Advanced Search

Royal Decree 1629 / 2009 Of 30 October, Which Establishes The Title Of Senior Technician In Computer Systems In Network Management And Fix Their Minimum Educations.

Original Language Title: Real Decreto 1629/2009, de 30 de octubre, por el que se establece el título de Técnico Superior en Administración de Sistemas Informáticos en Red y se fijan sus enseñanzas mínimas.

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

TEXT

Organic Law 2/2006, of 3 May, of Education, provides in Article 39.6 that the Government, after consulting the Autonomous Communities, will establish the qualifications corresponding to the vocational training studies, thus as the basic aspects of the curriculum for each of them.

The Organic Law of 19 June, of the Qualifications and of Vocational Training, establishes in Article 10.1 that the General Administration of the State, in accordance with the provisions of Article 149.1.30. Establishment and after consultation of the General Council of Vocational Training, the certificates and certificates of professionalism, which shall constitute the offers of vocational training referred to in the National Catalogue of Qualifications, shall be determined. Professionals.

Royal Decree 1538/2006, of 15 December, has established the general organisation of vocational training of the educational system, and defines in Article 6 the structure of vocational training qualifications on the basis of the National catalogue of professional qualifications, guidelines laid down by the European Union and other aspects of social interest.

Moreover, in the same way, the professional profile of these titles, which will include general competence, professional, personal and social skills, qualifications and, where appropriate, the professional qualifications of the (a) the national catalogue of vocational qualifications included in the titles, so that each degree will, at least, incorporate a complete professional qualification, in order to achieve that, in fact, the qualifications of the respond to the needs demanded by the productive system and the values personal and social to exercise democratic citizenship.

This regulatory framework makes it necessary for the Government, after consulting the autonomous communities, to establish each of the titles which will form the catalogue of titles of vocational training of the educational system, its minimum teaching and other aspects of academic management which, without prejudice to the competences conferred on the educational authorities in this field, constitute the basic aspects of the curriculum which ensure a common and ensure the validity of the securities, in compliance with the provisions of Article 6.2 of the Law Organic 2/2006, of 3 May, of Education.

For these purposes, it is appropriate to determine for each title their identification, their professional profile, the professional environment, the prospective of the title in the sector or sectors, the teaching of the training cycle, the correspondence of the professional modules with the units of competence for their accreditation, validation or exemption and the basic parameters of training context for each professional module (spaces, necessary equipment, qualifications and specialties of the teachers and their equivalences for the purposes of teaching), after consulting the Autonomous communities, as provided for in Article 95 of the Organic Law 2/2006, of 3 May, of Education.

Also, in each title, the access to other studies and, where appropriate, the modalities and subjects of baccalaureate that facilitate the connection with the higher grade training cycle, the convalidations, and exemptions will also be determined. and equivalences and information on the necessary requirements under the legislation in force for the professional exercise where appropriate.

In order to facilitate the recognition of credits between higher technical qualifications and the teachings leading to university degrees and vice versa, in the higher education courses the equivalence of each professional module with European ECTS credits, as defined in Royal Decree 1125/2003 of 5 September, establishing the European credit system and the system of qualifications in university degrees official character and validity throughout the national territory.

Thus, the present royal decree, as provided for in Royal Decree 1538/2006, of 15 December, establishes and regulates, in the basic aspects and elements mentioned above, the title of vocational training of the educational system Senior Technician in Network Information Systems Administration.

In the process of drawing up this royal decree, the autonomous communities have been consulted and the General Council of Vocational Training, the School Council of the State and the Ministry of Politics have issued a report. Territorial.

In its virtue, on the proposal of the Minister of Education and after deliberation of the Council of Ministers at its meeting on October 30, 2009,

DISPONGO:

CHAPTER I

General provisions

Article 1. Object.

1. This royal decree aims to establish the title of Superior Technician in the Administration of Computer Systems in Network, with official character and validity throughout the national territory, as well as its corresponding teachings. minimum.

2. The provisions of this royal decree supersede the regulation of the title of Superior Technician in the Administration of Computer Systems, contained in Royal Decree 1660/1994 of 22 July.

CHAPTER II

Identification of title, professional profile, professional and prospective title of the title in the sector or sectors

Article 2. Identification.

The title of Senior Technician in Network Information Systems Administration is identified by the following elements:

Denomination: Administration of Computer Systems in Network.

Level: Higher Grade Professional Training.

Duration: 2000 hours.

Professional Family: Informatics and Communications.

European Reference: CINE-5b (International Standard Classification of Education).

Article 3. Professional profile of the title.

The professional profile of the title of Superior Technician in the Administration of Computer Systems in Network is determined by his general competence, his professional, personal and social competences, and by the relationship of qualifications and, where appropriate, competence units of the National Catalogue of Professional Qualifications included in the title.

Article 4. General competence.

The general competence of this title is to configure, manage and maintain computer systems, ensuring the functionality, integrity of the resources and services of the system, with the required quality and compliance with the rules in force.

Article 5. Professional, personal and social skills.

The professional, personal and social competencies of this title are as follows:

1. Administer server operating systems, installing and configuring the software, in quality conditions to ensure system operation.

2. Manage network services (web, electronic messaging and file transfer, among others) by installing and configuring the software, under quality conditions.

3. Administer applications by installing and configuring the software, under quality conditions to meet the needs of the organization.

4. Implement and manage databases by installing and managing the management software under quality conditions, depending on the characteristics of the operation.

5. Optimize system performance by configuring hardware devices according to operating requirements.

6. Evaluate the performance of hardware devices by identifying enhancements for performance requirements.

7. Determine the telematics network infrastructure by developing schemas and selecting equipment and elements.

8. Integrate communications equipment into telematic network infrastructures, determining configuration to ensure their connectivity.

9. Implement high availability solutions, analyzing the various options on the market, to protect and recover the system in the face of unforeseen situations.

10. Monitor physical security according to manufacturer's specifications and the security plan to prevent disruption to the delivery of system services.

11. Ensure system and data according to the usage needs and security conditions set to prevent failures and external attacks.

12. Administer users according to operating specifications to ensure access and availability of system resources.

13. Diagnose system dysfunctions and take corrective action to restore functionality.

14. Manage and/or maintain the resources of your area (by scheduling and verifying compliance), depending on your workload and maintenance plan.

15. Consult, address the appropriate person and know how to respect the autonomy of the subordinates, informing when appropriate.

16. Maintain the spirit of innovation and updating in the field of your work to adapt to the technological and organizational changes in your professional environment.

17. To lead collective situations that can occur, mediating in personal and labor conflicts, contributing to the establishment of a pleasant work environment and acting at all times in a sincere, respectful and tolerant way.

18. Solve problems and make individual decisions, following established rules and procedures, defined within the scope of their competence.

19. Manage your career, analyzing employment, self-employment and learning opportunities.

20. Actively participate in economic, social and cultural life with a critical and responsible attitude.

21. Create and manage a small business, performing a product feasibility study, production planning and marketing.

Article 6. Relationship of qualifications and competence units of the National Catalogue of Professional Qualifications included in the title.

1. Full professional qualifications:

(a) IT systems management IFC152_3 (R.D. 1087/2005 of 16 September), comprising the following units of competence:

UC0484_3 Manage the hardware devices on the system.

UC0485_3 Install, configure, and administer the system application and base software.

UC0486_3 Secure computer equipment.

b) Internet Service Administration IFC156_3 (R.D. 1087/2005, 16 September), comprising the following units of competence:

UC0495_3 Install, configure, and administer the software to manage a web environment.

UC0496_3 Install, configure, and administer electronic messaging services.

UC0497_3 Install, configure, and administer file and media transfer services.

UC0490_3 Manage services on the computer system.

(c) Administration of databases IFC079_3 (R.D. 295/2004 of 20 February), comprising the following units of competence:

UC0223_3. Configure and exploit computer systems.

UC0224_3. Configure and manage a database manager system.

UC0225_3. Configure and manage the database.

2. Incomplete professional qualifications:

Developing applications with IFC154_3 web technologies (R.D. 1087/2005, September 16).

UC0493_3 Implement, verify, and document web applications in Internet, intranet, and extranet environments.

Article 7. Professional environment.

1. This professional exercises his or her activity in the area of computing of entities that have systems for the management of data and infrastructure of networks (intranet, internet and/or extranet).

2. The most relevant occupations and jobs are as follows:

a) Systems administration technician.

b) Responsible for computing.

c) Internet Service Technician.

d) Technician in electronic messaging services.

e) Support and support personnel.

f) Technician in teleassistance.

g) Technical in database administration.

h) Network technician.

i) Systems monitor.

j) Technician in communications services.

k) Technician in web environments.

Article 8. Prospective of the title in the sector or sectors.

Educational administrations will take into account, when developing the corresponding curriculum, the following considerations:

1. The professional profile of this title evolves towards greater integration, in small and medium-sized enterprises, of systems of management and exchange of information, as it is necessary for these to be more and more stable and secure.

2. The intervention in computer systems for the control of production in the industrial sector is gaining more importance for this profile, with the essential purpose of ensuring the continuity of the service.

3. The assurance of the functionality and profitability of the computer system, serving as support to the other departments of an organization, is an increasingly important aspect for this professional profile.

4. The tasks of processing and transferring data and information must be adapted to the legal regulations governing such aspects.

5. Tele-operation, remote technical assistance, on-line assistance and tele-centres are being set up as essential elements of response to the demand for technical assistance.

6. The commercial presence of companies on the Internet is progressively increasing the number of transactions made by this means, so it is essential to secure systems and data custody.

7. Rapid advances and technological changes in the sector mean that professionals are being sued in which favorable attitudes towards self-education are made.

CHAPTER III

Formative cycle teachings and basic context parameters

Article 9. General objectives.

The general objectives of this training cycle are as follows:

1. Analyze the structure of the base software, by comparing the features and capabilities of free systems and owners, to administer server operating systems.

2. Install and configure the base software, following technical documentation and given specifications, to administer server operating systems.

3. Install and configure file transfer and messaging software, among others, by linking them with their application and following documentation and specifications given, to administer network services.

4. Install and configure management software, following specifications and analyzing application environments, to administer applications.

5. Install and manage management software, relating to its exploitation, to implement and manage databases.

6. Configure hardware devices, analyzing their functional features, to optimize system performance.

7. Configure network hardware, analyzing its functional features and relating it to its application field, to integrate communications equipment.

8. Analyze interconnection technologies, describing their characteristics and application possibilities, to configure the structure of the telematics network and evaluate their performance.

9. Develop telematics network schemes using specific software to configure the telematic network structure.

10. Select protection and recovery systems, analyzing their functional characteristics, to implement high availability solutions.

11. Identify equipment and facilities conditions, interpreting safety plans and manufacturer specifications, to monitor physical security.

12. Apply protection techniques against external threats, typing and evaluating them to secure the system.

13. Apply information loss protection techniques, analyzing security plans and usage needs to ensure data.

14. Assign system access and resources, applying the specifications of the operation, to administer users

15. Apply monitoring techniques by interpreting the results and relating them to corrective measures to diagnose and correct dysfunctions.

16. Set task scheduling, analyzing system activities and workloads to manage maintenance.

17. Identify technological, organizational, economic and labor changes in their activity, analyzing their implications in the field of work, to solve problems and maintain a culture of updating and innovation.

18. Identify forms of intervention in collective situations, analyzing the decision-making process, and consulting to lead them.

19. Identify and value learning opportunities and their relationship with the world of work, analyzing market offers and demands to manage your career.

20. Recognize business opportunities, identifying and analyzing market demands to create and manage a small business.

21. Recognize their rights and duties as an active agent in society, analyzing the legal framework that regulates social and labor conditions to participate as a democratic citizen.

Article 10. Professional modules.

1. The professional modules of this training cycle:

(a) They are developed in Annex I to this royal decree, complying with the provisions of Article 14 of Royal Decree 1538/2006 of 15 December.

b) These are the following:

0369 Deployment of operating systems.

0370 Planning and administration of networks.

0371 Hardware Fundamentals.

0372 Database management.

0373 Brand languages and information management systems.

0374 Administration of operating systems.

0375 Network and Internet Services.

0376 Deployment of web applications.

0377 Administration of database manager systems.

0378 Security and high availability.

0379 Network computer systems administration project.

0380 Training and employment guidance.

0381 Enterprise and entrepreneurship.

0382 Training in job centers.

2. The educational authorities shall establish the corresponding curricula in accordance with this royal decree and in accordance with the provisions of Article 17 of Royal Decree 1538/2006 of 15 December establishing the general management of the vocational training of the education system.

Article 11. Spaces and equipment.

1. The spaces necessary for the development of the teachings of this formative cycle are those set out in Annex II of this royal decree.

2. The spaces will have the necessary and sufficient surface to develop the teaching activities that are derived from the learning outcomes of each of the professional modules that are taught in each of the spaces. In addition, they must meet the following conditions:

(a) The area will be established on the basis of the number of people occupying the training space and should enable the development of teaching-learning activities with the "ergonomics" and the mobility required within the same.

b) They should cover the spatial need for furniture, equipment and auxiliary work instruments.

c) They must respect the spaces or safety surfaces required by the machines and equipment in operation.

d) Respect the regulations on the prevention of occupational risks, the regulations on safety and health at the workplace and how many other rules are applicable.

3. The established training spaces may be occupied by different groups of students who are themselves or other educational courses, or educational stages.

4. The various identified learning spaces should not necessarily be differentiated by closure.

5. The equipment included in each space must be the necessary and sufficient to guarantee the acquisition of the learning outcomes and the quality of the teaching to the students. In addition they must meet the following conditions:

(a) The equipment (equipment, machines, etc.) shall have the necessary installation for its proper operation, comply with the safety and risk prevention rules and with the other applicable standards.

(b) The quantity and characteristics of the equipment must be based on the number of pupils and enable the acquisition of the learning outcomes, taking into account the evaluation criteria and the content that is include in each of the professional modules that are delivered in the referenced spaces.

6. The competent authorities shall ensure that the spaces and equipment are adequate in quantity and characteristics for the development of the teaching and learning processes resulting from the learning outcomes of the modules. and thus ensure the quality of these teachings.

Article 12. Teachers.

1. The teaching of the vocational modules which constitute the teaching of this training cycle corresponds to the teaching staff of the Secondary Teaching Body, the Secondary School Teachers 'Corps and the Teachers' Body. Professional Training Technicians, as appropriate, from the specialties set out in Annex III A) to this royal decree.

2. The qualifications required for access to the aforementioned teaching bodies are, in general, those laid down in Article 13 of Royal Decree 276/2007 of 23 February, approving the entry, access and acquisition of the new specialties in the teaching bodies referred to in the Organic Law 2/2006 of 3 May of Education, and the transitional admission regime is regulated, which refers to the transitional provision of the said law. The qualifications equivalent to those before these same effects are, for the various specialties of the faculty, those listed in Annex III B) of the present royal decree.

