Order Pre / 1636/2015 Of 23 July, Which Are Updated Eighteen Professional Qualifications Of The Professional Family Informatics And Communications, Included In The National Catalogue Of Professional Qualifications, Established By Royal De ...

Original Language Title: Orden PRE/1636/2015,de 23 de julio, por la que se actualizan dieciocho cualificaciones profesionales de la familia profesional Informática y Comunicaciones, recogidas en el Catálogo Nacional de Cualificaciones Profesionales, establecidas por Real De...

Read the untranslated law here: http://www.boe.es/buscar/doc.php?id=BOE-A-2015-8774

The Organic Law 5/2002 of 19 June, on Qualifications and Vocational Training, is aimed at the management of a comprehensive system of vocational training, qualifications and accreditation that responds effectively and transparently to social demands and economic through the various training modalities. To do this, create the National System of Qualifications and Vocational Training, defining it in Article 2.1 as a set of instruments and actions needed to promote and develop integration offers vocational training, through the National Catalogue of Professional Qualifications and as the evaluation and accreditation of the relevant professional skills, so that is conducive to professional and social development of people and the needs of the productive system are covered.

The National Catalogue of Professional Qualifications, according to Article 7.1, is created in order to facilitate integration and adaptation between vocational training and labor market and training throughout life, worker mobility and labor market unit. This catalog consists of the qualifications identified in the productive system and the formation associated with them, which is organized in training modules.

Article 5.3 of the Organic Law 5/2002 of June 19, attached to the National Institute of Qualifications, responsibility for defining, developing and updating the National Catalogue of Professional Qualifications, as technical support body the General Council of Vocational Training, whose regulatory development enshrined in Article 9.2 of Royal Decree 1128/2003, of 5 September, approving the National Catalogue of Professional Qualifications regulates, settling down in Article 9.4, the obligation to keep it constantly updated through regular review which, in any case, must be made within a period not exceeding five years from the date of inclusion of qualifications in the catalog.

So, in this order are updated by complete replacement of its annexes, eighteen professional qualifications of the Professional Family Computing and Communications have seniority in the National Catalogue of Professional Qualifications less than five years, the who applies the Royal Decree 817/2014 of 26 September. It also partially specific professional qualifications are modified by replacing certain key skills qualification units and associated training modules, including in the professional qualifications listed in Annexes date of this order.

In the process of making this order have been consulted and the Autonomous Communities have issued report by the General Council of Vocational Training and the State Board of Education.

By virtue of a joint proposal by the Minister of Education, Culture and Sports and the Minister of Employment and Social Security, I have:

Article 1. Purpose and scope.

This ministerial order is to update eighteen professional qualifications corresponding to the Professional Family Computing and Communications, proceeding to the replacement of the corresponding annexes, and amend certain professional qualifications partly by replacing certain competence units and associated training modules, pursuant to Royal Decree 817/2014, of September 26, by which specific aspects of professional qualifications for which modification, approval procedure and effects established is covered by Article 7.3 of the organic law 5/2002, June 19, qualifications and vocational training.
Professional qualifications
updated and partially modified by this procedure are valid and are applicable throughout the national territory, and not a regulation of the profession.

Article 2. Update of certain professional qualifications of the Professional Family Computer and Communications established by Royal Decree 295/2004, of 20 February, certain professional qualifications included in the National Catalogue of Professional Qualifications established, as well as their corresponding training modules incorporated in the Modular Catalogue of Vocational Training.


As established in the only additional provision of Royal Decree 295/2004, of February 20, proceed to the updating of professional qualifications, whose specifications are contained in the LXXVIII, LXXIX and LXXXI annexes said Royal Decree :

One. redrafting is given in Annex LXXVIII, Vocational Training "Microcomputer Systems." Level 2 IFC078_2, annexed I to this order.

Two. a new wording is given in Annex LXXIX, Vocational Training "Managing databases". Level 3 IFC079_3, annexed II of this order.

Three. redrafting is given in Annex LXXXI, Professional Qualification "Administration and design of departmental networks." Level 3 IFC081_3, annexed III of this order.

Article 3. Updating of certain professional qualifications of the Professional Family Computer and Communications established by Royal Decree 1087/2005, of 16 September, establishing new professional qualifications are established, which are included in the National Catalogue of Professional Qualifications as well as their corresponding training modules, which are incorporated into the Modular Catalogue of Vocational Training, and certain professional qualifications established by Royal Decree 295/2004, of 20 February updated.

As established in the only additional provision of Royal Decree 1087/2005, of 16 September, we proceed to the updating of professional qualifications, whose specifications are contained in the CLII, CLIII annexes and real CLIV said decree :

One. a new wording is given in Annex CLII, Vocational Training "Management information systems". Level 3 IFC152_3, annexed IV to this Order.

Two. a new wording is given in Annex CLIII, Vocational Training 'Computer Security'. Level 3 IFC153_3, annexed V of this Order.

Three. redrafting is given in Annex CLIV, Vocational Training "Developing applications with web technologies." Level 3 IFC154_3, annexed VI of this Order.

Article 4. Updating of specific professional qualifications established by Royal Decree 1201/2007, of 14 September, approving the National Catalogue of Professional Qualifications, by establishing eight new professional qualifications in the Family and Professional Computer communications.

As established in the only additional provision of Royal Decree 1201/2007, of 14 September, we proceed to the updating of professional qualifications, whose specifications are contained in the CCXCVII, CCXCVIII, CCXCIX, CCC, CCCII annexes and CCCIII real aforementioned decree:

One. redrafting is given in Annex CCXCVII, Vocational Training "Preparation and publication of web pages." Level 2 IFC297_2, annexed VII of this order.

Two. a new wording is given in Annex CCXCVIII, Vocational Training "Installation and repair of microcomputer systems." Level 2 IFC298_2, annexed VIII of this order.

Three. a new wording is given in Annex CCXCIX, Vocational Training "Operation departmental networks." Level 2 IFC299_2, annexed IX of this order.

Four. a new wording is given in Annex CCC, Vocational Training "Operation of computer systems." Level 2 IFC300_2, annexed X of this order.

Five. a new wording is given in Annex CCCII, Vocational Training 'Managing voice and data networks. " Level 3 IFC302_3, annexed XI of this order.

Six. a new wording is given in Annex CCCIII, Vocational Training "Programming systems". Level 3 IFC303_3, annexed XII of this order.

Article 5. Updating of specific professional qualifications established by Royal Decree 1701/2007 of 14 December, the National Catalogue of Professional Qualifications, by establishing six professional qualifications corresponding to the Professional Family Computer & communications.

As established in the only additional provision of Royal Decree 1701/2007, of December 14, it proceeds to the updating of professional qualifications, whose specifications are contained in the CCCLXI, CCCLXII, CCCLXIII, CCCLXIV, CCCLXV annexes and CCCLXVI real aforementioned decree:


One. redrafting is given in Annex CCCLXI, Vocational Training "Auxiliary operations assembly and maintenance of microcomputer systems." Level 1 IFC361_1, annexed XIII of this order.

Two. redrafting is given in Annex CCCLXII, Vocational Training "Maintenance premier radio systems." Level 2 IFC362_2, annexed XIV of this order.

Three. redrafting is given in Annex CCCLXIII, Professional Qualification "Administration and programming systems enterprise resource planning and customer relationship management." Level 3 IFC363_3, annexed XV to this order.

Four. a new wording is given in Annex CCCLXIV, Vocational Training "Management and alarm monitoring communications networks." Level 3 IFC364_3, annexed XVI of this order.

Five. redrafting is given in Annex O CCCLXV, Vocational Training "Implementation and management of computer elements in home automation / building automation systems, access control and presence, and video surveillance." Level 3 IFC365_3, annexed XVII of this order.

Six. redrafting is given in Annex CCCLXVI, Vocational Training PROFESSIONAL "Maintaining second-level radio systems". Level 3 IFC366_3, annexed XVIII of this order.

Article 6. Partial Amendment of professional qualifications of the Professional Family Computer and Communications established by Royal Decree 295/2004, of 20 February, certain professional qualifications included in the National Catalogue of Professional Qualifications established as well as their corresponding training modules incorporated in the Modular Catalogue of Vocational Training.

As established in the only additional provision of Royal Decree 295/2004, of 20 February, proceed to updating professional qualifications whose specifications are contained in Annex LXXX said Royal Decree:
Programming with object-oriented languages ​​and relational databases:
professional qualifications established as' Annex LXXX is changed. Level 3 IFC080_3 "respectively replacing the unit of competition" UC0223_3: Configure and operate computer systems "and the associated training module" MF0223_3: Operating systems and applications (150 h) 'for the unity of competition "UC0223_3: Configure and exploit computer systems "and the associated training module" MF0223_3: operating systems and applications (180 h) ', in Annex II "Managing databases. Level 3 IFC 'of this order, also modified the total duration of the training associated with the qualification of 610 hours to 640 hours.

Article 7. Partial amendment of certain professional qualifications of the Professional Family Computer and Communications established by Royal Decree 1087/2005, of 16 September, establishing new professional qualifications, which are included in the National Catalogue of Qualifications are set professionals and their corresponding training modules, which are incorporated into the Modular Catalogue of Vocational Training, and certain professional qualifications established by Royal Decree 295/2004, of 20 February updated.

As established in the only additional provision of Royal Decree 1087/2005, of 16 September, we proceed to the updating of professional qualifications whose specifications are contained in Annex CLVI real aforementioned decree:

One. professional qualifications established as amended "Annex CLV: Programming in structured languages ​​management applications" replacing respectively, the unit of competition "UC0223_3: Configure and operate computer systems" and the associated training module "MF0223_3: Operating systems and applications ( 150 h) 'for the unity of competition "UC0223_3: Configure and operate computer systems" and the associated training module "MF0223_3: operating systems and applications (180 h)', in Annex II" Managing databases. Level 3 IFC079_3 'of this order, also modified the total duration of the training associated with the qualification of 600 hours to 630 hours.


Two. Service Management internet: professional qualifications established as' Annex CLVI changes. Level 3 IFC156_3 "respectively replacing the unit of competition" UC0490_3: Manage services in the computer system "and the associated training module" MF0490_3: Management services in the computer system. (90 h) "by the unit competence" UC0490_3: Manage services in the computer system "and the associated training module" MF0490_3: Management services in the computer system. (90 h) "corresponding to Annex V 'Computer Security. Level 3 IFC153_3 'of this order.

Article 8. Partial Amendment of professional qualifications established by Royal Decree 1201/2007, of 14 September, approving the National Catalogue of Professional Qualifications, by establishing eight new professional qualifications in the Family Professional Computing and Communications.

As established in the only additional provision of Royal Decree 1201/2007, of 14 September, we proceed to updating professional qualifications whose specifications are contained in Annex CCCI real aforementioned decree:
Operation in voice communications systems and data:
professional qualifications established as' Annex CCCI is changed. Level 2 IFC301_2 "respectively replacing the unit of competition" UC0956_2: Making processes connection between private networks and public networks "and the associated training module" MF0956_2: Interconnection of private networks and public networks. (150 h) 'for the unity of competition' UC0956_2: Making processes connection between private networks and public networks "and the associated training module" MF0956_2: Interconnection of private networks and public networks. (150 h) "corresponding to Annex IX" Operation departmental networks. Level 2 IFC299_2 'of this order.

First final provision. competential title.

This order is issued pursuant to the powers conferred upon the State Article 149.1.1 and 30th of the Constitution, regulation of the basic conditions guaranteeing equality of all Spaniards in the exercise of rights and in fulfilling their constitutional duties, and for the regulation of the conditions for obtaining, issuing and recognition of academic and professional qualifications.

Second final provision. Entry into force.

This ministerial order shall come into force on the day following its publication in the "Official Gazette" day.

Madrid, July 23, 2015-The Deputy Prime Minister and Minister of the Presidency, Soraya Saenz de Santamaria Anton.
ANNEX I

Professional qualification
:
Microcomputer Systems


Professional Family: Computers and Communications





Level: 2





Code: IFC078_2





General competence



Install, configure and maintain microcomputer systems for use and support the user in managing applications on these systems as part of computer support service of an organization.



Competence units



UC0219_2: Install and configure the software based on microcomputer systems

UC0220_2: Install, configure, and verify the elements of the local network according to established procedures

UC0221_2: Install, configure and maintain general purpose software packages and specific applications

UC0222_2: Provide the user the use of general purpose software packages and specific applications



Professional environment





Professional field



Develops his professional activity in the area, both onsite and remote computer support, dedicated to the microcomputer systems, public entities or private, companies small, medium, large or micro, both self-employed and others regardless of their legal form. Operates depending where appropriate, functional or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



Services in the sector is located in the sub-suppliers and distributors of computer services and communications, and the marketing of microcomputer equipment and the provision of technical assistance microcomputers as well as any productive sector that uses microcomputer systems for management.




Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.


Equipment installers Microcomputer

Microcomputers Repairers Telecare operators

Administrators

Telecare
Personal
Support


Associate Training

(600 hours)





Training modules



MF0219_2: Installation and Configuration (120 hours) operating systems

MF0220_2: Implementation of the elements of the local network (210 hours)

MF0221_2: Installation and configuration of applications (60 hours)

MF0222_2: microcomputer Applications (210 hours)



UNIT OF COMPETENCE 1: Install and configure BASED SOFTWARE Microcomputer Systems





Level: 2





Code: UC0219_2





professional accomplishments and performance criteria:



RP 1: Perform installation processes operating systems for use in microcomputer systems, following specifications received.

CR 1.1 The characteristics of operating systems and templates are classified, to decide which version to install and the type of installation, depending on the technical specifications received.

CR 1.2 installation requirements and operating system templates are checked to verify that there are sufficient resources and support in the installation destination, and follow the established procedure.

CR 1.3 The installation target team prepares to locate the operating system, enabling infrastructure in mass storage devices and the necessary connectivity, according to the technical specifications received.

CR 1.4 operating system is installed using the processes indicated in the installation manuals that accompany it, using an image where appropriate, for a computer in functional status, following the established procedure.

CR 1.5 The operating system is configured for operation within the specified parameters, following established procedures and as indicated in the technical documentation.

CR 1.6 Utility programs included in the operating system are installed for use, according to the technical specifications received.

CR 1.7 programs running on servers for publication are installed, according to the technical specifications received.

CR 1.8 installation verification is performed to verify the functionality of the operating system, by testing starting and stopping, and performance analysis, following established procedures.

CR 1.9 documentation is constructed processes performed and recorded for later use, following internal models established by the organization.

RP 2: Updating the operating system to ensure operation, received following technical specifications and procedures of the organization.

CR 2.1 based versions of software, system add-ons and device drivers are checked to ensure their suitability, following the established procedure.

CR 2.2 Outdated versions of database software, system add-ons and device drivers are identified to proceed to update and ensure their functionality, following technical specifications and procedures.

CR 2.3-ins and 'patches' for the operation of the base software are installed and configured to display the system administrator to maintain security in the same, according to established procedures.

CR 2.4 Verification of the update is performed, to test the functionality of the operating system by testing starting and stopping, and performance analysis, according to established procedures.

CR 2.5 documentation processes performed are prepared and filed for later use, according to the standards set by the organization.

RP 3: Exploit the features of microcomputer system using base software and standard applications, taking into account the needs of use.

CR 3.1 The functions and applications provided by the software basis are identified for use, according to the instructions of the technical documentation and usage needs.


CR 3.2 Operations with the file system are made using the interface provided by the operating system, following techniques and specifications according to usage needs.

CR 3.3 configuration tools provided by the operating system are executed to select options work environment, according to specifications received and usage needs.

CR 3.4 application execution processes are performed to exploit the functions of each according to operational and functional needs.

CR 3.5 The messages provided by the software are interpreted based, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications provided by the organization.

CR 3.6 Procedures of use and management by users, peripherals connected to the microcomputer system are made to exploit its functionality, following the technical documentation and procedures established by the organization.



Professional background:





Production facilities:



IT equipment. Peripherals. Operating systems. Utilities and incorporated into operating systems and applications. Upgrade versions of operating systems. Disk cloning tools. Technical documentation associated with the operating systems. Utilities not incorporated into the operating system. Mass storage devices.



Products and results:



Computer equipment installed and configured operating systems. operating configured and operating systems. computer logically organized. Operating systems upgraded. Published applications available.



Information used or generated:



Manuals and technical documentation of operating systems. Manuals upgrade operating systems. Manuals of the applications included in the operating system and published. Reports installation, configuration and operating system upgrade. Plan safety and quality of the organization. Incident management applications.



COMPETITION UNIT 2: install, configure and VERIFY THE ELEMENTS OF PROCEDURES ESTABLISHED BY LOCAL NETWORK





Level: 2





Code: UC0220_2





professional accomplishments and performance criteria:



RP 1: Install and configure the local network nodes and software to implement internal communications services, following established procedures.

CR 1.1 modules of network equipment are installed to provide the connectivity features specified by the physical configuration indicated and following established procedures.

CR 1.2 version of 'firmware' network equipment is installed or updated in accordance with the desired features and functionalities.
CR 1.3
processes installation and configuration of devices on the local network are documented for registration using the formats specified by the organization according to the established procedure.

RP 2: Perform the minimum configuration of network node for subsequent management, following established procedures.

CR 2.1 The network connection is determined and set for the management of network equipment, based on the network topology.

CR 2.2 The operation of management protocols (SNMP, Telnet, SSH, CDP, etc.) required for remote management is enabled communications equipment check according to the project specifications or standards and procedures the organization.

CR 2.3 configuration are documented using the formats specified by the organization.

CR 2.4 The network node is prepared / packaged for transport if the team should refer to another venue, taking care not deteriorate during it.

RP 3: Install the network node in its final location, allowing subsequent access to the same specifications as the organization.

CR 3.1 The equipment is installed in the final frame following the manufacturer's instructions and according to the environmental conditions of temperature and humidity.

CR 3.2 The electrical connections are made following the procedure established by the organization, taking into account the independent circuit connection in the case of equipment with redundant power supply and checking the ground.

CR 3.3 data connections are made network node according to the specifications of the organization and being accessible device for remote management.

CR 3.4
documented installation made indicating the interconnections made following the rules or procedures of the organization.

RP 4: Set the device to ensure its functionality in the network according to the procedures established by the organization.

CR 4.1 protocols associated with network applications installed on the servers are configured to support the services implemented in accordance with the installation manual and following the specifications received.
CR 4.2
routers and switches are configured to manage protocols and services according to specifications received and work predefined procedures.

CR 4.3 Encryption software is installed and configured on the network nodes to be determined according to the specifications received and procedures to create virtual private networks.

CR 4.4 Functional tests of the configuration of the communication devices are performed to ensure compliance of the same with respect to the requirements in the operating specification of the organization.

CR 4.5 The network node is included in the monitoring systems of network infrastructure, including collection of characteristic parameters of operation (managed frames, bandwidth used, errors / collisions, etc.).

CR 4.6 configuration operations performed are documented, following the procedures established by the organization.

RP 5: Managing the incidents detected in the network devices to correct or report them, according to established protocols and procedures predefined performance.

CR 5.1 Incident reporting systems are seen to address any alarms as operational and organizational security procedures.

CR 5.2 The location of the element in which the incidence has occurred is done by interpreting the information received and the technical documentation, to isolate the physical and logical problem, according to the technical documentation and protocols of the organization for contingencies.

CR 5.3 Symptoms reported by the user or by incident management systems are verified for a diagnosis of the problem according to the technical documentation.
CR 5.4
detected and isolated incidence is diagnosed and its solution arises to rehabilitate interrupted or impaired services, according to quality standards and contingency plans.

CR 5.5 The incidence that has not been isolated reports to higher level of responsibility for management according to the protocols and procedures for the organization to contingencies.

CR 5.6 The incidence repair is done with the right tools and compliance with safety standards set by the organization.

CR 5.7 Documentation detection, diagnosis and resolution of the incidence is constructed for registration of the same according to the protocols of the organization.
CR 5.8
status information of the impact to the end user is transmitted to complete the process of its management accordance with the rules of the organization.



Professional background:





Production facilities:



Network analyzers. Certifiers wiring. Hand tools for electrical and mechanical works. Software tools for testing connectivity. Software tools for inventory control network elements. Computers, printers and peripherals. Operating systems. Hubs, switches, routers. Network cards. Cables and connectors. Network client software. Network management software. Owner Software network devices. Office tools. Network map.



Products and results:



Communications equipment connected to the data lines. local network installed and configured according to specifications. Inventory and descriptive record of physical communications devices and network configuration.



Information used or generated:



Network Map. Hardware inventory of the organization. Work orders. Network documentation. Installation manuals of the devices. Manual configuration of devices. operational specifications of the organization. Quality Manual. Standards and quality criteria of the organization. Security plan. Maintenance plan. applicable environmental regulations. Regulations applicable health and safety at work. Reliable and updated documentation network.




COMPETITION UNIT 3: install, configure and maintain computer PACKAGES GENERAL PURPOSE AND SPECIFIC APPLICATIONS





Level: 2





Code: UC0221_2





professional accomplishments and performance criteria:



RP 1: Install, configure and update general purpose software packages, utilities and specific applications for further exploitation by users and according to the directions received.

CR 1.1 configuration parameters and definitions on the computers of the network infrastructure data is determined individually with the values ​​set in the design, ensuring compatibility with the characteristics of the machine and the operating system described in the technical documentation that will be installed and the specifications.

CR 1.2 application or utility is installed and configured following the established procedure and using the tools of the application itself, remote communication tools or operating system.

CR 1.3 The software update is carried out ensuring equipment integrity and availability of information.

CR 1.4 The issues that appear are resolved by consulting the technical or using the network administrator documentation.

CR 1.5 The established tests are done checking all the packages have been installed and that the application works in all its aspects such as access to peripherals, network access, or where appropriate server access, among others.

CR 1.6 previously installed applications are tested by verifying that the installation of the application or utility has not affected its operation.

CR 1.7 Installation and configuration is documented including relevant details in the computer documentation, referencing the incidents and media generated and records in the established formats.

CR 1.8 supports software installation are stored so as to allow further use.

RP 2: Resolve incidents arising in the operation of applications to assist the user, identifying their nature, time and level of quality required in the internal rules of the organization.

CR 2.1 user support is made taking into account the established interpersonal communication skills, identifying the required performance, satisfying the requirements and demands of the user and ensuring the result of the performance.

CR 2.2 The affected software components are reinstalled, updated or configured with the appropriate parameters according to the specifications in the technical documentation and usage needs.
CR 2.3
preventive safety measures and possible alternative operating procedures are activated to maintain information integrity and continuity in the operation for solving the problem, following established procedures.

CR 2.4 The original information is restored and updated, following the established protocol, so that the system is back in operation.

CR 2.5 The audit of the system, once restored, is done to check its correct functionality by testing, following the specifications received.

CR 2.6 The actions taken are documented in the formats established for this purpose to facilitate monitoring, updating the repository of incidents and technical documentation of the installation and system configuration.



Professional background:





Production facilities:



Computer and peripheral equipment. Antivirus and security software, specific applications. Detection tools, diagnostics and repair of errors (local or remote). Tools software installation and upgrade. Updates and patches. Mobile devices. Collaborative management software. Installation elements (aid programs, manuals, licenses). Backup software and recovery. Backup media. Internet access.



Products and results:



Software packages, utilities and specific applications installed or updated. Incidents resolved applications.



Information used or generated:




Installation manuals of the application software or specific application. Guide operation of the application. Parts of incidents and historical incidents. Installation documentation. Request for assistance from users. internal rules of the company on customer service and confidentiality of information. Applicable regulations regarding data protection and intellectual property, among others. Incident management applications.



COMPETITION UNIT 4: TO FACILITATE THE USE OF COMPUTER USER PACKAGES OF GENERAL PURPOSE AND SPECIFIC APPLICATIONS





Level: 2





Code: UC0222_2





professional accomplishments and performance criteria:



RP 1: Provide users the exploitation of software packages through training for use.

CR 1.1 versions installed new applications or users are shown, explaining the differences to ensure an effective transition.
CR 1.2
operational instructions the application or new version installed are made to facilitate the understanding of them to users.
CR 1.3
utilities such as antivirus, compression and other programs are explained to users so that there is no doubt in their management.

CR 1.4 The implementation of security policies such as the completion of backups, folder protection and using shared folders from other users are explained so that no doubt use.

CR 1.5 Applications that allow browsing web pages, communicate in a conference or download files from other users are explained so that they understand their main advantages and can perform their job efficiently.

RP 2: Provide users the exploitation of software packages through direct processing of jobs.

CR 2.1 Document templates are made as instructed, making themselves available so that users know and access easy and convenient.
CR 2.2
operations import / export data between applications are made ensuring its integrity.
CR 2.3
images and graphics needed in the preparation of documents are prepared by simple building programs and / or editing.
CR 2.4
documents, spreadsheets and presentations made by users adapt, if necessary, to corporate models.

CR 2.5 The documents prepared following the corporate model are stored for later use or query the repository of digital files following established procedures.



Professional background:





Production facilities:



Computer and peripheral equipment. Antivirus and security software, specific applications. Diagnostic tools and templates generation applications. Updates and patches. Mobile devices. Collaborative software management and computer-aided teaching. Internet access software.



Products and results:



Assistance to users in the use of applications. Instructions for use of applications or versions. Format templates and documents of the organization. Forms input / output.



Information used or generated:



Installation manuals of the application software or specific application. Guide operation of the application. Parts of incidents and historical incidents. Installation documentation. Request for assistance from users. Internal documents normalization rules. internal rules of the company on customer service and confidentiality of information. Applicable regulations regarding data protection and intellectual property, among others.



Training Module 1: INSTALLATION AND CONFIGURATION OF OPERATING SYSTEMS





Level: 2





Code: MF0219_2





Associated with UC: Install and configure the software based on microcomputer systems





Duration: 120

hours





Capabilities and evaluation criteria:



C1: Sort the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main microcomputer systems architectures detailing the mission of each of the functional blocks.

CE1.2 Explain the concept of operating system and identify the functions performed in the microcomputer system.


CE1.3 Distinguish the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.
Sort
CE1.4 operating systems and versions that are used in computers detailing its main characteristics and differences, according to technical specifications.

CE1.5 Identify the phases involved in installing the operating system by checking the computer system requirements to ensure the possibility of the installation.

C2: Apply processes Installation and configuration of operating systems to enable the functionality of the computer, according to some specifications received.

CE2.1 In a practical course, properly characterized, installation of an operating system on a computer for its operation:

- Check that your computer meets the requirements and has the necessary resources for the installation of the base software.

- Prepare the installation destination formatting and creating partitions specified equipment.

- Install the operating system following the steps in the technical documentation.

- Configure the system with the specified parameters.

- Install utility programs indicated and verify the installation.

- Documenting the work done.

CE2.2 Identify procedures that are used to automate the installation of operating systems on computers of the same characteristics by using cloning software tools and other installation tools unassisted.

CE2.3 In a practical course, properly characterized, installation of an operating system on computers with the same characteristics:

- Prepare one of the computers to install the operating system and utilities.

