance of the developed or selected components to ensure their integration into the system, according to quality and safety criteria.

CE1.7 Perform deployment and deployment documentation following the specified patterns, regulations, and procedures.

CE1.8 In a properly characterized scenario, use the development tools to perform the development and deployment of a software component according to the given functional and technical specifications:

-Extract the design information for a component.

-Encode the component according to functional and technical specifications.

-Perform structural tests according to established quality standards and regulations.

-Incorporate the deployment, adaptation, configuration, and integration of the component according to technical specifications and development deployment.

-Tracing component tests according to quality and safety regulations given.

-Configure the tool for performing automatic test batteries according to regulations and quality criteria.

-Develop documentation using the templates provided or built into the tool itself.

-Generate quality and metrics reports, and interpret the results.

Contents

1. Deploying components

-Deployment models:

Design Without Repository Design:

-Design and running without deployment

-Examples: UML

Design Repository with Repository for Component Repository only:

-Container types

-Examples: EJBs, .NET, CCM, Web Services

Repository Deployment with Repository:

-Composition and repository of components

-Example: JavaBean

Repository Design with Repository:

-Connector types

-Examples: Koala

2. Selecting components

-Types:

Commercial Components:

-No modification capability (COTS)

-With the possibility of adaptations (MOTS)

Open Source Components

Advantages and drawbacks

-Component customization methods:

Parameterization

Using Extension Usage (plugins)

-Reusable Component Selection Criteria:

Adaptability

auditability

Standardization

Concurrency Characteristics

performance Performance

Resource Consumption

security

Maintenance Maintenance and Upgrade Features

-Component Selection Process:

Requirements Component Assessment according to requirements

Design and Encoding (Link Code):

-Binding components with other systems

-Integration

-Configuration

Test Design Design

Failure Detection Detection

Maintenance Maintenance and Configuration Management

Upgrading Component Update

Common Usage Selection Methods:

-CAP (COTS Acquisition Process)

-RUP (Rational Unified Process)

3. Component quality control

-Component quality assessment methods. Quality Standards

-Assessment Categories and Metrics

-Quality measurement and validation process:

Testing Compliance with Functional Requirements

Integrating Integration Tests with other systems

Non-Functional Aspects Tests:

-Performance

-Security

-Integration

-Component documentation

-Functional description

-Description of non-functional aspects

-Description of the installation and deployment process:

Packaging Description (packaging)

IBM Deployment Requirements

Parameterization and tuning

Methodological guidelines

Distance training:

Training Units

40

Total duration in hours of the training units

N.

90

40

90

40

Formative Unit 2-UF1290

90

40

30

20

Sequence:

To access the Formative Unit 2 must have passed the Formative Unit 1

Access criteria for students

They shall be those set out in Article 4 of the Royal Decree governing the professional family's certificate of professionalism to which this Annex accompanies.

COMPUTER PROGRAMMING NON-WORK PROFESSIONAL PRACTICE MODULE

Code: MP0274

Duration: 80 hours

Assessment Capabilities and Criteria

C1: Collaborate on the development and analysis of computer systems.

CE1.1 Analyze corporate systems development requirements.

CE1.2 Evaluate the analysis and design of the systems according to the established requirements.

CE1.3 Verify the use and reuse of software components in the realization of corporate systems.

CE1.4 Support in the development and maintenance of software systems

CE1.5 Collaborate on the realization of software documentation

CE1.6 Investigate new tools or updates from existing ones to improve productivity in development

CE1.7 Facilitate coordination between design, development, installation, and software deployment groups

C2: Auditing the quality and security of software systems

CE2.1 Classify software systems according to their criticality and value for the enterprise

CE2.2 Provide support in performing software audits for the verification and improvement of software quality and security

CE2.3 Perform tests according to rules and quality criteria set in the company

CE2.4 Provide assistance in the application of corporate software quality and security improvement measures

C3: Participate in the company's work processes, following the rules and instructions set out in the job center.

CE3.1 Behave responsibly in both human relationships and the jobs to be performed.

CE3.2 Respect the procedures and rules of the work center.

CE3.3 Diligently undertake the tasks according to the instructions received, trying to bring them into line with the work rate of the company.

CE3.4 Integrate into the production processes of the job center.

CE3.5 Use the established communication channels.

CE3.6 To respect at all times the measures of risk prevention, occupational health and environmental protection.

Contents

1. Software lifecycle analysis

-Defining functional requirements

-Design methodologies

-Corporate development tools and languages

-Software debugging and testing procedures

-Installation and deployment processes

-Standardizing and reusing corporate components

-Criteria for software upgrade

-Documentation rules

2. Development and reuse of corporate components

-Using development tools in the various phases of the software lifecycle according to corporate rules

-Performing design diagrams

-Validation of requirements

-Coordination between different teams or programmers for building software systems

-Testing and validation of requirements

3. Quality and safety audits

-Applying quality regulations

-Performing audit plans

-Review of software security

-Software Performance Analysis

-Evaluation of the level of integration and optimization in software construction

-Identifying improvement aspects

-Reporting

4. Integration and communication in the workplace

-Responsible behavior in the job center.

-Respect to the procedures and rules of the work center.

-Interpreting and diligently performing the instructions received.

-Recognition of the organization's production process.

-Using the communication channels set in the job center.

-Adequation to the company's work rate.

-Tracking the regulations for risk prevention, occupational health and environmental protection.

IV. PRESCRIPTIONS OF TRAINERS

Modules

Required Accreditation

Professional experience required in the scope of the competency

If you have accreditation

If you do not have accreditation

MF0490_3: Manage services on the system

• Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.

• Diplomat, Technical Engineer, Technical Architect, or corresponding degree degree or other equivalent titles.

2 years

4 years

MF0964_3: Developing software items for systems management

• Bachelor, Engineer, Architect or corresponding degree of degree or other equivalent qualifications.

• Diplomacy, Technical Engineer, Technical Architect or corresponding degree of degree or other titles equivalents.

1 year

3 years

MF0965_3: Software development based on oriented technologies to components

• Licensed, Engineer, Architect, or the title of corresponding grade or other equivalent titles.

• Diplomat, Technical Engineer, Technical Architect or corresponding degree of degree or other equivalent titles.

1 year

3 years

V. MINIMUM REQUIREMENTS FOR SPACES, FACILITIES AND EQUIPMENT

Forming Space

Surface m2

15 pupils

Surface m2

25 pupils

Classroom

45

60

Forming Space

M1

M2

M3

X

X

X

X

Forming Space

Classroom

audio-visual equipment

-network installed PCs, with Internet connection

-PC with server functions

-Canon projection

-Specialty specific software

-Pizars to write with pen

-Rotafolios

-Classroom material

-Table and chair for trainer

-Messes and chairs for pupils

It should not be interpreted that the various identified learning spaces should necessarily be differentiated by closure.

The facilities and equipment must comply with the relevant industrial and sanitary sanitary regulations and respond to the universal accessibility and safety measures of the participants.

The number of units to be provided with the tools, machines and tools specified in the training spaces will be sufficient for a minimum of 15 students and must be increased, in their case, to attend to the top number.

In the event that the training is addressed to persons with disabilities, the adaptations and reasonable adjustments will be made to ensure their participation in equal conditions.