3. The qualifications required and the necessary requirements for the delivery of the professional modules that make up the title, for the teachers of the centers of private ownership or public ownership of other administrations other than education, are the ones included in Annex III C) of the present royal decree. In any case, the lessons to be taught in the above mentioned qualifications will be required to include the objectives of the professional modules or to be accredited, by means of "certification", a work experience of at least three years in the sector linked to the professional family, performing productive activities in companies that are implicitly related to learning outcomes.

4. The competent authorities shall ensure that the teachers provided by the professional modules comply with the specified requirements and thus ensure the quality of these lessons.

CHAPTER IV

Accesses and links to other studies, and correspondence of professional modules with the competition units

Article 13. Preferences for access to this training cycle in relation to the modalities and subjects of Baccalaureate courses.

A preference will be given to access to this training cycle those students who have completed the Bachelor of Science and Technology modality.

Article 14. Access and linkage to other studies.

1. The title of Senior Technician in Network Information Systems Administration allows direct access to cure any other higher-grade training cycle, under the conditions of admission to be established.

2. The title of Senior Technician in Network Information Systems Administration allows direct access to the teachings conducive to undergraduate degree degrees in the conditions of admission that are established.

3. The Government, heard by the Council of Universities, shall, as a rule, regulate the recognition of claims between the qualifications of the higher technical vocational training and the degree of university teaching. For the purpose of facilitating the validation regime, 120 ECTS credits have been allocated in the minimum teachings established in this royal decree among the professional modules of this training cycle.

Article 15. Validations and exemptions.

1. The convalidations of professional modules of the professional qualifications established under the Organic Law 1/1990, of 3 October, of General Ordination of the Educational System, with the professional modules of the established titles under the Organic Law 2/2006 of 3 May of Education are set out in Annex IV to this royal decree.

2. Professional modules, common to several training cycles, of the same name, duration, contents, objectives expressed as learning outcomes and evaluation criteria, established in the actual decrees, will be validated. laying down the minimum lessons to be learned from vocational training qualifications. However, in accordance with Article 45.2 of Royal Decree 1538/2006 of 15 December, those who have passed the vocational training and guidance module or the business module of Enterprise and entrepreneurial initiative in any of the training cycles corresponding to the securities established under the Organic Law 2/2006 of 3 May of Education shall have such modules validated in any other training cycle established under the same law.

3. The vocational training and guidance module of any professional training title may be subject to validation provided that the requirements laid down in Article 45.3 of Royal Decree 1538/2006 of 15 December 2006 are satisfied. that the certificate of Technical in Prevention of Occupational Risks, Basic Level, issued in accordance with the provisions of Royal Decree 39/1997 of 17 January, approving the Regulation of the Prevention Services.

4. In accordance with Article 49 of Royal Decree 1538/2006 of 15 December 2006, the total or partial exemption of the vocational training module may be determined in respect of the work experience, provided that an experience related to this training cycle is established in the terms provided for in that Article.

Article 16. Correspondence of professional modules with the units of competence for their accreditation, validation or exemption.

1. The correspondence of the units of competence with the professional modules which form the teaching of the title of Senior Technician in Administration of Computer Systems in Network for validation or exemption is determined in Annex V A) of this royal decree.

2. The correspondence of the professional modules which form the teaching of the title of Senior Technician in the Administration of Computer Systems in Network with the units of competence for their accreditation, is determined in Annex V B) of this royal decree.

Additional disposition first. Title reference in the European framework.

Once the national qualifications framework has been established, in accordance with the European recommendations, the corresponding level of this qualification will be determined in the national framework and its equivalent in the European framework.

Additional provision second. Distance offering of this Title.

The professional modules that form the teaching of this training cycle can be offered at a distance, provided that it is guaranteed that the student can achieve the learning outcomes of the same, according to the in the present royal decree. To this end, the educational authorities, within the scope of their respective powers, shall take the measures they deem necessary and shall give the precise instructions.

Additional provision third. Equivalent qualifications and links with vocational training.

1. In accordance with the provisions of the additional thirty-first provision of the Organic Law 2/2006, of May 3, of Education, the titles of Technical Specialist of Law 14/1970, of 4 August, General of Education and Financing of the Reform Educational, which are then related, will have the same professional and academic effects as the title of Superior Technician in Administration of Computer Systems in Network established in the present royal decree:

a) Technical Specialist in Business, Administrative and Commercial Branch.

b) Technical Specialist in Enterprise, Administrative and Commercial Branch.

c) Technical Specialist in Business Computing, Administrative and Commercial Branch.

2. The title of Superior Technician in Information Systems Administration, established by Royal Decree 1660/1994, of July 22, will have the same professional and academic effects as the title of Superior Technician in Systems Administration. Computer in Network established in this royal decree.

3. The training provided in this royal decree in the vocational training and guidance module is capable of carrying out professional responsibilities equivalent to those required by basic level activities in the field of risk prevention. This is the case in the case of the case-law of the Court of Law of 17 January 1997, in which the Regulation of the Prevention Services is adopted, provided that it has at least 45 teaching hours.

Additional provision fourth. Regulation of the exercise of the profession.

1. In accordance with the provisions of Royal Decree 1538/2006 of 15 December establishing the general organisation of the vocational training of the education system, the elements set out in this royal decree do not constitute a Regulation of the exercise of profession entitled.

2. Similarly, the equivalence of academic qualifications laid down in paragraph 1 and 2 of the third provision of this royal decree shall be without prejudice to the provisions which they enable for the exercise of the right of regulated professions.

Additional provision fifth. Equivalences for the purposes of teaching in the selective entry procedures in the Professional Training Technical Teachers ' Corps.

The title of Technical Superior or Specialist Technician is declared equivalent to those required for access to the Technical Teachers ' Body of Vocational Training, when the title has been used as an interim teacher in schools. (a) public in the territorial scope of the convening administration and in the teaching profession to which it intends to access for a minimum period of two years before 31 August 2007.

Additional provision sixth. Universal accessibility in the teachings of this title.

1. In the field of their respective competences, the educational authorities will include in the curriculum of this training cycle the elements necessary to ensure that the persons who are cured develop the competences included in the curriculum in design for all.

2. They shall also take the measures they deem necessary to enable this student to access and to pursue that training cycle under the conditions laid down in the final provision of Law 51/2003 of 2 December 2003. equal opportunities, non-discrimination and universal accessibility for people with disabilities.

Single transient arrangement. Applicability of other rules.

1. Until the provisions of this royal decree are applied, pursuant to the provisions of its second and third final provisions, the provisions of Royal Decree 1660/1994 of 22 July 1994 establishing the title of the Senior Technician in Computer Systems Administration and the corresponding minimum teachings.

2. In addition, until the rule governing the management of the Ministry of Education is applied, the curriculum corresponding to the title of Senior Technician in the Administration of Information Systems in Network will be applicable. established in Royal Decree 1675/1994 of 22 July 1994 establishing the curriculum of the higher grade training cycle corresponding to the title of Senior Technician in Computer Systems Administration.

Single repeal provision. Repeal of rules.

1. Royal Decree 1660/1994 of 22 July 1994 establishing the title of a higher technician in the administration of information systems and the corresponding minimum teaching and the number of provisions of equal or lower rank is hereby repealed. oppose the provisions of this royal decree.

2. Royal Decree 1675/1994 of 22 July 1994 establishing the curriculum of the higher education cycle corresponding to the title of Senior Technician in the Administration of Computer Systems is hereby repealed.

Final disposition first. Competence title.

This royal decree is of a basic standard, under the powers conferred on the State by Article 149.1.1. and 30. of the Constitution.

Final disposition second. Implementation of the new curriculum.

The educational administrations will implement the new curriculum of these teachings in the school year 2010/2011.

Final disposition third. Entry into force.

This royal decree will enter into force on the day following its publication in the "Official State Gazette".

Given in Madrid on October 30, 2009.

JOHN CARLOS R.

The Minister of Education,

ANGEL GABILONDO PUJOL

ANNEX I

Professional Modules

Professional Module: Deployment of Operating Systems.

Equivalence in ECTS credits: 15

Code: 0369

Learning results and evaluation criteria.

1. Installs operating systems, analyzing their features, and interpreting the technical documentation.

Assessment Criteria:

a) The functional elements of a computer system have been identified.

b) The features, functions, and architecture of an operating system have been identified.

c) Different operating systems, their versions, and usage licenses have been compared, depending on their requirements, features, and application fields.

d) installations of different operating systems have been performed.

e) System update and recovery techniques are planned and applied.

f) System and startup process incidents have been resolved.

g) Tools have been used to know the software installed on the system and its source.

h) Support documentation has been developed regarding the installations performed and the detected incidents.

2. Configures the base software, analyzing the operating needs of the computer system.

Assessment Criteria:

a) You have planned, created, and configured local user accounts, groups, profiles, and password policies.

b) Access to the system has been secured by using account directives and password directives.

c) Services and processes have been performed according to the needs of the system.

d) Network protocols have been installed, configured, and verified.

e) Different name resolution methods have been analyzed and configured.

f) The use of operating systems for portable systems has been optimized.

g) Virtual machines have been used to perform operating system configuration tasks and analyze their results.

h) The base software configuration tasks have been documented.

3. Ensures system information, describing procedures and using backup and fault-tolerant systems.

Assessment Criteria:

a) A number of file systems have been compared and their differences and implementation benefits analyzed. 

b) The operating system directory structure has been described.

c) The container directories for system configuration files (binaries, orders, and libraries) have been identified.  

d) Disk administration tools have been used to create partitions, logical drives, simple volumes, and distributed volumes.

e) Redundant storage (RAID) systems have been deployed.

f) Backup plans have been implemented and automated.

g) Disk quotas have been administered.

h) The operations performed and the methods to be followed for disaster recovery have been documented.

4. Centralizes information on servers by managing domain structures and analyzing their benefits.

Assessment Criteria:

a) Domains have been implemented.

b) User accounts and team accounts have been administered.

c) The personal information of domain users has been centralized by using mobile profiles and personal folders.

d) Security groups have been created and administered.

e) Templates have been created to facilitate the administration of users with similar features.

f) The domain objects have been organized to facilitate their administration.

g) Virtual machines have been used to administer domains and verify their operation.

h) The structure of the domain and the tasks performed have been documented.

5. Manages access to domains by analyzing and respecting security requirements.

Assessment Criteria:

a) Teams have been incorporated into the domain.

b) Unauthorized access locks have been scheduled for the domain.

c) Access to local resources and network resources has been administered.

d) Security requirements have been taken into account.

e) Group directives have been implemented and verified.

f) Group directives have been assigned.

g) The tasks and incidents have been documented.

6. It detects performance problems, monitoring the system with the appropriate tools, and documenting the procedure.

Assessment Criteria:

a) The monitorizable objects in a computer system have been identified.

b) Event types have been identified.

c) Real-time monitoring tools have been used.

d) Performance monitoring by counter and system tracking records has been monitored.

e) Performance alerts are planned and configured.

f) The stored performance records have been interpreted.

g) The system was analyzed using simulation techniques to optimize performance.

h) Support and incident documentation have been produced.

7. Audits the use and access to resources, identifying and respecting the security needs of the system.

Assessment Criteria:

a) User rights and security directives have been administered.

b) Auditable objects and events have been identified.

c) An audit plan has been developed.

d) The impact of audits on system performance has been identified.

e) Correct and wrong events were audited.

f) Access attempts and access to system resources have been audited.

g) Audit records have been managed.

h) The audit process and its results have been documented.

8. It implements specific software with client/server structure in response to the functional requirements. 

Assessment Criteria:

a) Specific software has been installed according to the technical documentation.

b) Unserved installations have been performed.

c) An update server has been configured and used.

d) Action protocols are scheduled to resolve incidents.

e) Action protocols have been followed to resolve incidents.

f) Technical assistance has been provided through the network documenting the incidents.

g) Visual and manual guides have been developed to instruct in the use of operating systems or applications.

h) The tasks performed have been documented.

Duration: 140 hours.

Basic contents:

Free and proprietary software installation:

− Structure of a computer system.

− Architecture of an operating system.

− Functions of an operating system.

− Types of operating systems.

− Application types.

− Licenses and license types.

− Boot managers.

− Pre-installation considerations for free operating systems and owners.

− Installing operating systems. Requirements, versions, and licenses.

− Installing/uninstalling applications.  Requirements, versions, and licenses.

− Updating operating systems and applications.

− Operating system startup files.

− System log.

− Updating and maintaining device drivers.

Base software administration:

− Administration of local users and groups.

− Default users and groups.

− User account security.

− Password security.

− Administration of local user profiles.

− Configuring the TCP/IP protocol on a network client.

− Configuring name resolution.

− Network configuration files.

− Optimizing systems for laptops. Network files offline.

Administering and securing information:

− File systems.

− Managing file systems using commands and graphical environments.

− Link management.

− Free operating system directory structure and owners.

− Search system information using graphical commands and tools.

− Identification of software installed using graphical commands and tools.

− Management of the system information. Performance. Statistics.

− Assembly and disassembly of devices on operating systems. Automation.

− Disk Management Tools. Partitions and volumes. Defragmentation and checkup.

− Extension of a volume. Volumes distributed. RAID0 by software.

− Tolerance to hardware failures. RAID1 and RAID5 by software.

− Tolerance to data software failures.

− Types of backups.

− Backup plans. Backup programming.

− Recovery in case of system failure.

− Boot Disks. Recovery discs.

− System security copies. System recovery using console. Recovery points.

− Creating and retrieving images of servers.

− Disk quotas. Quota levels and warning levels.

Domain administration:

− Client-server structure.

− LDAP protocol.

− Domain Concept. Subdomains. Requirements for mounting a domain.

− Account Management. Default accounts.

− Passwords. Account locks.

− User and Equipment Accounts.

− Mobile and mandatory profiles.

− Personal Folders.

− User Templates. Environment variables.

− Group administration. Types. Nesting strategies. Default groups.

Administering domain access:

− Domain Teams.

− Permissions and Rights.

− Administration of access to resources. SAMBA. NFS.

− Network Permissions. Local permissions. Inheritance. Effective permissions.

− Delegation of permissions.

− Access control lists.

− Group Directives. User rights. Security directives. Directive objects. Scope of the Directives. Templates.

Monitoring system performance:

− Real-time monitoring tools.

− Continuous monitoring tools.

− Performance analysis tools.

− Event logs.

− Event monitoring.

− Managing applications, processes, and threads.

− Monitoring of applications and processes.

Security and Audit Directives:

− System and data security requirements.

− User rights.

− Local security directives.

− Operating system log.

− Audit goals.

− Scope of the audit. Auditable aspects.

− Audit mechanisms. Alarms and corrective actions.

− Audit log information.

− Techniques and audit tools.

− Audit reports.

Incident resolution and technical assistance:

− Interpretation, analysis and elaboration of technical documentation.