- Install and configure the operating system and utilities indicated.

- Select the software tool for cloning equipment and proceed to obtain images of the system installed for distribution.

- Implement by management tools disk images, those obtained on multiple machines with similar characteristics to the original order to activate their functional resources.

- Testing of starting and stopping to check the facilities.

- Documenting the work done.

C3: Updating the operating system of a computer to include new features and address security issues, based on technical specifications.

CE3.1 Identify the components of a software operating system susceptible reset for updating, considering its technical specifications.

CE3.2 Identify and classify the sources of obtaining update elements for the implementation processes of patches and operating system updates.

CE3.3 Describe the procedures for updating the operating system taking into account the security and integrity of the information in the computer.

CE3.4 In a duly characterized upgrade an operating system for incorporating new features practical course:

- Identify the components to update.

- Check the software update requirements.

- Update specified components.

- Check made processes and the absence of interference with other system components.

- Documenting the update process.

C4: Using applications that provide operating systems for the operation thereof according to technical specifications.

CE4.1 use the applications provided by the operating system by describing its characteristics for use and exploitation thereof, taking into account their technical specifications and functional requirements.

CE4.2 use the applications provided by the operating system for the organization of the disk and the file system, according to technical specifications received.

CE4.3 Use accessibility options operating systems to configure accessible environments for people with disabilities, in accordance with technical and functional specifications.

CE4.4 Set options work environment using the tools and applications provided by the operating system, following specifications received and usage needs.


CE4.5 Describe the applications provided by the operating system to exploit the capabilities of the peripherals connected to the system, according to usage needs.

CE4.6 Sort the messages and warnings provided by the microcomputer system to discriminate their importance and criticality and implement response procedures in accordance with instructions given.

Capabilities whose acquisition should be completed in a real working environment:

C2 and CE2.3 CE2.1 respect; C3 respect CE3.4.
Other capabilities
:

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Keep an assertive, empathetic and conciliatory attitude with others showing warmth and kindness in treatment.

Adapt to new situations or contexts.
Respect
procedures and internal rules of the organization.

Adopt appropriate working environment postural attitudes.



Contents:





1. Computer Architecture



Block diagram of a computer: subsystems.

The central processing unit and its elements: Internal memory, types and characteristics; the input and output units; mass storage, types and characteristics.

Buses: characteristics and types.

Correspondence between the physical and logical subsystems of a computer.



2. Operating Systems



Classification operating systems.

Functions of an operating system.

Equipment Microcomputer Operating Systems: characteristics and use.

Command mode.

Graphic mode.



3. Installation of operating systems



Procedures for installing operating systems.

Substrate Preparation: partitioned and formatted.
Types
installation of an operating system: minimal, standard and customized.

Device configurations.

Tools for cloning disks.

Update operating systems.



4. Utilities OS



Features and functions.

Based Software Utilities: work environment configuration; administration and management of file systems; process management and resources; management and editing files.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation and configuration of software in microcomputer-based systems, which are accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: IMPLEMENTATION OF THE ELEMENTS OF LOCAL NETWORK





Level: 2





Code: MF0220_2





Associated with UC: Install, configure, and verify the elements of the local network according to established procedures





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Sort the elements that make up a local communications network, to identify the components that make up the physical map.

CE1.1 Explain a local network topologies considering architectures and technologies.

CE1.2 List the elements that can be found in the physical map of a local network based on the scope and network infrastructure used.

CE1.3 Describe each of the elements of a local network taking into account its characteristics and associated features.

CE1.4 In a practical course classification communications elements an installed local network:

- Develop your physical map as a received specifications.


- Develop your logical map as a received specifications.

CE1.5 identify the applicable rules and technical regulations affecting the implementation of local networks according to the procedures given.

C2: Apply the installation procedures and configuration of the local network nodes as well as protocol handlers and other programs that support communications services.

CE2.1 List and explain the characteristics of the protocols that are configured on a local network taking into account the technology and standards used.

CE2.2 Explain the addressing system nodes used in the local network based on network technologies used.

CE2.3 In a practical course setup and configuration of the nodes of a network to implement internal communications services, according to a received specifications:

- Identify the different outlets network nodes and their representation in the control cabinet, interpreting technical documentation.

- Select the appropriate tools for installation.

- Install network adapters with their corresponding drivers.

- Install and configure the network protocols used according to specifications received.

- Install and configure different network services according to the specifications received.

- Documenting activities, including all relevant aspects.

CE2.4 Apply the settings specified for the active elements (switches and routers), using a specified procedures.

CE2.5 identify the applicable rules and technical regulations affecting the implementation of local networks according to some given specifications.

C3: Apply the test procedures and verification of the elements of network connectivity and tools for these processes.

CE3.1 Explain the stages of a verification process on a local network connectivity.

CE3.2 List the tools used to verify connectivity to a local network, according to the technologies implemented in local networks.

CE3.3 Explain the operation of the network management tools to check the status of communications devices, taking into account the technical specifications of the tools.

CE3.4 In a practical course check the connection already installed in a local network, and from procedures given:

- Check the connection options permitted and prohibited.

- Check access to shared resources, following procedures given.

- Documenting processes and verification test performed according to technical specifications.

C4: Set the configuration parameters of the communications protocols in the network nodes, for integration into the network itself, following procedures given.

CE4.1 Identify parameters to configure communications protocols, their function and range of allowed values.

CE4.2 Interpret the specifications of a particular configuration of communications protocols, taking into account integration needs node on the network and the implementation of related services.

CE4.3 Enumerate the procedure for applying a predetermined configuration to a network node.

CE4.4 In a practical simulation, configure the different communication protocols using technical specifications given.

CE4.5 Identify the configuration parameters of the protocols with security features transmission and encryption, for integration into secure networks taking into account the safety criteria given.

CE4.6 Documenting processes to be performed in the configuration of the protocols on the local network nodes according to a given specification.

C5: Address the issues of the elements of the local network communications, and to solve the issue following a given specification.

CE5.1 Describe any incidents that occur in the communications elements of local networks, as the communications technologies used and the elements involved with them.

CE5.2 List the procedures and tools used for incident detection elements of the local communications network, according to specifications defined contingency plan.

CE5.3 Describe the techniques and tools that are used to isolate and diagnose the causes that have produced a reported incidence in the network, as indicated in the contingency plan.


CE5.4 Explain the systematic procedures for troubleshooting communications elements of the local network, depending on the devices that are detected incidents.

Ce5.5 In practical cases, properly characterized, failures simulated resolution within a local network, according to a specification received and following procedures given:

- Interpret alarms generated by the incident detection system.

- Locate the cause of the incidence element.

- Resolve the issue by applying pre-established procedures.

- Register the impact on the document prescribed for that purpose.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.3; C3 respect CE3.4; C5 respect ce5.5.
Other capabilities
:

Responsibility for the work carried out.

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Demonstrate some autonomy in solving small contingencies related to their activity.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Adopt appropriate working environment postural attitudes.



Contents:





1. Local networks



Features.

Topologies.

Architectures.

Elements of a local network.

Physical and logical network maps.

Applicable regulations and technical regulations affecting the implementation of local networks.



2. link layer protocols on a local network



Protocols logical link control.

Media Access Protocols: protocols contention, token passing, among others.

Physical addresses.

MAC address.



3. network layer protocols on a local network



Protocol IP network.

Logical addressing.



4. Verification Procedures and test connectivity elements of local networks



Verification tools connectivity elements of local networks.

Systematic verification procedures and test connectivity elements of local networks.



5. Configuration Procedures communication protocols in local networks nodes



Characteristic parameters of common communications protocols.
Systematic procedures
configuration protocols common communications nodes local networks.



6. Detection and diagnosis of incidents in local networks


Diagnostic Tools
communications devices in local networks.

Incident management processes in local networks.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation, configuration and verification of the elements of the local network according to established procedures, which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: INSTALLATION AND CONFIGURATION OF COMPUTER APPLICATIONS





Level: 2





Code: MF0221_2





Associated with UC: Install, configure and maintain general purpose software packages and specific applications





Duration: 60

hours





Capabilities and evaluation criteria:



C1: Interpret information on the configuration of computer equipment to determine proper installation of applications.


CE1.1 Describe resources and system components that must be considered in the installation of an application.
Sort CE1.2
types of programs and applications according to the needs of computer resources for optimal performance.

CE1.3 In a practical course of installing applications on computers:

- Identify and locate the necessary elements for application installation (brackets, braces, licenses, backpacks, procedures and manuals).

- Interpret documentation from the installation of the application, the required minimum and optimum requirements depending on the components you want to install.

- Identify the characteristics of the hardware required by the application (CPU speed, amount of memory, disk space, and other hardware specific) using the operating system tools.

- Based on the above findings, determine what type of installation can be done, what parts can not be installed and, if so, what modifications (hardware or software) should be performed for optimal installation.

- Documenting the activities and the results obtained.

C2: Install, configure and update office automation and business applications on a computer.

CE2.1 List the types of virus, how to spread of infection and the effects that can cause a computer.

CE2.2 Explain the operation of the tools used to prevent and repair damage caused by computer viruses.

CE2.3 Describe the basic precautions to take users on issues of security and prevention of computer virus infections.

CE2.4 Describe the activities that must be carried out in the installation process or update an application on a computer.

CE2.5 In a practical course, properly characterized, update antivirus software available:

- Check version of antivirus and virus patterns.

- Download the latest version from Internet virus pattern.

- Update Install / update with the latest antivirus database available patterns.

- Conveniently Documenting the configuration data of the database of patterns.

- Documenting the activities and the results obtained.

CE2.6 In a practical course, properly characterized, installation or upgrade of an antivirus program:

- Install or update your antivirus program properly.

- Configure the program, as required.

- Upgrade the antivirus with the latest available patterns.

- Note the action on the computer log sheet.

- Documenting the activities and the results obtained.

CE2.7 In a properly characterized practical case, installation of a particular application on a computer:

- Install or upgrade components correctly established the application following the procedure established by the manufacturer and / or specifications received.

- Configure the application based on the characteristics and resources of the computer on which it is installed.

- Customize the application to meet different possible preferences.

- Setting the application to take into account possible user disabilities, taking advantage of all the possibilities offered by the same application, operating system and hardware installed for that purpose.

- Set directories used by the application to facilitate access to existing documentation, templates or other relevant information.

- Check the operation of the application by systematic tests to ensure the proper functioning of the installed components and access to the resources of both own the team and shared on the network.

CE2.8 In a duly characterized practical case installation does not meet the expected results:

- Consult the technical documentation to identify the problem and find its solution.

- Consult Internet (service pages, forums) to identify the problem and find its solution.

- Documenting the incidence and the solution found in a format established for this purpose.

C3: To facilitate the use of computer applications through technical assistance to the malfunction of the program.

CE3.1 Describe the process of managing an incident, indicating the steps since a notice is received until it is completely resolved.


CE3.2 Enumerate the type most commonly encountered problems in a microcomputer system and related symptoms, associating each possible solutions and levels of emergency repair.

CE3.3 incidence Develop reports from alleged errors described by a user.

CE3.4 In a practical course, properly characterized, failure of a computer with error description:

- Play the computer problem.

- Describe the incidence associated with equipment failure.

- Set the type of probable cause (hardware, operating system, application, virus, mail, Internet access, etc.) and the level of urgency of the repair.

- Describe possible causes and solutions to the problem.

- List the elements and activities planned for repair.

- Estimate the time required for repair.

Lost CE3.5, as far as possible, damaged the fault information.

CE3.6 Apply the procedures for safeguarding information and retrieving it after repair.

CE3.7 In a practical case of software failure (the operating system or application):

- Identify the cause with the help of assistants, aid programs, manuals and consultations on the Internet (FAQ, tutorials, forums).

- Identify and locate the necessary items for repair (firmware, drivers, magnetic installation support, licenses, manuals and others) using the Internet in the case of not having them available.

- Perform repair following the required procedures.

- Check, once the repair is complete, which does not occur again malfunction.

- Documenting the activities and the results obtained.

CE3.8 In a practical course of infection by a virus on a computer:

- Check that the computer has an antivirus program and it is updated (if necessary consulting Internet), and if not, and if possible, install the latest version.

- Locate infected by antivirus program files.

- Delete the virus trying to save as much data.

- Documenting the activities and the results obtained.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.3; C2 respect to CE2.5, CE2.6, CE2.7, CE2.8; C3 respect to CE3.4, CE3.8 CE3.7 and.
Other capabilities
:

Adapt to the specific organization of the company, integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute operations in accordance with the instructions received, with quality and safety criteria, applying specific procedures of the organization.

Used to the pace of work of the organization to meet the daily performance objectives defined in the organization.

Show at all times an attitude of respect toward peers, procedures and internal rules of the organization.

Adopt appropriate working environment postural attitudes.



Contents:





1. Setting computers



System requirements demanded by applications: obtaining sources, components hardware requirements, operating system requirements, other requirements.

Operating System Tools for obtaining information.

System Check: information and characteristics of the hardware, test and diagnostic utilities (CPU, memory, disks, graphics controller), device drivers.



2. Applications, programs and utilities. Installation and Configuration



Types of programs in terms of licensing: free use, temporary use in development (beta), corporate agreements, application usage, license using code licenses through backpacks.

Components of an application: installation manual, user manual.

Installation and registration of applications.

Application Settings.

Diagnostic programs.

Methodology for problem solving.



3. Virus and antivirus



Computer virus: concept, means of propagation, evolution, effects.

Precautions to avoid infection.
Virus
post offices, programs and documents.

Antivirus programs: concept and function.

Recovery discs.

Antivirus Active components: enabling and disabling protection.


Virus removal and data recovery.

Updating antivirus patterns.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation, configuration and maintenance of general purpose software packages and specific applications, in own and foreign language, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 4: micro-computer applications





Level: 2





Code: MF0222_2





Associate UC: To provide the user the use of general purpose software packages and specific applications





Duration: 210

hours





Capabilities and evaluation criteria:



C1: To facilitate the use of computer applications to assist the user during the period of use.
Apply CE1.1
personal communication techniques so that good communication with the user is achieved.

CE1.2 Develop a visual guide to the basics of using an application, describing the procedures and basic precautions.

CE1.3 Describe the various utilities such as file compression, antivirus and backup, so that the user can understand its features and how to use.

In a practical course CE1.4 user support, properly characterized:

- Interpret the need for the user according to his explanations.

- Define the interventional procedure.

- Develop adequate to the problem textual or visual guide.

- To train the user in the application of the solution.

C2: Develop documents using office applications word processing.

CE2.1 Describe the key features of a document that may be carried by a word processor.

CE2.2 Describe how to develop various standard documents: letters, official letters, certificates, claims, faxes, records, and calls, among others.

CE2.3 Explain the key features that provide word processing documents for comment and review by multiple users.
Perform operations CE2.4
location, recovery, named and recording documents from a word processor.

CE2.5 Incorporate the document elements from other applications (tables, graphs, text pieces).
CE2.6
Import documents from other word processors or earlier versions using the tools of the application.

CE2.7 Print documents from your word processor, using all possibilities of the application and printer.

CE2.8 Develop templates, using for this the features provided by your word processor. Prepare envelopes and labels combining templates with fields in a database.

CE2.9 Develop simple macros making them available to other users.

CE2.10 Describe the basic settings of the word processing application, indicating possible problems that may arise and providing solutions to them.

CE2.11 In a practical course of preparation of a document from multiple files:

- Develop a document from several files corresponding to parts of it.

- Homogenize formats between different parts.

- Use master documents and subdocuments.

C3: Develop documents using office applications spreadsheet.

CE3.1 Explain the basic concepts of a function: input data, function output.


CE3.2 Organize folders and documents computer so that a comfortable and efficient from the spreadsheet have access.
Perform operations CE3.3
location, recovery, named and recording documents from a spreadsheet.

CE3.4 In a practical course of preparation and editing documents using the features provided by a spreadsheet:

- Incorporate data in different formats.

- Perform calculations with data using formulas.

- Give the right format for the right presentation of the data and verify its validity by parallel calculations.

- Solve problems of circular references and division by zero, among others, with the utilities provided by the application.

- Use references to other sheets of paper sheets and other documents.

- Include graphs and maps of different types with data from the spreadsheet and enter the document elements from other applications (tables, graphs, text pieces).
CE3.5
Import documents from other programs or earlier versions using the tools of the application.

CE3.6 Printing documents from the worksheet, using all possibilities of the application and printer.

CE3.7 In a practical course work with spreadsheet:

- Using filters, diagrams and operations immobilizing cells to present the data properly.

- Develop templates following the instructions, with particular emphasis on the protection of cells and clear presentation so that a user can use them comfortably and without possibility of error.

- Develop user functions and macros simple, making them available to users.

C4: Develop documents using office applications presentations.

CE4.1 Explain the parts of a slide and the factors taken into account to get the correct transmission of information in a presentation.

CE4.2 Organize folders and computer presentations to have a comfortable and efficient access from the application.
Perform operations CE4.3
location, recovery, and recording presentations appointed from within the application.

CE4.4 Develop presentation templates using the features provided by the application.

CE4.5 In a practical course of preparation and editing presentations using the features provided by the application:

- Use the template set.

- Find in the catalog available figures that best suit required.

- Establish distribution frame (text, figures, tables and others) on the slides according to the requirements, using different colors, textures, effects and other features provided by the application and using editing operations that allow application to copy, move and modify the operative site.

- Incorporate elements of other office automation applications and comments.

- Using different techniques of transition between slides provided by the application.

CE4.6 Print presentations from the application, on paper or transparencies, using all possibilities of the application and printer.

CE4.7 Connect the computer to the projection to start a presentation, checking the operation or solving problems that may arise.

C5: Develop simple documents with office automation applications data base.

CE5.1 Describe how to import data from other business applications.

CE5.2 Create tables using the help of assistants, inserting, modifying and deleting data in them.

CE5.3 Create basic queries using wizards.

CE5.4 Develop basic reports from tables and queries already made, using wizards.

Ce5.5 Change reports made from ofimáticas database application data, changing design options thereof.

C6: Develop graphics using office applications image editing.

CE6.1 Describe ways of rendering graphics (bitmap, vector) and the most common formats, indicating that more fit every situation.

CE6.2 Explain the concept of resolution graphics, forms of compression and possible loss of quality, indicating their advantages and disadvantages.

CE6.3 Explain the concepts of obtaining photographs with digital cameras.

CE6.4 Explain the concepts of contrast, brightness, gamma and filters associated with images, applying it to different contexts.


CE6.5 contained a catalog Sort by graphics that allow quick and efficient access to images, graphics and photos included in it.

CE6.6 Get images using digital photo cameras, scanners, Internet or other means, and incorporate them into the catalog.

CE6.7 In a case study charting and editing:

- Use the tools available to change the format of the images.

- Modify its resolution, adapting the size specified use, and optimizing the size / quality ratio.

- Elaborate graphics, editing images and using the features that provide graphic editing application.

C7: Manage communication applications.

CE7.1 Describe the elements that compose an email, indicating its usefulness.

CE7.2 List and describe the basic needs of postal and electronic management agendas.

CE7.3 List the similarities and differences between email, Internet email and subscriptions.

CE7.4 Connect and synchronize agendas on computers with agendas in kind 'smartphone' portable devices, as required.

CE7.5 Describe the use of browsers, focusing on the characteristics of configuration.

CE7.6 Describe the use of videoconferencing applications, focusing on its configuration.

CE7.7 Describe the use of file transfer applications, explaining its basic configuration.

CE7.8 In a practical course management address book:

- Import and export contacts.

- Organize contacts into folders and create distribution lists.

- Have the address book to other programs for sending letters or label creation.

- Insert new contacts delete or modify existing ones.

CE7.9 In a practical course management email:

- Import and export emails from / to other tools or other mail program versions.

- Create mail templates and corporate firms.

- Organize your mail into folders according to the criteria indicated.

- Perform safeguards, recovery and disposal of old mails.

- Configure the application to automatically redirect mail, spam avoid spam and other functions of the application.

CE7.10 In a practical course management agenda:

- Include entries in the phonebook.

- Organize meetings.

- Include tasks.

- Include warnings.

CE7.11 In a practical case of use of a desktop email application:

- Make subscriptions to newsgroups.

- Sync mail.

- Participate in the news forum to check its operation.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect CE2.11; C3 and CE3.7 CE3.4 respect; C4 respect CE4.5; C6 respect to CE6.7; C7 respect to CE7.8, CE7.9, and CE7.11 CE7.10.
Other capabilities
:

Responsibility for the work carried out.

Demonstrate some autonomy in solving small contingencies related to their activity.

Demonstrate care and concern for successfully meeting the needs of customers.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Learn new concepts or procedures and make effective training using the knowledge acquired.

Demonstrate communication skills and empathy with customers and end users of their work.

Adopt appropriate working environment postural attitudes.



Contents:





1. Instruction in the use of computer utilities



File compression.

Using antivirus.

Backing up user.



2. Word processors



Document files. Storage.

Format characters, paragraphs, pages.

Design Document outlines, bulleted and numbered lists; columns; master documents and sub-documents; templates, styles; tables of contents, indexes; page numbering.

Tables and associated functions.

Pictures and associated functions.

Spelling and synonyms Corrector.

Printing documents, and related functions.

Document protection.

Mail Merge.
Methods
shortcut key.

Macros.

Version management changes, comments and reviews.

Collaborative work with documents.


Setting the word processing application.



3. Spreadsheets



Data files. Storage. Import and export documents.

Format spreadsheet cells and texts.

Data types and associated with each presentation.

Formulas and relationships between cells.

Ranges and derivative transactions.

Conditional formats.

Cells: selection, scroll leaf, copying and pasting data, search and replaced.

Property, plant and cell protection.

Grouping of cells and schemes.

Automatic and user management and data filters.

Functions tracking application errors.

Generation of graphs and maps, and inclusion of external images.

Using methods shortcut key.

Version management changes, comments and reviews.

Generation user functions.

Generation templates.

Printing: ranges, formatting, headers and footers, page breaks, among others.

Collaborative work with spreadsheets.

Setting the spreadsheet application.



4. Applications for making presentations



Files presentations. Storage.

Presentation elements: it slides and text boxes, tables, charts and graphs.

Presentation elements: selection, scrolling, copy and paste, search and replaced.

Templates and patterns.

Texts: types, shapes and colors; line spacing, alignment, indents, tabs, justification, and others.

Graphics and animations.

Styles, fill patterns, borders, textures, gradients, shadows, 3D effects, among others.

Transition between slides.

Connecting to a projector and configuration.

Presentation printing.

Making online presentations.

Application Configuration of making presentations.



5. Data Bases of office



Using wizards for creating tables, queries and reports.

Insertion, modification and deletion of data.

Design and modify reports with databases.



6. Applications for creating and editing graphics



Forms of rendering graphics (bitmap, vector).

Formats used for graphics rendering.

Resolution and quality graphics. compressed formats. Quality losses in compression.

Digital camera. Getting photos with digital cameras. Copy photos to the computer.

Brightness contrast, gamma and filters associated with pictures.

Organization a catalog of images.

Printing graphics.

Charting applications: lines, simple geometric figures, images and pictures library, text, connection and alignment of figures, twists, groups, among others.

Editing applications: cut areas of interest or disposable; brightness, contrast and gamma; profiling, antialiasing, color retouching, blur, and others.

Import and export graphics to different formats.

Using charts in other office applications.



7. Communication Applications



Use and browser settings.

Email: sender, recipient (copy, blind copy), subject, message text and attachments.

Mail Format, templates and corporate firms.

E encryption programs (PGP). Installation and sending encrypted mail.

Installing and using electronic signature certificates.

Key components of a management application mail and electronic agendas.

Forums News 'news': configuration, use and synchronization messages.

Programs agendas in sync with type 'smartphone' portable devices. Installation, use and synchronization.

Management Address Book: import, export, add contacts, create distribution lists, make the list available to other office applications.

Mail Handling: organization folders: import, export, delete old messages by keeping backups, configuration of incoming mail, spam protection spam.

Managing the calendar: appointments, calendar, reminders, tasks, notes, meetings, view attendee availability.

Applications videoconferencing and file transfer.



Parameters context of training:





Spaces and facilities:




The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and related techniques provide the user with the use of general purpose software packages and specific applications, which is accredited by one of the following two ways:

- Academic Training Level 1 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX II


Professional qualifications: Database Administration



Professional Family: Computers and Communications





Level: 3





Code: IFC079_3





General competence



Manage system databases on computer systems, interpreting its design and structure, and performing the adaptation of the model to the requirements of the management system database, and configuring it to ensure the integrity, availability and confidentiality stored information, complying with the applicable rules on data protection.



Competence units



UC0223_3: Set up and operate computer systems

UC0224_3: Configure and manage manager database system

UC0225_3: Configure and manage the database



Professional environment





Professional field



Develops his professional activity in the production area dedicated / or management of databases, in institutions public or private, medium-sized companies, large or micro information systems or companies of any size that manage information systems for other organizations, both self-employed basis, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located in the service sector, sub-sector management information systems to other organizations, in software development, technical consulting in information systems or in any productive sector with companies that have information systems to manage their business processes.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Administrators

database
Technical Data Mining (Data Mining)



Associate Training

(630 hours)





Training modules



MF0223_3: Operating systems and applications (180 hours)

MF0224_3: Managing database management systems data (210 hours)

MF0225_3: Database Management (240 hours)



COMPETITION UNIT 1: SETTING UP AND EXPLODE SYSTEMS





Level: 3





Code: UC0223_3





professional accomplishments and performance criteria:



RP 1: Adapt system configuration logic for exploitation, according to the needs of use and within the guidelines of the organization.

CR 1.1 system parameters that affect memory, processor and peripherals meet the usage needs, optimizing performance.

CR 1.2 Required devices and control files are added, removed or repaired using for this operating system utilities.

CR 1.3 Team logical connections are configured to access remote services within or outside the organization.


CR 1.4 System parameters affecting the ergonomics or ease of use conform to improve the working conditions of the user, within the guidelines of the organization.

RP 2: Organize information in file systems and operating system maintain their properties to facilitate the use of resources and ensure compliance with the directives of the organization.

CR 2.1 applications are organized with a structure and configuration that allow its use under optimal conditions.

Information CR 2.2 operating system user remains in organized structures according to the possibilities of the system (files, directories, volumes, etc.) itself to facilitate access to such information and maintain homogeneity in the various teams of the organization.

CR 2.3 The structure and system configuration files are preserved in a position to use to prevent accidental failures and share information.
CR 2.4
storage space free of useless or obsolete to improve system performance and extend its life information is maintained.

RP 3: Develop and transfer documents by using general-purpose applications, to assist in planning tasks and documentation work, in compliance with applicable regulations.

CR 3.1 office automation tools are used with the necessary skills to assist in planning tasks and documentation work.

CR 3.2 The exchange of information with others is done using mail systems or electronic mail to facilitate the flow of information and reduce costs and time when the nature of the information exchange permits.
CR 3.3
services available on the Internet or other networks are obtained by the correct use of the necessary tools (navigation, forums, FTP client, etc.) to facilitate access to information needed for the job.

RP 4: Protecting information which is responsible and is stored in the file system to ensure the integrity, availability and confidentiality of the same, complying with the applicable regulations.

CR 4.1 The information (data and software) is stored so as to allow returned to a state of use at any time by backups, among other means.

CR 4.2 Access to information is protected through the use of passwords and other security measures established in the organization.

CR 4.3 The means of protection against disasters or improper access (antivirus, firewall, 'proxies', change management systems, etc.) are implemented and used in systems which is responsible.

CR 4.4 The system free software remains unlicensed.

CR 4.5 The internal rules of the organization and the applicable rules on data protection are met in systems which is responsible.

CR Manager 4.6 Incidences systems are reported to perform the necessary work.



Professional background:





Production facilities:



Computer and peripheral equipment. operating systems and configuration parameters. Office tools. File transfer services and messaging. Tools 'backup'. Antivirus firewalls and proxy servers. Change management tools, incidents and configuration.



Products and results:



Computer system running at optimum performance and proper use of its resources. Networked computers. operating system and applications configured and parameterized. Files with information according to the nature of the professional activity developed (programs, scripts consultations, text documents, spreadsheets, etc.) stored. Backing up the information according to criteria of integrity, confidentiality and availability.



Information used or generated:



Manuals use and operation of computer systems. Operation manuals associated software. Training material. Support systems of technical supports applications (telephone, Internet, messaging, forums, etc.) assistance.



COMPETITION UNIT 2: SET AND MANAGE A DATABASE MANAGER SYSTEM





Level: 3





Code: UC0224_3





professional accomplishments and performance criteria:




RP 1: Install and initially parameterised Manager Database System (RDBMS) for its implementation, according to the technical specifications and characteristics of the subsequent operation.

CR 1.1 operating system adapts to the requirements of DBMS according to the manufacturer's technical specifications.

CR 1.2 devices, processes and physical space are configured according to the characteristics of the DBMS, operating system, hardware, storage needs and service requirements.

CR 1.3 The data dictionary is created as specified by the DBMS.

CR 1.4 The components of the cluster, if applicable, are set according to the DBMS, storage needs and service availability policies.
CR 1.5
additional support utilities (backup, loading and processing of data, among others) are integrated into the existing operating environment.

CR 1.6 graphical administrative tools and command line interface is skillfully used both for the installation and configuration tasks.

CR 1.7 The responsibilities of local administrators establish themselves individually in case there are multiple nodes.

CR 1.8 In the case of NoSQL databases distributed in the DBMS to be located on multiple nodes, the system structure is planned as the databases that it is intended to contain.

CR 1.9 In the case of a NoSQL database system it adapts to the specific requirements of the data and its mode of operation (transactionality, oriented graphs, oriented document, key / value, connectivity nodes, size data, etc.).

RP 2: Organize and perform administrative tasks Manager Database System to allow optimum exploitation and according to established procedures.

CR 2.1 The start and stop of DBMS is performed based on usage needs of the organization and maintenance policies.

CR 2.2 Administrative tasks are organized according to the needs of use.

CR 2.3 Administrative tasks are encoded using scripts judgments or by using tools of the DBMS.
CR 2.4
sentences scripts are tested in a controlled environment, verifying the results before implementation.
CR 2.5
scripts statements are scheduled for execution according to the needs of the organization and interfering as little as possible in the operating system.

CR 2.6 Operating procedures are documented for use in production, using established models.

CR 2.7 The data dictionary used in those administrative tasks that require it, while maintaining its integrity.

CR 2.8 The data dictionary is kept updated following changes in the structure of the DBMS and its integrity is preserved.

RP 3: Monitoring indicators Manager Database System to assess the state of the system and the degree of compliance with the performance criteria, making the necessary adjustments for optimization.

CR 3.1 The performance criteria system databases are set according to the general criteria of the organization and established for each database.

CR 3.2 The system is prepared for monitoring using tools trace, log files, performance statistics, schedule alerts and other monitoring elements.

CR 3.3 System monitoring is performed during periods of best able to draw conclusions about their performance time.

CR 3.4 operating system and physical devices are adjusted to improve performance and correct malfunctions detected in the system database.

CR 3.5 The DBMS is adapted to improve performance or correct operation anomalies detected.

CR 3.6 databases are adapted to improve performance or correct operation anomalies detected.
CR 3.7
information monitoring systems is used to analyze trends and anticipate behavior incidents and problems.

RP 4: Advise on the acquisition and updating of the logical and physical systems associated with the System Manager Database to provide improvements in system performance.

CR 4.1 The hardware and software are analyzed and assessed for need and feasibility reports on possible improvements and updates to the DBMS.

CR 4.2 New versions, updates, tools and alternatives are evaluated to determine the suitability of its implementation in the system.


CR 4.3 version upgrades are planned and executed in collaboration with the affected areas and minimizing its impact on the holding.

CR 4.4 Corrective maintenance of the DBMS and associated tools is performed by applying the patches supplied by the manufacturer.
CR 4.5
Physical storage systems are configured and defined according to the needs and requirements of each DBMS.



Professional background:





Production facilities:



Computer and peripheral equipment. operating systems and configuration parameters. Storage systems (RAID, SAN and NAS). Cluster and backup centers. Design Tools databases. DBMS management tools. Backup media. Office tools. management systems databases. Data Dictionary (or catalog, or system tables). Data manipulation languages. Control languages ​​and data definition. Management Tools log files (log). structured languages. Debugging tools. Change control tools. Job schedulers. Monitors performance.



Products and results:



Operating system and applications configured and parameterized. Backups of information. Consultations for handling database interactively. Applications that manipulate the database through embedded code. available logical connections to allow access to clients. Transaction recovery mechanisms. Commissioning and operational maintenance of network DBMS. Programs for performing administrative tasks. Activation controls for proper safety management of the DBMS. Traces system performance available for analysis.



Information used or generated:



Manuals administration and operation of the DBMS. Manuals installation of the operating system. Manual operation of the operating system. Organization charts. Knowledge of data communications networks. Safety Standards (security plan) and quality of the organization. Applicable regulations regarding data protection and confidentiality of information. Manuals administrative tools. Manuals online help. online support.



COMPETITION UNIT 3: Configure and manage DATABASE





Level: 3





Code: UC0225_3





professional accomplishments and performance criteria:



RP 1: Conduct and / or modify the physical design of databases from the previous logical design to suit the requirements of operating the database.

CR 1.1 The logical design is assessed and adapted, if appropriate, environmental characteristics (number of users, data volume, volatility, estimated data traffic, etc.) and quality standards of the organization.
CR 1.2
tables, views, indexes and other objects from a management database, created by DDL or administrative tools Manager Database System (DBMS).

CR 1.3 The allocation of space and the physical constraints of the database are determined in accordance with the defined logical characteristics and operating requirements.

CR 1.4 In the case of NoSQL databases distributed information remains available and the appropriate version on each node according to the requirements of the data.

CR 1.5 In the case of distributed NoSQL databases are established mechanisms to maintain synchronization between them.

CR 1.6 For NoSQL distributed data distribution scheme of the nodes and of the fragments and in the case of being partitioned, the fragments in the nodes, is done considering the logical organization of database, the location of applications, their access characteristics.

CR 1.7 The data dictionary is updated in those maintenance tasks database that require it, preserving its integrity.

RP 2: Implement access control policy in the database managers to ensure their safety following the rules of the organization and the applicable rules on data protection.

CR 2.1 Security profiles are defined and maintained in accordance with the security policy of the organization, by judgments DCL scripts and / or administrative tools.

CR 2.2 The activity log is configured to carry out monitoring of the activities of users and to detect deficiencies in access control systems.

CR 2.3
measures implementing the security policy document conforming to the standards of the organization.

RP 3. Planning and backup and data recovery if necessary, to maintain the integrity of the database, complying with safety standards of the organization.
CR 3.1
policy backup and disaster recovery are defined and applied in accordance with the safety standards of the organization and the requirements of each database.
CR 3.2
information existing DBMS in the backup center is kept updated so that it can be retrieved disaster.

CR 3.3 Storing copies is monitored, ensuring that the standards of the organization (fireproof cabinets, different physical location, etc.) are met.
CR 3.4
backups are recovered at the request of the data controller under the rules of the organization.

RP 4: Enable access to databases according to criteria of confidentiality, integrity and availability, compliance with applicable regulations.

CR 4.1 The initial data load is performed in the database so that the result corresponds to the original information to ensure consistency.

CR 4.2 connections required for access from clients are enabled according to available networks and protocols.
CR 4.3
recovery mechanisms are enabled transactions so as to ensure the integrity of the information to perform operations on data.
CR 4.4
mechanisms available in the DBMS to ensure the confidentiality and integrity of the information obtained and stored in the database (cryptography, 'checksum' signature algorithms, etc.) are enabled.

CR 4.5 The implementation strategy and query optimization are set minimizing response times and data transfers across the network.

CR 4.6 Restrictions on use of the database are specified and documented to ensure optimal performance.

CR 4.7 The data is imported and exported with the tools according to the procedures established for the transfer of information between different databases or systems available.

CR 4.8 In the case of distributed NoSQL databases are set replication mechanisms of information.



Professional background:





Production facilities:



Computer and peripheral equipment. operating systems and configuration parameters. Storage systems. Cluster and backup centers. Design Tools databases. DBMS management tools. Backup media. Office tools. management systems databases. Data Dictionary (or catalog, or system tables). Data manipulation languages. Control languages ​​and data definition. Management Tools log files. structured languages. Change control tools. Job schedulers. Monitors performance. Debugging tools. Query optimizers.



Products and results:



Databases available for use. Access profiles in line with planning. Activity records in the database. Backup line with planning. Copies of the database backup center. Connections clients to access the database. Setting mechanisms for transaction recovery. Efficient implementation strategy that minimizes query response times. Import procedures and data export. Traces system performance available for analysis. Consultations for handling database interactively. available logical connections to allow access to clients. Commissioning and operational maintenance of network DBMS, either alone or in running cluster. Programs for performing administrative tasks.



Information used or generated:



Manuals administration and operation of the DBMS. Manuals installation of the operating system. Manual operation of the operating system. Organization charts. Safety Standards (security plan) and quality of the organization. Applicable regulations regarding data protection and confidentiality of information. Manuals administrative tools. logical and physical design of the database. Logbook backups. Measures implementing the security policy. Data Dictionary.



Training Module 1: OPERATING SYSTEMS AND COMPUTER APPLICATIONS





Level 3






Code: MF0223_3





Associate UC: Configure and operate computer systems





Duration: 180

hours





Capabilities and evaluation criteria:



C1: Differentiate the main components of a computer indicating their functions and technical characteristics.

CE1.1 Explain the main components of a computer or general-purpose server based on their function and utility.

CE1.2 List and describe the elements of a computer motherboard recognizing its main functions.

CE1.3 Sort the main types of processors according to their technological family, historical evolution and relevant characteristics.

CE1.4 Classify and explain the components and peripherals input / output of a computer main noting the role that develop in the whole system.

CE1.5 List and classify the main command instruction set low a processor based on the function they perform.

CE1.6 In a duly characterized, configuration of microcomputer systems from a wiring diagram and technical documentation practical course:

- Identify the motherboard.

- Recognize the processor and memory banks.

- Locate the disks and optical drives.

- Locate the input / output and sort them by type.

C2: Analyze the main functions of a multiuser, multitasking operating system, recognizing and classifying the different types of existing operating systems.

CE2.1 Explain the core concepts, virtual core and shell of an operating system, indicating their characteristics.

CE2.2 Explain the different ways to route and store the files and file systems and operating system structure permits reading and editing, detailing the advantages of each mode.

CE2.3 analyze the role of memory in the process of computer tasks, from the characteristics associated with the concepts involved: central and expanded memory, virtual memory and paging and swapping.

CE2.4 List the different distribution policies implemented in processor time operating systems, identifying the impact of each on the types of processes.

CE2.5 Recognize and explain the functions of context switches, semaphores, scheduler and interrupt handlers running in multiuser and multitasking operating systems.

CE2.6 Explain the different mechanisms of input / output handling an operating system based resource management.
Sort
CE2.7 operating and architectures for the different ways that have been used historically systems.

CE2.8 In a practical course, properly characterized, setting a multiuser and multiprocessing computer system:

- Install different operating systems on the machine by identifying the major milestones of the process.

- Configure paging and swapping areas of memory and recognize their impact on the system.

- Provoking and interpret resource locks and their impact on system performance.

- Create and organize files and file systems.

C3: Distinguish and analyze the configuration variables of an operating system, specifying its effect on system behavior.

CE3.1 List and explain the different types of logic devices used for installing services and applications.

CE3.2 Recognize and explain the main kernel configuration parameters of an operating system and its impact on the system behavior.

CE3.3 analyze the main services running on an operating system and its influence and competence in managing resources.

CE3.4 Describe the different ways to monitor and adjust the components of an operating system and analyze trends from charging status.

CE3.5 Correlate alarms sent by the monitoring system previously implemented and define events for resolution.

CE3.6 In a practical course, properly characterized, identification and analysis of configuration variables and an operating system from the technical documentation of the installation and operating system configuration:

- Make the file structure and file systems with user permissions.

- Torn Detailing processes on the machine.

- Itemize the charge status occupation disk, and memory usage.

- Identify the networks defined in the system.


- Install and compile various hardware device drivers components.

- Start system monitors.

- Analyze data in real time and in aggregate mode.

C4: Recognize and describe encodings and nomenclatures of computer elements according to the criteria most widespread standardization.

CE4.1 Describe and apply the rules concerning the nomenclature and classification of files and containers required to facilitate the preservation and data management system.

CE4.2 Describe and use regulations standardized nomenclature of machines, services and applications required to facilitate administration tasks.

CE4.3 recognize and implement migration policies and archiving files that are to be used in the storage management system based on their need for further processing and efficiency of resource use.

CE4.4 In a practical course, properly characterized, management connected to different networks TCP / IP communications servers:

- Generate a map of IP addresses and network servers.

- Define a name server (DNS).

- Implement a name server (DNS).

CE4.5 In a course, practical adequately characterized and analysis systems architecture Photo:

- Analyze and explain the structure implemented.

- Identify dates of creation and last modification effect of a characteristic set of files.

- Identify authorized to open and modify a set of files users.

- Apply different data migration policies analyzing their influence on the availability of space and runtime processes.

C5: Distinguish the different types of storage used in the multiuser operating systems indicating their structure, characteristics and modes of operation.

CE5.1 List and classify the different storage systems according to their capacity, performance characteristics and compatibility with the most widespread operating systems.

CE5.2 Describe and classify physical protection mechanisms and information retrieval based on their mode of operation and performance.

CE5.3 Enumerate and analyze clusters of volumes, logical volumes and types of format are defined and implemented in each operating system and volume manager.

CE5.4 Choose and use the tools of logical volume management that are used for storage management based on its mode of operation and its compatibility with different operating systems.

Ce5.5 explain how it works and what value for the operating system provides parallel access to multiple physical volumes.

CE5.6 List the different storage systems and classify them by type of support, manual or automatic management and use in operating systems and applications.

CE5.7 In a practical course, properly characterized, systems management with external and internal storage and libraries:

- Documenting a physical / logical map that defines capacity: physical volumes with their capacity, address and mode of access, implemented protections parity and number of accesses to each volume.

- Define logical volumes and file systems with different size and structure.

- Install and configure a balancing system fault tolerant access.

- Define parallel access to file systems and analyze the impact on system performance monitoring tools using the operating system.

- Implement the Logical Volume Manager volumes mirroring software and analyze its usefulness for operating system recovery.

C6: Use the main types of office automation tools and associated services and Internet applications.

CE6.1 List and explain the main functions of word processors, spreadsheets and editing presentations.

CE6.2 Relate the main services associated with the Internet and rank them based on their function and specificity.
Apply CE6.3
office automation functions and Internet services to the development of properly structured and standardized to facilitate understanding and version control tools technical documentation.

CE6.4 Use file transfer services to exchange information with support services that manufacturers of information technology published on the Internet.

CE6.5 In a practical course, properly characterized, operating a microcomputer system with the possibility of Internet connection:


- Elaborate text documents, spreadsheets and presentations from a number of delivered models and require the use of different functionalities of the tools in increasing difficulty.

- Set up your computer for Internet access from the specifications of the Service Provider.

- Find and remove technical documentation and applications from different Internet service providers from a list of situations raised.

C7: Apply techniques and procedures related to security systems, communication networks and data.

CE7.1 Explain the fundamental concepts of security policies and data protection and recovery ratio and continuity of services and applications.

CE7.2 Explain the differences between copies of physical and logical security and its influence on operating systems, file systems and databases.

CE7.3 Identify key high availability architectures of systems and components and analyze their strengths and weaknesses depending on each case.

CE7.4 Explain the mode of operation of firewalls, antivirus and 'proxies' in communication network architectures.

CE7.5 Recognize the techniques and operational procedures used to ensure security in user access to services and applications with a focus on Internet-related architectures.

CE7.6 In a practical course, properly characterized, configuration of computer systems connected to communication networks:

- Implement backup files and databases.

- Recover applications that use databases from copies of physical and incremental backups and specifications of continuity of the same.

- Installing and configuring firewalls on servers that allow access only from clients and specified protocols.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 respect to CE2.8; C3 respect CE3.6; C4 respect CE4.4 CE4.5 and; C5 respect CE5.7; C6 respect to CE6.5; C7 respect CE7.6.
Other capabilities
:

Responsibility for the work carried out and the fulfillment of the objectives.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Used to the pace of work of the organization.

Adopt appropriate working environment postural attitudes.



Contents:





1. Computer Concepts and general-purpose servers



The structure and main components: processor (Set Manual, Records, Counter, arithmetic logic unit, Interruptions); RAM and xPROM; interfaces input / output; discs.

Processors: families and types of processors; historical evolution.

Types of peripherals.



2. Operating Systems



Features of an operating system.
Types
classification.

Main functions: memory management: Virtual memory and paging; sharing policies processing time; entrance exit; interrupt handlers and devices; resource lock; file systems; multiprocessing and multi-user; User organization.

Logical partitioning and virtual cores.



3. Configuration techniques and systems setting



Performance systems.

Consumption of resources and competence.

Predictive models and trend analysis.

Preproduction test plans.



4. Organization and information management



File Systems: nomenclature and coding; storage hierarchies; migration and data archiving.

Logical and physical volumes: partitioning; NAS and SAN systems; logical volume management; parallel access; RAID protection.

Safeguard Policies: physical and logical safeguards; High Availability concepts.

Cluster and load balancing.

Data integrity and recovery of service.

Keeping backup files.

Security Policies: restricted user accounts, access proprietary information; unique identifier access; antivirus protection; security audits; firewalls and proxy servers.



5. microcomputer and Internet Applications




Word processors, spreadsheets and presentations: knowledge management and user level; processing techniques technical documentation; document formats.

Structure of information.

Internet use: WWW knowledge; browsers; email systems, chat and forums; file transfer.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the configuration and operation of computer systems, which are accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: MANAGEMENT SYSTEMS MANAGERS OF DATABASES





Level: 3





Code: MF0224_3





Associated with UC: Configure and manage manager database system





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Describe the key information storage systems and determine the environments in which it is proper implementation.

CE1.1 Describe the fundamental logical storage systems information (flat files, indexed files, shortcut files, XML files, JSON files, management systems database, etc.).
Distinguish
CE1.2 other advanced storage mechanisms structured information: Directories (LDAP), XML.

CE1.3 distinguish the different types of existing DBMS: Hierarchical, Network, Relational, Object Oriented, Documentary.

CE1.4 Explain the main functions to be performed by a DBMS.

CE1.5 Describe the levels of organization in the standard architecture of a DBMS.

CE1.6 Describe the major functional components that are part of a DBMS, both in terms of processes and data structures.

CE1.7 Distinguishing characteristics that differentiate each of the types of commercial DBMSs that exist (centralized, client / server, parallel, distributed NoSQL).

CE1.8 Describe the types of user who may need access to DBMS (database administrator data, data users, application users, network administrators).

C2: Installing the system databases, identifying and implementing appropriate configuration DBMS performance requirements posed.

CE2.1 Describe the fundamental logic components and physical structure of the DBMS files distinguishing the different components and their physical location on the machine of the installation.

CE2.2 Describe the optional and / or auxiliary logic components and dependencies between them and affect their installation.

CE2.3 Describe the process to follow to install the DBMS, identifying the tools involved in the process.

CE2.4 List and describe the different support utilities that can be integrated into the DBMS environment.

CE2.5 Explain the configuration parameters involved in the implementation of a DBMS.
Explaining CE2.6
parameters particular configuration DBMS NoSQL distributed (data distribution, replication scheme, local structure of each node, each node local administration).

CE2.7 In a practical course, properly characterized, installation and configuration of a DBMS, given certain performance requirements to meet:

- Identify all parameters and operating system features that affect the operation of the DBMS and configure them appropriately (variables change, recompile, among others), consulting and interpreting the technical documentation provided by the manufacturer of the DBMS.


- Perform DBMS installation and configure them to optimize performance and storage requirements are met, adapting requirements to the characteristics of the DBMS.

- Integrate support tools, depending on the requirements.

- Create and initially configure the data dictionary, depending on the requirements.

- Configure remote access to the database, both from customers and from other processes running on the same server.

- Documenting the installation process followed and configuration parameters applied.

C3: Apply techniques of organizing and carrying out administrative tasks, operating with the DBMS tools.

CE3.1 List and describe common to perform administrative tasks in a DBMS: Backup and recovery, creating and maintaining databases, user management and access permissions, physical space management, cluster management, management partitioning, management of distributed databases, process management, manual and scheduled starts and stops, etc.).

CE3.2 List and describe the graphical tools available, according to the DBMS, to perform administrative tasks.

CE3.3 List and describe the available commands, according to the DBMS, to perform administrative tasks in text mode.

CE3.4 Describe the techniques of scheduling and queue management.

CE3.5 Identify the tools available in the DBMS for planning tasks.

CE3.6 Explain existing in the DBMS for job scheduling commands.

CE3.7 In a practical course, properly characterized, management of the database to cover the most common needs and preparing the safety plan and rules of the organization:

- Establish an implementation plan of the administrative tasks that meets the needs of the organization.

- Start and stop the DBMS according to usage needs of the organization and maintenance policies.

- Perform administrative tasks using graphical tools available or user commands, using the data dictionary, following the rules of the organization and trying to interfere as little as possible on the operation of the system.

- Check the results obtained in the execution of administrative tasks, before final implementation, by testing in a controlled environment.

- Modify the administrative tasks set to meet new requirements or to correct possible malfunctions, and documented.

- Documenting the administrative tasks set, the execution plan of the same and the results they produce.

C4: Build sentences scripts to automate administrative tasks.
Differentiate CE4.1
classes scripts that can develop in the system database.

CE4.2 List programming resources available in the system for coding, debugging and script execution of judgments (available scripting languages, compilers and / or interpreters, IDEs).

CE4.3 Describe the syntax of different aspects of a scripting language for coding scripts statements.

CE4.4 Describe the basic design techniques structured development.

CE4.5 Describe the types of tests, characterizing each.

CE4.6 Describe existing tools for testing code and functionality that provide: trace, debugging, execution plan, among others.

CE4.7 In a practical course, properly characterized, management database and from safety plan and rules of the organization:

- Designing the necessary modules and each module testing, using the most appropriate script language.

- Schedule sentences scripts needed to meet the administrative tasks that require them, according to plan and following the corresponding programming techniques.

- Check the results of the execution of scripts before final implementation, by testing in a controlled environment.

- Modify the scripts to meet new requirements or to correct possible malfunctions.

- Include the scripts developed in the execution plan of administrative tasks.

- Documenting coded scripts, indicating that automate administrative tasks and the results they produce.

C5: Apply monitoring techniques and optimization of system performance.


CE5.1 List and describe the various techniques for monitoring the system, indicating the advantages and disadvantages of each.

CE5.2 List and describe the tools available, according to the DBMS for system monitoring.

CE5.3 Describe the mechanisms available in the DBMS for automatic query optimization and identify their advantages and disadvantages (SQL optimizers available, configuration parameters to identify database query or update, index creation, Caches , among others).

CE5.4 List the usual parameters set as a goal of system optimization.

Ce5.5 Describe the main techniques for query optimization in RDBMS.

CE5.6 In a practical course, properly characterized, monitoring a DBMS, which is artificially introduced a number of outstanding issues detection and correction, and preparing the safety plan and rules of the organization: || |
- Establish performance criteria system databases according to the general criteria of the organization and established for each database.

- Prepare the system for monitoring, determining the tightest a technique used in each case.

- Evaluate the system status from the monitoring results and the degree of compliance with the performance criteria.

- Make adjustments to the DBMS, operating system and involved physical devices to improve performance and / or correct malfunctions detected during monitoring of the DBMS.

- Discover behavior trends from the information monitoring systems, establishing the administrative tasks necessary to anticipate incidents and problems.

- Documenting the performance criteria and other monitored parameters, the results achieved and the adjustments made system (if they were necessary).

Capabilities whose acquisition should be completed in a real working environment:

Respect CE2.7 C2; C3 respect CE3.7; C4 respect CE4.7; C5 respect CE5.6.
Other capabilities


Responsibility for the work carried out and the fulfillment of the objectives.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Used to the pace of work of the organization.

Adopt appropriate working environment postural attitudes.



Contents:





1. Storage of information management systems and databases



Storage files: planes, indexed shortcut.

DBMS Storage: Network / CODASYL, hierarchical, relational, documentary, object-oriented, NoSQL.

Other storage types: XML, Directory Services (LDAP).

Database management systems (DBMS).

Evolution of DBMS.

Functions of the DBMS.

Types of DBMS: DBMS and DBMS centralized client / server (multithreaded engines and 'multithreading' engines); model 2-layer and 3-layer model; parallel DBMS; Distributed DBMSs.

General architecture of a DBMS (Architecture ANSI / SPARC): Internal / physical schema; conceptual scheme; external schema / 'subschema'.



2. Functional structure of the DBMS



DBMS processes.

File Manager.

DML preprocessor and compiler.

DDL Compiler.

Manager database (Authorization Control, File Manager, Control of integrity, Query Optimizer, Transaction Manager, Recovery Manager, Manager 'buffers' shared memory manager, scheduler, Manager data dictionary, client processes).

Connection management and network access ( 'listeners', and others).

DBMS data structures.

Disk storage structures.

Areas of shared memory.
Buffers
exchange between memory and disk.

Internal control structures.

Transaction management structures.

Files logfile.

Indexing physical structures.



3. Installation of a particular DBMS



Physical implementation in a DBMS.

Data files, data dictionary, indexes and other auxiliary files, stores statistical data.

Organization DBMS software.

Features OS dependent


Shared memory.

Traffic lights.

Process management and CPU.
Management
I / S to disk.

Privileges.

Other parameters of the system environment.



4. Communications DBMS



Configuring remote access to the database.

Philosophy Client / Server (sockets, RPC, CORB, among others).