− Interpretation, analysis, and elaboration of installation and configuration manuals for operating systems and applications.

− Client licenses and server licenses.

− Unserved installations.

− Implementation of response files.

− Automatic update servers.

− Incident Parties.

− Action Protocols.

− Remote administration.

Pedagogical guidelines.

This professional module contains the necessary training to perform the functions of implementing operating systems and applications of a computer system and helps to achieve the necessary training in the administration and server exploitation.

The implementation of operating systems and applications includes aspects such as:

− The search for operating systems that are appropriate to the operating environment.

− The installation, maintenance, and administration of client operating systems.

− Installation, maintenance, and administration of servers.

− Planning, automating, and restoring backups.

− Monitoring the performance of computer systems.

− The audit of events and resources in a computer system.

− The simulation of computer systems by using virtual machines.

− Installation and maintenance of software from technical documentation.

− The resolution of incidents.

− Technical assistance.

The professional activities associated with these functions apply to:

− The installation and maintenance of domestic operating systems.

− Installing and maintaining client and server operating systems.

− The exploitation of computer systems.

− The administration of computer systems.

− The maintenance of computer systems.

− Computer technical assistance to users.

− Technical assistance to enterprises.

The formation of the module contributes to achieving the general objectives (a), (b), (j), (l), (m), (n), (n), (o) and (p) of the training cycle and the professional, personal and social competences (a), (e), (g), (f), (k) and (n) of the title.

The lines of action in the teaching-learning process that enable you to achieve the objectives of the module are related to:

− The analysis of changes and new developments in operating systems and applications.

− Using virtual machines to simulate systems.

− The correct interpretation of technical documentation.

− Installing and upgrading client operating systems.

− The installation and maintenance of independent servers.

− Server administration.

− Domain administration.

− The verification of system access security.

− The elaboration of technical documentation, incident parts, usage manuals, visual guides, etc.

− Assistance and troubleshooting in operating system administration.

Professional Module: Network Planning and Administration.

Equivalence in ECTS credits: 12

Code: 0370

Learning results and evaluation criteria.

1. Recognizes the structure of the data networks by identifying their elements and principles of operation.

Assessment Criteria:

a) The factors that drive the continuous expansion and evolution of data networks have been identified.

b) Different means of transmission used in networks have been differentiated.

c) The various network types and their topologies have been recognized.

d) Network architectures and their component levels have been described.

e) The concept of communication protocol has been described.

f) The operation of the protocol stacks on the various network architectures has been described.

g) The functional, physical, and logical elements of the data networks have been presented and described.

h) Network interconnect devices have been differentiated based on the functional level in which they are bound.

2. Integrates computers and peripherals into wired and wireless networks, assessing their performance and performance.

Assessment Criteria:

a) Standards for wired and wireless networks have been identified.

b) Direct, cross, and console cables have been mounted.

c) Checkers have been used to verify the connectivity of different types of cables.

d) The IP logical routing system was used to assign network addresses and subnet masks.

e) wired and wireless network adapters have been configured under different operating systems.

f) Devices have been integrated into wired and wireless networks.

g) The connectivity between various devices and wireless adapters over different configurations has been checked.

h) Applications have been used to represent the physical and logical map of a network.

i) The network was monitored by applications based on the SNMP protocol.

3. Manages switches by setting configuration options for network integration.

Assessment Criteria:

a) Switches are connected to each other and to workstations.

b) The information provided by the switch's "leds" has been interpreted.

c) Different methods have been used to access the switch configuration mode.

d) Files that save the switch configuration have been identified.

e) The switch MAC address table was administered.

f) Port security has been configured.

g) The switch operating system has been updated.

h) The commands provided by the operating system of the switch have been used to track possible incidents.

i) The running of the Spanning Tree Protocol on a switch has been verified.

j) The parameters that determine the root bridge selection process have been modified.

4. Manages the basic functions of a router by setting configuration options for network integration.

Assessment Criteria:

a) The information provided by the "leds" of the "router" has been interpreted.

b) Different methods have been used to access the "router" configuration mode.

c) The stages of the "router" startup sequence have been identified.

d) The commands for basic "router" configuration and administration have been used.

e) Files that save the "router" configuration have been identified and managed using the corresponding commands.

f) Static routes have been configured.

g) The commands provided by the "router" operating system have been used to track possible incidents.

h) The "router" has been configured as the dynamic IP address server.

i) The traffic filtering capabilities of the "router" have been described.

j) Commands have been used to manage access control lists.

5. Configures virtual local networks by identifying their application field.

Assessment Criteria:

a) The benefits of using virtual local networks (VLANs) have been described.

b) VLANs have been implemented.

c) Incident diagnosis has been performed on VLANs.

d) Troncal links have been configured.

e) A router has been used to interconnect multiple VLANs.

f) The benefits of using VLANs centralized administration protocols have been described.

g) Switches have been configured to work according to centralized administration protocols.

6. Performs advanced network administration tasks by analyzing and using dynamic routing protocols.

Assessment Criteria:

a) The R&no. routing protocol is configured.

b) Networks have been configured with the R&L; 2. protocol

c) The failure diagnosis has been performed on a network that uses RIP.

d) The need to use variable-length masks has been assessed in 4.

e) A core network has been divided into subnets of different sizes with VLSM.

f) Network pools have been made with CIDR.

g) OSPF is enabled and configured on a "router".

h) A default route has been set and propagated using OSPF.

7. Connects private networks to public networks by identifying and applying different technologies.

Assessment Criteria:

a) The advantages and disadvantages of using network address translation (NAT) have been described.

b) NAT has been used to perform static translation of network addresses.

c) NAT has been used to perform dynamic network address translation.

d) The features of the "Frame Relay", ISDN and ADSL technologies have been described.

e) Analogies and differences between "Wifi" and " Wimax" technologies have been described.

f) The features of UMTS and HSDPA technologies have been described.

Duration: 110 hours.

Basic contents:

Network Characterization:

− Terminology: LAN, MAN and WAN networks, topologies, architectures, protocols.

− Decimal, binary, and hexadecimal numbering systems. Conversion between systems.

− Network architecture.

− Encapsulation of the information.

− The OSI model.

− The TCP/IP model.

− Ethernet technologies.

− The OSI and "Ethernet" model.

− Ethernet cabling types.

Integrating elements into a network:

− The physical media.

− Bandwidth and Transfer Rate.

− The metal cables (coaxial, STP, and UTP).

− Physical factors affecting transmission.

− The wireless connection. The microwave and radio wave spectra. Topologies. Association and authentication on the WLAN.

− Routing.

− Collision domains and "broadcast".

− IPv4 addresses and network masks.

− Dynamic routing (DHCP).

− Adapters.

− Wire adapters: installation and configuration.

− Wireless adapters: installation and configuration.

Configuring and administering switches:

− Network segmentation. Benefits that you present.

− Switches and Collision Domains and "broadcast".

− Network segmentation.

− Forms connection to the switch for configuration.

− Switch configuration.

− Static and dynamic configuration of the MAC address table.

Routers ' basic configuration and administration:

− The routers on the LANs and on the WANs.

− Router components.

− Forms of connection to the "router" for initial configuration.

− Commands for "router" configuration.

− Commands for "router" administration.

− Configuring static routing.

− Definition and location of access control lists (ACLs).

Configuring virtual networks:

− The layout of three-layer local networks (core, distribution, and access).

− Deployment and configuration of virtual networks.

− Definition of trunk links on switches and routers. The IEEE802.1Q protocol.

Configuring and administering dynamic protocols:

− Routing protocols and routing protocols.

− Internal and outer routing protocols.

− Unclass routing.

− The network subdivision and the use of variable-length masks (VLMs).

− The Ration2 protocol; comparison with Rate1.

− Configuring and administering R&L; 1.

− Configuring and administering Ration2.

Configuring Internet access from a LAN:

− Internal routing and external routing.

− NAT source and target NAT.

− static, dynamic, overload (PAT), and reverse NAT.

− NAT configuration.

− Diagnostics of NAT incidents.

− PAT configuration.

Pedagogical guidelines.

This professional module contains the necessary training to perform the function of connecting computers, devices and network electronics in a local area network.

The definition of these functions includes aspects such as:

− The layout of the structure of a local network, identifying the elements that must integrate it.

− The connection and configuration of the local network elements.

− Local network monitoring.

− The resolution of physical and logical incidents on the local network.

− Creating virtual networks.

− The connection of the local network to an extensive area network.

The professional activities associated with this function apply to:

− The layout of wired, wireless, and mixed local area networks.

− The installation and configuration of network electronics, computers, and devices in local wired, wireless, and mixed networks.

− The resolution of incidents in wired, wireless, and mixed local networks.

The formation of the module contributes to achieving the general objectives (f), (g), (h), (i), (k), (n) and (p) of the training cycle, and the professional, personal and social competences (b), (e), (f), (g), (h), (m), (n), (n) and (s) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− The proper choice of local network elements.

− The interpretation of the technical documentation of the local network elements.

− The installation and configuration of the local network elements.

− The elaboration and interpretation of the documentation relating to the organization of the local network.

− The resolution of problems encountered in the operation of the local network.

Professional Module: Hardware Foundations.

Equivalence in ECTS credits: 6

Code: 0371

Learning results and evaluation criteria.

1. Configures microcomputer, component, and peripheral equipment, analyzing their characteristics and relationship to the set.

Assessment Criteria:

a) The devices that constitute the functional blocks of a microcomputer equipment have been identified and characterized.

b) The role of the physical and logical elements involved in the process of commissioning a team has been described.

c) The overall architecture of a device and the mechanisms of connection between devices have been analyzed.

d) The configuration parameters (hardware and software) of a microcomputer team have been set with the specific utilities.

e) The capabilities of the team have been evaluated.

f) Check and diagnostic utilities have been run.

g) Breakdowns and their causes have been identified.

h) The peripheral devices and their communication mechanisms have been classified.

i) Standard wireless communication protocols have been used between devices.

2. Installs general purpose software by evaluating its features and application environments.

Assessment Criteria:

a) Software types have been cataloged according to their license, distribution, and purpose.

b) The specific software needs associated with the use of computer systems in different production environments have been analyzed.

c) Utilities for file management, data recovery, maintenance, and system optimization have been installed and evaluated.

d) Basic security utilities have been installed and evaluated.

e) Ostatic and general utility software has been installed and evaluated.

f) Documentation and interactive aids have been consulted.

g) The impact of removing, modifying, and/or updating the utilities installed on the system has been verified.

h) Portable and non-portable applications have been tested and compared.

i) Inventory of the installed software and the features of your license have been performed.

3. Runs procedures to retrieve the base software from a computer, analyzing them, and using images stored in auxiliary memory.

Assessment Criteria:

a) The appropriate auxiliary memory supports for the storage and restoration of software images have been identified.

b) The difference between a standard installation and a preinstallation or software image has been recognized.

c) Different configurable boot sequences have been identified and tested on a computer.

d) Tools for disk partitioning have been used.

e) Different utilities and media have been used to make images.

f) Images have been restored from different locations.

4. It implements specific data processing center (CPD) hardware, analyzing its features and applications.

Assessment Criteria:

a) The differences between personal and business-type hardware configurations have been recognized.

b) Environments that require specific hardware solutions have been analyzed.

c) Specific hardware components for enterprise solutions have been detailed.

d) The basic requirements of physical security, organization, and environmental conditions of a CPD have been analyzed.

e) Uninterruptible power systems and voltage stabilizers have been implanted.

f) Hardware devices for hot-plug storage and power have been successfully handled.

g) Procedures, incidents, and parameters used in the installation and configuration of hardware devices have been documented.

h) Inventorying tools have been used, recording the characteristics of the hardware devices.

i) Technical documentation, drivers, utilities, and hardware accessories have been classified and organized.

5. It complies with the standards of occupational risk prevention and environmental protection, identifying the associated risks, measures and equipment to prevent them.

Assessment Criteria:

(a) The risks and level of danger posed by the handling of materials, tools, tools, machines and means of transport have been identified.

b) Machines have been operated in compliance with safety standards.

c) The most frequent causes of accidents in the handling of materials and tools, among others, have been identified.

(d) Safety elements (protection, alarms, and emergency steps, among others) have been described for machines and personal protective equipment (footwear, eye protection and clothing, among others) which must be use in the various assembly and maintenance operations.

e) The handling of materials, tools and machines has been related to the required security and personal protection measures.

f) Possible sources of contamination of the environmental environment have been identified.

g) The generated waste has been classified for selective removal.

h) Order and cleaning of facilities and equipment has been valued as the first risk prevention factor.

Duration: 55 hours.

Basic contents:

Configuring computers and peripherals: Computer architecture:

− Schema and structure of a computer.

− Functional elements and subsystems.

− Composition of a computer system:

• The central processing unit.

• Memory.

• The I/O subsystem

• Types of bus architectures.

• Interfaces.

− Integration components for computer equipment assembly:

• Chassis, power and cooling.

• Base plates, processors, and memories.

• Storage devices. Controllers.

• Peripherals. Adapters for the device connection.

• Mechanisms and interconnection techniques.

• A computer boot sequence. Possibilities.

• Installing and configuring devices.

• Security rules.

− Configuration and verification of equipment.

− Embedded software configuration of a team.

− screening and diagnosis.

− Connection and communication techniques.

− Communications between computer systems.

− Connection to networks.

Installing utility and general purpose software for a computer system:

− Operating Environments.

− Application types.

− Installing and testing applications.

− Needs of the operating environments.

− Application requirement.

− Application Comparison. Evaluation and performance.

− General purpose software:

• Ofimatica and electronic documentation.

• Image, design, and multimedia.

• Programming.

• Customers for Internet services.

• Custom software.

− Utilities:

• Compressors.

• Monitoring and optimizing the system.

• File and data recovery management.

• Disk management. Fragmentation and partitioning.

• Security.

• Antivirus, antispies, and firewalls.

Creating software images. Backing the base software of a system:

− Partitioning of disks.

− Backup images.

− Boot options for a system.

− Image creation.

− Recovery of images.

Hardware deployment in data processing centers (CPD):

− Personal computer architectures, departmental systems, and large computers.

− Structure of a CPD. Organization.

− Physical security.

− Specific components in business solutions:

• Racks or "racks".

• Hot-plug devices.

• Disks.

• Power supplies.

• Remote control.

− High availability architectures.

− Inventory of the hardware.

Compliance with the rules on occupational risk prevention and environmental protection:

− Risk identification.

− Determination of occupational risk prevention measures.

− Prevention of labor risks in assembly and maintenance processes.

− Individual protective equipment.

− Compliance with workplace risk prevention regulations.

− Compliance with environmental protection regulations.

Pedagogical guidelines.

This professional module contains the training required to perform systems maintenance functions in personal environments and associated with common peripherals. It will also serve to gain a comprehensive and up-to-date view of the operation, structure, organization, specific hardware, and role of the system administrator of a data processing center.