Interoperability Database Systems (RDA, ODBC, C / S, among others).



5. DBMS Administration



Administrator functions of the DBMS.

Types of users (roles) in a DBMS.

Common Administrative Tasks: creation of a database; start and stop; queue management processes.

Strategies: security policies; resource policies.

Administrative Tools DBMS.
Planning
administrative tasks: scheduling techniques; DBMS planning tools.



6. Construction of scripts



Types of scripts: simple scripts, stored procedures and functions, and triggers.

Tools Available for: coding scripts sentences, script debugging and test scripts for sentencing.

Structured design techniques.

Frame structure diagram.

State transition diagram.

Programming Language (PL / SQL, Transact-SQL, etc.): data types; control structures; functional structures: modules, procedures, functions.

Libraries or administrative commands available from the programming language.



7. Monitoring and Performance Tuning



Factors and parameters that influence performance.

Tools for monitoring: trace files logfile, alert definition, other DBMS tools.

Memory storage optimization.

Optimizing disk space.

Optimization of transfer procedures and communications.

Setting parameters for optimization DBMS query execution.
Preventive maintenance
.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to configuration and management of a management system database, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: MANAGEMENT OF DATABASES





Level: 3





Code: MF0225_3





Associated with UC: Configure and manage the database





Duration: 240

hours





Capabilities and evaluation criteria:



C1: Mastering the conceptual and technical fundamentals of relational databases.

CE1.1 Describe the concepts of the relational model, indicating their characteristics.

CE1.2 Describe the basic relational algebra operations, indicating their characteristics.

CE1.3 Identify modeling techniques usual data, indicating their characteristics.

CE1.4 correctly identify the elements of a Entity / Relationship model as well as those present in extensions of the model.

CE1.5 Describe the usual normal forms.

CE1.6 Describe the possible degrees of standardization for a database, specifying standardization procedures and the advantages and disadvantages involved.

CE1.7 Describe the main elements and objects of the physical schema of a relational database.

CE1.8 Describe the mechanisms present in the physical model to ensure the integrity of the database: referential integrity, assertions, triggers, unique keys, foreign, among others.


CE1.9 Describe the basic syntax of a data manipulation language (DML) and establish its relationship with the relational algebra.
In a practical
CE1.10 course, duly it characterized ID concepts of a relational model, from a logical design given:

- Identify the entities that may be considered weak.

- Identify the degree of standardization of design indicating which parts of it are in third normal form and which parts, as well as the specific degree of each party.

- Identify elements in fourth and fifth normal form or are likely to be modified to achieve these normal forms.

CE1.11 In a practical course, properly characterized, standardization of a logical design completely 'I denormalized' with a sufficient description of the elements present:

- Perform normalization to the first normal form.

- Perform standardization second normal form.

- Perform normalization to the third normal form.

- Perform standardization to fourth normal form.

- Perform fifth standardization to normal.

CE1.12 In a practical course, properly characterized, use the data manipulation language (DML) from a physical database with known information:

- Perform the extraction of information from a textual description of the information to be obtained and using the query language database and known concepts of relational algebra.

- Perform operations updating information from a textual description of the operation to perform.

- Documenting the operations carried out, indicating the results, and changes made in the database.

C2: Perform physical design of databases as specified in the logical design.

CE2.1 Explain the elements, objects and physical storage structures available in a particular DBMS (volumes, files, table spaces, data files, blocks, segments, etc.) to organize the same information resources storage operating system.

CE2.2 Explain the relationship of the elements mentioned in the previous point with the elements of the physical schema: tables, views, indexes.

CE2.3 Explain the practical consequences of different organizations establish physical storage structures.

CE2.4 Explain the different schemes replication of information, its characteristics and forms of implementation.

CE2.5 detail the different methods of fragmentation of information (vertical, horizontal or mixed) for distributed databases.

CE2.6 Describe the structure of the DBMS data dictionary containing the information from the database.

CE2.7 In a practical course, properly characterized, under physical design of databases based on the logical design of the same:

- Check that the logical design complies with the required degree of standardization according to the types of use established the quality standards of the organization and available resources, adapting if necessary result.

- Dimensioning system storage needs and physical restrictions as specified by the logical design (number and characteristics of the intended users, initial data volume, growth forecasts, volatility and expected data traffic).

Select and apply the replication system the most appropriate information according to the needs of the organization in cases where necessary.

- Choose and implement recovery and synchronization methods most appropriate transactions to the needs of the organization and logic design requirements.

- Establish control mechanisms best suited to the needs of the organization and the requirements of logical design competition.

- Create tables, views, indexes and other objects from the database using DDL and / or administrative tools DBMS.

C3: To maintain the security of access to databases ensuring confidentiality.

CE3.1 Explain the methods for defining access profiles, indicating the characteristics of each.

CE3.2 Explain the concepts available in the DBMS to implement security policies (roles, login, users, groups, permissions, privileges, etc.).

CE3.3 Describe the rules applicable data protection and DBMS mechanisms which ensure compliance with it.


CE3.4 Describe the principles of data protection, indicating the characteristics thereof.

CE3.5 Describe the rights of people, emphasizing what most influences the security of databases.

CE3.6 Identify tools to carry out the monitoring of user activity, and profits thereof.

CE3.7 List the possible mechanisms of confidentiality of information (cryptography, 'checksum' signature algorithms, etc.) available in the DBMS: for both the data in the database as for communications.

CE3.8 Describe the two major groups of cryptographic techniques: public key and private key (asymmetric or symmetric), indicating the respective characteristics.

CE3.9 List the problems that can be solved using cryptographic techniques: authentication, confidentiality, integrity, non-repudiation.

CE3.10 In a practical course, properly characterized, for determining the obligations regarding the applicable legislation, from a database schema defined and a specification of use:

- Recognize the type of content under the regulations applicable (public or private ownership, type of information).

- Determine if the information is adjusted for the purposes detailing if any mismatches found.

- Determine what obligations to comply are based on information available.

CE3.11 In a practical course, properly characterized, policy enforcement control access to a database from a database operation, a security plan and internal rules work of an organization:

- Establish profiles access to the required database according to characteristics of use given in the logical design with safety standards of the organization and complying with applicable regulations.

- Create and maintain security profiles defined by DCL statements and / or administrative tools.

- Create users database adapting them to established safety profiles.

- Configure logging activity to carry out monitoring of the activities of users, so that they can detect deficiencies in access control systems.

- Documenting the measures of implementing security policy at the user level.

C4: Ensuring the preservation and retrieval of information stored in databases according to the needs of each.

CE4.1 Describe the main potential failures in a database: a hardware failure, software failure: failure internal database, aborted, canceled, etc.) processes transactions.

CE4.2 Describe the main means provided by the DBMS for the recovery of logical errors indicating what its usefulness in the context of a logical flaw: safeguards and types available, transaction log files, spaces 'rollback' , among others.

CE4.3 Itemize the main forms of access to secondary storage media, explaining its characteristics.

CE4.4 Describe the different techniques of performing backups (incremental, cumulative and complete), indicating the advantages and disadvantages of each.

CE4.5 Identify applicable to planning backup systems on different types of content stored rules.

CE4.6 Explain the operation of the mechanisms connecting with remote servers safeguard for performing backups.

CE4.7 In a practical course, properly characterized, safeguard and recovery of data stored in a database on a running database, based on the plan of internal security and labor standards:

- Define the policy backup and disaster recovery according to the safety standards of the organization, to the requirements of each database and applicable regulations.

- Plan performing backups, calculating their costs, according to the standards of the organization (characteristics, timing, storage, time windows for batch execution, etc.).

- Calculate the necessary resources to implement the plan established on a given database.

- Have the proper procedures to implement the planning of copies using scripts and / or administrative tools.


- If there is a backup center of the DB, perform the operations necessary to keep the information contained updated: linked to the remote server, export and import data, among others.

- Lost in conditions of integrity backups.

C5: Apply technical export and import of data from the database ensuring their integrity.

CE5.1 Explain mechanisms possible import and export of data (direct export of physical resources, transportable table spaces, files, etc.) that make up the database to another similar DBMS (export and direct import by linking databases, export and import data through an intermediate structure).

CE5.2 Describe import and export tools available on the specific DBMS specifying the advantages and disadvantages of each, when their use is appropriate taking into account performance considerations of each, the possibility of automation, flexibility in formats recognized data and power in data transformation.

CE5.3 Describe verification tools integrity of the structure of a database available in the DBMS.

CE5.4 Describe the possible consequences in conducting import and export data without logging logfile taking into account the opposition between the considerations of performance and failure recovery.

Ce5.5 Describe the configuration mechanisms and other character sets regarding the internationalization of the system, to avoid problems in loading character fields, numeric with and without decimal point and date type.

CE5.6 In a practical course, properly characterized, import or export data on a DB set and a set of flat files and other databases to known structures:

- Determine the initial loading process data in the DB for each data set and establish the tools to use and mechanisms of initial creation of the indices.

- Perform the initial charge of ensuring data integrity.

- Import data to the DB, if applicable (from other databases or other source of information), using the most appropriate method depending on the needs and internal work rules.

- Export data from databases, where appropriate (to another destination databases or other information), using the most appropriate method and data transformations necessary to realize it according to the needs and internal work rules.

- Perform data transfer (import / export) according to the selected method and ensuring data integrity.

- Perform basic operations high, low and manual modification query on a database running.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.10, CE1.11 and CE1.12; C2 respect to CE2.7; C3 respect CE3.10 and CE3.11; C4 respect CE4.7; C5 respect CE5.6.
Other capabilities


Responsibility for the work carried out and the fulfillment of the objectives.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Used to the pace of work of the organization.

Adopt appropriate working environment postural attitudes.



Contents:





1. Introduction to relational databases and relational model



Fundamental theoretical concepts of relational databases.

Data Models.

Types of data models.

The relational model properties relationships and relationships; keys; relational algebra; relational calculus 'tuples'; domain relational calculus.

Theory of normalization: functional dependencies; normal forms; reasons to justify the denormalization.



2. Logical Data Models



Entity-relationship model: entity-relationship diagram; weak institutions; design of a database schema with the entity-relationship diagram.

Model object-oriented: Object-oriented concepts (classes, objects, attributes, methods, inheritance, polymorphism, etc.); class diagrams and objects.


Distributed model: introduction, advantages and disadvantages; fragmentation techniques: vertical, horizontal, mixed; data distribution techniques; allocation schemes and data replication.



3. Languages ​​definition, manipulation and control



Basic structure, history and standards.

The data definition language (DDL) statements to create items (tables, views, triggers, constraints, etc.); sentences modification of elements; Case removing items; maintaining referential integrity: assertions, triggers and foreign keys.

The data manipulation language (DML): data query, data entry, data modification, deletion of data; unions; treatment of nulls; nested subqueries; transactions.

Optional: Specific features of DBMS with which the training is given, particularly those cited by its current importance: extensions for storing objects in relational databases; extensions for storage and retrieval of XML in relational databases.

Handling data dictionary; structure; permissions.



4. Strategies for controlling transactions and concurrency



Integrity concept.

Transaction concept.

Properties of transactions: atomicity, consistency, isolation and permanence.

Problems arising from concurrent execution of transactions.

Concurrency control: optimistic and pessimistic techniques.

Disaster Recovery.

Mechanisms to undo transactions.



5. Backup and data recovery


Classes
media.

RAID.

Caches.

Process Planning safeguard.
Types
copies: full copies, incremental backups, cumulative copies.



6. Data security



Concepts of data security: confidentiality, integrity and availability.

Regulations applicable data protection .; the personal data and the right to privacy; laws first, second and third generation; The Data Protection Agency; General Data Protection Registry.

Types of security threats: accidental: human error, faulty software / hardware; meaning: direct and indirect attacks.

Security policies associated with BBDD: user profiles; user privileges; user views; data encryption.

The Control Language DCL data.

Monitoring user activity.

Basic Introduction to cryptography: techniques private or symmetric key; techniques or asymmetric public key; cryptography applied to: authentication, confidentiality, integrity and non-repudiation; cryptographic mechanisms available in the DBMS for use in databases.



7. Data transfer



Tools for importing and exporting data.

Migration of data between different DBMS.

Interconnection with other databases.

Configuring remote access to the database.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to configuration and management of the database, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX III


Professional qualifications: Departmental Management and Design Networks



Professional Family: Computers and Communications





Level: 3





Code: IFC081_3





General competence




Architecting an environment communications medium complexity or low, monitor its implementation following the project and manage the resulting system, providing the necessary technical assistance.



Competence units



UC0228_3: Designing computer network infrastructure

UC0229_3: Coordinate the implementation of computer network infrastructure

UC0230_3: Managing telematic network infrastructure



Professional environment





Professional field



Develops his professional activity in the communications department dedicated to the administration and maintenance of corporate networks in enterprises of medium or large and in the area of ​​design and installation of networks in small- or medium sized entities of nature public or private, both on its own and others, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located in the telecommunications sector, sub-sector in the design and development of systems and communications facilities, installation and maintenance of telecommunications networks and in any productive sector that uses a corporate network and business process support.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Administrators

telematics systems Administrators

networking and communications
Local technicians and telematic networks
Supervisors

network installation
Technical design of computer networks



Associate Training

(600 hours)





Training modules



MF0228_3: Design of computer networks (210 hours)

MF0229_3: Managing network implementation (150 hours)

MF0230_3: Administration of computer networks (240 hours)



COMPETITION UNIT 1: DESIGNING TELEMATICS INFRASTRUCTURE NETWORK





Level: 3





Code: UC0228_3





professional accomplishments and performance criteria:



RP 1: Determine the topological configuration of network interconnection equipment that adequately meets the needs of the project.

CR 1.1 The system specifications are developed collecting and functional performance requirements, technical and cost.

CR 1.2 The topology of the system is determined by the choice of a standard reference model that satisfies the requirements of the applications that are to be used, such as response time, quality of service, addressing scheme, volume data transfer, distance or access to other networks.

CR 1.3 Communication elements are valued taking into account the existing infrastructure and the state of technology in this evolution and its possible short and medium term.

CR 1.4 The topology and network elements are chosen in accordance with the requirements of accessibility, confidentiality and integrity required by the user and current regulations.

RP 2: Analyze the possibilities of connectivity communications equipment market to integrate them into an infrastructure project of telematic networks.

CR 2.1 features and specifications of communications equipment are identified to determine their suitability for network design.

CR 2.2 The different physical transmission media are distinguished by their technical characteristics and their suitability for use for different types of networks, interpreting technical documentation.

CR 2.3 Environmental requirements of communications equipment (occupied area, power consumption, heat dissipation, etc.) are contrasted with the possibilities of installation.

CR 2.4 The conditions of employment and service means access to basic public networks offered by telecommunications operators are included in the network design specifications, reviewing the content.


CR 2.5 The performance and features of communications hardware and software products similar products such as: routers, hubs, switches, VPN servers virtual-private-networks, or firewalls, are compared towards their inclusion in the network design, interpreting the technical documentation.

CR 2.6 The implementation of communications software products are evaluated on different platforms and operating systems, taking into account all possible cases.

RP 3: Determine the physical configuration of network interconnection equipment by selecting equipment, devices and software to fit the needs of the project.

CR 3.1 The location of the equipment and network devices is determined taking into account the conditions of ergonomics, safety and use of space.

CR 3.2 software components of the network infrastructure are chosen according to the system requirements and performance required by applications and previously specified.

3.3 CR wiring system and the type of support used for the local network are determined based on the distances between nodes of the system, the speed required for data transmission and environmental conditions.
CR 3.4
equipment and network devices are selected according to the following criteria:

- The condition of approval thereof, both internally and externally, for internal approval proposing those items whose use is essential.

- Compliance with the prescribed technical and economic conditions.

- The supply security and availability in the agreed deadlines.

CR 3.5 The sketches and block diagrams of the system are made reflecting the structure of the system and the various elements that compose it, identifying the user jobs in the plane and its connections in the rack plant, interconnections with other racks the building, and the identification and location of communication devices each rack.

RP 4: Prepare or supervise the preparation of technical documentation that allows the execution of the installation of data network and subsequent maintenance.

CR 4.1 The specification of the installation is made detailing the nature and scope of it.

CR 4.2 The technical documentation is made including schematics and assembly drawings and detail necessary, using the symbology and standardized presentation.

CR 4.3 The relationship of materials, equipment and devices is performed using standard encoding and ensuring its internal acquisition and / or external.

CR 4.4 installation construction plans are made collecting the characteristics of the equipment for its implementation, such as physical dimensions, location of devices and cards, encoded identification E / S and wiring, among others.

CR 4.5 The network software and communication programs are documented system so as to allow the implementation and subsequent maintenance of the functions thereof.

CR 4.6 The technical documentation is made so that meets the standards of the organization, contains chapters required for installation and maintenance of the system, and include:

- The process to be followed in the commissioning.

- Tests and adjustments to be made in the process of commissioning the system.

- Parameters to be checked and adjusted.

- Stable operating margins.

- Guidelines for the implementation of preventive maintenance.



Professional background:





Production facilities:



Instruments for performing installations schemes (CAD / CAM / CAE, among others). manufacturer's technical documentation. Project planning tools. Configurators communications services operators.



Products and results:



Network design: flat and block diagrams. Memory components. Maintenance Guidelines network infrastructure. Guidelines for verification and testing of components and equipment.



Information used or generated:




Security policy communications infrastructure. Installation manuals, reference and use of communications equipment. Information and extensive local networks and systems of public and private media area. Information communications equipment and software. applicable regulations and standards of communications networks. technical project documentation and communications facilities. Manuals times and prices of communications facilities.



COMPETITION UNIT 2: COORDINATE THE IMPLEMENTATION OF NETWORK INFRASTRUCTURE TELEMÁTICA





Level: 3





Code: UC0229_3





professional accomplishments and performance criteria:



RP 1: Check the implementation and maintenance of data networks planning and checking that the conditions in the overall implementation plan are met, developing a monitoring and control procedure.

CR 1.1 protocols testing and testing systems are developed so that ensure the standard identification of drivers and setting type, insulation and conductor section and the type and characteristics of the pipes to the specifications of the project.

CR 1.2 The implementation of the data network is performed according to the project specifications and applicable electrical engineering rules.

CR 1.3 protocols testing and testing systems are developed so that ensure that the electrical protection devices and signaling and control are approved, the resistance of the grounding is within the margins established, the brownouts are admissible and tripping of protections against potential failures is prescribed by applicable electrical engineering rules.
CR 1.4
Different controls applied during the execution of the installation are adjusted in a timely manner to the overall implementation plan.

CR 1.5 The procedure to be followed in the process of monitoring and controlling the execution of the work is made explicit all steps.
CR 1.6
collect data on the state of assembly or maintenance of the system are determined so as to assess the progress of work and its relevance to the established planning.
CR 1.7
incidents and deviations arising during the process communicate quickly enough and the causes thereof are explained.
CR 1.8
improvements and / or changes in the implementation of the system are proposed to solve contingencies or increase performance, attaching a technical and economic assessment of them to facilitate decision-making.

CR 1.9 Responses to incidents that may occur on the staff or materials included in a contingency plan.
CR 1.10
working parts are collected daily, ensuring that collect in form and content data needed to track planning.
CR 1.11
modifications to be made on planning the implementation or maintenance of the system is permanently reflected in production graphics produced on this issue.

RP 2: Monitoring the wiring installation and certification of the same in accordance with the installation project that meets the quality criteria.

CR 2.1 The materials and tools used in the installation comply with the project specifications, meeting the quality criteria.

CR 2.2 Conducting wirings, wirings and pipes is monitored by checking that fit the schemes and plans and solving contingencies arising.
CR 2.3
wiring and connections are made in accordance with the schemes and plans, resolving contingencies arising.

CR 2.4 cables and connectors are properly labeled in origin and type according to project specifications.

CR 2.5 Respecting personal security conditions and the means and materials used is monitored so that ensure compliance at all times, taking appropriate measures in case of incidents.
CR 2.6
program modifications to be carried out is drawn up when necessary, reporting and taking appropriate action according to the standard or most appropriate procedure, optimizing resources and minimizing cutting time and / or delay.

CR 2.7 The changes made during installation are recorded in the drawings and diagrams keeping updated installation documentation.

CR 2.8
preventive maintenance operations are monitored, checking that are performed in accordance with established procedures.

CR 2.9 Changes and / or improvements of the system are proposed to repetitive failures thereof to provide a safer and more reliable operation.

2.10 CR periodic reports and daily reports are monitored, verifying that accurately reflected the work done, incidents encountered and the solutions adopted, and allow updating and tracking information on the implementation of the system.

CR 2.11 Training and information for staff in charge of the quality required in the execution of the work is done continuously, giving instructions and / or undertaking the necessary actions to this end.

RP 3: Monitoring the installation of equipment and network devices that meets the quality criteria, ensuring that the applicable regulations and / or the manufacturer's recommendations is met and that the project complies with installation .

CR 3.1 The location of the equipment is checked by checking that corresponds to the installation drawings and respects the criteria of ergonomics, safety and use of space.

CR 3.2 The connection of the equipment to the power supply is monitored by checking the safety criteria and applicable regulations are followed.

CR 3.3 Installation of network equipment is monitored by checking that as far as possible be placed in racks in compliance with manufacturers' specifications and maintain adequate ventilation.

CR 3.4 Securing and connecting the cables monitored equipment verifying functional criteria that maintain a proper labeling and allow subsequent handling are followed.

CR 3.5 Manipulating production equipment is made in times and how to minimize the impact on the service.

CR 3.6 Training and information for staff in charge of the quality required in the execution of the work is done continuously, giving instructions and / or undertaking the necessary actions to this end.

CR 3.7 The selection of wireless communication channels and transmission power are performed according to the environmental characteristics and performance requirements of the project.

RP 4: Perform and / or oversee necessary to verify the basic operation of equipment and devices so that they comply with the requirements set forth in the documentation of the implementation to ensure evidence.

CR 4.1 The tests are performed as recommended by the manufacturer and the test plan of the organization.

4.2 CR reports anomalies or malfunction of part or all of the network equipment are developed detailing the characteristics and refer to the manufacturer.

CR 4.3 Repair or replacement of components or equipment breakdowns or malfunctions is monitored so that the proper functioning of the same is ensured.

CR 4.4 The characteristics of the materials used are verified so that matching them to ensure project specifications.
CR 4.5
tests and functional connection (at rest and activity) are performed following the protocol established, making the necessary adjustments to achieve the prescribed specifications.

CR 4.6 Test reports are prepared, evaluating records test results and testing of equipment and materials, and responsible for the system are transmitted according to the established procedure.

RP 5: Develop the technical documentation project closure and train the management team to take over the management of the installed infrastructure.

CR 5.1 The verification report and commissioning of the communication system is developed to include accurately the overall results of the tests performed and the acceptance by the customer.

CR 5.2 The documentation is prepared to allow the management team to configure and operate the systems for the expected and appropriate to the requirements result.
CR 5.3
closure documentation is made including diagrams and installation, reports of anomalies of components and equipment, detailed analysis of each of the components and manual operation of equipment, including maintenance plan.

CR 5.4 The training plan is developed with the aim of facilitating the management of network elements.

CR 5.5 Training activities are held on the installation itself and emphasizing the practical component.



Professional background:






Production facilities:



Project management programs. Office tools. graphical reporting. Certifiers wiring. Network analyzers. hand tools for installation of communications infrastructure. Communications infrastructure equipment. Support means communications software. Copper cabling and fiber optics. Work parts. Racks of communications. Tools monitoring levels of coverage in wireless networks.



Products and results:



Data Networks installed. Planning documents and monitoring the implementation of communications facilities. I installed cabling and labeling. Closing technical documentation. Training Plan. Equipment installed communications infrastructure. Communications software installed. Individual tests carried out.



Information used or generated:



Installation manuals, reference and use of communications equipment. Information and extensive local networks and systems of public and private media area. Rules, regulations and standards. Information and extensive local networks and systems of public and private media area. Information communications equipment and software. technical project documentation and communications facilities. Manuals times and prices of communications facilities. Rates and conditions communications services operators. Implementation plan. Monitoring reports and proposals / modifications of facilities. Parts of completed work.



COMPETITION UNIT 3: MANAGE TELEMATICS INFRASTRUCTURE NETWORK





Level: 3





Code: UC0230_3





professional accomplishments and performance criteria:



RP 1: Configure computers and devices on the network infrastructure from design data set for operation start.

CR 1.1 infrastructure equipment data network are configured by setting parameters and definitions individually with the values ​​set in the design and in the order and manner determined by the manufacturer.

CR 1.2 Means of identification of network access (users, profiles or other) are adjusted to ensure the safety and traceability of configuration parameters and definitions.
CR 1.3
parameters which depend the stability and availability of components and / or network computers are configured with particular attention to the resources available and always according to the design established.

CR 1.4 User names and passwords of network equipment are chosen according to the criteria established in the security policy, are stored using applications and / or procedures to ensure confidentiality.

CR 1.5 Access to computers on the network infrastructure data is done through applications to ensure security against unauthorized access system.

CR 1.6 access control mechanisms network equipment are configured that can only be modified from authorized points.

CR 1.7 configuration documentation is made including all implanted values ​​and implicit topological definitions graphic outline mode.

RP 2: Verify and test the elements of the network infrastructure data to verify the integrated same operation, using tools, techniques, verification, testing and ensuring the proper operation thereof.
CR 2.1
tests continuity from end to end, load and client applications of network infrastructure network are carried out, verifying that fit as planned in the design stage.
CR 2.2
tests coverage and signal quality are made at different points in the coverage area, taking into account the location of access points and architectural features of the building.

2.3 CR functional checks are performed, as planned in the design stage, so that the network performance is guaranteed in extreme cases.

CR 2.4 The network software is verified together with the equipment and using the techniques and tools that are better suited to the situation in check.

CR 2.5 The final verification and testing documentation is prepared including the activities and results.


RP 3: Define and implement monitoring procedures of the elements of the network infrastructure data, so to evaluate system performance, estimate their performance and determine the elements that should be extended or replaced before demean system performance.
CR 3.1
processes and components to be monitored are selected with criteria of availability and charging status.
CR 3.2
thresholds processes and components to be monitored are selected according to the level of service required and the manufacturers specifications.

CR provided 3.3 Alarms are selected so that they are interrelated to facilitate analysis operators.
CR 3.4
monitors different network elements that configure a particular service are grouped logically to facilitate understanding by network operators.
3.5
CR system is configured to automatically generate events based on alarms or alarm groups.

CR 3.6 Alarms and events are recorded so they can be analyzed after allowing anticipate which items should be extended or replaced in order for the system to maintain its performance.

RP 4: Monitor and / or maintenance of the data network by adapting preventive plans established to the particularities of the installation, using the standard and with the frequency established in the design stage procedure to ensure the functioning of the network.

CR 4.1 Physical transmission systems are maintained to minimize the levels of signal loss.

CR 4.2 Maintenance actions are planned and implemented by adjusting the procedures and schedules so as to minimize the impact on production.
CR 4.3
after each maintenance action occur tests to ensure proper operation of the data network infrastructure.