Systems maintenance functions include aspects such as:

− The knowledge and correct manipulation of the elements that form the physical and logical component of the equipment.

− The monitoring and monitoring of equipment, at a physical and logical level.

− The organization and inventory of the physical and logical resources of a system.

− The diagnosis and resolution of breakdowns.

− The commissioning and maintenance of peripherals.

− The constant adaptation to changes and innovations in this field.

The professional activities associated with these functions apply to:

− Equipment Maintenance. Hardware and software.

− Commissioning and maintenance of peripherals.

− Technical, commercial and technical-commercial departments specializing in computer and peripheral equipment.

− Technical, commercial and technical-commercial departments specializing in applications.

− Technical personnel in data processing centers.

The formation of the module contributes to the achievement of the general objectives (f), (k), (m), (n), (p) and (q) of the training cycle and the professional, personal and social competences (e), (f), (j), (m), (n), (n), (o), (p), (r) and (s) of the title.

The lines of action in the teaching-learning process that enable you to achieve the objectives of the module are related to:

− The identification of the elements that form the physical component of the computer equipment.

− The interpretation of the technical documentation of these elements, to ensure their correct handling and use.

− The Health Check, Diagnosis and Monitoring of Equipment.

− The planned diagnosis of problem or failed equipment.

− The elaboration and/or interpretation of inventories.

− The comparative analysis of general purpose software and utilities.

− The analysis of the application of information technologies in different production environments, and the characterization of these environments.

− The promotion of professional and personal behavior patterns specific to a data processing center.

− Knowledge of roles and tasks in a data processing center.

− Monitoring hardware devices with specific tools.

− Compliance with the standards of occupational risk prevention and environmental protection.

− The promotion of an up-to-date and comprehensive view of the industry, as well as the recognition of new trends and specific solutions in systems management.

Professional Module: Database Management.

Equivalence in ECTS credits: 11

Code: 0372

Learning results and evaluation criteria.

1. Recognizes the elements of the databases by analyzing their functions and valuing the utility of the managing systems.

Assessment Criteria:

a) The different storage logical systems and their functions have been analyzed.

b) The different types of databases have been identified based on the data model used.

c) The different types of databases have been identified based on the location of the information.

d) The utility of a database manager system has been recognized.

e) The function of each of the elements of a database manager system has been described.

f) The database manager systems have been classified.

2. Designs normalized logical models by interpreting entity/relationship diagrams.

Assessment Criteria:

a) The meaning of the own symbology of the entity/relationship diagrams has been identified.

b) Graphic tools have been used to represent the logical layout.

c) Logical layout tables have been identified.

d) The fields that are part of the logical layout tables have been identified.

e) The relationships between the logical layout tables have been identified.

f) Key fields are defined.

g) The integrity rules have been applied.

h) The normalization rules have been applied to an appropriate level.

i) Restrictions that cannot be reflected in the logical layout have been identified and documented.

3. Performs physical database design using wizards, graphical tools, and data definition language.

Assessment Criteria:

a) The physical storage structures are defined.

b) Tables have been created.

c) The appropriate data types have been selected.

d) The key fields in the tables have been defined.

e) All the constraints reflected in the logical layout have been implemented.

f) It has been verified by a test data set that the implementation conforms to the model.

g) Wizards and graphical tools have been used.

h) The data definition language was used.

i) The data dictionary is defined and documented.

4. Queries the stored information by handling wizards, graphical tools, and the data manipulation language.

Assessment Criteria:

a) The tools and statements for performing queries have been identified.

b) Simple queries have been performed on a table.

c) Queries that generate summary values have been performed.

d) Queries have been performed on the contents of multiple tables by internal compositions.

e) Queries have been performed on the contents of multiple tables by external compositions.

f) Queries have been made with subqueries.

g) The advantages and disadvantages of the various valid options for performing a particular query have been valued.

5. Modifies stored information using wizards, graphical tools, and data manipulation language.

Assessment Criteria:

a) The tools and statements to modify the contents of the database have been identified.

b) Data has been inserted, deleted, and updated in the tables.

c) The information resulting from the execution of a query has been included in a table.

d) Measures have been taken to maintain the integrity and consistency of the information.

e) Statement scripts have been designed to perform complex tasks.

f) The operation of the transactions has been recognized.

g) Changes produced by a transaction have been partially or completely overridden.

h) The effects of different record lock policies have been identified.

6. Executes information assurance tasks, analyzing and applying safeguard and transfer mechanisms.

Assessment Criteria:

a) Graphical and command-line tools have been identified for backup administration.

b) Backups have been made.

c) Backups have been restored.

d) The tools to import and export data have been identified.

e) Data has been exported to various formats.

f) Data has been imported in different formats.

g) The information provided by error messages and log files has been interpreted correctly.

h) Information has been transferred between managing systems.

Duration: 105 hours.

Basic contents:

Information storage systems:

− Ficheros (flat, indexed, and direct access, among others).

− Databases. Concepts, uses, and types according to the data model, the location of the information.

− Database managers: functions, components, and types.

Logical database design:

− Data Model.

− The representation of the problem: the entities and relationships E/R diagrams. Cardinality. Weakness.

− The extended E/R model.

− The Relational Model: Relational Model Terminology. Characteristics of a relationship. Primary keys and foreign keys.

− Step of the E/R diagram to the relational model.

− Standardization.

Physical database design:

− Graphical tools provided by the manager system for the database implementation.

− The data definition language.

− Creating, modifying, and removing databases.

− Creating, modifying, and removing tables. Data types.

− Implementing restrictions.

Performing queries:

− Graphical tools provided by the manager system for querying.

− The SELECT statement.

− Selection and sorting of records. Treatment of null values.

− Summary Queries. Grouping of records.

− Query Union.

− Internal and external Compositions.

− Subqueries.

Editing the data:

− Graphical tools provided by the managing system for editing information.

− INSERT, DELETE, and UPDATE statements.

− Subqueries and combinations in edit orders.

− Transactions. Transaction processing statements.

− Concurrent access to data: lock policies.

Build dashes:

− Introduction. Programming language.

− Data types, identifiers, variables.

− Operators. Control structures.

Managing data security:

− Recovery from failures.

− Security Copies.

− Graphical tools and utilities provided by the manager system for backup and recovery of backups.

− Statements for backing up and retrieving backups.

− Graphical tools and utilities for data import and export.

− Data transfer between managing systems.

Pedagogical guidelines.

This professional module contains the training required to perform the database manager function.

Database management includes aspects such as:

− Planning and performing the physical design of a database.

− Data insertion and manipulation.

− Planning and performing queries.

− The planning and execution of imports, exports, and data migrations.

− Planning and applying information assurance measures.

The professional activities associated with this function apply to:

− The implementation of databases.

− Managing information stored in databases.

The formation of the module contributes to achieving the general objectives (d), (e) and (m) of the training cycle and the professional, personal and social competencies (c), (d) and (m) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− The interpretation of logical database designs.

− Performing the physical design of a database from a logical design.

− The implementation of databases.

− Performing operations with stored data.

− Data import and export.

− The assurance of information.

Professional Module: Brand Languages and Information Management Systems.

Equivalence in ECTS credits: 7

Code: 0373

Learning results and evaluation criteria.

1. Recognizes the features of markup languages by analyzing and interpreting snippets.

Assessment Criteria:

a) The general characteristics of the markup languages have been identified.

b) The benefits that they provide in the treatment of information have been recognized.

c) The most relevant and identified markup languages have been classified.

d) Their application scopes have been differentiated.

e) The need and specific scope of application of a general purpose markup language has been recognized.

f) The characteristics of the XML language have been analyzed.

g) The structure of an XML document and its syntactic rules have been identified.

h) The need to create well-formed XML documents and influence on their processing has been contrasted.

i) The benefits of namespaces have been identified.

2. It uses markup languages for the transmission of information through the Web by analyzing the structure of documents and identifying their elements.

Assessment Criteria:

a) The Web-related markup languages and their different versions have been identified and classified.

b) The structure of an HTML document has been analyzed and the sections that compose it are identified.

c) The functionality of the main HTML language tags and attributes has been recognized.

d) The similarities and differences between HTML and XHTML languages have been established.

e) The XHTML utility has been recognized in the information management systems.

f) Tools have been used in creating Web documents.

g) The benefits of using style sheets have been identified.

h) Style sheets have been applied.

3. Generates content channels by analyzing and using syndication technologies.

Assessment Criteria:

a) The benefits of syndication of content in the management and transmission of information have been identified.

b) Your application scopes have been defined.

c) The technologies on which content syndication is based have been analyzed.

d) The structure and syntax of a content channel has been identified.

e) Content channels have been created and validated.

f) The functionality and access to the channels have been checked.

g) Specific tools have been used as aggregators and channel directories.

4. Sets validation mechanisms for XML documents using methods to define their syntax and structure.

Assessment Criteria:

a) The need to describe the information transmitted in the XML documents and their rules has been set.

b) The technologies related to the XML document definition have been identified.

c) The specific structure and syntax used in the description has been analyzed.

d) XML document descriptions have been created.

e) Descriptions have been used in the processing and validation of XML documents.

f) The descriptions with the documents have been associated.

g) Specific tools have been used.

h) The descriptions have been documented.

5. Performs conversions on XML documents using processing tools and techniques.

Assessment Criteria:

a) The need for XML document conversion has been identified.

b) Application scopes have been set.

c) The technologies involved have been analyzed and their mode of operation.

d) The specific syntax used in XML document conversion and adaptation has been described.

e) Conversion specifications have been created.

f) Specific tools related to XML document conversion have been identified and characterized.

g) Conversions have been performed with different output formats.

h) Conversion specifications have been documented and purged.

6. Manages information in XML format by analyzing and using storage technologies and query languages.

Assessment Criteria:

a) The main methods of storing the information used in XML documents have been identified.

b) The drawbacks of storing information in XML format have been identified.

c) Efficient information storage technologies have been established based on their characteristics.

d) Relational database manager systems have been used in the storage of information in XML format.

e) Specific techniques have been used to create XML documents from information stored in relational databases.

f) The characteristics of the XML native database manager systems have been identified.

g) Native XML database manager systems have been installed and analyzed.

h) Techniques have been used to manage information stored in native XML databases.

i) Languages and tools have been identified for the processing and storage of information and their inclusion in XML documents.

7. Works with information management business systems by performing import, integration, securing, and extraction tasks.

Assessment Criteria:

a) The benefits of enterprise resource planning and management systems have been recognized.

b) The characteristics of the main business management applications have been evaluated.

c) Enterprise management applications have been installed.

d) Applications have been configured and adapted.

e) Secure access to information has been established and verified.

f) Reports have been generated.

g) Integration tasks have been performed with office applications.

h) Information extraction procedures have been performed for their treatment and incorporation into various systems.

i) Assistance and incident resolution tasks have been performed.

j) Documents relating to the operation of the application have been prepared.

Duration: 70 hours.

Basic contents:

Recognition of brand language features:

− Classification.

− XML: structure and syntax.

− Tags.

− Edit Tools.

− Making well-formed XML documents.

− Using namespaces in XML.

Using markup languages in Web environments:

− Identification of HTML tags and attributes.

− XHTM: syntactic and structural differences with HTML.

− HTML and XHTML Versions.

− Web Design Tools.

− Style Sheets.

Application of trademark languages to content syndication:

− Application Ambits.

− Structure of the content channels.

− Content channel creation technologies.

− Validation.

− Content channel directories.

− Aggregation.

Defining schemas and vocabularies in XML:

− Using XML document definition methods.

− Creating descriptions.

− Association with XML documents.

− Validation.

− Create and validate tools.

XML document conversion and adaptation:

− XML document transformation techniques.

− Structure and syntax description.

− Using templates.

− Using processing tools.

− Documentation elaboration.

Information storage:

− Information storage systems.

− Inserting and extracting information in XML.

− Information search techniques in XML documents.

− Query and manipulation languages.

− Native XML storage.

− Information storage and treatment tools in XML format.

Enterprise Management Systems:

− Installation.

− Adaptation and configuration.

− Integration of modules.

− Reporting.

− Integration with office applications.

− Export of information.

Pedagogical guidelines.

This professional module contains the necessary training to perform the function of managing and operating information systems.

Managing and exploiting information systems includes aspects such as:

− The use of markup languages in the processing and transmission of information.

− Publishing and disseminating information using content syndication technologies.

− The characterization of the transmitted and stored information.

− The adaptation of information to technologies used in their presentation, transmission and storage.

− Storage and retrieval of information.

− The implementation and adaptation of enterprise management systems.

The professional activities associated with this function apply to:

− The storage and transmission of information.

− The use of Web technologies for publishing and disseminating information.

− The exploitation of information management business systems.

The formation of the module contributes to the achievement of the general objectives (c), (d), (e) and (r) of the training cycle and the professional, personal and social competences (b) and (c) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− The characterization and transmission of information using markup languages.

− Publishing and disseminating information on the Web.

− The use of information transformation and adaptation techniques.

− The storage of the information.

− Managing information on specific systems oriented to business environments.

Professional Module: Operating Systems Administration.

Equivalence in ECTS credits: 8

Code: 0374

Learning results and evaluation criteria.

1. Manages the directory service by interpreting specifications and integrating it into a network.

Assessment Criteria:

a) The function, elements, and logical structures of the directory service have been identified.

b) The directory service schema was determined and created.

c) The directory service installation on the server has been performed.

d) The configuration and customization of the directory service has been performed.

e) The directory service has been integrated with other services.

f) Search filters have been applied to the directory service.

g) The directory service has been used as the centralized accreditation mechanism for users in a network.

h) The client configuration has been performed for integration into the directory service.

i) Graphical tools and commands have been used for directory service administration.

j) The structure and implementation of the directory service has been documented.

2. Manages system processes by describing them and applying safety and efficiency criteria.  

Assessment Criteria:

a) The concept of system processing, types, states, and lifecycle have been described.

b) Interrupts and exceptions have been used to describe the internal processor events.

c) It has been differentiated between process, thread, and work.

d) Process creation, manipulation, and termination tasks have been performed.

e) The file system was used as a logical means for recording and identifying system processes.

f) Graphical tools and commands have been used for monitoring and tracking system processes.

g) The system startup sequence, the processes involved, and the relationship between them have been checked.

h) Security measures have been taken before the occurrence of unidentified processes.

i) The usual system processes, their function, and relationship between them have been documented.

3. Manages system task automation, applying efficiency criteria and using graphical commands and tools.  

Assessment Criteria:

a) The advantages of automating repetitive tasks on the system have been described.

b) System commands for task scheduling have been used.

c) Security restrictions have been set.

d) Repetitive or point-in-time task schedules related to system administration have been performed.

e) Account management has been automated.

f) Graphical tools for task scheduling have been installed and configured.

g) Graphical tools have been used for task scheduling.

h) Processes scheduled as automatic tasks have been documented.