CR 4.4 The share register maintenance is performed following criteria to facilitate consultation and traceability of incidents.

RP 5: Address the issues, diagnosing the causes of dysfunctionality of the system and adopting, at their level, appropriate measures for the rapid and reliable restoration of operation thereof.

CR 5.1 The incidence is verified, reproducing the behavior indicated in the part of failure and specifying the effect of it.

CR 5.2 Diagnosis and fault location system is performed using the technical documentation of the network and equipment, the necessary tools, specialized diagnostic software and applying the appropriate procedure briefly.

CR 5.3 devices and / or replaced equipment are adjusted according to established design, with the required precision, following documented procedures.

CR 5.4 Functional tests, final adjustments, reconfiguration of the parameters, load software and, if necessary, reliability tests recommended are performed systematically, following the procedure specified in the system documentation.

CR 5.5 The report troubleshooting or incidents is done in the standard format, allowing collect information for updating the repository incidents.



Professional background:





Production facilities:



Configuration software tools. Network addressing plan. Software troubleshooting. corporate office applications. graphical reporting. Network analyzers. Communications infrastructure equipment. Support means communications software. Copper cabling and fiber optics. Monitoring tools. Incident management applications / help-desk. Applications for storage and / or secure data transmission. Random password generator. Programs for remote configuration of communications equipment. Monitoring tools wireless coverage.



Products and results:



Infrastructure configured according to customer specifications communications. Data networks installed. Planning documents and monitoring the implementation of communications facilities. Equipment installed communications infrastructure. Communications software installed. Integrated tests executed. Networks monitored with alarm and event management.



Information used or generated:




Implementation Plan communications system. Installation manuals communications equipment. internal rules of work on customer service. Quality guide. Maintenance plan. Installation manuals, reference and use of communications equipment. Information and extensive local networks and systems of public and private media area. Information communications equipment and software. technical project documentation and communications facilities. Telecommunication regulations applicable. Monitoring reports. Performance reports and proposals for improvement. Monitoring reports and proposals / modifications of facilities.



TRAINING MODULE 1: DESIGNING Telematic networks





Level: 3





Code: MF0228_3





Associated with UC: Designing computer network infrastructure





Duration: 210

hours





Capabilities and evaluation criteria:



C1: To analyze the characteristics and requirements of a telematic network project from the customer's needs.

CE1.1 Identify sources of information.

CE1.2 Apply interview techniques and information gathering.

CE1.3 Explain the problem of the feasibility study of a project.

CE1.4 Develop a document user requirements.

CE1.5 Synthesize information collected.

CE1.6 In a practical course, properly characterized, information collection:

- Simulate an interview with the client.

- Conduct a requirements document.

- Conduct a study of technical and economic feasibility.

C2: Differentiate the characteristics of the existing transmission media market.

CE2.1 Explain reasonably the relationship between bandwidth and transmission speed.

CE2.2 Identify the characteristics of a product from its specifications.

CE2.3 Describe the problem of installation of a given transmission medium.

CE2.4 Sort transmission means according to the technical characteristics of its use in network installations.

CE2.5 detail the influence of each transmission medium on overall network performance.

CE2.6 properly interpret the symbology and encoding used commercially for different transmission media.

CE2.7 In a practical course, properly characterized, design of computer networks:

- Analyze the market communications products required for the design, consulting online documentation, journals, catalogs of manufacturers, among others.

- Perform several proposals based on criteria of economy and performance.

C3: Explain existing levels in the TCP / IP protocols.

CE3.1 interpret the OSI reference model.

CE3.2 Describe the functions and services of each level of the OSI reference model.

CE3.3 Explain the TCP / IP architecture.

CE3.4 Establish correspondences between the architecture of TCP / IP and the OSI reference model.

CE3.5 Associating functions and services at each level of the TCP / IP architecture.

CE3.6 Describe the IP addressing system.

CE3.7 Apply IP addressing system in subnetting.

CE3.8 Describe the different routing protocols in IP networks: BGP, OSPF, RIP.

CE3.9 Describe application-level protocols TCP / IP, FTP, HTTP, SMTP, Telnet, SNMP, among other architecture.

C4: Explain the technical characteristics and mode of operation of different network interconnection equipment.
Sort
CE4.1 operation of network equipment compared to the OSI reference model.

CE4.2 Describe the functions of the various interconnection devices.
Detail
CE4.3 techniques interconnection equipment characteristics to determine their influence on network performance.

CE4.4 software analyze the different alternatives with respect to communications hardware equivalent products.

CE4.5 Describe interconnect architecture using VPN (Virtual Private Network, virtual private networks).

CE4.6 interpret the information in catalogs communications products.

C5: Select a particular computer interconnect for network infrastructure.

CE5.1 Justify the choice of interconnection equipment according to criteria of performance and economy.

CE5.2 Describe the problem of interconnection of local area networks.

CE5.3 Describe the problem of network interconnection local-area network wide area.


CE5.4 Justify the choice between hardware and other software solution according to criteria of performance, economy, and ease of management complexity.

Ce5.5 Explain the influence of collision domains and IP domains in network performance.

C6: Design the network topology, including transmission media and equipment best suited to the specifications received communications.

CE6.1 In a practical course design data communications from a given specification networks:

- Design topology that meets the specifications on performance, cost and quality of service expected.

- Choose the transmission means for the design of the network according to quality criteria and expected cost.

- Locate on interconnection design teams so that the quality criteria are met.

CE6.2 In a practical course of interconnection and logical configuration of equipment, from a given design:

- Set the addressing mode and configuration, including the subnets that are necessary and taking into account safety.

- Select the interconnection system with wide area network according to the topology of choice and meeting the criteria agreed cost and effectiveness.

- Establish backup lines if necessary.

- Using simulation programs that verify the operation of the design obtained.

C7: Develop necessary for the implementation of the project documentation.

CE7.1 Identify the quality standard in force paragraphs that apply to network design process.

CE7.2 In a practical course description or analysis of a process related to the design activity or identify states:

- Data input to the process.

- Function associated with the process.

- Data or documentation generated in the process.

- Records and evidence generated.

- Relationship with other processes.

- Metrics that can be applied and possible improvements.

CE7.3 In a practical course, properly characterized, technical documentation of an existing project:

- Identify the location of the equipment.

- Identify the means of transmission used.

- Identify network addresses used.

- Interpret encoding interconnection equipment used.

CE7.4 Describe and differentiate the sections that make up a project, under the applicable rules.

CE7.5 To prepare, from the specifications developed a network map that contains:

- The location of the equipment.

- The transmission medium.

- Network addresses used.

- Coding of interconnection equipment.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 respect to CE2.7; C6 and CE6.2 CE6.1 respect; C7 and CE7.3 CE7.2 respect.
Other capabilities
:

Finish work according to criteria of suitability, speed, economy and efficiency.

Treat the customer with courtesy, respect and discretion.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Demonstrate flexibility to understand the changes.



Contents:





1. Introduction to communications and computer networks



Data communication.

Communication across networks.

WAN networks. LAN networks. Protocols and protocol architecture.

The OSI model.

Architecture TCP / IP protocols.

Regulations and standards bodies. IETF. ISO. ITU ICT.



2. Data communication



Principles of Data Transmission.

Coding. Multiplexing. Commutation.

Analog and digital data.

Analog and digital transmission.

Disturbances.

Transmission media.

Guided media.

Wireless media.

Data link control.



3. Classification Communications networks



Switched networks.

Circuit Switched.

Packet Switched.

ATM and Frame Relay.

Network Broadcasting.

Network bus.

Ring networks.

Network star.

Local Area Networks.

LAN architecture.

LAN-LAN interconnection.

LAN-WAN interconnection.



4. Design of communication networks



Transmission medium.


Equipment connection.

Network Cards.



5. Protocols



Networking protocols.

IP Protocol.

Transport Protocol.

Protocols TCP / UDP.

Network Security.

Application level.

Protocols: HTTP, SMTP, SNMP, FTP, and others.



6. Documentation Project



Information gathering techniques.

Feasibility study.

Quality.

Regulations and certifications.

The Quality System of a company.

Processes and procedures.

Quality Plans.

Records and evidence.

Metric.

Audits.

Improvement and problem prevention.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the design of computer network infrastructure, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: MANAGEMENT NETWORK DEPLOYMENT





Level: 3





Code: MF0229_3





Associate UC: Coordinate the implementation of computer network infrastructure





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Analyze technical documentation projects for the implementation and maintenance of networks, identifying the information needed to plan the processes that are required.

CE1.1 Describe the technical documentation included in the draft assembly and maintenance of networks, interpreting the information it contains.

CE1.2 indicate different types of drawings or diagrams that make up the graphic documentation of a project.

CE1.3 Identify and interpret the rules and regulations it is to be used in planning network projects.

CE1.4 Explain the parts, equipment and elements that make networks (network cabling, wireless networks, telematic communication equipment, telephony PBXs, terminals, and others).

CE1.5 In a case study, analysis of technical documentation from the definition of a project implementation and maintenance of a network, well characterized:

- Identify the location of communications equipment for voice and data.

- Determine the necessary means and tools to implement the processes.

- Identify the power distribution system, the protection elements, envelopes, boxes, cabinets and cabling elements and forced ventilation systems and special food.

- Determine the type of pipelines and distribution in plants, horizontal and vertical distribution and the characteristics of the wiring and connection of the elements.

- Determine identification systems and signaling conductors, connectors, power user and equipment at the facility.

C2: Apply techniques of planning, programming and monitoring in the process of implementation and maintenance of networks.

CE2.1 Explain different techniques and tools for project planning and scheduling (GANTT, PERT and CPM), the rules that must be met to apply and indicate the usefulness of each.

CE2.2 analyze the various components that make up the cost of implementation processes and maintenance of networks.

CE2.3 In a practical course, properly characterized, planning an implementation process or network maintenance, and from technical documentation establishing the necessary information:

- Establish the stages of implementation and / or maintenance, decomposing in turn each of the phases in the various operations that compose it.


- Determine the equipment and facilities needed to run the process.

- Calculate the time of each operation, identifying and describing the critical points in the process.

- It Represents the sequence of tasks using Gantt charts and network diagrams.

- Determine human and material resources so that it meets the specifications received.

- To estimate costs, depending on the decisions made.

CE2.4 Explain how a graph is set workloads, analyzing the allocation of resources and time.

CE2.5 List and describe the most relevant job scheduling techniques.

CE2.6 In a practical course of implementation and / or maintenance of a network, duly characterized by technical documentation that includes at least the drawings and diagrams of it, the start and end dates, the processes used, human resources and means of production available, as well as the work schedule, the timing of the maintenance and supply of products and equipment:

- Determine milestones for each of the major phases of work.

- Establishing workload in different jobs, balancing the loads.

- Identify, by name or standard code, materials, products, components, tools and equipment required to undertake the various operations involving the implementation and / or maintenance.

- Generate information defining: procurements, media, tools and tools and 'stocks' intermediate necessary.

C3: Develop / modify intervention protocols for commissioning and maintenance of networks.

CE3.1 In many practical cases, properly characterized, making commissioning protocols and network maintenance, ensure that:

- Problems detected in the implementation of the procedure to develop / modify are justified and explained sufficiently in the standard document.

- The definition of the solution of the new procedure is preceded by trials and tests necessary to ensure the best solution in accordance with the procedure you need to be improved.

- The result procedure takes into account the optimization of material and human resources necessary for its implementation.

- Proposals for changes to be made are clearly justified, specified and included in the relevant document, successfully solving the shortcomings of the procedure.

- The new procedure collect, in the standard format, the most important aspects for application, as are the stages to follow in implementing the procedure, both graphical and textual description necessary for the implementation, testing and adjustments perform, the means to be used, the control parameters, the safety of people, equipment and materials to be applied, the expected results and / or expected people who must intervene and standard document to be completed.

C4: Perform, accurately and safely, measures in the various elements of the networks, using appropriate tools and auxiliary elements and applying the most appropriate procedure in each case.

CE4.1 Explain the most important characteristics, types and methods of using measuring instruments used in the field of networks, depending on the nature of the variables to be measured and the type of technology used.

CE4.2 Apply the most appropriate parameters for measuring procedures (crosstalk, attenuation, return loss, and others.) Required for certification of structured copper and fiber optics in different categories and classes standardized wiring.

CE4.3 Apply the most suitable for measurement of electrical quantities required in the implementation and maintenance of networks (voltages and electric currents, impedance, earth resistance, and others) procedures.

CE4.4 In several practical cases of measures in simulated networks, which involved different elements of different type and depending on the nature of the signals to be measured:

- Select the measuring instrument and the most appropriate depending on the type and nature of the variables to be measured and the precision required ancillaries.

- It must be connected properly measuring the different devices depending on the characteristics of the magnitudes to be measured.

- Measure the signals and eigenstates of equipment and devices used, instruments and operating properly implemented, with the required safety standard procedures.


- Interpret measurements, linking the states and values ​​of the measured quantities with the corresponding reference, pointing out the differences and justifying the results obtained.

- Prepare a report-memory of the activities and results, structuring it in sections necessary for proper documentation of them (description of the process followed, means used, diagrams and plans, functional explanation, measurements, etc.) .

C5: Diagnose faults in networks, identifying the nature of the damage (physical and / or logical), applying the most appropriate procedures and techniques in each case.

CE5.1 Classify and explain the type and characteristics of the physical nature breakdowns that occur in networks.

CE5.2 Classify and explain the type and characteristics of the faults of a logical nature that occur in networks.

CE5.3 Describe the general technical and specific technical means for troubleshooting the physical nature of networks.

CE5.4 Describe the general technical and specific technical means necessary for troubleshooting networks logical nature.

Ce5.5 Describe the general process used for diagnosis and troubleshooting of physical and / or logical nature on networks.

CE5.6 In many practical cases, properly characterized, diagnostic and troubleshooting a network where different problems are simulated:

- Interpret system documentation, identifying the various functional blocks and specific components that comprise it.

- Identify the symptoms of damage characterizing the effects it produces and perform at least one hypothesis of the possible causes that can produce damage, relating it to the (physical and / or logical) symptoms presented by the system.

- Make a plan of intervention in the system to determine the cause or causes that produce the damage.

- Locate the (physical or logical) element responsible for the failure and perform the replacement (using similar components or equivalent) or modification of the element configuration and / or program, applying the procedures required and in a set time the type of fault.

- Perform the checks, modifications and adjustments to the system parameters according to the specifications of the technical documentation thereof, using appropriate tools that allow putting them in each case.

- Prepare a report-memory of the activities and results, structuring it in sections necessary for proper documentation of them (description of the process followed, means used, measurements, functional explanation and diagrams).

C6: Apply techniques and procedures to ensure safety and quality in the process of implementation and maintenance of networks.

CE6.1 identify the contents of a quality plan relating to the product or process and the rules and applicable quality standards.

CE6.2 Describe endpoints control features.

CE6.3 Explain the structure and content of the guidelines and monitoring reports.

CE6.4 In a practical course of implementation and / or maintenance of a network defined by the technical specifications, process, technical and human resources, timing:

- Analyze the system specifications for determining the quality characteristics under control.

- Establish phase control system implementation.

- Apply control guidelines, determining methods, devices and instruments required.

- Develop information and data jacks chips to be used.

- Write reports of non-compliance in accordance with established procedures.

CE6.5 identify the contents of a security plan, relating to the product or process and the rules and regulations applicable safety.

CE6.6 In several cases of safety and quality in different work environments related to the implementation and maintenance of networks are described:

- Determine the specifications of media and safety equipment and protection.

- Develop technical documentation on the location of emergency equipment displays, signals, alarms and exit points in case of emergency, in line with the applicable regulations.

- Develop procedures and guidelines to be followed to perform with the security required for each type of action.


- Write reports of non-compliance in accordance with established procedures.

C7: Develop and deliver training plans on procedures for implementation, maintenance and network management.

CE7.1 define precisely the elements that must contain a plan for technical training team.

CE7.2 List and explain various techniques for diagnosing training needs of technical contents of a group of people.

CE7.3 Explain precisely the differences between the various types of content that should appear in a technical training plan: conceptual, procedural and attitudinal.

CE7.4 Describe different techniques and training methods for technical training of groups of people.

CE7.5 In a properly characterized practical training course for a group of people in a technique, procedure or specific equipment, develop a multimedia presentation that will support for the presentation of the contents, which is included: | ||
- Script of the presentation, properly structured.

- Quality graphic elements.

- Explanatory texts accompanying graphics.

- Care aesthetic content.

- Multimedia elements to support the presentation.

CE7.6 In a properly characterized practical course for the training of a group of people in a technique, procedure or specific equipment, develop and deliver, sham in the learning environment, a training program at least with the following characteristics:

- Development of precise objectives to be achieved on time, according to the learning needs diagnosed.

- Selection of contents and typology in accordance with the objectives and the nature of them.

- Preparation of teaching and learning activities in the proper format, including the operating process, resources and methodology used.

- Establishment of sequencing in the development of content and activities.

- Preparation of activities, procedures and tools for evaluation of learning.

- Development of the simulated delivery in a timely manner, explaining in detail the actions that allegedly would be carried out in real situations.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 and CE2.6 CE2.3 respect; C3 respect CE3.1; C4 respect CE4.4; C5 respect CE5.6; C6 and CE6.6 CE6.4 respect; C7 and CE7.6 CE7.5 respect.
Other capabilities
:

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Adapt to new situations or contexts.



Contents:





1. Project development



Defining projects. Specifications.

The organization projects.

Project groups.
Documentation
up a project BOM, schematics, drawings, instructions for assembly and commissioning, functional testing, quality and reliability, specification, specifications and programs. Documentation for planning. Documentation for monitoring the actions to be taken.
Planning
times, resource scheduling and cost estimation in the implementation and maintenance of networks: phase relationship and tasks; breakdown of tasks; determining times.

Forms estimates materials, characteristics of human resources, contingency costs. Outsourcing.

Work units.

Technical PERT and CPM. Rules that define it. Your application.

Gantt charts. Rules that define it. Your application.

Completion and delivery of projects: reports and documentation; news formal completion of the project; Documentation: product designs; cost reports.

Correspondence.

Basic File Management.



2. Implementation of the plans of quality and safety in the execution of projects for the implementation of networks



The quality execution of projects for the implementation of networks. The quality plan.

Criteria to be taken to ensure quality implementation of projects for the implementation of networks.

Quality Control. Phases and procedures. Resources and documentation.

Computer for the implementation and monitoring of a quality plan tools.


The Safety Plan in implementing projects for the implementation of networks.

Criteria to be taken to ensure safety in the implementation of projects for the implementation of networks.

Security control. Phases and procedures. Resources and documentation.

Quality standards and safety regulations.



3. Development of protocols for intervention in the implementation and maintenance of networks



Network implementation procedures. Type and characteristics.

Procedures commissioning of networks. Tests, checks and records.

Network Maintenance procedures: preventive and corrective.

Phases and tasks.

Registration procedures.

Cause and effect diagrams.



4. Certification procedures for local area networks



Structured Cabling Systems: Horizontal and vertical wiring cabling.

Measuring instruments; téster and certifiers.

Characteristic parameters of a transmission medium.

Regulations cabling certification categories and classes.

Regulations applicable in the field of communications infrastructures.



5. power supply systems. Characteristics, quantities and measures



Power plants: types and characteristics.

Measures electrical parameters: voltage, current, impedance, earth resistance.

Electrical protection elements.

Uninterruptible Power Supplies.

Electrotechnical regulations.



6. Preparation and delivery of training plans



Techniques and tools for diagnosing training needs.

Development of training objectives.
Selecting
contents: conceptual, procedural and attitudinal.

Reporting and operating manuals: structure of information to be transmitted; technical writing; development of textual and visual guides for operating manuals.

Technical presentation and exhibition of content: making techniques multimedia presentations; preparation of teaching-learning activities: format and content; preparation of evaluation activities: format and content; records tracking the learning process.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the coordination of the implementation of computer network infrastructure, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: MANAGEMENT Telematic networks





Level: 3





Code: MF0230_3





Associate UC: Managing telematic network infrastructure





Duration: 240

hours





Capabilities and evaluation criteria:



C1: products properly and effectively implement communications software on different platforms.

CE1.1 Explain the role of DNS and DHCP services and their components.

CE1.2 Explain the functions of a proxy server and its usual commercial implementations, highlighting if offers firewall, NAT or cache.

CE1.3 In a case study, installation and configuration of communications services:

- Install and configure a DNS service, including DNS and DHCP Dynamic DNS service.

- Install the DHCP service, creating a scope and setting address ranges and reserves.

- Check operation of the installed services.

CE1.4 In a practical course of installing and configuring a proxy server:

- Install a proxy server.


- Setting options: NAT, caching, firewalls.

CE1.5 In a practical course setup and configuration of a router:

- Install and configure a router using a computer.

- Check the operation of the equipment according to router routing requirements.

C2: Set the configuration of the equipment best suited to the needs of the facility interconnection.

CE2.1 Explain the different functions of level 2 and 3 of the OSI model and what are its characteristics in a way to isolate network traffic.

CE2.2 Describe the problem of the appearance of loops to interconnect LANs through switches.

CE2.3 Describe the problem of the appearance of loops to interconnect switches with multiple redundant links.

CE2.4 Explain the operation of the algorithm 'Spanning Tree'.

CE2.5 In a practical course VLAN configuration:

- Configure multiple VLANs on a single switch.

- Configure multiple VLANs on two switches and join them for a trunk.

- Check the settings and check the correct operation of the network.

CE2.6 In a practical course routing from a raised operating requirements:

- Set up a network topology with multiple routers adding routes as stated requirements.

- Check if the routing tables are correct for the required routing.

- Define access control lists to allow or block certain traffic.

C3: Implement procedures for monitoring and alarms for maintaining and improving network performance.

CE3.1 Explain the role of protocols for exchanging management messages.

CE3.2 Associating the parameters defining the operation of a network component to a monitoring method for measuring values.
Distinguish CE3.3
equipment that can be monitored based on their operational importance.

CE3.4 Planning monitoring procedures to have the least impact on network performance.

CE3.5 Employ management and monitoring protocols (SNMP / RMON) to determine the operating status and the load of each network element.
Use programs
CE3.6 to monitor active services on network elements.

CE3.7 Translate the values ​​of the parameters of a network component in the level of benefits that the component is offering.

CE3.8 In a practical course of maintenance and improvement of the network:

- Use traffic profiles and network utilization to determine how it will evolve the network usage.

- Analyze the results obtained by monitoring in order to propose amendments.

C4: Apply preventive maintenance procedures defined in the technical documentation.

CE4.1 Interpret manual operation of a network component manufacturer to perform proper maintenance.

CE4.2 In a practical course of preventive maintenance, from a data network already in operation:

- Distinguish computers that can update their firmware.

- Locate the appropriate firmware update, depending on the equipment to upgrade.

- Updating the firmware.

- Check the operation of updated equipment.

CE4.3 graphically Develop a schedule of maintenance operations according to an established maintenance plan.

CE4.4 Apply the quality plan established for conducting the audit quality.

CE4.5 In a case study, traffic analysis in a data network in operation:

- Take a screen capture traffic using a traffic analyzer.

- Analyze the catch taken and determine the variations with respect to the operating parameters considered normal.

- Propose, if necessary, a solution justifying the answer.

C5: Resolve incidents occurring carrying out the diagnosis of faults and carrying out repairs at the right time to the type of damage and the expected level of quality.

CE5.1 define a sequence of operations to perform to solve a problem.

CE5.2 Identify the tools available in the protocol used by purpose (ping, traceroute, etc.).

CE5.3 Choose the specific diagnostic tools depending on the operation to perform.

Use CE5.4 traffic analyzers to detect anomalies in the communication service.
Discover ce5.5
intermediate network nodes using specific applications.


CE5.6 Use the procedures established by the manufacturer to determine the cause of the malfunction of a computer.

CE5.7 Discriminate the faults that occur in the network infrastructure differentiating belonging to the local network or wide area network.

CE5.8 In a case solving practical impact from a data network with a detected problem:

- Interpret the technical documentation of the equipment involved and the project.

- Choose diagnostic tools depending on the problem.

- Estimate the magnitude of the problem to define the performance.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect to CE1.3, CE1.5 CE1.4 and; C2 respect to CE2.5y CE2.6; C3 respect CE3.8; C4 respect CE4.2 CE4.5 and; C5 respect CE5.8.
Other capabilities
:

Responsibility for the work carried out and the fulfillment of the objectives.

Finish work according to criteria of suitability, speed, economy and efficiency.

Alternatives to improve results propose.

Demonstrate creativity in the development of the work done.

Demonstrate stress resistance, stability of mood and impulse control.

Adapt to new situations or contexts.



Contents:





1. Interconnection networks at Layer 2 of the OSI model



Main Layer 2 of the OSI model.
Addressing
Level 2 MAC addresses.

Switches: MAC address table; algorithm 'Spanning Tree'; Link Aggregation ( 'Channel Bonding' or 'Multi-Link Trunking'); VLANs.



2. Interconnection networks at level 3 of the OSI model: Architecture TCP / IP



Definition IP network.

Features TCP / IP networks over TCP / IP, multiplexing and demultiplexing, correspondence between the OSI and TCP / IP model is implemented.



3. Interconnection networks at level 3 of the OSI model: IP



IP Addressing: address classes; address structure; netmask; public and private addresses; reserved and restricted addresses.

IP Protocol: Address Resolution Protocol (ARP); routers: static and dynamic routing; 'Subnetting' classic; Netmasks variable length (VLSM); Network Address Translation (NAT).



4. Interconnection networks at level 3 of the OSI model other protocols, proxy servers



Protocols ICMP, IGMP, BGP, OSPF, RIP.

Proxy Servers.



5. Network Management



Network Management Systems.

SNMP protocol.

SNMP elements.

Traffic analyzers.



6. Services application level: DNS



Domain Name Service (DNS).

Files and DNS name resolution.

Design implementation of DNS.

Installing and configuring DNS.



7. Services Application Layer: DHCP



Dynamic Host Configuration Protocol (DHCP).

Installing DHCP.

Configuring DHCP.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the administration of computer network infrastructure, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX IV

Professional qualification
:
Management Information Systems


Professional Family: Computers and Communications





Level: 3





Code: IFC152_3





General competence




Configure, manage and maintain a computer system hardware and software level, ensuring availability, optimal performance, functionality and integrity of services and system resources.



Competence units



UC0484_3: Manage hardware system devices

UC0485_3: Install, configure and manage software base and system application

UC0486_3: Securing computers



Professional environment





Professional field



Develops his professional activity in the IT department dedicated to systems and telematics area, public entities or private, companies of any size, self-employed persons, irrespective of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



Services is located in the sub-sector in the marketing of computers and computer technical support, as well as any productive sector that uses computer systems to manage them.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
System administrators

Responsible

computer

Technical Systems
Network System Administrators



Associate Training

(420 hours)





Training modules



MF0484_3: Administration hardware of a computer system (120 hours)

MF0485_3: Management software of a computer system (210 hours)

MF0486_3: Safety equipment (90 hours)



COMPETITION UNIT 1: MANAGE SYSTEM HARDWARE DEVICES





Level: 3





Code: UC0484_3





professional accomplishments and performance criteria:



RP 1: Inventory the physical components of the system, keeping them updated to ensure their location and availability according to the rules of the organization.

CR 1.1 The hardware and physical components of the system are correctly identified and listed exhaustively to know your current availability.

CR 1.2 hardware inventory to report describes in detail the characteristics, current configuration, exact location and status of each device according to the rules of the organization.

CR 1.3 The new acquisitions, changes in the hardware or its configuration are modified in inventory to keep updated interpreting technical documentation.

CR 1.4 Hardware installation including detailed incidents and referenced in the documentation generated for later use.

RP 2: Analyze and parameterize hardware devices, monitoring and evaluating their performance to optimize system performance and propose, if necessary, modified or improved according to existing functional needs.

CR 2.1 monitoring techniques or tools to be used is selected according to the characteristics of the system to optimize its performance.

CR 2.2 The system is monitored, so that they can obtain performance statistics, alerts schedules and other items, using the techniques or tools selected monitoring.
CR 2.3
system performance criteria are established in accordance with the general provisions laid down by the manufacturer, and individuals established by the organization for adequate monitoring.

CR 2.4 Data from monitoring are collected and presented clearly and concisely using rendering techniques.

CR 2.5 The representation of system performance generated by the monitoring is analyzed to locate any loss or performance degradations and propose necessary amendments.

CR 2.6 The parameters of the physical devices are adjusted so that performance improves and operating anomalies detected in the system are corrected.

RP 3: Implement and optimize hardware solutions to ensure high availability and ensure protection and system recovery to unforeseen situations as planned contingency plan.

CR 3.1
incidents hardware installation and configuration are resolved by consulting the technical documentation and technical support services.

CR 3.2 Verification of the installation and configuration of physical devices and their drivers for mass storage and backup, is performed so that they can be tested according to the standards and quality and safety standards set by the organization .

CR 3.3 Managing the repair or replacement of failed hardware components is performed in accordance with the technical specifications of the system and following the installation procedure established in the technical documentation provided by the manufacturer and the implementation plans of the organization .

CR 3.4 Verifications of substituted components are performed to ensure proper operation according to the standards and quality and safety standards set by the organization.

CR 3.5 or misalignments problems are solved by ensuring information integrity and continuity in the operation of the system, taking preventive security measures necessary, activating possible alternative operating procedures and in compliance with applicable regulations.

CR 3.6 The original information and backups are restored to bring the system back into operation following the protocol established safety and complying with the applicable regulations of data protection.

CR 3.7 Storing copies is monitored, ensuring that the safety standards established by the organization and the applicable rules on data protection are met.

CR 3.8 Redundant servers and other high-availability systems are implemented according to manufacturer's specifications and standards of the organization.

RP 4: Planning the expansion and growth of proposing new configurations to take future increases in workload or users as required operating system.

CR 4.1 The hardware is analyzed and assessed for reporting of possible future needs, and the feasibility of possible improvements and updates.

CR 4.2 reports the organization about future increases in workload or number of users are properly analyzed using techniques tailored to the situation.

CR 4.3 The system is represented by mathematical modeling and analytical tools to analyze performance with new added charges.

CR 4.4 The data obtained through modeling and simulation of the system are analyzed to determine if new charges are assumable.

CR 4.5 The physical devices available in the market are evaluated to propose the most suitable system and to ensure the absorption of the burden of work raised.

CR 4.6 The introduction of new devices develops minimizing its effects on the operation of the system, optimizing yields and adapting the same technology as market developments.

CR 4.7 extensions and system configuration changes are detailed and referenced in the documentation generated and saved for later use according to the established procedure.

RP 5: Define environmental and safety conditions appropriate to avoid interruptions in service provision system according to manufacturer's specifications and the security plan of the organization.

CR 5.1 The environmental requirements of physical devices are set according to the technical specifications and the security plan of the organization.
CR 5.2
power supply conditions of the physical devices are set according to the technical specifications and the security plan of the organization.

CR 5.3 Environmental requirements and conditions power of the physical devices are contrasted with the possibilities of installation to avoid incidents and service interruptions.
CR 5.4
conditions ergonomics, safety and use of space are set to the correct location of equipment and physical devices in accordance with the technical specifications.

CR 5.5 Safety conditions are established to prevent unwanted access and service interruptions according to the security plan of the organization.

CR 5.6 Environmental and safety conditions are listed and referenced in the documentation generated and saved for later use, according to the established procedure.



Professional background:





Production facilities:




Computer and peripheral equipment. operating systems and configuration parameters. Software tools for inventory control. Tools diagnostic software. Physical devices for mass storage and backups (such as RAID, SAN and NAS). Backup media. Management Tools log files (log). Diagnostic software, backup and restore. Technical documentation. Tools 'backup'. Change management tools, incidents and configuration. Monitors performance. Uninterruptible power systems. Analytical modeling tools. Analysis Tools system performance. Mobile devices. 'Hosting'.



Products and results:



Inventory and descriptive record of physical devices in the system and its configuration. computer system running at optimum performance and proper use of its resources. Proper connection of the system to a network within an organization. Reports expansion and growth of the system.



Information used or generated:



Hardware Inventory. technical specifications for the installation of the devices. Technical information equipment. Documentation or manuals and system operation. Documentation on setting safety standards for installation. Maintenance recommendations of the manufacturers. Maintenance plan. Relationship issues. Recommendations manufacturers' maintenance and technical support for assistance. Catalogs hardware products, suppliers, prices, business regulations regarding data privacy. Health and safety regulations. Standards applicable data protection and internal labor standards on data confidentiality and health and safety.



COMPETITION UNIT 2: install, configure and manage software BASIC AND APPLICATION SYSTEM





Level: 3





Code: UC0485_3





professional accomplishments and performance criteria:



RP 1: Install and configure the server operating system to ensure system functionality according to the needs of the organization.

CR 1.1 The server operating system is installed following the procedures indicated in the technical documentation.

CR 1.2 Verification of components of the operating system and device drivers testing is done by starting and stopping, and the use of software tools and diagnostics check, so it can be proven that the components are recognized and enabled and no conflicts arise as provided by the organization.

CR 1.3 operating system parameters are set to ensure the integrity and reliability of the system according to the security plan of the organization.

CR 1.4 The configuration of the network parameters is set to connect the server as network design and system standards and safety standards and quality of the organization.
CR 1.5
Different groups and users are created to allow the use of the system according to the needs of the organization and system security plan.
CR 1.6
necessary updates the server operating system are carried out effectively, ensuring the integrity of the system, the adequacy of the same and following the safety standards of the organization.

CR 1.7 Relevant installation details and incidents during the process, are reflected in the documentation, according to the procedure established by the organization.

RP 2: Inventory system software, updating inventory to ensure their location and availability according to the rules of the organization.

CR 2.1 software and versions are listed exhaustively to maintain an inventory of applications and operating systems available on the system.

CR 2.2 The current configuration of base and application software is recorded clearly and completely to facilitate recovery efforts in case of failures.

CR 2.3 installed software information is listed for each user to allow control of facilities not allowed applications.

CR 2.4 The number of facilities, their location and identification are controlled by each software product to carry out an exhaustive control of licenses in compliance with applicable rules on intellectual property.

CR 2.5 Access privileges of users of system resources software, register for access control, according to the plan of system security and data laws in force.


CR 2.6 applications automatically inventoried are used to keep the information about system software, according to the rules of the organization.

RP 3: Install and configure to meet corporate user functionality as the implementation plan of the organization applications.
CR 3.1
corporate software installation is carried out effectively ensuring the integrity of the system, fulfilling the requirements established by the organization and following from the technical documentation.

CR 3.2 The audit of the software in the whole system is performed according to the safety and quality procedures established by the organization and the manufacturer.

CR 3.3 Corporate software is configured with appropriate to the system security plan and the needs of the organization parameters.
CR 3.4
corporate software updates needed are carried out effectively, ensuring the integrity of the system, the adequacy of the same and following the safety standards of the organization.

CR 3.5 Relevant installation details and incidents during the process, are reflected in the documentation, according to the procedure established by the organization.

RP 4: Prepare the support plan users, coordinating technical support staff and maintenance to ensure the use of the functions of the computer system.

CR 4.1 Guidelines for installation, configuration and maintenance of database software and application user posts exhaustively documented.
CR 4.2
solving common problems related to hardware devices and network user posts exhaustively documented.

CR 4.3 user support is planned applying the techniques of communication, action protocols established by the organization and following security policies and protection of existing data and service quality.
CR 4.4
training users on different tools and equipment to handle planned to be performed gradually assisted and ensuring its full adaptation to the environment.
CR 4.5
assistance procedures are organized to ensure maximum availability to the request for advice and attention from users.

RP 5: Configure and manage system resources to optimize performance based on operating parameters of the applications.

CR 5.1 Performance metrics used are set to specify the performance attributes to consider.

5.2 CR performance analysis techniques used are set to obtain system operating parameters.
CR 5.3
testing programs are set to use for system performance parameters, according to the manufacturer's specifications and the requirements established by the organization for proper performance.
CR 5.4
models representing the system are made to obtain the same performance parameters according to the manufacturer's specifications and the requirements established by the organization for proper performance.

CR 5.5 system simulation systems are configured for the same performance parameters, according to the manufacturer's specifications and the requirements established by the organization for proper performance.
CR 5.6
system performance parameters obtained are analyzed to locate and identify possible conflicts capable hardware devices be reconfigured, deleted or added.

RP 6: Planning for performing backup and recovery thereof to maintain adequate levels of data security according to the needs of use and within the guidelines of the organization.

CR 6.1 The system architecture backup is designed taking into account the requirements of the computer system.

CR 6.2 The procedures for making backup copies and levels of the copies are planned according to the needs of the server, from the time of making copies of recovery times, storage spaces required and the validity of historical copies.
CR 6.3
verification tests backups are performed and verified its functionality in response to the quality specifications of the organization and of the rules of data protection.

CR 6.4
planning identification system and storage media is performed according to the specifications of the security plan of the organization and of the rules of data protection.

CR 6.5 documentation procedures for obtaining and verifying backups as well as contingency plans and troubleshooting it is constructed according to the regulations of the organization and of the rules of data protection.

RP 7: Audit the use of system resources to ensure optimal performance based on the parameters of the business plan.

CR 7.1 The audit plan with the necessary functional tests and periods of realization is implemented, so as to ensure optimum system performance.

CR 7.2 Checking incidents is performed to verify, clarify and minimize negative effects on the system, according to the needs of the organization and system security plan.
CR 7.3
diagnosis and localization of unwanted operations are performed using equipment and tools, and the corresponding corrective procedure is applied in a timely manner.

CR 7.4 The audit report is made in the standard format in order to collect the information required for the performance of the repository incidents.



Professional background:





Production facilities:



Computer and peripheral equipment. Operating system software server. Corporate software application. Software updates and patches and application base. Drivers Security tools and antivirus devices. Monitors performance. Modeling tools and simulation. Tools for automatic inventorying. Office tools. Management tools and performing backups.



Products and results:



Operating system and applications configured and parameterized according to the needs. Inventories configuration software and system applications. Event log based software system. Record of incidents of corporate application software. Plan assistance and user training. Backups, archived and documented. Implementation plan, storage and retrieval of backups. Plan audit system resources. Audit Report system resources.



Information used or generated:



Manuals installation of the operating system. Manual operation of the operating system. Application installation manuals. Operation manuals applications. Operation manuals performing backups. Safety Standards (security plan) and quality of the organization. Manuals administrative tools. Manuals online help. online support. Plans for the use and implementation of the organization. Standards applicable data protection and intellectual property, business regulations regarding data privacy. Installation and configuration documentation. Specific identification cards and equipment configuration.



COMPETITION UNIT 3: ENSURE COMPUTERS





Level: 3





Code: UC0486_3





professional accomplishments and performance criteria:



RP 1: Apply security policies to improve the protection of servers and end-user equipment according to the needs of use and safety conditions.

CR 1.1 The implementation plan for the computer system of the organization is analyzed by checking that incorporates:

- Referring to installation procedures and equipment upgrades, backup and intrusion detection, among other information.

- References possibilities of utilization of equipment and restrictions thereof.

- Protection against virus attacks and other unwanted elements, among others.

CR 1.2 permits access by users to different system resources are allocated (provisioned) using the appropriate tools under the Plan Implementation and security of the computer system.

CR 1.3 The confidentiality and integrity of the connection to the server access is guaranteed by the safety standards of the organization.


CR 1.4 User policies are analyzed verifying that such circumstances are reflected as uses and restrictions assigned to computers and users, allowed network services and restricted and areas of responsibilities due to the use of computer equipment.

CR 1.5 The security policy is transmitted to users, ensuring proper and complete understanding.

CR 1.6 The tasks performed are documented according to the procedures of the organization.

CR 1.7 The information affected by the regulations applicable data protection are treated verifying that authorized users meet the requirements set by the regulations and channels of distribution of such information are documented and approved according to the safety plan.

RP 2: Configuring servers to protect them from unwanted access according to the needs of use and within the guidelines of the organization.

CR 2.1 The server is located on the network in a protected and isolated area according to safety standards and the implementation plan of the organization.

CR 2.2 The services offered by the server is enabled and configured by disabling unnecessary accordance with the rules applicable safety and implementation plan of the organization.
CR 2.3
access and permissions to server resources by users are configured depending on the purpose of the server itself and the safety regulations of the organization.

CR 2.4 Logging mechanisms of activity and system events are triggered and analysis procedures such information are enabled, so allow conclusions a posteriori.

CR 2.5 The use of additional server modules are decided based on their capabilities and security risks, reaching a compromise.

CR 2.6 authentication mechanisms are configured to provide levels of security and integrity in connecting users according to the safety regulations of the organization.

CR 2.7 Roles and privileges of users are defined and assigned following the instructions contained in the safety and operating plan of the organization.

RP 3: Install and configure security features (firewall, trap equipment, Intrusion Prevention Systems and Firewalls, among others) in computers and servers to ensure security against external attacks according to usage needs and within organization's policies.

CR 3.1 firewall topology is selected depending on the deployment environment.

CR 3.2 hardware and software firewall elements are chosen taking into account economic and performance factors.

CR 3.3 Firewalls are installed and configured according to the level defined in the security policy.
CR 3.4
filtering rules and logging levels and alarms are determined, configured and managed according to the needs dictated by the safety regulations of the organization.

CR 3.5 Firewalls are verified with test kits, ensuring that exceed the specifications of the safety regulations of the organization.

CR 3.6 Installation and update firewalls and operating procedures are documented with the same specifications as the organization.
CR 3.7
registration systems are defined and configured for review and study of possible attacks, intrusions and vulnerabilities.



Professional background:





Production facilities:



Corporate Office applications. Verifiers strength of passwords. Port scanners. Analyzer system log files. Firewall. specific and / or general purpose machines. personal firewall or server. Authentication systems: weak: based on user name and password and robust: based on physical devices and biometric measures. Communication programs with cryptographic capabilities. Secure remote management tools. IDS Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), trap equipment ( 'Honeypots').



Products and results:



Plans revised as implementation organization's policies. Audit reports network services computer systems. Map and topology design corporate firewall. Installation Guide and firewall configuration. Report activity detected on the firewall. Map and system design backup. Planning performing backups. Report of performing backups. Elaborate operational security. Configured servers and security equipment.




Information used or generated:



Security Policy telematic infrastructures. Installation manuals, reference and use firewall. Information and extensive local networks and systems of public and private media area. Information communications equipment and software. applicable rules, regulations and standards. Registration inventoried hardware. Registration check with the security measures applied to each computer system. Computer system topology to protect.



Training Module 1: HARDWARE MANAGEMENT COMPUTER SYSTEM A





Level: 3





Code: MF0484_3





Associate UC: Managing system hardware devices





Duration: 120

hours





Capabilities and evaluation criteria:



C1: Identify the hardware components of the distinguishing characteristics and parameters detailing system and installation procedures.

CE1.1 analyze and explain the basis of the physical architecture of a computer system on various component parts.

CE1.2 List and define the functions performed by each of the hardware components of a computer system explaining its features.

CE1.3 Sort according to type each of the hardware components of a computer system by its characteristics, usefulness and purpose.

CE1.4 that the technical characteristics and installation procedures and configuration of hardware components of a computer system according to specifications given functionality.

CE1.5 Distinguish and explain the types of physical and technical possible communication between the different components of a computer system hardware devices, describing its main characteristics and typology.

CE1.6 define and classify the different types of peripheral devices according to their purpose, describing the various techniques used for communication with them and the technologies available in controllers input / output.

CE1.7 Identify and classify different physical devices available to connect the system through a communications network.

CE1.8 In a practical course of identification and registration of hardware devices:

- Sort a collection of hardware devices according to different criteria: purpose, fitness for a system and compatibility, among others.

- Trading tools inventoried comprehensively recording the characteristics of hardware devices under study.

- Documenting the installation of the hardware detailing procedures, more frequent incidents and parameters used.

C2: Select and apply the procedures and techniques of performance monitoring devices to adjust the configuration parameters and ensure the absence of conflict.

CE2.1 List and define performance metrics commonly used to measure the performance of a system.

CE2.2 Characterize and analyze the main procedures and monitoring techniques used to measure the performance of a system.

CE2.3 Apply techniques and selected for optimum performance and determine the status of the system by analyzing the results of performance measurements and indicating whether it is saturated, balanced or underused tools.

Plot CE2.4 system performance according to the monitoring data obtained.

CE2.5 Analyze the alarms obtained in monitoring and describe the major configuration problems relating to hardware devices known explaining the most common solutions.

CE2.6 In a practical course, properly characterized, monitoring and adjustment of systems:

- Select performance metrics to be used according to the needs of the system.

- Get system performance measurements using skillfully the necessary tools to carry it out.

- Analyze the measurements obtained, documenting them and presenting them to facilitate decision making about the system.

- Configure system parameters necessary for the performance requirements are met.

- Reconfigure alarms depending on the measurements obtained by the system.

- Indicate and document the limitations that exist in trying to improve the performance of a system.


C3: Integrate and implement the computer system hardware devices to ensure continuity in the provision of services and data security.

CE3.1 Identify different hardware solutions available to ensure the continuity of the system, describing its main features and configurations.

CE3.2 Define different hardware solutions available to ensure system recovery to unforeseen situations, describing its main features and configurations.

CE3.3 Identify security policies and data protection and recovery ratio and continuity of services and applications as computer security regulations.

CE3.4 In a practical course, properly characterized, configuration and implementation of solutions to ensure the continuity of the system:

- Analyze the system to identify needs and provision of uninterruptible power supplies.

- Install properly supply units and voltage stabilizers respecting the technical characteristics of equipment and complying with the standards for safety in the workplace.

- Configuration and monitor installed devices, adapting the system to ensure full compatibility, optimal performance, control and management of them.

- Perform an intervention plan and activation of alternative mechanisms.

- Documenting the installation of the hardware detailing procedures, more frequent incidents and parameters used.

CE3.5 In a practical course, properly characterized, configuration and implementation of solutions for system recovery to unforeseen situations:

- Install and configure a local backup server to ensure the immediate recovery operations in the event of fall of the main server.

- Install and configure solutions 'arrays' disks to increase fault tolerance system and a system of 'clusters' according to their type to increase the reliability and productivity of the system.

- Make a plan of intervention and possible alternative mechanisms activation and locate hardware devices responsible for a possible fault and establish procedures for its repair or replacement.

- Configure devices properly replaced following the steps set out in the plan provided.

- Documenting the installation of the hardware detailing procedures, more frequent incidents and parameters used and the steps for system recovery once there has been an unforeseen situation.

- Plan and conduct tests to verify the suitability of the implemented solutions, making improvements and adjustments to achieve optimum performance.

C4: Analyze and evaluate the devices available on the market to propose hardware implementations that improve the performance and capabilities of the computer system.

CE4.1 identify, assess and classify existing hardware devices on the market, according to evolution and typology, using commercial catalogs, technical documentation, journals or any other method and support.

CE4.2 Identify the parts of a computer system, typically capable of causing bottlenecks and degradations in productivity.

CE4.3 Explain trends technological developments in the common physical devices in a computer system in order to propose improvements to it.

CE4.4 In a practical course, properly characterized, growth planning a system, given some estimates of possible increases in workload or users:

- Analyze expected workloads and future, characterizing them properly.

- Deploy new workloads, integrating them into the system for possible effects on performance.

- Analyze performance parameters obtained after subjecting the system to new workloads.

- Plan and execute the implementation of new hardware devices needed to support new workloads and minimizing its effects on the system.

- Documenting the results of the evaluation subjected to new burdens and propose system so reasoned, changes in current or new hardware configuration deployments.


C5: Apply safety procedures and environmental conditioning in order to ensure system integrity and the right environment according to specifications and system requirements to install.

CE5.1 List and describe the main environmental and environmental factors to be considered in the proper installation of computer equipment, to establish the precautions to avoid or minimize their effect.

CE5.2 List and describe the main environmental and environmental factors that can degrade the performance of a communications network to establish the precautions to avoid or minimize their effect.

CE5.3 Interpret technical specifications of the devices and the security plan to adapt their physical location installation and achieving optimal performance thereof.

CE5.4 Assess the installation of the mains ensuring that their capacity and available equipment are adequate to connect all the hardware devices and the operation of these is optimal.

Ce5.5 In a practical course, properly characterized, installation of computer equipment:

- Locate the computers respecting the environmental conditions of temperature and humidity recommended by the manufacturers.

- Locate the computer equipment respecting ergonomics and occupational safety conditions recommended.

- Check that the installation environment of computer equipment free of smoke, dust or any other environmental disturbance is.

- Documenting the characteristics location of computer equipment, detailing the procedures, more frequent and parameters used incidents.

CE5.6 In a practical course, properly characterized, check the computer system security:

- Ensure handling equipment by users for the initial conditions of temperature and humidity do not vary.

- Ensure handling equipment by users checking that the rules for safety is respected.

- Check performing backups, ensuring the suitability of frequency, support and safeguarded information.

- Documenting security incidents found for later correction.

- Interpret the system security plan, removing the security procedures apply.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.8; C2 respect to CE2.6; C3 and CE3.5 CE3.4 respect; C4 respect CE4.4; C5 respect ce5.5 and CE5.6.
Other capabilities
:

Adapt to the specific organization of the company integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute the operation according to the instructions received, with quality and safety criteria, applying specific procedures of the company.

Used to the pace of work of the company meeting the daily performance objectives defined in the organization.

Show at all times an attitude of respect toward peers, procedures and internal rules of the company.

Take into consideration the proposals received.



Contents:





1. Introduction to computer architecture



Fundamentals of Von-Neumann architecture: operating principles, layout and structure, functional elements and subsystems.

Other processor architectures.

Peripherals.

Bus architectures.

Control units and out.

Architectures personal computers, departmental systems and mainframes.



2. Components of a computer system



The central processing unit: functions; purpose and operation scheme; internal structure: control unit, arithmetic logic unit and records.

The memory system: functions, address spaces and memory maps, memory hierarchies.

The system I / S: functions and types of I / S (programmed, interrupts, DMA) controllers, I / S, features a bus system, types of bus architectures, organization and arbitration system bus, peripheral devices.

The storage subsystem: storage devices, interfaces.

Motherboards.

Power supplies and boxes.

Heat sinks.



3. hardware devices




Current developments and future trends in hardware devices. multiple processors and distributed among other memory.

Classification and typology: mainframes, memory, storage devices, peripherals.

Installing and configuring devices: tools and measuring devices, safety standards, device assembly procedure, check the connections, check the system.

Devices and techniques connection: connection and communication techniques; communications systems; wireless networks: network topologies, communication protocols, wiring devices and connecting local networks; diagnostic tools and measurement.



4. System performance



Performance evaluation of computer systems: performance metrics, representation and analysis of measurement results.

Configuration techniques and adjustment of systems: system performance, workload characterization (actual loads, synthetic fillers such as 'benchmarks', nuclei, synthetic programs and instruction sets, etc.).

Measurement techniques system parameters: monitoring tools.

Consumption and resource competition.

Predictive models and trend analysis.

Preproduction test plans.

Technical diagnostics and troubleshooting: diagnosis by operating profits, diagnostic system using specific software, diagnostics using tools.
Techniques
action: implementation of alternative mechanisms established methods for solving the problem, check.

High Availability: definition and objectives: uninterrupted operation, installation and configuration of solutions; file systems: nomenclature and coding, storage hierarchies, data migration and archiving; logical and physical volumes: partitioning, NAS and SAN systems, logical volume management, parallel access, RAID protection.



5. Security policies and safeguard



Access restricted user accounts.

Property information.

Unique identifier access.

Physical environment of a computer system: the equipment and the environment: adaptation of physical space, external agents and their influence on the system, negative effects on the system, factors affecting the operation of a communications network.

Creating the right environment: control of environmental conditions: temperature and humidity, industrial factors: dust, smoke, noise, noise and vibration, human factors: functionality, ergonomics and quality of the installation, other factors.

Evaluation of risk factors: basic concepts in electrical safety, electrical installation requirements, electrical and electromagnetic interference, static electricity, other risk factors, introduction to measuring devices.

Physical and logical Safeguard.

'Cluster' and load balancing.

Data integrity and recovery of service.

Keeping backup files.

Regulations on health and safety at work.

Electrical and electrotechnical regulations.

Quality Standards and Standards (ISO, AENOR).

Regulations on protection of information.

The legal protection of computer programs.

National and international standards organizations.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the management of hardware devices in the system, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.




TRAINING MODULE 2: SOFTWARE MANAGEMENT COMPUTER SYSTEM A





Level: 3





Code: MF0485_3





Associated with UC: Install, configure and manage software base and system application





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Specifying and implementing procedures based installation and configuration and application software according to operational requirements of the computer system.

CE1.1 analyze the suitability of different types of operating systems for different types of systems and purposes.

CE1.2 Identify and describe the different stages to follow in installing software on a computer system.

CE1.3 Identify and explain the main settings of the operating system for device management, memory, processes and file systems.

CE1.4 Recognize and describe the main settings of the application software for the correct use of system resources.

CE1.5 Automate and schedule tasks in the system through the development of 'scripts'.

CE1.6 In a practical course, properly characterized, installation and configuration of an operating system in a computer system:

- Install the operating system software documenting the process, the incidents occurred and parameters used.

- Configure the operating system parameters relating to system memory, indicating the organization to follow and the use of advanced management techniques.

- Configure operating system parameters relating to the implementation of tasks: job scheduling, synchronization mechanisms and resource allocation.

- Configuration input output system by checking the optimal operation of peripheral devices.

- Organize filesystems creating the structures necessary for the proper functioning of the system.

- Setting the parameters of the operating system so that the specifications of the system security plan are met.

CE1.7 In a practical course, properly characterized, verification and configuration of the installation of an operating system in a computer system:

- Check the operation of the operating system and devices involved in the system, ensuring their drivers configuration and the absence of conflict, using the diagnostic software necessary.