4. Remotely manages the networked operating system by valuing its importance and applying security criteria.

Assessment Criteria:

a) Remote systems access and administration methods have been described.

b) It has been differentiated between session-oriented and non-session-oriented services.

c) Remote administration tools supplied by the operating system itself have been used.

d) Remote access and administration services have been installed.

e) Graphical commands and tools have been used to manage access and remote administration services.

f) User accounts have been created for remote access.

g) Remote access and administration tests have been performed between heterogeneous systems.

h) Encryption mechanisms have been used for the transferred information.

i) The managed system processes and services have been documented remotely.

5. Manages print servers by describing their functions and integrating them into a network.

Assessment Criteria:

a) The functionality of the print servers and systems has been described.

b) The ports and protocols used have been identified.

c) The tools for managing integrated printers have been used in the operating system.

d) A Web environment print server is installed and configured.

e) Logical printers have been created and classified.

f) Print groups have been created.

g) You have managed printers and job queues using graphical commands and tools.

h) Network printers have been shared between different operating systems.

i) The configuration of the print server and created printers has been documented.

6. Integrates free operating systems and owners, justifying and ensuring their interoperability.

Assessment Criteria:

a) The need to share network resources between different operating systems has been identified.

b) Security levels have been set to control client access to network shared resources.

c) Network connectivity has been checked in a heterogeneous scenario.

d) The functionality of services that enable network resources to be shared has been described.

e) Services have been installed and configured to share network resources.

f) The operation of the installed services has been checked.

g) Group worked to access network file and printer systems from computers with different operating systems.

h) The configuration of the installed services has been documented.  

7. Uses scripting languages on operating systems, describing their application and administering operating system services.

Assessment Criteria:

a) The language structures for creating dashes have been used and combined.

b) Tools have been used to debug syntactic and execution errors.

c) Operating system configuration scripts have been interpreted.

d) Changes and adaptations of system scripts have been made.

e) Service administration scripts have been created and tested.

f) Task automation scripts have been created and tested.

g) Scripts have been implemented on free systems and owners.

h) Function libraries have been queried and used.

i) The created scripts have been documented.

Duration: 75 hours.

Basic contents:

Directory service administration:

− Directory service. Definition, elements and nomenclature. LDAP.

− Directory service schema.

− Domain controllers.

− Installing, configuring, and customizing the directory service.

− Creating domains.

− Objects that administer a domain: global users, groups, and teams among others.

− Directory service administration graphical tools.  

System process administration:

− Processes. Types. States. Structure.

− Execution threads.

− State transitions.

− Priorities.

− Management of system processes. Order line. Graphical environment.

− System startup sequence. Demons.

System information:

− Directory structure.

− Search for system information. Orders. Graphical tools.

− Virtual File System.

Installing, configuring, and using remote administration and access services:

− Terminals in text mode.

− Remote Desktop.

− Remote access protocols and ports involved.

− Remote access services of the operating system itself.

− External graphical tools for remote administration.

Administration of print servers:

− Ports and print protocols.

− Print systems.

− Orders for managing printers and jobs.

Integrating free network operating systems and owners:

− Description of heterogeneous scenarios.

− Installing, configuring, and using network services to share resources.

− Configuring network-shared resources.

− Using heterogeneous networks.

Applying "scripting" languages on free operating systems and owners:

− Language structures.

− Creating and debugging "scripts".

− Interpretation of system "scripts". Adaptations.

− Using command extensions for administration tasks.

− "Scripts" for the administration of operating system user accounts, processes, and services.

Pedagogical guidelines.

This professional module contains the training required to perform operating system administration tasks.

Operating system administration includes aspects such as:

− The administration of the directory service.

− Monitoring and tracking system processes.

− Managing system task automation.

− Remote administration of the network operating system.

− The administration of print servers.

− Performing free operating system integration tasks and owners.

− Using "scripting" languages on free operating systems and owners for operating system services.

The professional activities associated with this function apply to:

− The management of services provided by the operating system.

− Centralized management of users and groups in client-server environments.

− Basic system programming.

The formation of the module contributes to achieving the general objectives (a), (b), (n), (n), (o) and (q) of the training cycle, and the professional, personal and social competences (a), (l), (m), (n), (n), (o), (q), (r) and (s) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− Installation and administration of the directory service.

− System task automation and system process control.

− Remote administration of the system.

− Using heterogeneous scenarios by sharing resources.

− Basic system programming.

Professional Module: Network and Internet Services.

Equivalence in ECTS credits: 8

Code: 0375

Learning results and evaluation criteria.

1. Manages name resolution services, analyzing them, and ensuring service security.

Assessment Criteria:

a) Scenarios have been identified and described where the need for a name resolution service arises.

b) Top name resolution mechanisms have been classified.

c) The structure, nomenclature, and functionality of the hierarchical name systems have been described.

d) Hierarchical name resolution services have been installed and configured.

e) The service has been prepared to forward external resource queries to another name server.

f) The service has been prepared to store and distribute responses from other servers.

g) Name records have been added for a new zone, with options for mail servers and aliases.

h) Name server solutions have been implemented in dynamic "ip" addresses.

i) Zone transfers were made between two or more servers.

j) Installation and configuration procedures have been documented.

2. Manages automatic configuration services, identifying them and verifying the correct allocation of parameters.

Assessment Criteria:

a) The automated mechanisms for configuring network parameters and the benefits they provide have been recognized.

b) The procedures and guidelines involved in a request for configuration of the network parameters have been illustrated.

c) Network parameter configuration servers have been installed.

d) The service has been prepared to assign the basic configuration to the computers in a local network.

e) Static and dynamic assignments have been configured.

f) Additional configuration options have been integrated into the service.

g) The procedures performed have been documented.

3. Manages Web servers by applying configuration criteria and ensuring the operation of the service.

Assessment Criteria:

a) The fundamentals and protocols on which the operation of a Web server is based have been described.

b) Web servers have been installed and configured.

c) Server functionality has been enhanced by activating and configuring modules.

d) Virtual sites have been created and configured.

e) The server access control and authentication mechanisms are configured.

f) Digital certificates have been obtained and installed.

g) Mechanisms have been established to ensure communications between the client and the server.

h) Service monitoring tests have been performed.

i) Service records for statistics processing and incident resolution have been analyzed.

j) Documentation has been developed regarding the installation, configuration, and recommendations for use of the service.

4. Manages file transfer services by securing and limiting access to information.

Assessment Criteria:

a) The file transfer service utility and mode of operation is set.

b) File transfer servers have been installed and configured.

c) Users and groups have been created for remote access to the server.

d) Anonymous access is configured.

e) Limits have been set on the different access modes.

f) Access to the server has been checked, both in active mode and passive mode.

g) Tests have been conducted with client online clients and with clients in graphical mode.

h) The browser has been used as a file transfer service client.

i) Documentation has been developed regarding the installation, configuration, and recommendations for use of the service.

5. Manages email servers, applying configuration criteria, and ensuring service security.

Assessment Criteria:

a) The different protocols involved in sending and collecting the email have been described.

b) An email server has been installed and configured.

c) User accounts have been created and verified access to them.

d) Methods have been set and applied to prevent improper uses of the email server.

e) Services have been installed to allow remote collection of existing mail in user mailboxes.

f) Email clients have been used to send and receive mail from accounts created on the server.

g) Digital signature and encrypted mail have been used.

h) The mail server has been configured as a secure service.

i) Documentation has been developed regarding the installation, configuration, and recommendations for use of the service.

6. Manages instant messaging services, news and distribution lists, verifying and securing user access.

Assessment Criteria:

a) The instant messaging, news, and distribution lists have been described.

b) The instant messaging service is installed and configured.

c) Graphical and instant messaging text clients have been used.

d) The news service has been installed and configured.

e) The distribution list service is installed and configured.

f) The list type and allowed access modes have been determined.

g) User accounts have been created and verified access to instant messaging services, news, and distribution lists.

h) Documentation has been developed regarding the installation, configuration, and usage recommendations of the instant messaging, news, and distribution lists services.

7. Manages audio services by identifying distribution needs and adapting formats.

Assessment Criteria:

a) The audio service functionality has been described.

b) An audio distribution server is installed and configured.

c) The client has been installed and configured for access to the audio server.

d) Digital audio formats have been recognized and used.

e) Audio playback tools have been used on the client.

f) Audio services have been used through the browser.

g) Audio syndication and subscription techniques have been used.

h) Documentation has been developed regarding the installation and administration of the audio server.

8. Manages video services by identifying distribution needs and adapting formats.

Assessment Criteria:

a) The video service functionality has been described.

b) A video server has been installed and configured.

c) The client has been configured for access to the video server.

d) Digital video compression formats have been recognized and used.

e) Video syndication and subscription techniques have been used.

f) The features and protocols used in the video conferencing service have been described.

g) Graphical tools have been installed and configured for videoconferencing.

h) Graphical tools and browsers have been used for video conferencing.

i) Documentation has been developed regarding the installation and administration of the video server and the video conferencing service.

Duration: 75 hours.

Basic contents:

Installing and administering domain name services:

− Flat and hierarchical name systems.

− Name resolutions. The process of resolving a domain name.

− Root servers and first-level and successive domains.

− Primary and secondary zones. Zone Transfers.

− Record types.

− Name servers in dynamic "ip" addresses.

Installing and administering network automatic configuration services:

− Operation of the service.

− Allocations. Types.

− Parameters and configuration declarations.

− Commands used for operation of the service.

Installing and administering Web servers:

− General features of a Web server.

− Basic configuration of a Web server.

− Modules: installation, configuration, and usage.

− "Hosts" virtual. Creating, configuring, and using.

− Authentication and access control.

− Certificates. Certificate servers.

− Web Browsers. Appearance and usage parameters.

Installing and administering file transfer services:

− Configuring the file transfer service. Permissions and quotas.

− User types and access to the service.

− Client connection modes.

− File transfer types.

Installing and administering the email service:

− Message Transfer Protocol.

− E-mail clients.

− Mail accounts, aliases, and user mailboxes.

− Secure mail: digital signature and message encryption.

− Mail download protocols and services.

Installing and administering instant messaging services, news, and distribution lists:

− Features of the instant messaging service. Protocols.

− Instant messaging graphics clients.

− Clients in instant messaging text mode.

− Characteristics of the distribution list service. Protocols.

− Types of access to the distribution list.

− Distribution list types.

Installing and administering the audio service:

− Audio Formats.

− "streaming" servers.

− Syndication and audio subscription. "Podcast".

Installing and administering the video service:

− Image Formats.

− Video servers.

− Video Formats. "Codecs" and players.

− Syndication and video subscription.

Pedagogical guidelines.

This professional module contains the training required to perform network and Internet service installation and administration tasks.

The installation and administration of network and Internet services includes aspects such as:

− The network service installation and administration processes.

− The basic Internet service installation and administration processes.

− The processes of installing and administering Internet services related to secure and controlled access to information.

− The multimedia services installation and administration processes.

− The control and tracking of network and Internet service activity.

− The development of documentation relating to the administration of network and Internet services.

− The use of free operating systems and owners.

The professional activities associated with this function apply to:

− The installation and administration of network and Internet services.

− The installation and administration of multimedia services.

The formation of the module contributes to the achievement of the general objectives (a), (c), (n), (n), (o), (r) and (s) of the training cycle, and the professional, personal and social competences (b), (m), (n), (n), (o) and (q) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− The installation and administration of network and Internet services.

− Managing servers and clients.

− The installation and administration of multimedia services.

− The monitoring and logging of network and Internet services activity.

Professional Module: Deployment of Web Applications.

Equivalence in ECTS credits: 6

Code: 0376

Learning results and evaluation criteria.

1. Prepares the development environment and Web application servers by installing and integrating the required functionality.

Assessment Criteria:

a) The software required for its operation has been identified.

b) The different technologies used have been identified.

c) Web and database servers have been installed and configured.

d) The processing capabilities in client and server environments have been recognized.

e) The required components and modules for code processing on the server have been added and configured.

f) Access to databases is installed and configured.

g) Security on server accesses has been established and verified.

h) Integrated platforms for testing and developing Web applications have been used.

i) The procedures performed have been documented.

2. It implements content managers by selecting them and setting the configuration of their parameters.

Assessment Criteria:

a) The use and utility of the content managers has been valued.

b) They are classified according to the main functionality of the Web site that they allow to manage.

c) Different types of content managers have been installed.

d) Their characteristics have been differentiated (use, license, among others).

e) Content managers have been customized and configured.

f) Security mechanisms provided by the content managers themselves have been activated and configured.

g) Operating tests have been performed.

h) Content managers have been published.

3. Manages content managers by adapting them to the requirements and ensuring the integrity of the information.

Assessment Criteria:

a) The content manager modules have been adapted and configured.

b) Users with different profiles have been created and managed.

c) Modules have been integrated based on functionality requirements.

d) The contents have been backed up.

e) Imported and exported contents in different formats.

f) Templates have been managed.

g) Syndication functionality has been integrated.

h) Updates have been made.

i) Access reports have been obtained.

4. Manages Web office applications by integrating capabilities and ensuring access to information.

Assessment Criteria:

a) The utility of Web office applications has been recognized.

b) They have been classified according to their functionality and specific capabilities.

c) Web office applications have been installed.

d) Applications have been configured to integrate into an intranet.

e) User accounts have been managed.

f) Security criteria have been applied to users ' access.

g) Applications have been used cooperatively.

h) Documentation has been developed regarding the use and management of applications.

5. Generates Web documents using server scripting languages.

Assessment Criteria:

a) The most relevant server scripting languages have been identified.

b) The relationship between server scripting languages and the markup languages used in clients has been recognized.

c) The basic syntax of a particular scripting language has been recognized.

d) Language control structures have been used.

e) Functions are defined and used.

f) Forms have been used to enter information.

g) Mechanisms have been established and used to ensure the persistence of information between different related Web documents.

h) Users who access the Web document have been identified and secured.

i) The isolation of each user's specific environment has been verified.

6. Generates Web documents with access to databases using server scripting languages.

Assessment Criteria:

a) The most commonly used database manager systems have been identified in Web environments.

b) The integration of the database manager systems with the server script language has been verified.

c) The connection for access to the database manager system has been configured in the scripting language.

d) Databases and tables have been created on the manager using the scripting language.

e) The information stored in databases was obtained and updated.

f) Security criteria have been applied to users ' access.

g) The system performance and performance has been verified.

7. Makes modifications to content managers by adapting their appearance and functionality.

Assessment Criteria:

a) The content manager directory structure has been identified.

b) The functionality of the files used and their nature (code, images, configuration, among others) has been recognized.

c) The functionalities to be adapted and incorporated have been selected.

d) The resources affected by the modifications have been identified.

e) The application code has been modified to incorporate new functionality and adapt existing ones.

f) The correct operation of the changes made has been verified.

g) The changes made have been documented.

Duration: 55 hours.

Basic contents:

Installing Web application servers:

− Requirements Analysis.