- Establish and configure the network operating system so as to ensure and guarantee data integrity and system reliability at all times following the plan of safety and quality of the organization.

- Enable the organization and user configuration according to the needs and safety plan of the organization.

- Updating the operating system to ensure system integrity, data and according to plan organizational security server.

- Documenting the operating system settings detailing the parameters used.

- Interpret the security plan of the organization to implement the measures specified therein as security regulations.

CE1.8 In a duly characterized, installation and configuration of application software in a computer system practical course:

- Install the application software documenting the process, the incidents occurred and parameters used.

- Configure the application software parameters relating to the use of system resources so that the impact on performance is minimized.

- Setting the parameters of the application software so that the specifications of the system security plan are met.

- Check the operation of the application software and devices that make up the system, ensuring the configuration of their drivers and the absence of conflict using the diagnostic software required.

- Update application software ensuring system integrity and data security according to the plan of the organization.

- Documenting configuration software application detailing the parameters used.

- Interpret the security plan of the organization to implement the measures specified under the rules of security.

C2: Identify software components distinguishing features and detailing system parameters.


CE2.1 Analyze and list the different types of operating systems and specify its most important features.

CE2.2 Sort and describe the different types of applications and software components explaining its main features, functions and purpose.

CE2.3 Identify the functions performed by an operating system installed on a computer system.

CE2.4 Explain the legal requirements regarding intellectual property to consider the installation of software on the system.

CE2.5 In a practical course, properly characterized, identification and registration of software of a computer system:

- Sort a collection of software installed according to different criteria: purpose, fitness for a system and compatibility, among others.

- Trading tools inventoried comprehensively recording the characteristics of the installed software.

- Check the number and location of installed applications protected by copyright laws for proper licensing compliance.

- Check your installed applications to verify the non-existence of not allowed software.

- Register and control access privileges to applications users according to plan security and data protection laws in force.

- Document detailing software installation procedures, more frequent incidents and parameters used.

C3: Planning user support ensuring maximum availability and documentation of the work involved.

CE3.1 define the objectives of a plan of technical assistance and user support.

CE3.2 Explain the advantages and main features of the technical remote support to users through the services and tools available in the system.

CE3.3 List and describe the most common problems related to the implementation of software in user sites.

CE3.4 List and describe the most common problems relating to hardware devices and network user stations.

CE3.5 Establish procedures for installation, configuration and maintenance of database software and application user posts.

CE3.6 In a practical course, properly characterized, planning support to users in a computer system:

- Fix assistance procedures based on the systematic annotation of detected and consultation support personnel problems.

- Thoroughly document the most common problems related to software system resources.

- Thoroughly document the most common problems related to hardware system resources.

- Planning for adaptation training staff to work tools.

- Configure and properly operate with remote support tools users.

C4: Analyze the system through simulation and modeling techniques to optimize performance.

CE4.1 define the concept of simulation explaining the advantages of using this technique and its potential applications in various fields.

CE4.2 Explain the need for representation systems through models for further study.

CE4.3 identify and adequately characterize the steps to perform the simulation of a system.

CE4.4 In a practical course, properly characterized, simulation of a computer system properly characterized:

- List the objectives to be achieved through system simulation.

- Analyze the characteristics of the system and build a model of it using modeling tools available.

- Build a simulation model according to the defined objectives and the model obtained using simulation tools available.

- Run the simulation model thoroughly documenting the data.

- Analyze the simulation results identifying points of malfunction or system problem.

- Adjust the system configuration to solve the identified problems and optimize performance and document simulation processes detailing the objectives, models and results.

C5: Analyze and define policies for performing backup and recovery of data according to safety specifications.

CE5.1 Sort the different types of backup systems, based on the support used in the topology or architecture and supported systems (file, disk partition and database, among others).

CE5.2 Describe the levels of backup explaining the differences between them.

Associating CE5.3
policy making copies to the systems involved, justifying decisions and compliance with current regulations regarding the protection of personal data.

CE5.4 In a practical course of storage systems:

- Estimate the amount of information copied per unit time.

- Identify areas of storage media used for backups.

- Plan authorized access to the media.

- Keep track of information about the content, versions and location of data files.

- Organize inventory storage media and stored files.

- Verify that backups get the same level of security as the original files.

C6: Apply audit procedures using appropriate techniques and to ensure the operating parameters of the computer system tools.

CE6.1 List and explain the objectives to meet enabling system audits.

CE6.2 Sort according priority system events and applications that can be audited for maintaining optimal system performance.

CE6.3 determine, for each detected event, the need to take corrective action, if so implanting.

CE6.4 In a duly characterized, application of audit procedures in a practical course system:

- Establish audit policies properly to avoid overloading the system operation and affect their performance.

- Select a list of events to be audited to provide useful information: start and stop services, access to resources, connection and disconnection of users, application events and system events.

- Fix the necessary corrective actions associated with the detected events and implement and integrate the tools available to the system according to the audit plan established.

- Set alarms to highlight the detection of events or critical priority.

- Operate with the tools available for planning, definition and implementation of audits and analyzing records of the same extracting information about the operation and status of the system for conducting the audit report.

- Interpret technical documentation system, applications and audit tools.

Capabilities whose acquisition should be completed in a real working environment:

C1 and CE1.7 CE1.6 respect; C2 respect to CE2.5; C3 respect CE3.6; C4 respect CE4.4; C5 respect CE5.4; C6 respect to CE6.4.
Other capabilities
:

Responsibility for the work carried out and the fulfillment of the objectives.

Demonstrate a good professional.

Being able to propose improvements in processes and procedures.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.

Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Representation of information



Need for information representation.

Systems information representation.



2. Classification Software



Operating systems: basic concept of software or operating system; evolution of operating systems: generation and characteristics; concepts: single-user / multi-user, single-tasking / multi-tasking, single-processor / multiprocessor; functions of an operating system, an operating system structure: characteristics and functions; process management; memory management and organization; management and file systems; user and group management; device management, accessibility for people with disabilities; common operating system tools; concepts of network operating systems and distributed; concepts of real-time operating systems; trends operating systems.

Programming languages: purpose programming languages, classification according to the degree of independence of the machine, classification according to the form of his instructions, classification for generations.

Application programs: language processors, general purpose applications, advantages and disadvantages of custom applications.



3. Procedures software deployment



The software deployment cycle: installation, configuration, verification and adjustment.

The need for planning in the installation process.


System parameters to consider a software installation process.

Procedures for installing operating systems: system requirements, device drivers, cloning software, user interface configuration, testing and optimization of the configuration, applicable regulations on intellectual property, licensing and licensing.



4. Software Maintenance Procedures



The need for planning in the installation process.

Planning and automation tasks using scripts.

Objectives of a maintenance plan.
Preventive maintenance
as a strategy.

Common problems in software installations.

Common problems in the hardware facilities.

Remote Maintenance: Tools and configuration.

Adequacy of systems: patches and updates.



5. Backing



Service architecture backup: centralized systems, distributed systems, local copies.

Service planning backup: backup levels, sizing backup service.

Supports for backup: traditional media, storage hierarchies.



6. System Audit Procedures



Audit Objectives: standards.

Audit Policy: scope of the audit, auditable aspects; classification of events: system, application, security; audit mechanisms: alarms and corrective actions; audit log information.

Techniques and audit tools.

Audit reports.



7. Introduction to modeling and simulation



Simulation concept: purpose and applications.

Representation of systems using models: main concepts.

The life cycle of a simulation project.

Overview of simulation tools of computer systems.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Domain knowledge and related installation, configuration and basic software management and system application techniques, which are accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: SAFETY EQUIPMENT
COMPUTER




Level: 3





Code: MF0486_3





Associated with UC: Securing computers





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Analyze implementation plans of the organization to identify the system elements involved and the security levels to implement.

CE1.1 Identify the structure of an implementation plan, explaining the contents contained in each section.
Distinguish CE1.2
systems that can appear in the implementation plan, describing the security features implemented.

CE1.3 Describe the security levels listed in the implementation plan, linking them to the access permissions for implantation.

CE1.4 In a case study analysis of a security plan implementation and its impact on the system:

- Determine the systems involved in the implementation plan.

- Analyze the security requirements of each system.

- Describe the security measures to be applied to each system.

- Complete the forms for the declaration file of personal data.

C2: Analyze and implement mechanisms of physical and logical access to servers according to safety specifications.


CE2.1 describe the characteristics of the mechanisms of physical access control, explaining its main functions.
Exposing CE2.2
trace mechanisms, linking them to the server operating system.

CE2.3 Identify mechanisms logical access control, explaining its main features (passwords, IP filtering among other ports).

CE2.4 In a practical course of implementing mechanisms of physical and logical access in the implementation of a server according to a given specification:

- Determine the physical location of the server to ensure its functionality.

- Describe and justify physical security measures to be implemented to ensure system integrity.

- Identify additional modules or applications to implement the security level required by the server.

- Determine the threats that the server is exposed, assessing the risk they pose, given the context of the server.

- Determine the permissions assigned to users and user groups for using the system.

C3: To assess the role and needs of each service running on the server according to safety specifications.

CE3.1 Identify the usual services in the computer system of an organization, describing its mission within the IT infrastructure and communications.

CE3.2 Identify and describe the services necessary for the operation of a server, depending on its mission within the computer system of the organization.

CE3.3 Describe the threats of running services, applying the more restrictive permissions, ensuring its execution and minimize risk.

CE3.4 In a practical course of assessment of the role and need for services running, from a server implementation with a set of running services with correspondence to an operating plan as:

- Indicate the relationship between the server and the rest of the computer system of the organization.

- Extract implementation plan security requirements applicable to the server.

- Determine the minimum services necessary for the operation of the system.

C4: Install, configure and manage a firewall server with the necessary safety features according to specifications.

CE4.1 Sort the types of firewalls, network and local, hardware and software, and application packet, describing its main features and functionalities.

CE4.2 Describe the filtering rules of a firewall server, explaining the main parameters.

CE4.3 Explain the format trace a firewall server, reflecting the relevant safety information.

CE4.4 In a practical case of installing a firewall server in a scenario of local and remote access:

- Determine server security requirements.

- Establish relationships with other server computers in the computer system.

- Prepare the list of access rules to implement on the server.

- Composing a test plan implemented firewall.

- Execute the test plan, drafting the necessary corrections to correct the deficiencies identified.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.4; C3 respect CE3.4; C4 respect CE4.4.
Other capabilities
:

Keep the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.

Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Security management and risks



Security: security objective; threats; external and internal attacker; types of attack; protection mechanisms.

Risks: risk management process; methods of identification and risk analysis; risk reduction.



2. Physical Security



Protection computer system.

Data protection.



3. Security system logic



File systems.

File permissions.

Access Control Lists (ACLs) to files.

Records system activity.

User Authentication: weak authentication systems; strong authentication systems; Biometric authentication systems.


Introduction to Cryptography and Establishing password policies.



4. Remote system access



Mechanisms operating system for access control.

Server firewall: packet filtering; application-level firewall; records of firewall activity.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to underwriting of computer equipment which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX V


Professional qualifications: Computer Security



Professional Family: Computers and Communications





Level: 3





Code: IFC153_3





General competence



Ensuring the security of access and use of information recorded on computers, as well as the system itself, protect them from possible attacks, identifying vulnerabilities and applying encryption systems to communications made to the outside and the within the organization.



Competence units



UC0486_3: Securing computers

UC0487_3: Audit communication networks and computer systems

UC0488_3: To detect and respond to security incidents

UC0489_3: Designing and implementing secure systems access and data transmission

UC0490_3: Manage services in the computer system



Professional environment





Professional field



Develops his professional activity in the area of ​​computer systems department dedicated to computer security, public entities or private, small enterprises / medium / large or micro, both self-employed basis, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located mainly in the service sector, sub-sector computer services technical assistance, and in any productive sector that has computer equipment in their management processes.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Technicians security

Technical Computer audit




Associate Training

(420 hours)





Training modules



MF0486_3: Safety equipment (90 hours)

MF0487_3: Audit security (90 hours)

MF0488_3: Managing computer security incidents (90 hours)

MF0489_3: secure access systems and data transmission (60 hours)

MF0490_3: Service management in the computer system (90 hours)



COMPETITION UNIT 1: SECURING COMPUTERS





Level: 3





Code: UC0486_3





professional accomplishments and performance criteria:



RP 1: Apply security policies to improve the protection of servers and end-user equipment according to the needs of use and safety conditions.

CR 1.1 The implementation plan for the computer system of the organization is analyzed by checking that incorporates:


- Referring to installation procedures and equipment upgrades, backup and intrusion detection, among other information.

- References possibilities of utilization of equipment and restrictions thereof.

- Protection against virus attacks and other unwanted elements, among others.

CR 1.2 permits access by users to different system resources are allocated (provisioned) using the appropriate tools under the Plan Implementation and security of the computer system.

CR 1.3 The confidentiality and integrity of the connection to the server access is guaranteed by the safety standards of the organization.

CR 1.4 User policies are analyzed verifying that such circumstances are reflected as uses and restrictions assigned to computers and users, allowed network services and restricted and areas of responsibilities due to the use of computer equipment.

CR 1.5 The security policy is transmitted to users, ensuring proper and complete understanding.

CR 1.6 The tasks performed are documented according to the procedures of the organization.

CR 1.7 The information affected by the regulations applicable data protection are treated verifying that authorized users meet the requirements set by the regulations and channels of distribution of such information are documented and approved according to the safety plan.

RP 2: Configuring servers to protect them from unwanted access according to the needs of use and within the guidelines of the organization.

CR 2.1 The server is located on the network in a protected and isolated area according to safety standards and the implementation plan of the organization.

CR 2.2 The services offered by the server is enabled and configured by disabling unnecessary accordance with the rules applicable safety and implementation plan of the organization.
CR 2.3
access and permissions to server resources by users are configured depending on the purpose of the server itself and the safety regulations of the organization.

CR 2.4 Logging mechanisms of activity and system events are triggered and analysis procedures such information are enabled, so allow conclusions a posteriori.

CR 2.5 The use of additional server modules are decided based on their capabilities and security risks, reaching a compromise.

CR 2.6 authentication mechanisms are configured to provide levels of security and integrity in connecting users according to the safety regulations of the organization.

CR 2.7 Roles and privileges of users are defined and assigned following the instructions contained in the safety and operating plan of the organization.

RP 3: Install and configure security features (firewall, trap equipment, Intrusion Prevention Systems and Firewalls, among others) in computers and servers to ensure security against external attacks according to usage needs and within organization's policies.

CR 3.1 firewall topology is selected depending on the deployment environment.

CR 3.2 hardware and software firewall elements are chosen taking into account economic and performance factors.

CR 3.3 Firewalls are installed and configured according to the level defined in the security policy.
CR 3.4
filtering rules and logging levels and alarms are determined, configured and managed according to the needs dictated by the safety regulations of the organization.

CR 3.5 Firewalls are verified with test kits, ensuring that exceed the specifications of the safety regulations of the organization.

CR 3.6 Installation and update firewalls and operating procedures are documented with the same specifications as the organization.
CR 3.7
registration systems are defined and configured for review and study of possible attacks, intrusions and vulnerabilities.



Professional background:





Production facilities:




Corporate Office applications. Verifiers strength of passwords. Port scanners. Analyzer system log files. Firewall. specific and / or general purpose machines. personal firewall or server. Authentication systems: weak: based on user name and password and robust: based on physical devices and biometric measures. Communication programs with cryptographic capabilities. Secure remote management tools. IDS Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), trap equipment ( 'Honeypots').



Products and results:



Plans revised as implementation organization's policies. Audit reports network services computer systems. Map and topology design corporate firewall. Installation Guide and firewall configuration. Report activity detected on the firewall. Map and system design backup. Planning performing backups. Report of performing backups. Elaborate operational security. Configured servers and security equipment.



Information used or generated:



Security Policy telematic infrastructures. Installation manuals, reference and use firewall. Information and extensive local networks and systems of public and private media area. Information communications equipment and software. applicable rules, regulations and standards. Registration inventoried hardware. Registration check with the security measures applied to each computer system. Computer system topology to protect.



COMPETITION UNIT 2: AUDIT COMMUNICATION NETWORKS AND SYSTEMS





Level: 3





Code: UC0487_3





professional accomplishments and performance criteria:



RP 1: Perform vulnerability analysis, through specific programs to control possible failures in safety systems according to the needs of use and within the guidelines of the organization.

CR 1.1 tools and types of tests are selected vulnerability analysis, adapting the environment to verify according to security specifications of the organization and the sector to which it belongs.

CR 1.2 and testing programs are updated for testing consistent with potential security flaws versions of hardware and software installed in the computer system.

CR 1.3 The test results are analyzed, documenting as indicated in the rules of the organization.
CR 1.4
password access systems are checked using specific tools as specified by safety regulations.

CR 1.5 The documented vulnerability analysis, including accurate applications and services that were detected running on the system, the level of installed patches, denial of service vulnerabilities, detected vulnerabilities and network map references.

RP 2: Verify compliance with regulations, best practices and legal requirements to ensure confidentiality according to the needs of use and within the guidelines of the organization.

CR 2.1 Assigning security officer to all files with personal data is checked under the applicable rules.

CR 2.2 The status of the list of authorized to access each file people verified, checking that it is updated in accordance with the applicable regulations.

CR 2.3 The access control files are checked following the procedure laid down in the safety regulations of the organization.

CR 2.4 storage management of files and their backups are audited, checking is performed following the applicable rules and regulations of the organization.

CR 2.5 Telematic access to the files audited, checking is performed using mechanisms to ensure the confidentiality and integrity when required by the regulations.

CR 2.6 The audit report is made, including the relationship of files with personal data, the security measures and those pending application (nonconformity) as well as strengths and areas for improvement.

RP 3: Check compliance with established security policy to affirm the integrity of the system according to the needs of use and within the guidelines of the organization and taking into account national and international applicable regulations.


CR 3.1 The procedures for detection and management of security incidents are developed and reviewed, checking that are included in the safety regulations of the organization and include everything you need to efficiently manage any incidents that may affect to the organization.

CR 3.2 Access points and out of the network they are tested proving that its use is limited as described in the safety regulations of the organization.

CR 3.3 Activation and update security programs and protection systems are tested, seeing that correspond to manufacturers' specifications.

CR 3.4 points of entry and exit of the additional network is validated by verifying that authorize and control based on the specifications of security and the implementation plan of the organization.
CR 3.5
computer audit processes are reviewed, both internal, such as those performed by external personnel to the organization, checking that are enabled, and updated with the parameters specified in the rules of the organization.

CR 3.6 Compliance procedures security policies by users verified so that its correct application and adaptation to the needs of the organization security is detected.



Professional background:





Production facilities:



Corporate Office applications. Analyzers vulnerabilities. Tools to ensure the confidentiality of information. Programs that ensure the confidentiality and integrity of communications. Applications for project management. Analysis programs passwords. Control tools compliance with safety analysis methodologies. Audit program.



Products and results:



Vulnerability analysis reports. Ratio weak passwords. Log files of personal data, according to applicable regulations. Audit Report services and access points to the computer system.



Information used or generated:



Law regarding the protection of personal data. Security policy of the company.

Safety analysis methodologies. Security bulletins and notices of vulnerabilities available in electronic format. Computer system topology to protect.



COMPETITION UNIT 3: RESPONDING TO DETECT AND SECURITY INCIDENTS





Level: 3





Code: UC0488_3





professional accomplishments and performance criteria:



RP 1: Establish procedures for incident response and mechanisms for intrusion detection according to guidelines response teams to national and international incidents.
CR 1.1
screening procedures and incident response are located, making sure they are documented, indicating the roles and responsibilities of security and implementing the requirements of the security policy of the organization.
CR 1.2
systems modeling is done by selecting recording mechanisms to enable observing defined alarms, characterizing parameters of network usage and inventory files to detect changes and signs of suspicious behavior.
CR 1.3
activation mechanisms verified system registry, contrasting with the safety specifications of the organization and / or through a system of indicators and metrics.
CR 1.4
planning mechanisms log analysis is verified, so that the detection of unusual behavior is ensured through a system of indicators and metrics.

CR 1.5 The installation, configuration and updating of intrusion detection systems is verified according to security specifications of the organization and / or through a system of indicators and metrics.

CR 1.6 restoration procedures are verified computer system for recovering it before a serious incident within the needs of the organization.

RP 2: Detect security incidents and preventive actively to minimize the risk according to guidelines response teams to national and international incidents.

CR 2.1 The tools used to detect intrusions are analyzed to determine which have not been compromised or affected by malicious programs.
CR 2.2
suspicious operation parameters are analyzed with specific tools according to safety regulations.


CR 2.3 software system components are regularly checked with regard to their integrity using specific programs.

CR 2.4 The operation of physical protection devices is verified by testing according to the rules of the organization and / or safety regulations applicable.
CR 2.5
events and strange signs that could be considered an alert is reflected in the report for further analysis based on the severity of them and the policy of the organization.

RP 3: Coordinate the response to security incidents between the different areas involved to contain and resolve the incident as the service requirements and within the guidelines of the organization.

CR 3.1 The procedures contained in the protocols of the safety regulations of the organization are activated upon detection of a security incident.

CR 3.2 The information for forensic analysis of compromised system is collected once isolated the system according to the procedures of the safety standards of the organization and / or applicable regulations.

CR 3.3 The target system is analyzed by intrusion detection tools according to safety procedures of the organization.

CR 3.4 The intrusion is contained by implementing the measures in the safety standards of the organization and those extraordinary necessary although not preplanned.

CR 3.5 The documentation of the incident is carried out for further analysis and implementation of measures to prevent replication fact occurred.

CR 3.6 Possible actions to resume normal service delivery system violated are planned from determining damages, fulfilling the criteria of service quality and operational plan of the organization.



Professional background:





Production facilities:



Corporate Office applications. Analyzers vulnerabilities. Tools to ensure the confidentiality of information. Programs that ensure the confidentiality and integrity of communications. Applications for project management. Analysis programs passwords. Network monitoring software. Workflow software for sending alarms and incidents to responsible. IDS and consoles. SNMP console. Forensic analysis tools (creation of timelines, undelete, disk cloning, among other files).



Products and results:



Vulnerability analysis reports. Ratio weak passwords. Audit Report services and access points to the computer system. Activity Register. Security document. Alarm log. Action plans. Document security. Alarm log. Record of incidents. Audit report. Audit report. Impact assessment. Reporting incidents of personal data.



Information used or generated:



Law regarding the protection of personal data. Security policy of the company. Security analysis methodologies. Security bulletins and notices of vulnerabilities, mostly written in English, and available in electronic format. Working paper based on the security policy. internal rules intrusion detection and prevention of security threats.



COMPETITION UNIT 4: DESIGN AND IMPLEMENT INSURANCE SYSTEMS ACCESS AND DATA TRANSMISSION





Level: 3





Code: UC0489_3





professional accomplishments and performance criteria:



RP 1: Implement security policies and encryption of information in data exchange operations for secure connections to the needs of use and within the guidelines of the organization.

CR 1.1 Communication with other companies or through insecure channels are made using virtual private networks to ensure confidentiality and integrity of these connections during transit over public networks as specified in the applicable regulations and safety network design of the organization.

CR 1.2 The requirements to implement virtual private network solution are selected and reported to the network operator to achieve appropriate solutions to the security plan.
CR 1.3
protection techniques available wireless connections on the market are evaluated and those most suitable are selected, taking into account the principle of proportionality and the safety standards of the organization.

CR 1.4
services accessible through the telematic network that use cryptographic techniques to ensure the integrity and confidentiality of communications parameters are implemented according to the safety regulations of the organization.

CR 1.5 Encapsulation, or end-to-end encryption is enabled for those services accessible through the telematic network that do not incorporate cryptographic techniques to ensure the security of communications.
CR 1.6
Services incorporating support for digital certificates for server identification, are used to ensure the user's identity server.
CR 1.7
security policies and encryption of information exchange operations implemented data are documented in the format set out in the organization.
CR 1.8
Services incorporating a double or triple authentication factor, validation user certificates, electronic ID, 'token', biometric or other devices.

RP 2: Implement digital signature systems to ensure the authenticity, integrity and confidentiality of data involved in a transfer of information using cryptographic systems and protocols according to the needs of use and within the guidelines of the organization.

CR 2.1 Access to services through the telematic network is implemented so that use authentication based on digital certificates of personal identity.

CR 2.2 The process of obtaining and verifying signatures applies if necessary according to the requirements of the computer system and business processes.

CR 2.3 The use of digital certificates to sign and encrypt their content is secured in the transmission of emails.
CR 2.4
profile digital signature standard document used ensuring that is best suited to the use to be made.
CR 2.5
systems digital timestamping, to ensure the existence of a document at a certain date, are implemented according to the safety standards of the organization.

CR 2.6 Web components are digitally signed so as to ensure the integrity of those components.

CR 2.7 digital signature systems implemented are documented in the format set out in the organization.

RP 3: Implement public key infrastructure to ensure the safety of the system according to the standards and within the guidelines of the organization.

CR 3.1 certification hierarchy is designed according to the needs of the organization and intended use to give certificates.

CR 3.2 certification practice statement and certificate policy is drawn up so as to define the procedures and rights and obligations of those responsible for the certification authority and users.

CR 3.3 The certification authority system is installed according to the manufacturer's instructions.

CR 3.4 The digital certificate of the certification authority and its associated policy are made available to users in the form and manner required, following the guidelines contained in the certification practice statement.
CR 3.5
The private key of the certification authority is kept secure and backups established in the certification practice statement.

CR 3.6 The issue of digital certificates is performed according to the uses that will receive the certificate and following the procedures outlined in the certification practice statement.

CR 3.7 Service certificate revocation information remains accessible validity of certificates issued by the certification authority as stated in the certification practice statement.

CR 3.8 The public key infrastructure implemented are documented in the format set out in the organization.



Professional background:





Production facilities:



Programs secure connection. Systems to implement digital certification authorities. Servers and clients virtual private network (VPN). insurance supports for digital certificates.

Web with SSL / TLS support Servers. Traffic Wrappers with cryptographic support (HW and SW).

Programs secure connection to telematic services. Email interfaces with support for secure mail. Public Key Infrastructure (PKI) and secure signature creation devices (electronic ID, CSP and PKCS modules).



Products and results:




Certificate Policy. Certification Practice Statement. List of certificates issued and revoked certificates. Guidelines and recommendations for the implementation of secure communication systems. Guides use of digital certificates.



Information used or generated:



Legal regulations on digital signature. Standards and recommendations generally written in English. Manual installation of public key infrastructure (PKI), Certification Authorities (CA), electronic ID cards, digital certificates, 'token'.



COMPETITION UNIT 5: MANAGE THE SYSTEM SERVICES





Level: 3





Code: UC0490_3





professional accomplishments and performance criteria:



RP 1: Manage the system configuration to ensure process performance according to the needs of use and within the guidelines of the organization.
CR 1.1
processes involved in the system are identified so as to evaluate performance parameters.
CR 1.2
parameters affecting system components: memory, processor and peripherals, among others, they meet the needs of use.
CR 1.3
execution priorities are suitable processes depending on the specifications of the business plan of the organization.
CR 1.4
monitoring tools are deployed and configured by determining the levels of alarms depending on the business plan of the organization.