− Web server: installation and configuration.

− Database manager system: installation and configuration.

− Code processing: client and server "script" languages.

− Modules and components required.

− Test and integrated installation utilities.

Installing content managers:

− Types of content managers.

− Usage licenses.

− Operating Requirements.

− Installation.

− Creating the database.

− Structure.

− Creating content.

− Customizing the interface.

− Integrated security mechanisms.

− Verification of performance and performance.

− Publication.

Content Manager Administration:

− Users and Groups.

− Profiles.

− Access control.

− Integration of modules.

− Managing topics.

− Templates.

− Security Copies.

− Content Syndication.

− Import and export of the information.

Web office application deployment:

− Application types.

− Installation.

− Configuration.

− Integrating heterogeneous applications.

− User management.

− Access control.

− Assurance of information.

Programming Web documents using server "script" languages:

− Classification.

− Integration with markup languages.

− Syntax.

− Code editing tools.

− Language elements.

− Comments.

− Integrated and user functions.

− Error management.

− Information Introduction Mechanisms: Forms.

− User authentication.

− Access control.

− Sessions.

− Interpreter configuration.

Access to databases from server "script" languages:

− Integrating the server "script" languages with the database manager systems.

− Connection to databases.

− Creating databases and tables.

− Recovering database information from a Web page.

− Modification of stored information: inserts, updates, and deleted.

− Verification of information.

− Error management.

− Security mechanisms and access control.

− Verification of performance and performance tests.

Adaptation of content managers:

− Selection of modifications to be made.

− Recognition of involved elements.

− Modification of appearance.

− Incorporation and adaptation of functionalities.

− Verification of operation.

− Documentation.

Pedagogical guidelines.

This professional module contains the training required to perform the Web application administrator function.

Web application administration includes aspects such as:

− The installation and configuration of the operating system and the services on which the applications are running.

− The implementation of content management systems and their adaptation to operating conditions.

− The administration of content management systems, using methods to optimize their operation and ensure access to information.

− The installation and integration of Web office applications.

− Creating Web documents using server "script" languages to access information stored in databases.

− The modification of the functionalities offered by the content managers for their adaptation to the operating requirements.

The professional activities associated with this function apply to:

− The use of Web technologies for the implementation and exploitation of information publishing systems.

− Installation, administration, and integration of Web office tools.

− The adaptation of Web applications to the specific needs of utilization.

The formation of the module contributes to the achievement of the general objectives (c), (e), (l), (m), (o), (p), (r) and (s) of the training cycle and the professional, personal and social competences (a), (b), (c), (d), (k), (l), (o), (r) and (s) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− Preparing systems for running Web applications.

− The exploitation of content manager systems.

− The integration of functionality offered by Web office applications.

− Using server "script" languages for Web solution adaptation.

Professional Module: Administration of Data Bases Management Systems.

Equivalence in ECTS credits: 5

Code: 0377

Learning results and evaluation criteria.

1. Implements database management systems by analyzing their characteristics and adjusting to system requirements.

Assessment Criteria:

a) The utility and function of each of the elements of a database manager system has been recognized.

b) The characteristics of the major database manager systems have been analyzed.

c) The database manager system has been selected.

d) The software required to perform the installation has been identified.

e) Compliance with hardware requirements has been verified.

f) Database manager systems have been installed.

g) The installation process has been documented.

h) The information provided by error messages and log files has been interpreted.

i) The installation incidents have been resolved.

j) The operation of the database manager system has been verified.

2. Configures the database manager system by interpreting the technical specifications and operating requirements.

Assessment Criteria:

a) The start and stop conditions of the manager system have been described.

b) The database engine has been selected.

c) Administration accounts have been secured.

d) The management system client software and tools have been configured.

e) The network connectivity of the manager system has been configured.

f) The default characteristics of the databases have been defined.

g) The parameters relating to connections (wait times, maximum connections, among others) have been defined.

h) The configuration process has been documented.

3. Implements access control methods using wizards, graphical tools, and manager system language commands.

Assessment Criteria:

a) Custom views have been created for each user type.

b) Synonyms of tables and views have been created.

c) User accounts have been defined and removed.

d) The privileges on the databases and their elements have been identified.

e) Privileged and ungrouped privileges.

f) Privileges have been assigned and removed to users.

g) User privilege groups have been assigned and removed.

h) Ensuring compliance with security requirements.

4. Automates manager administration tasks by describing them and using statement scripts.

Assessment Criteria:

a) The importance of automating administrative tasks has been recognized.

b) Different script execution methods have been described.

c) The tools available for writing scripts have been identified.

d) Scripts have been defined and used to automate tasks.

e) Events capable of triggering triggers have been identified.

f) triggers are defined.

g) Flow control structures have been used.

h) Measures have been taken to maintain the integrity and consistency of the information.

5. Optimizes system performance by applying monitoring techniques and making adaptations.

Assessment Criteria:

a) The monitoring tools available for the manager system have been identified.

b) The advantages and disadvantages of index creation have been described.

c) Indexes have been created on tables and views.

d) The database structure has been optimized.

e) The resources of the manager system have been optimized.

f) Information about query performance for optimization has been obtained.

g) Performance alerts are scheduled.

h) Changes have been made to the operating system configuration to improve the performance of the manager.

6. Applies availability criteria by analyzing and adjusting the configuration of the manager system.

Assessment Criteria:

a) The utility of distributed databases has been recognized.

b) Different information fragmentation policies have been described.

c) A homogeneous distributed database has been implanted.

d) A distributed database has been created by integrating a set of pre-existing databases.

e) A master "node" and multiple "slaves" have been configured to perform the replication of the first.

f) A chain replication system has been configured.

g) The effect of stopping certain nodes on distributed and replicated systems has been checked.

Duration: 30 hours.

Basic contents:

Installing and configuring a database manager system:

− Database manager system functions (SGBD). Components. Types.

− Database manager system architecture. ANSI/SPARC architecture.

− Commercial and free database manager systems.

− Installing and configuring a SGBD. Relevant parameters.

− Installing a two-layer SGBD.

− Configuring the relevant parameters.

− Data dictionary structure.

− Ficheros LOG.

Access to information:

− Creating, modifying, and removing views.

− Creating and removing users.

− Assignment and Deallocation of Rights to Users. Points of access to the system.

− Role definition. Assigning and deallocating roles to users.

− Current legal regulations on data protection.

Automation of tasks: Build administration scripts:

− Tools for scripting; execution procedures.

− Planning for administration tasks using dashes.

− Events.

− Disparators.

− Exceptions.

Performance optimization: monitoring and optimization:

− Monitoring tools available on the manager system.

− Elements and parameters that can be monitored.

− Optimization.

− Tools and statements for index management.

− Tools for creating performance alerts.

Applying availability criteria to distributed and replicated databases:

− Distributed databases.

− Distributed SGBD Types.

− Components of a distributed SGBD.

− fragmentation techniques.

− Assignment Techniques.

− Distributed query.

− Distributed Transactions.

− Optimizing queries on distributed databases.

− Replication.

− Configuring the "master node" and "slave nodes".

Pedagogical guidelines.

This professional module contains the training required to perform the function of administering database manager systems.

The administration of database manager systems includes aspects such as:

− The implementation of database manager systems.

− Database manipulation.

− The application of security measures.

− Planning and performing administrative tasks.

− Monitoring and optimizing the database and the database manager system.

The professional activities associated with this function apply to:

− The implementation and administration of database management systems.

− The implementation and administration of databases.

The formation of the module contributes to achieving the general objectives (d), (e), (j), (n) and (n) of the training cycle and the professional, personal and social competences (b), (d), (k), (l) and (m) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− Installing and configuring database manager systems.

− Database manipulation.

− Performing operations with databases.

− Database administration.

− Planning and automating tasks on a manager system.

Professional Module: Security and High Availability.

Equivalence in ECTS credits: 6

Code: 0378

Learning results and evaluation criteria.

1. It adopts guidelines and practices for the safe treatment of information, recognizing the vulnerabilities of a computer system and the need to secure it.

Assessment Criteria:

a) The importance of ensuring the privacy, consistency and availability of information in computer systems has been valued.

b) The differences between physical and logical security have been described.

c) The main vulnerabilities of a computer system, according to their typology and origin, have been classified.

d) The incidence of social engineering techniques in computer fraud has been contrasted.

e) Password policies have been adopted.

f) The benefits of using biometric systems have been assessed.

g) Cryptographic techniques have been applied to the storage and transmission of the information.

h) The need to establish a comprehensive perimeter protection plan, especially in systems connected to public networks, has been recognized.

i) The phases of forensic analysis have been identified in the face of attacks on a system.

2. It implements active security mechanisms by selecting and executing counter-measures against threats or attacks on the system.

Assessment Criteria:

a) The main types of logical threats against a computer system have been classified.

b) The origin and authenticity of the applications installed on a computer, as well as the status of the operating system update, have been verified.

c) The anatomy of the most common attacks, as well as the preventive and palliative measures available, have been identified.

d) Multiple types of threats, attacks, and malicious software have been analyzed in controlled execution environments.

e) Specific applications have been implemented for threat detection and malicious software removal.

f) Encryption techniques, signatures, and digital certificates have been used in a work environment based on the use of public networks.

g) Security measures for protocols used in wireless networks have been evaluated.

h) The need to inventory and control network services running on a system has been recognized.

i) The types and characteristics of intrusion detection systems have been described.

3. It implements secure remote access techniques to a computer system, interpreting and implementing the security plan.

Assessment Criteria:

a) Typical scenarios of systems with connection to public networks have been described in which the internal network is needed to be fortified.

b) The risk zones of a system have been classified according to perimeter security criteria.

c) Secure communication protocols and their usage scopes have been identified.

d) Virtual private networks have been configured using secure protocols at different levels.

e) A server has been deployed as an internal network access gateway from remote locations.

f) Possible authentication methods in remote user access through the gateway have been identified and configured.

g) An authentication remote server is installed, configured, and integrated on the gateway.

4. It implements firewalls to secure a computer system, analyzing its capabilities and controlling traffic to the internal network.

Assessment Criteria:

a) The features, types, and functions of firewalls have been described.

b) The levels in which traffic filtering is performed have been classified.

c) The firewall installation is scheduled to limit access to certain areas of the network.

d) Filters have been configured in a firewall from a list of filtering rules.

e) Firewall event records have been reviewed, to verify that the rules are applied correctly.

f) Different options have been tested to implement firewalls, both software and hardware.

g) Connectivity problems have been diagnosed in the clients caused by the firewalls.

h) Documentation has been developed regarding the installation, configuration, and use of firewalls.

5. Implements "proxy" servers, applying configuration criteria that ensure the safe operation of the service.

Assessment Criteria:

a) The "proxy" types, their features, and main functions have been identified.

b) A "proxy-cache" server is installed and configured.

c) The authentication methods have been configured on the "proxy".

d) A "proxy" has been configured in transparent mode.

e) The "proxy" server was used to establish Web access restrictions.

f) Access problems have been fixed from clients to the "proxy".

g) "Proxy" performance tests have been performed, monitoring their activity with graphical tools.

h) A "proxy" server has been configured in reverse mode.

i) Documentation has been developed regarding the installation, configuration, and use of "proxy" servers.

6. Implements high availability solutions using virtualization techniques and configuring test environments.

Assessment Criteria:

a) Assumptions and situations have been analyzed in which you need to implement high availability solutions.

b) Hardware solutions have been identified to ensure continuity in the operation of a system.

c) The capabilities of systems virtualization to implement high availability solutions have been evaluated.

d) A redundant server has been deployed to ensure continuity of services in case of drop of the main server.

e) A load balancer has been implanted at the input of the internal network.

f) Redundant storage systems have been deployed on specific servers and devices.

g) The utility of "clusters" systems has been evaluated to increase system reliability and productivity.

h) Future solutions have been analyzed for a system with increasing demand.

i) Solutions have been schemed and documented for different scenarios with high availability needs.

7. Recognises the legislation and regulations on security and data protection by assessing its importance.

Assessment Criteria:

a) Personal data protection legislation has been described.

b) The need to control access to stored personal information has been determined.

c) Legal figures involved in the processing and maintenance of data files have been identified.

d) It has been contrasted with the duty to make personal data available to them.

e) The current legislation on the services of the information society and electronic commerce has been described.

f) The rules on information security management have been contrasted.

g) The need to know and respect applicable legal regulations has been understood.

Duration: 55 hours.

Basic contents.

Adoption of computer security guidelines:

− Reliability, confidentiality, integrity, and availability.

− Vulnerable elements in the computer system: hardware, software, and data.

− Analysis of the main vulnerabilities of a computer system.

− Threats. Types:

• Physical threats.

• Logical threats.

− Physical and environmental security:

• Location and physical protection of computers and servers.

• Uninterruptible power systems.

− Logical security:

• Cryptography.

• Access control lists.

• Setting password policies.

• Storage policies.

• Backup images and backup images.

• Storage media.

− Forensic Analysis in Computer Systems:

Deploying active security mechanisms:

− Attacks and countermeasures on personal systems:

• Classification of attacks.

• Anatomy of attacks and analysis of malicious software.

• Preventive tools. Installation and configuration.

• Paliative tools. Installation and configuration.

• Updating systems and applications.

• Security in connection with public networks.

• Paths and safe practices.

− Corporate network security:

• Monitoring network traffic.

• Security in protocols for wireless communications.

• Potential risks from network services.

• Penetration attempts.

Deployment of remote access techniques. Perimeter security:

− Basic elements of perimeter security.

− Network Perimeters. Demilitarized zones.

− Protected subnet weak architecture.

− Protected subnet strong architecture.

− Virtual private networks. VPN.

− Benefits and disadvantages with respect to dedicated lines.

− Encryption techniques. Public key and private key:

• Network level VPN. SSL, IPSec.

• VPN at the application level. SSH.

− Remote access servers:

• Authentication protocols.

• Configuring access parameters.

• Authentication servers.

Installing and configuring firewalls:

− Using firewalls.

− Filtering of data packets.

− Firewall types. Features. Main functions.

− Firewall installation. Location.

− Firewall filtering rules.

− Operating tests. Polling.

− Event logs for a firewall.

Installing and configuring "proxy" servers:

− Proxy types. Features and functions.

− Installing "proxy" servers.

− Installing and configuring "proxy" clients.

− Configuring the caching of a "proxy".

− Setting up filters.

− Authentication methods on a "proxy".

Deployment of high availability solutions:

− Definition and objectives.

− Analysis of high availability configurations.

• Unbroken operation.

• Data integrity and service recovery.

• Redundant servers.

• Clusters systems.

• Load balancers.

− Installing and configuring high availability solutions.

− Virtualization of systems.

− Systems virtualization capabilities.

− Tools for virtualization.

− Configuring and using virtual machines.

− High availability and virtualization.

− Service simulation with virtualization.

Security legislation and rules:

− Data Protection Legislation.

− Legislation on the services of the information and email society.

Pedagogical guidelines.

This professional module contains the necessary training to select and use specific IT security tools and techniques in the field of systems administration. In addition, you will be able to learn about high availability architectures and use virtualization tools in the deployment of high availability services.

Secure systems administration functions include aspects such as:

− The knowledge and correct manipulation of all the elements that form the physical and logical component of the equipment.

− The adoption of safe practices according to the physical security plan of the system.

− The adoption of safe practices according to the system's logical security plan.

− The knowledge and use of secure remote access techniques to a system, both in user and administrative mode.

− The selection and application of active safety techniques and tools that act as preventive and/or palliative measures in the face of attacks on the system.

− The installation and configuration of perimeter protection tools, firewalls, and proxy servers.

− The installation and configuration of high availability services that ensure the continuity of services and the availability of data.

− The knowledge and application of current legislation in the field of digital information processing.

The professional activities associated with these functions apply to:

− Equipment Maintenance. Hardware and software.

− Systems administration in small and medium-sized enterprises.

− Systems administration technical staff in data processing centers.

− Technical support staff in specialized IT security companies.

The formation of the module contributes to achieving the general objectives (j), (k), (l), (m), (o), and (p) of the training cycle and the professional, personal and social competences (e), (f), (i), (j), (k), (m), (n), (o), (r) and (s) of the title.

The lines of action in the teaching-learning process that enable you to achieve the objectives of the module are related to:

− Knowledge of appropriate practices and guidelines, relating to physical and logical security in a computer system.

− The knowledge and analysis of techniques and tools of active safety, which act as preventive and/or palliative measures in the face of attacks on the system.

− The analysis and application of active security techniques and tools.

− The analysis and application of secure remote access techniques to a system.

− The analysis of perimeter protection tools and techniques for a system.

− The installation, configuration, and test of firewalls and proxy servers as basic perimeter protection tools.

− The analysis of the most common high availability services, which ensure continuity of services and ensure data availability.

− The knowledge and analysis of current legislation in the field of digital information processing.

Professional Module: Network Information Systems Administration Project.

Equivalence in ECTS credits: 5

Code: 0379

Learning results and evaluation criteria.

1. Identifies needs of the productive sector by relating them to projects that can satisfy them.

Assessment Criteria:

a) Companies in the sector have been classified for their organizational characteristics and the type of product or service they offer.

b) Type companies have been characterized by indicating the organizational structure and functions of each department.

c) The most demanding needs have been identified for businesses.

d) The foreseeable business opportunities in the sector have been valued.

e) The type of project required to respond to expected demands has been identified.

f) The specific characteristics required for the project have been determined.

g) Tax, labour and risk prevention obligations and their conditions of application have been determined.

h) Possible grants or grants have been identified for the incorporation of new production or service technologies being proposed.

i) The work script to be followed for project elaboration has been developed.

2. Designs projects related to the competencies expressed in the title, including and developing the phases that compose it.

Assessment Criteria:

a) Information has been collected regarding the aspects to be addressed in the project.

b) The technical feasibility study of the same has been performed.

c) The phases or parts that make up the project and its content have been identified.

d) The objectives that are intended to be identified by identifying their scope have been set.

e) The material and personal resources required to perform the project have been foreseen.

f) The corresponding economic budget has been made.

g) Financing needs have been identified for the implementation of the project.

h) The documentation required for your design has been defined and elaborated.

i) The aspects that need to be controlled to ensure the quality of the project have been identified.

3. Plans the implementation or execution of the project, determining the intervention plan and associated documentation.

Assessment Criteria:

a) Activities have been sequenced, ordering them based on implementation needs.

b) The resources and logistics required for each activity have been determined.

c) The permissions and authorization needs to perform the activities have been identified.

(d) The procedures for the performance or performance of the activities have been determined.

e) The risks inherent in the execution have been identified, defining the risk prevention plan and the necessary means and equipment.

f) The allocation of material and human resources and run times have been planned.

g) The economic assessment that responds to the conditions of the execution has been made.

h) The documentation required for the execution has been defined and elaborated.

4. Defines the procedures for monitoring and control in project execution, justifying the selection of variables and instruments used.

Assessment Criteria:

a) The procedure for evaluating activities or interventions has been defined.

b) Quality indicators have been defined to perform the assessment.

c) The procedure for evaluating incidents that may arise during the performance of the activities, their possible solution and registration has been defined.

d) The procedure has been defined to manage potential changes to resources and activities, including the system of logging them.

e) The documentation required for the evaluation of the activities and the project has been defined and elaborated.

f) The procedure for participation in the assessment of users or clients has been established and the specific documents have been prepared.

g) A system has been established to ensure compliance with the project specification when it exists.

Duration: 25 hours.

Pedagogical guidelines.

This professional module complements the training established for the rest of the professional modules that integrate the title into the context analysis, project design and execution organization functions.

The context analysis function includes the subfunctions of:

− Collection of information.

− Identification and prioritization of needs.

− Identification of the aspects that facilitate or hinder the development of possible intervention.

The design function of the project aims to establish the general lines to respond to the needs posed by concreting the relevant aspects for its realization. Includes the subfunctions of:

− Definition or adaptation of the intervention.

− Prioritizing and sequencing of actions.

− Planning for the intervention.

− Determination of resources.

− Planning of the assessment.

− Documentation design.

− Customer Care Plan.

The execution organization function includes the subfunctions of:

− Demands and needs detection.

− Programming.

− Management.

− Coordination and monitoring of the intervention.

− Reporting.

The professional activities associated with these functions are developed in:

− Computer areas and IT departments in any activity sector.

− Technology services and communications sector.

− Commercial area with Internet transaction management.

The formation of the module is related to all the general objectives of the cycle and the professional, personal and social competencies of the title.

The lines of action in the teaching-learning process that enable you to achieve the objectives of the module are related to:

− The execution of team jobs.

− The responsibility and self-assessment of the work done.

− autonomy and personal initiative.

− The use of Information and Communication Technologies.

Professional Module: Training and Employment Orientation.

Equivalence in ECTS credits: 5

Code: 0380

Learning results and evaluation criteria.

1. It selects job opportunities, identifying the different insertion possibilities and learning alternatives throughout life.

Assessment Criteria:

a) The importance of lifelong learning has been assessed as a key factor for employability and adaptation to the demands of the production process.

b) The vocational training pathways related to the professional profile of the Technical Administration of Computer Systems in Network have been identified.

c) The skills and attitudes required for the professional activity related to the profile of the title have been determined.

d) The main fields of employment and job integration for the Technical Administration of Computer Systems in Network have been identified.

e) The techniques used in the job search process have been determined.

f) Self-employment alternatives have been foreseen in the professional sectors related to the title.

g) The assessment of personality, aspirations, attitudes, and self-training for decision-making has been performed.

2. Applies team work strategies, valuing their effectiveness and efficiency in achieving the goals of the organization.

Assessment Criteria:

a) The benefits of teamwork in work situations related to the profile of the Technical in Network Information Systems Administration have been valued.

b) Work teams that can be created in a real job situation have been identified.

c) The characteristics of the effective work equipment against the ineffective equipment have been determined.

d) The necessary existence of diversity of roles and opinions assumed by members of a team has been positively valued.

e) The possible existence of conflict between members of a group has been recognized as a characteristic aspect of organizations.

f) The types of conflicts and their sources have been identified.

g) Procedures for conflict resolution have been determined.

3. It exercises rights and meets the obligations arising from industrial relations, recognising them in the different employment contracts.

Assessment Criteria:

a) The basic concepts of the right of work have been identified.

b) The main bodies involved in the relations between employers and workers have been distinguished.

c) The rights and obligations arising from the employment relationship have been determined.

(d) The main modalities of recruitment have been classified, identifying the measures to promote recruitment for certain groups.

e) The measures established by the current legislation for the reconciliation of work and family life have been assessed.

f) The causes and effects of the modification, suspension and extinction of the employment relationship have been identified.

g) The receipt of salaries has been analyzed, identifying the main elements that integrate it.

h) Different collective conflict measures and conflict resolution procedures have been analyzed.

i) The working conditions agreed in a collective agreement applicable to a professional sector related to the title of technical in the Administration of Computer Systems in Network have been determined.

j) The defining characteristics of new work organization environments have been identified.

4. It determines the protective action of the Social Security system in the face of the various contingencies covered, identifying the different classes of benefits.

Assessment Criteria:

a) The role of Social Security has been valued as an essential pillar for improving the quality of life of citizens.

b) The various contingencies covered by the Social Security system have been listed.

c) Existing regimes have been identified in the Social Security system.

d) The obligations of employer and employee within the Social Security system have been identified.

e) A worker's contribution and the fees for a worker and employer have been identified in a simple case.

f) Social Security system capabilities have been classified, identifying requirements.

g) Possible legal situations of unemployment have been determined in simple practical scenarios.

h) The calculation of the duration and amount of a basic contributory level unemployment benefit has been performed.

5. It evaluates the risks arising from its activity, analyzing the working conditions and the risk factors present in its work environment.

Assessment Criteria:

a) The importance of preventive culture has been valued in all areas and activities of the company.

b) Work conditions have been linked to the health of the worker.

c) Risk factors have been classified in the activity and the damage resulting from them.

d) The most common risk situations have been identified in the technical working environments of the Network Informatics Systems Administration.

e) Risk assessment has been determined in the company.

f) Working conditions have been determined with significance for prevention in work environments related to the professional profile of the Technician in Network Information Systems Administration.

g) Types of professional damage have been classified and described, with particular reference to occupational accidents and occupational diseases, related to the professional profile of the Technical Administration of Systems Network Computing.

6. Participates in the development of a risk prevention plan in a small business, identifying the responsibilities of all the actors involved.

Assessment Criteria:

(a) The principal rights and duties in the field of occupational risk prevention have been determined.

b) The different forms of prevention management in the company have been classified, depending on the different criteria laid down in the regulations on the prevention of occupational risks.

c) Forms of representation of workers in the company in the field of risk prevention have been determined.

d) Public bodies related to the prevention of occupational risks have been identified.

e) The importance of the existence of a preventive plan in the company that includes the sequencing of actions to be carried out in case of an emergency has been assessed.

f) The content of the prevention plan has been defined in a work centre related to the technical sector of the Technical Administration of Computer Systems in Network.

g) An emergency and evacuation plan has been planned in a small and medium-sized enterprise.

7. Applies prevention and protection measures, analyzing the risk situations in the work environment of the Technical Administration of Computer Systems in Network.

Assessment Criteria:

(a) The techniques of prevention and individual and collective protection that must be applied in order to avoid damage to their origin and to minimize their consequences should they be unavoidable.

b) The meaning and scope of the different types of security signage has been analyzed.

c) Action protocols have been analyzed in case of emergency.

d) The techniques for the classification of injuries have been identified in case of emergency where there are victims of varying severity.

e) The basic first aid techniques to be applied at the site of the accident have been identified with different types of damage and the composition and use of the kit.

(f) The requirements and conditions for the monitoring of the health of the worker and their importance as a preventive measure have been determined.

Duration: 50 hours.

Basic contents:

Active job search:

− Valuation of the importance of permanent training for the work and professional trajectory of the Technical Administration of Computer Systems in Network.

− Analysis of personal interests, skills and motivations for the professional career.

− Identification of training itineraries related to the Technician in Network Information Systems Administration.

− Definition and analysis of the professional sector of the Technical Administration of Computer Systems in Network.

− Job search process in industry companies.

− Learning and Employment Opportunities in Europe.

− Employment search techniques and instruments.

− The decision-making process.

Conflict management and work teams:

− Valuation of the advantages and disadvantages of team work for the effectiveness of the organization.

− Teams in the network computer management industry according to the functions they perform.

− Participation in the work team.

− Conflict: features, sources, and stages.

− Methods for conflict resolution or suppression.

Job Contract:

− The right of the job.

− Analysis of the individual labor relationship.

− Work contract modes and procurement promotion measures.

− Rights and duties derived from the employment relationship.

− Modification, suspension, and termination of the work contract.

− Representation of workers.

− Analysis of a collective agreement applicable to the professional scope of the Technical Administration of Computer Systems in Network.

− Benefits for workers in new organizations: flexibility and social benefits, among others.

Social Security, Employment and Unemployment:

− Structure of the Social Security System.

-Determination of the main obligations of employers and workers in the field of social security: membership, high, low and contribution.

− Protected situations in unemployment protection.

Professional risk assessment:

− Assessment of the relationship between work and health.

− Risk Factor Analysis.

− Risk assessment in the company as a basic element of preventive activity.

− Risk analysis linked to security conditions.

− Risk analysis linked to environmental conditions.

− Risk analysis linked to ergonomic and psycho-social conditions.

− Specific risks in the network computer systems management industry.

− Determination of the possible damage to the health of the worker that can be derived from the identified risk situations.

Planning for risk prevention in the enterprise:

− Rights and duties in the field of occupational risk prevention.

− Management of prevention in the enterprise.

− Public bodies related to the prevention of occupational risks.

− Planning for prevention in the enterprise.

− Emergency and evacuation plans in work environments.

− Making an emergency plan in an SME.

Application of prevention and protection measures in the enterprise:

− Determination of individual and collective prevention and protection measures.

− Action protocol in an emergency situation.

− First aid.

Pedagogical guidelines.

This professional module contains the necessary training for the student to be able to insert himself and develop his professional career in the field of network computer systems management.

The formation of the module contributes to achieving the general objectives p), q), r) and t) of the training cycle and the competencies q), r) and t) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

− The management of information sources on the education and labour system, in particular as regards the IT sector.

− The conduct of guidance and dynamic tests on one's own personality and the development of social skills.

− The preparation and performance of CVs and job interviews.

− The identification of labor regulations that affect workers in the sector, the management of the most commonly used contracts, and the comprehensive reading of collective agreements of application.

− The fulfillment of salary receipts of different characteristics and other related documents.

The analysis of the Law on the Prevention of Labor Risks, which allows the evaluation of the risks arising from the activities carried out in its productive sector, and collaborate in the definition of a prevention plan for a small business, as well as the necessary measures to be taken for implementation.

Professional Module: Enterprise and Entrepreneurship Initiative.

Equivalence in ECTS credits: 4

Code: 0381

Learning results and evaluation criteria.

1. Recognizes the capabilities associated with the entrepreneurial initiative, analyzing the requirements derived from the jobs and the business activities.

Assessment Criteria:

a) The concept of innovation and its relationship with the progress of society and the increase in the well-being of individuals have been identified.

b) The concept of entrepreneurial culture and its importance as a source of job creation and social welfare have been analyzed.

c) The importance of individual initiative, creativity, training and collaboration as essential requirements to succeed in entrepreneurial activity has been valued.

d) The ability of an employee to take an initiative in the work of a person employed in an SME dedicated to the administration of networked computer systems has been analyzed.

e) The development of an entrepreneur's entrepreneurial activity that starts in the IT sector has been analyzed.

f) The concept of risk has been analyzed as an inevitable element of all entrepreneurial activity.

g) The concept of entrepreneur and the requirements and attitudes required to develop business activity have been analyzed.

h) The business strategy has been described relating to the objectives of the company.

i) A particular business idea has been defined in the field of network computing management, which will serve as a starting point for the development of a business plan.

2. Defines the opportunity to create a small business, assessing the impact on the performance environment and incorporating ethical values.

Assessment Criteria:

a) The basic functions that are performed in a company have been described and the system concept applied to the company has been analyzed.

b) The main components of the general environment surrounding the company have been identified, in particular the economic, social, demographic and cultural environment.

c) The influence on the business activity of customer relations, with suppliers and with competition as main members of the specific environment has been analyzed.

d) The elements of an IT SME environment have been identified.

e) The concepts of enterprise culture and corporate image and their relationship to business objectives have been analyzed.

f) The phenomenon of corporate social responsibility and its importance as an element of the business strategy has been analyzed.

g) The social balance of an IT company has been developed, and the main social costs incurred by these companies, as well as the social benefits they produce, have been described.

h) Practices that incorporate ethical and social values have been identified in computer companies.

i) A study of the economic and financial viability of an SME in network IT management has been carried out.

3. Carries out activities for the establishment and implementation of a company, selecting the legal form and identifying the legal obligations associated with it.

Assessment Criteria:

a) The different legal forms of the company have been analyzed.

b) The degree of legal liability of the owners of the company has been specified according to the chosen legal form.

c) The tax treatment established for the different legal forms of the company has been differentiated.

(d) The formalities required by the legislation in force for the establishment of an SME have been analysed.

e) A comprehensive search has been made for the different support for the creation of IT companies in the reference location.

(f) The business plan has been included in the business plan as regards the choice of legal form, economic-financial feasibility study, administrative procedures, aid and grants.

g) The existing external administrative advice and management pathways have been identified when an SME is launched.

4. Performs administrative and financial management activities of an SME, identifying the main accounting and tax obligations and completing the documentation.

Assessment Criteria:

a) The basic accounting concepts, as well as accounting information recording techniques, have been analyzed.

(b) The basic techniques for the analysis of accounting information, in particular as regards the solvency, liquidity and profitability of the company, have been described.

c) The tax obligations of an IT company have been defined.

d) Tax rates have been differentiated in the fiscal calendar.

e) Basic commercial and accounting documentation (invoices, delivery notes, order notes, exchange letters, cheques and others) for an IT SME have been completed and the circuits described above have been described. documentation runs through the company.

f) The main banking finance instruments have been identified.

g) The previous documentation has been included in the business plan.

Duration: 35 hours.

Basic contents:

Entrepreneurial Initiative:

− Innovation and economic development. Main features of innovation in the administration of networked computer systems (materials, technology and production organization, among others).

− Key factors for entrepreneurs: initiative, creativity and training.

− The performance of entrepreneurs as employees of an IT company.

− The performance of entrepreneurs as entrepreneurs, from a small business in the IT sector.

− The entrepreneur. Requirements for the exercise of business activity.

− Business Plan: the business idea in the field of computing.

The company and its environment:

− Basic Business Functions.

− The enterprise as a system.

− Analysis of the overall environment of an IT SME.

− Analysis of the specific environment of an IT SME.

− Relationships of an IT SME with your environment.

− Relations of an IT SME with the whole of society.

Creating and starting a business:

− Enterprise Types.

− Taxation in companies.

− Choice of the legal form.

− Administrative formalities for the formation of a company.

− Economic viability and financial viability of an IT SME.

− Business plan: choice of legal form, economic and financial feasibility study, administrative procedures and management of grants and grants.

Administrative function:

− Concept of basic accounting and notions.

− Analysis of accounting information.

− Tax obligations of companies.

− Administrative management of an IT enterprise.

Pedagogical guidelines.

This professional module contains the necessary training to develop the own initiative in the business field, both towards self-employment and towards the assumption of responsibilities and functions in the employment for account

The formation of the module helps to achieve the general objectives p), r), s) and t) of the training cycle, and the professional, personal and social competencies r), s) and t) of the title.

The lines of action in the teaching-learning process that enable the objectives of the module to be achieved will be about:

-The management of information sources on the IT sector, including the analysis of ongoing sector innovation processes.

-The realization of cases and group dynamics that allow understanding and valuing the attitudes of entrepreneurs and adjust the need for them to the industrial sector related to systems management processes networked computing

-Using administrative management programs for industry SMBs.

-The realization of a business plan project related to the administration of networked computer systems and that includes all facets of a business start-up, as well as its justification social responsibility.

Professional Module: Job Centers Training

Equivalence in ECTS credits: 22

Code: 0382

Learning results and evaluation criteria.

1. Identifies the structure and organization of the business by relating them to the type of service it provides.

Evaluation criteria.

a) The organizational structure of the company and the functions of each area of the company have been identified.

b) The structure of the company has been compared to the existing business organizations in the sector.

c) The service characteristics and the type of clients have been related to the development of the business activity.

d) Work procedures have been identified in the development of service delivery.

e) The necessary competencies of human resources have been valued for the optimal development of the activity.

f) The suitability of the most frequent broadcast channels in this activity has been assessed.

2. He applies ethical and work habits in the development of his professional activity according to the characteristics of the job and with the procedures established in the company.

Assessment Criteria:

a) They have been recognized and justified:

• The necessary personal and temporary availability in the job.

• Personal attitudes (punctuality and empathy, among others) and professionals (order, cleanliness and responsibility, among others) necessary for the job.

• Atitudinal requirements for the prevention of risks in professional activity.

• Atitudinal requirements regarding the quality of the professional activity.

• Relational attitudes to the work team itself and to the hierarchies established in the company.

• Attitudes related to the documentation of activities carried out in the field of work.

• The training needs for job insertion and reintegration in the scientific and technical field of the good work of the professional.

b) The rules on the prevention of occupational risks and the fundamental aspects of the Law on the Prevention of Occupational Risks of Application in Professional Activity have been identified.

c) Individual protective equipment has been applied according to the risks of the business activity and the company's standards.

d) An attitude of respect to the environment has been maintained in the developed activities.

e) The job or the area corresponding to the development of the activity has been organized, clean and free of obstacles.

f) The assigned job has been held responsible for interpreting and performing the instructions received.

g) Effective communication has been established with the responsible person in each situation and with team members.

h) It has been coordinated with the rest of the team communicating the relevant incidents that are presented.

i) The importance of their activity and the need to adapt to changes in tasks has been assessed.

j) You have taken responsibility for the application of the rules and procedures in the development of your work.

3. Organizes the work procedure that you must develop, interpreting the specific documentation.

Assessment Criteria:

a) The appropriate legislation or bibliography has been interpreted for the type of task to be developed.

b) The phases of the process or task to be performed have been defined.

c) The job is scheduled by sequencing and prioritizing the different phases.

d) The equipment, and ancillary services required for the development of the task entrusted, have been identified.

e) The sourcing and storage of material resources has been organized.

f) Order and method have been valued in performing phases and/or tasks.

g) The regulations that need to be observed according to the task have been identified.

4. Determines the technical characteristics of the installation from the established functionalities and needs.

Assessment Criteria:

a) The main processes have been identified.

b) The characteristics of the equipment and accessories have been specified relating to their function.

c) The computers and items that configure the installation are sized.

d) The inventory of programs and components of the installation has been performed according to the specifications set.

e) The main security measures to be adopted have been described.

f) The regulations applicable to the installation have been identified.

5. Participates in the design, commissioning and maintenance of facilities with local network and Internet services, documenting the intervention.

Assessment Criteria:

a) The work plan has been adapted to the established quality standards.

b) Installation plans have been developed by defining stages, task relationships, and expected times.

c) The installation and/or configuration of the operating system has been performed.

d) System automation tasks have been developed.

e) The system functionality has been checked according to the requirements set.

f) Provisioning plans and storage conditions for equipment and materials have been developed.

g) Installation technical documentation has been interpreted.

h) Data backups have been performed according to the established security plan.

i) The intervention was documented by noting the incidences produced during the intervention.

6. Assists users by solving problems of system exploitation, according to established rules and times.

Assessment Criteria:

a) The needs of the users have been identified.

b) The processes that the system performs with understandable indications for users have been described.

c) The incidents have been resolved in the expected times.

d) Interventions have been performed on the processes of the users according to the established procedure.

e) The system resources have been allocated appropriately to the needs of the users.

f) Incidents produced during user assistance have been documented.

g) Service instruction and facility maintenance manuals have been developed.

Duration: 220 hours.

This professional module contributes to the completion of the competencies, which are specific to this title, that have been achieved in the educational center or to develop the skills that are difficult to achieve in the educational center.

ANNEX II

Spaces

Forative

Technique

Multipurpose Aula

ANNEX III A)

Teacher's specialties with teaching assignment in the professional modules of the training cycle of Superior Technician in the Administration of Computer Systems in Network

Professional Module

Teacher Speciality

Body

0369. Deployment of operating systems.

• Computer systems and applications.

• Technical Teacher of Vocational Training

0370. Network planning and administration.

• Informatics.

• Secondary Teaching Professor.
• Secondary Teaching Teacher

0371. Hardware fundamentals.

• Computer systems and applications.

• Technical Teacher of Vocational Training

0372. Database management.

• Informatics.

• Secondary Teaching Professor.
• Secondary Teaching Teacher

0373. Brand languages and information management systems.

• Informatics.

• Secondary Teaching Professor
• High School Teacher

0374. Operating system administration.

• Computer systems and applications.

• Technical Teacher of Vocational Training

0375. Network and Internet Services.

• Informatics.

• Secondary Teaching Professor
• Secondary Teaching Teacher

0376. Deployment of Web applications.

• Informatics.

• Secondary Teaching Professor.
• High School Teacher

0377. Administering database manager systems.

• Informatics.

• Secondary Teaching Catalogs.
• High School Teacher

0378. Security and high availability.

• Informatics.

• Secondary Teaching Professor.
• Secondary Teaching Teacher

0379. Network computer systems administration project.

• Informatics.

• Secondary Teaching Catedratic.
• High School Teacher

• Computer systems and applications.

• Technical Teacher of Vocational Training.

0380. Job training and guidance.

• Training and employment guidance.

• Secondary Education Professor.
• High School Teacher

0381. Enterprise and entrepreneurial initiative.

• Training and employment guidance.

• Secondary Education Professor.
• Teacher of Secondary Education

ANNEX III B)

Equivalent to teaching effects

Specialties

Secondary Teaching Teachers.

Training and employment guidance.

− Diplomated in Business Sciences.
− Diplomacy in Industrial Relations.
− Diplomat at Social Work.
− Diplomated at Social Education.
− Diplomacy in Public Administration and Management

Informatics.

− Diplomated in Statistics.
− Engineer Management Informatics Technician.
− Technical Engineer in Systems Informatics.
− Telecommunication Technical Engineer, Specialty in Telematics.

ANNEX III C)

Required to impart the professional modules that make up the title in the centers of private ownership, of other administrations other than the educational and orientations for the educational administration

Modules

Entitled

0370. Planning and administration of networks.
0372. Database management.
0373. Languages of brands and information management systems.
0375. Network and Internet Services.
0376. Deployment of Web applications.
0377. Administration of database manager systems.
0378. Security and high availability.
0380. Training and career guidance.
0381. Enterprise and entrepreneurial initiative.

− Licensed, Engineer, Architect or corresponding degree of degree or other equivalent degrees for teaching purposes

0369. Deployment of operating systems.
0371. Hardware fundamentals.
0374. Administration of operating systems.
0379. Network computer system administration project.

− Licensed, Engineer, Architect, or corresponding degree title or other equivalent titles.
− Diplomate, Technical Engineer or Technical Architect or corresponding degree degree or other equivalent titles

ANNEX IV

Convalidations between professional modules established in the title of Superior Technician in the Administration of Computer Systems, under the Law of Organic Law 1/1990 and those established in the title of Superior Technician in Management of Computer Systems in Network under the Organic Law 2/2006

Cycle Modules (LOGSE 1/1990):
Information Systems Administration

Professional Cycle Modules (LOE 2/2006):
Administration of Computer Systems on Network

Single-user and multi-user computer systems.

0369. Deploying operating systems

area networks.

0370. Network planning and administration

manager systems.

0372. Database management.
0377. Administering database manager systems

Foundations.

0373. Markup languages and information management systems

functions on the computer system.

0374. Operating system administration

of management computing applications.

0376. Deploying Web applications

Workcenter training.

0382. Training in job centers

ANNEX V A)

Correspondence of the accredited units of competence in accordance with the provisions of Article 8 of the Organic Law of June 19, with the professional modules for their validation

Accredited Competition Units

Convalidable Professional

UC0485_3: Install, configure, and administer the base and application software on the system.

0369. Deploying operating systems

UC0484_3: Manage the hardware devices on your system.

0371. Hardware fundamentals

UC0223_3: Configure and exploit computer systems.

0371. Hardware fundamentals

UC0225_3: Configure and manage the database.

0372. Database management

UC0490_3: Manage services in the computer system.
UC0485_3: Install, configure, and administer the base and application software on the system.

0374. Operating system administration

UC0495_3: Install, configure, and administer the software to manage a Web environment.
UC0496_3: Install, configure, and administer electronic messaging services.
UC0497_3: Install, configure, and administer file and media transfer services.

0375. Network and Internet

UC0493_3: Implement, verify, and document Web applications in Internet, intranet, and extranet environments.

0376. Deploying Web applications

UC0224_3: Configure and manage a database manager system.

0377. Administering database manager systems

UC0486_3: Securing computer equipment.

0378. Security and high availability.

ANNEX V B)

Correspondence of professional modules with the competency units for their accreditation

Outmatched Professional Modules

Accreditable Competition

0369. Deploying operating systems.

UC0485_3: Install, configure, and administer the base and application software of the system

0369. Deployment of operating systems.
0371. Hardware fundamentals.

UC0223_3: Configure and exploit computer systems

0371. Hardware fundamentals.
0378. Security and high availability.

UC0484_3: Manage the hardware devices on your system

0372. Database management.

UC0225_3: Configure and manage the database

0374. Operating system administration.

UC0490_3: Manage services in the computer system.
UC0485_3: Install, configure, and administer the base and system application software

0375. Network and Internet Services.

UC0495_3: Install, configure, and administer the software to manage a Web environment.
UC0496_3: Install, configure, and administer electronic messaging services.
UC0497_3: Install, configure, and administer file and media transfer services

0376. Deploying Web applications.

UC0493_3: Implement, verify, and document Web applications in Internet, intranet, and extranet environments

0377. Administering database manager systems.

UC0224_3: Configure and manage a database manager system

0378. Security and high availability.

UC0486_3: Securing computer equipment.