RP 2: Managing storage devices according to the needs of use and within the guidelines of the organization.

CR 2.1 storage devices are configured for use on different operating systems used in the computer system.

CR 2.2 storage structure is defined and implemented according to the needs of different file systems and specifications for use of the organization.
CR 2.3
object naming requirements and restrictions of use of each storage device is properly documented.

CR 2.4 storage devices are integrated to provide a functional system to the user according to the specifications of the organization.

RP 3: Manage user tasks to ensure system access and availability of resources according to specifications operating the computer system.

CR 3.1 user access to the computer system is configured to ensure the security and integrity of the system as specified by the organization.

CR 3.2 user access to resources administered by assigning permissions based on the needs of the organization.

CR 3.3 The resources available for limited users with appropriate based on specified in the rules of use of the organization tools.

RP 4: Manage network services to ensure communication between computer systems according to operating requirements.

CR 4.1 Communication services are established with a system service quality so that these communications are guaranteed.

CR 4.2 Communications devices are checked with regard to its configuration and performance as specified by the organization.

CR 4.3 Resource Consumption communications services are analyzed, verifying that are within permitted by the specifications of the business plan of the organization.
CR 4.4
incidents detected in communications services are documented to inform those responsible for the operation of the system and manage them according to the protocols of the organization.



Professional background:





Production facilities:



Operating systems. User management tools and management resources permit. Performance monitoring tools. Process monitoring tools. Monitoring tools memory usage. Monitoring tools storage device management. User management tools.



Products and results:



System operating correctly. Performance system suitable operating parameters.

Safe and full access and use of system resources. Communication services running.



Information used or generated:




Operating manuals operating system and device. Operating Plan of the organization. Manuals monitoring tools used. Graphics and performance analysis. Listings user access and restrictions. Incident report. Action protocol to incidents.



Training Module 1: SAFETY EQUIPMENT
COMPUTER




Level: 3





Code: MF0486_3





Associated with UC: Securing computers





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Analyze implementation plans of the organization to identify the system elements involved and the security levels to implement.

CE1.1 Identify the structure of an implementation plan, explaining the contents contained in each section.
Distinguish CE1.2
systems that can appear in the implementation plan, describing the security features implemented.

CE1.3 Describe the security levels listed in the implementation plan, linking them to the access permissions for implantation.

CE1.4 In a case study analysis of a security plan implementation and its impact on the system:

- Determine the systems involved in the implementation plan.

- Analyze the security requirements of each system.

- Describe the security measures to be applied to each system.

- Complete the forms for the declaration file of personal data.

C2: Analyze and implement mechanisms of physical and logical access to servers according to safety specifications.

CE2.1 describe the characteristics of the mechanisms of physical access control, explaining its main functions.
Exposing CE2.2
trace mechanisms, linking them to the server operating system.

CE2.3 Identify mechanisms logical access control, explaining its main features (passwords, IP filtering among other ports).

CE2.4 In a practical course of implementing mechanisms of physical and logical access in the implementation of a server according to a given specification:

- Determine the physical location of the server to ensure its functionality.

- Describe and justify physical security measures to be implemented to ensure system integrity.

- Identify additional modules or applications to implement the security level required by the server.

- Determine the threats that the server is exposed, assessing the risk they pose, given the context of the server.

- Determine the permissions assigned to users and user groups for using the system.

C3: To assess the role and needs of each service running on the server according to safety specifications.

CE3.1 Identify the usual services in the computer system of an organization, describing its mission within the IT infrastructure and communications.

CE3.2 Identify and describe the services necessary for the operation of a server, depending on its mission within the computer system of the organization.

CE3.3 Describe the threats of running services, applying the more restrictive permissions, ensuring its execution and minimize risk.

CE3.4 In a practical course of assessment of the role and need for services running, from a server implementation with a set of running services with correspondence to an operating plan as:

- Indicate the relationship between the server and the rest of the computer system of the organization.

- Extract implementation plan security requirements applicable to the server.

- Determine the minimum services necessary for the operation of the system.

C4: Install, configure and manage a firewall server with the necessary safety features according to specifications.

CE4.1 Sort the types of firewalls, network and local, hardware and software, and application packet, describing its main features and functionalities.

CE4.2 Describe the filtering rules of a firewall server, explaining the main parameters.

CE4.3 Explain the format trace a firewall server, reflecting the relevant safety information.

CE4.4 In a practical case of installing a firewall server in a scenario of local and remote access:

- Determine server security requirements.


- Establish relationships with other server computers in the computer system.

- Prepare the list of access rules to implement on the server.

- Composing a test plan implemented firewall.

- Execute the test plan, drafting the necessary corrections to correct the deficiencies identified.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.4; C3 respect CE3.4; C4 respect CE4.4.
Other capabilities
:

Keep the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.

Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Security management and risks



Security: security objective; threats; external and internal attacker; types of attack; protection mechanisms.

Risks: risk management process; methods of identification and risk analysis; risk reduction.



2. Physical Security



Protection computer system.

Data protection.



3. Security system logic



File systems.

File permissions.

Access Control Lists (ACLs) to files.

Records system activity.

User Authentication: weak authentication systems; strong authentication systems; Biometric authentication systems.

Introduction to Cryptography and Establishing password policies.



4. Remote system access



Mechanisms operating system for access control.

Server firewall: packet filtering; application-level firewall; records of firewall activity.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to underwriting of computer equipment which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: COMPUTER SECURITY AUDIT





Level: 3





Code: MF0487_3





Associated with UC: Audit communication networks and computer systems





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Analyze and select audit tools and vulnerability detection computer system implementing those that fit the specifications of computer security.

CE1.1 Explain the differences between vulnerabilities and threats.

CE1.2 State the characteristics of the main types of vulnerabilities and existing malicious programs, describing its particularities.

CE1.3 Describe the operation of a vulnerability analysis tool, indicating the main techniques used and the reliability thereof.

CE1.4 Select the tool most appropriate safety audit based on the server or network and security requirements.

CE1.5 In a case study, vulnerability scanning from a computer system in circumstances of specific implementation:

- Establish safety requirements to be met by each system.

- Create a new test for auditing tool, based on the specifications of vulnerability.

- Prepare the test plan taking into account the type of analyzed server.


- Use multiple tools to detect potential vulnerabilities.

- Analyze the results of the audit tool, discarding false positives.

- Write the audit report, reflecting the irregularities, and suggestions for regularization.

C2: Apply procedures relating to compliance with applicable regulations.

CE2.1 Explain the current legislation (regional, national, European and international) applicable to personal data.

CE2.2 Exposing the legal procedures must comply files with personal data, taking into account the quality of them.

CE2.3 Describe the safety levels established in the applicable regulations associating them to the requirements.

CE2.4 In a practical course of verification of compliance in which it has a record structure information of an organization:

- Identify the files with personal data, justifying the level of security it deserves.

- Develop the audit plan for compliance with regulations on the protection of personal data.

- Review the documentation associated with the files with personal data, identifying existing gaps.

- Prepare a report for files of a personal nature, indicating the deficiencies and corrections.

C3: Plan and implement security measures to ensure the integrity of the system and entry and exit points of the departmental network.

CE3.1 Identify the phases of risk analysis, describing the purpose of each.

CE3.2 Describe the terms associated with the risk analysis (threat, vulnerability, impact and countermeasures), establishing the relationship between them.

CE3.3 Describe network analysis techniques, explaining the selection criteria.

CE3.4 Describe topologies common network firewall, indicating its main features.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 respect to CE2.4.
Other capabilities
:

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Keep an assertive, empathetic and conciliatory attitude with others showing warmth and kindness in treatment.

Adapt to new situations or contexts.
Respect
procedures and internal rules of the organization.



Contents:





1. Exploit



Program failures.

Malicious software.

Secure programming.



2. Analysis of vulnerabilities



Local analysis.

Remote analysis: white box analysis; analysis black box.

Audit process optimization.
Contrast
vulnerabilities and audit report.



3. Applicable regulations



European regulations.

National legislation: Criminal Code; data protection regulations. Regulations for Automated Data Processing.

Procedures for the enforcement of data protection in the company.



4. Network Firewall



Components of a network firewall.

Network Firewall Types: packet filtering; network firewall application.

Network Architectures firewall: network firewall with two interfaces; demilitarized zone.

Other network firewall architectures.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the audit of communications networks and computer systems, which will be evidenced by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.


2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: MANAGEMENT COMPUTER SECURITY INCIDENT





Level: 3





Code: MF0488_3





Associated with UC: Detect and respond to security incidents





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Plan and implement intrusion detection systems according to safety standards.

CE1.1 Describe the techniques of intrusion detection and prevention, exposing the main parameters that can be used as screening criteria.

CE1.2 determine the number, type and location of intrusion detection systems, ensuring monitoring traffic indicated in the implementation plan.

CE1.3 Select the rules of intrusion detection system, depending on the computer system to be monitored.

CE1.4 determine the alarm thresholds system, taking into account the parameters of system usage.
Develop CE1.5
detection rules, based on the characterization of intrusion techniques.

CE1.6 From a practical course properly characterized alarm installation in which servers are located with the possibility of local and remote access:

- Installing and configuring software collection alarms.

- Configure different levels of alarm collection.

CE1.7 In several practical cases of implementation of detection systems in a controlled servers in various areas of a departmental network with Internet connection environment:

- Decide areas to protect.

- Install an intrusion detection system.

- Define and apply rules of detection.

- Check operation of attacking protected areas system.

- Prepare a report detailing findings.

C2: Apply procedures for information analysis and containment with a detected attack incidence.

CE2.1 Analyze information systems intrusion detection, removing those security-relevant events.
Analyze CE2.2
signs of intrusion, indicating the conditions necessary for the threat to materialize.

CE2.3 Sort the elements alerts intrusion detection system, establishing the possible correlations between them, distinguishing alerts at times and levels of security.

CE2.4 In a practical case, application of analytical procedures in which intrusion attempts made to the computer system:

- Collect alerts of intrusion detection systems.

- Relate events collected by intrusion detection systems.

- Determine those significant alerts.

- Prepare the report indicating the possible intrusions and associated risk to the security of the computer system of the organization.

CE2.5 Establish processes of updating intrusion detection tools to ensure their functionality according to manufacturers' specifications.

C3: Analyze the extent of the damage and determine the recovery process to a detected incident.

CE3.1 Describe the phases of the plan of action against security incidents, describing the objectives of each phase.
Indicate CE3.2
phases of forensic analysis of computer equipment, describing the objectives of each phase.

CE3.3 Sort the types of evidence from forensic analysis of systems, indicating their characteristics, methods of collection and analysis.

CE3.4 Describe the various techniques for analyzing malware, indicating use cases.

CE3.5 In a practical course coordinating response to an intrusion into a computer system:

- Perform volatile collecting evidence.

- Perform nonvolatile evidence collection.

- Preliminary analysis of the evidence.

- Temporal analysis of file system activity.

- Prepare the final report, collecting the evidence found, the potential vulnerabilities used for intrusion and activity by the intruder has been detected in the system.

CE3.6 Standardize disaster recovery methods of computer equipment to intrusion detection.

Capabilities whose acquisition should be completed in a real working environment:

C1 and CE1.7 CE1.6 respect; C2 respect to CE2.4; C3 respect CE3.5.
Other capabilities
:


Finish work according to criteria of suitability, speed, economy and efficiency.

Treat the customer with courtesy, respect and discretion.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Demonstrate flexibility to understand the changes.



Contents:





1. Management of security incidents



Justification of the need to manage security incidents.

Identification and characterization data of system operation.

Intrusion detection systems: computer-based (HIDS) systems; network-based systems (NIDS); intrusion prevention systems (IPS); decoys.



2. Security Incident Response



Information Collection.

Analysis and correlation of events.

Verification of intrusion.

Incident management bodies: National (IRIS-CERT, esCERT); International (CERT, FIRST).



3. Computer Forensics


Objectives
forensic analysis.
Principle
Lockard.

Collection of evidence.

Indeterminacy principle: Volatile evidence; nonvolatile evidence; labeling evidence; chain of custody.

Analysis of evidence: hidden files and directories; information hidden in the filesystem, Slack-space; recovery of deleted files; Forensic analysis tools.

Analysis of malicious programs: disassemblers; controlled execution environments.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to detecting and responding to security incidents, in own and foreign language, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 4: ACCESS INSURANCE SYSTEMS AND DATA TRANSMISSION





Level: 3





Code: MF0489_3





Associated with UC: Designing and implementing secure systems access and data transmission





Duration: 60

hours





Capabilities and evaluation criteria:



C1: Evaluate existing encryption techniques necessary to choose depending on the safety requirements.

CE1.1 Describe the differences between algorithms private key encryption and public key, indicating its different uses.

CE1.2 Identify the different encryption modes, describing the main features.
Sort CE1.3
different private key algorithms, describing their implementation phases.
Sort CE1.4
different public key algorithms, describing their implementation phases.

CE1.5 Identify the different key exchange protocols, describing its operation.

C2: Implement services and cryptographic techniques in those services which require computer security according to specifications.

CE2.1 Justifying the need to use cryptographic techniques in communications between computer systems based on the channels used.

CE2.2 Define encryption techniques to securely connect two networks describing the features and requirements.

CE2.3 Define the techniques used to securely connect two computers (SSL and SSH tunnels), describing the features and requirements.


CE2.4 In a practical course in which you want to establish a secure communication between two computer systems:

- Analyze the security requirements of the proposed communications architecture.

- Indicate the most appropriate solution, justifying the selection.

- Install and IPSec VPN services to connect networks.

- Install services SSL or SSH tunnels to connect remote computers.

C3: Using digital certificates systems in those communications requiring integrity and confidentiality according to safety specifications.

CE3.1 Identify the attributes used in digital certificates for server, describing their values ​​and function.

CE3.2 Describe ways to use digital certificates, associating them to safety specifications: confidentiality, integrity and accessibility.

CE3.3 Describe the structure of a digital seal, indicating the functions of the elements that comprise it.

C4: To design and implement digital certification services according to operational needs and security.

CE4.1 Describe the structure of the public key infrastructure, indicating the functions of the elements that comprise it.

CE4.2 Describe the services and obligations of the certification authority, relating to the certificate policy and certification practice statement.

CE4.3 Identify the mandatory and optional attributes of a digital certificate, describing the routine use of such attributes.

CE4.4 Describe the structure of a privilege management infrastructure, indicating the functions of the elements that comprise it.

CE4.5 determine the fields of certificates of attributes, describing his habitual use and the relationship with digital certificates.

CE4.6 In a practical course of establishing a certification system for a computer system:

- Design a public key infrastructure, depending on the specifications.

- Justify the hierarchy of certification authorities designed.

- Issuing certificates following the procedures outlined in the Declaration of Certification Practices.

Capabilities whose acquisition should be completed in a real working environment:

Respect CE2.4 C2; C4 respect CE4.6.
Other capabilities
:
Demonstrate interest
extensive knowledge of the organization and its processes.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Demonstrate stress resistance, stability of mood and impulse control.

Used to the pace of work of the organization.



Contents:





1. Cryptography



Information security and cryptography.

Basics.

Symmetric key encryption.

Digital signature.

Public key encryption.

Functions summary.

Encryption and block flow.

Key exchange protocols.



2. Secure Communications



Virtual Private Networks.

IP Security Protocol.

Encrypted tunnels.



3. Certification Authorities



Public Key Infrastructure (PKI).

Certificate policy and certification practice statement.
Hierarchies
certification authorities.

Privilege Management Infrastructure (PMI).



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the design and implementation of secure systems access and data transmission, which is evidenced by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.


- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 5: MANAGEMENT SERVICES IN THE SYSTEM





Level: 3





Code: MF0490_3





Associated with UC: Managing services in the computer system





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Analyze system processes to ensure adequate performance to the parameters specified in the business plan.
Identify
CE1.1 system processes and parameters that characterize (parent process, process status, consumption of resources, priorities and users affected among others) to determine their influence on system performance.

CE1.2 Describe each of the tools provided by the system to process management in order to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a practical course of analyzing the performance of a computer system with a load of well characterized processes:

- Use the system tools to identify how many active processes exist and the particular characteristics of some of them.

- Perform operations activation, deactivation and modification of priority among others with a process using system tools.

- Monitor system performance using specific tools and set alarms that indicate risk.

C2: Apply management procedures to storage devices to offer the user a registration system of the full, safe and available information.

CE2.1 Identify the different file systems used in a given storage device to optimize registration procedures and access to them.

CE2.2 Explain the characteristics of file systems based storage devices and operating systems used.

CE2.3 Describe the overall structure of the computer system storage devices associating with other existing file systems.

CE2.4 In a practical course of implementation of management procedures storing information with multiple devices:

- Perform partitioning, where necessary, and generating infrastructure file systems to be installed on each device.

- Implement the overall structure integrating all storage devices and their corresponding file systems.

- Documenting the requirements and restrictions of each file system implemented.

C3: Managing Access to the system and the resources to verify the proper and safe use thereof.

CE3.1 Identify opportunities for access to remote access system distinguish local access.

CE3.2 Describe the tools used in the management of permissions to users for the use of system resources.

CE3.3 In a practical course management system access in which it has right of user administration:

- Identify possible a user accesses the system.

- Modify the permissions to use a system resource to a user.

- Define use limitations of a system resource users.

C4: To evaluate the use and performance of communications services to keep within the specified parameters.

CE4.1 Explain the configuration parameters and operation of communications devices to ensure their functionality within the system.

CE4.2 Relate active communications services in the system with the devices used by them in order to analyze and evaluate performance.

CE4.3 In a case study evaluation of use and performance of a computer system connected to the outside through various communications lines:

- Identify communications devices and describe their characteristics.

- Check the status of communications services.

- Evaluate the performance of communications services.

- Identify and document any incidents arising in the system.

Capabilities whose acquisition should be completed in a real working environment:


C1 respect CE1.4; C2 respect to CE2.4; C3 respect CE3.3; C4 respect CE4.3.
Other capabilities
:

Keep the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.

Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Processes



States of a process.
Management
signals between processes.

Process Management.

Changing priorities.

Process monitoring.

Management resource consumption.



2. Storage Systems



Storage devices.

File systems.
General structure
storage.

System tools for managing storage devices.



3. User Management



Access to the system.

Permissions and access to resources.

Limitations of use of resources.



4. Communication services



Communications devices.

Communications protocols.

Communications services.

Yields communications services.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to service management in the computer system, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX VI


Professional qualification: Developing Applications with Web Technologies



Professional Family: Computers and Communications





Level: 3





Code: IFC154_3





General competence



Develop documents and software components that constitute applications in distributed environments using Web technologies, based on a ready-made, also performing verification, documentation and implementation of the same technical specification.



Competence units



UC0491_3: Develop software elements in the client environment

UC0492_3: Develop software elements in the server environment

UC0493_3: Implement, verify and document web applications in environments internet, intranet and extranet



Professional environment





Professional field



Develops his professional activity in the IT department dedicated to developing applications with Web technologies, public entities or private, small enterprises / medium / large or micro, both self-employed basis, regardless of its legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located in the service sector, sub-sector analysis, design and construction of applications with Web technologies and any other sector that uses computer systems to manage or make your business process via the Internet .



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Web Programmers

Programmers multimedia




Associate Training

(510 hours)






Training modules



MF0491_3: Web programming in the client environment (180 hours)

MF0492_3: Web programming in the server environment (240 hours)

MF0493_3: Implementation of web applications in environments internet, intranet and extranet (90 hours)



COMPETITION UNIT 1: DEVELOP SOFTWARE ELEMENTS IN THE ENVIRONMENT CUSTOMER





Level: 3





Code: UC0491_3





professional accomplishments and performance criteria:



RP 1: Develop static and dynamic documents with programming software tools for processing on the client environment to the specified design.
CR 1.1
Static and dynamic documents are developed to perform according to the specifications received from design and according to the security policy of the organization.

CR 1.2 The coding of documents is made taking into account the different development techniques and the client device environment (desktop, mobile devices, etc.), with markup languages ​​and software development standards.

CR 1.3 programming software tools are used for encoding documents without errors and that the documents are processed on the client environment.

CR 1.4 Errors in the documents produced are detected and corrected using debugging tools.

CR 1.5 Developed documents are tested to verify compliance with the functions specified in the design.

CR 1.6 tools centralized control or distributed versions are used to ensure control of software changes, facilitating the development and testing of modifications to new features and bug fixes.

CR 1.7 The documentation is carried out following patterns, rules and procedures established in the design.

RP 2: Develop software components on the client environment to meet the objectives of the design according to the given specifications.

CR 2.1 The development of the component is performed according to the specifications received from design and according to the security policy of the organization.

2.2 CR application logic is interpreted correctly identifying the elements necessary to encode the components.

CR 2.3 The coding of the components is performed using the various techniques of structured software development and programming standards.

CR 2.4 The code develops software component providing an interface capable of usability, accessibility and ergonomics according to design specifications and standards of the organization.

CR 2.5 components made errors are detected and corrected using debugging tools.
CR 2.6
developed components are tested to verify that they meet the objectives specified in the design.

CR 2.7 tools centralized control or distributed versions are used to ensure control of software changes, facilitating the development and testing of modifications to new features and bug fixes.

CR 2.8 The documentation of processed components is carried out following patterns, rules and procedures established by the organization.

RP 3: Develop specific applications on the client device environment to meet the design objectives according to the specifications given.

CR 3.1 The development of the specific application of the device is performed according to specifications received from design and according to the security policy of the organization.

CR 3.2 application logic is interpreted correctly identifying the components and documents that can be reused for coding.

CR 3.3 The specific application coding device is performed using various structured programming techniques, software development standards and specialized development tools for the client device.

CR 3.4 The specific application code is developed device providing an interface capable of usability, accessibility and ergonomics, according to design specifications and standards of the organization.

CR 3.5 Errors in the specific application of the device are detected and corrected using debugging tools.

CR 3.6 The specific application developed device is tested to verify that it meets the objectives specified in the design.


CR 3.7 tools centralized control or distributed versions are used to ensure control of software changes, facilitating the development and testing of modifications to new features and bug fixes.
CR 3.8
documentation developed application specific device is carried out following patterns, rules and procedures established by the organization.

RP 4: Developing multimedia components with specific tools and languages ​​to increase the functionality of the elements of the customer's environment, according to design specifications.

CR 4.1 audio and video components are arranged depending on the environment in which will be inserted, adjusting the output to digital formats and standards given performance specifications.

CR 4.2 graphics, illustrations or photographs are retouched and adjusted to obtain an output with a standard format using specific tools considering the device used in the customer environment and according to specifications received and the security policy of the organization.

CR 4.3 The animations that incorporate multimedia elements are configured using scripting languages ​​and other specific tools to meet design specifications given.

CR 4.4 The interactivity of multimedia elements is developed with scripting languages ​​and other specific tools according to instructions received.

CR 4.5 The developed component conforms to the criteria of accessibility, usability and ergonomics set by the standards and specifications of the organization and the rules governing intellectual property and copyright.

CR 4.6 The integration of multimedia elements in the client environment is verified to ensure product quality parameters according to the rules of the organization.

CR 4.7 tools centralized or distributed control versions are used to ensure control of software changes, facilitating the development and testing of modifications to new features and bug fixes.

RP 5: Include specific features in development documents, using software components on the client environment and developed under the applicable rules.
CR 5.1
already developed components are used as integral elements in the development of new components, according to the technical design and according to the security policy of the organization.

CR 5.2 The documents are built using components and software developed according to the specified design and in accordance with the applicable rules on intellectual property.

CR 5.3 The software component is configured through its properties and methods to adapt its functionality to user needs and the customer's chosen environment.

CR 5.4 Testing and documentation software components already made are made taking into account the rules defined in the technical design.

CR 5.5 The use of already developed software components is carried out ensuring the integrity of the system.

CR 5.6 System parameters affecting the ergonomics or ease of use conform to improve the working conditions of the user, within the guidelines of the organization.



Professional background:





Production facilities:



Computer and peripheral equipment. operating systems and configuration parameters. Office tools. Tools: rapid development, layout, graphics and animation. virtual machines. Browsers. Communication protocols. Integrated Development Environments - IDEs - multilanguage. multimedia tools. Debugging and testing tools. And software components developed and / or distributed by computer companies. Web servers. Security systems. Database engines for use in test environment. Development environments for local applications with Web technology - RIA -. Framework design - type Bootstrap -. Version control tools - GIT -.



Products and results:



Static and dynamic documents whose content is to be interpreted source code. graphical user interfaces. Documentation associated with the developed components.



Information used or generated:




Design and specifications of the application. overview of the system to perform, deliver and exploit. Manuals and operation of computer systems. Software operating manuals. Manuals of development tools used. Documentation of training courses. Documentation client operating environment. technical support for assistance. Regulations applicable intellectual property and copyright (Copyright). Documentation associated with the developed components. Manuals usability. Job Templates. Specifications corporate graphic design.



COMPETITION UNIT 2: DEVELOP SOFTWARE ELEMENTS IN THE ENVIRONMENT SERVER





Level: 3





Code: UC0492_3





professional accomplishments and performance criteria:



RP 1: Develop software components in the server environment meeting the design objectives according to the specifications given to complete the Web application.

CR 1.1 The software component code is developed using languages ​​that allow achieving the functions indicated in the specifications development.

CR 1.2 The component is encoded using standard techniques development from design patterns to obtain, if possible, reusable elements seeking maximum portability under the rules of the organization.

CR 1.3 The component is encoded with tools, format and code documentation indicated in the programming rules.

CR 1.4 interface component is defined and clearly documented, ensuring integration into the system.

CR 1.5 The developed component is subjected to batteries of tests needed in a standardized execution environment with debugging tools adequate to ensure proper operation according to the specifications of safety and quality of the organization.

CR 1.6 The creation and management of users, roles and profiles is made to meet the requests related to access to the software component on the server, following specifications received and according to the needs of the organization.

CR 1.7 server software components that can be accessed from the client environment is configured to ensure that they can only access them who should, following the guidelines and procedures and according to the security policy of the organization.

RP 2: Manipulating interfaces to access information stored in databases or other structures to integrate logic contained in the Web application according to the specifications given.

CR 2.1 The components are developed capabilities including connection to databases or other structures according to the specifications and using patterns of development for possible reuse.

CR 2.2 data is manipulated by the tools provided by the system according to design specifications.

CR 2.3 The query and data manipulation is done using languages ​​standard definition and manipulation of data according to the stipulations design.

CR 2.4 Connections to the management systems databases are configured following the guidelines provided by the organization.

CR 2.5 Developed components are tested to verify the functionality described in the design specifications and to ensure the integration of these with the system components and other applications installed according to the quality standards of the organization.

CR 2.6 Testing and documentation software components already made are made taking into account the rules defined in the technical design.

RP 3: Integrate development capabilities, using distributed according to established industry standards, to adjust the application to the design specifications services.

CR 3.1 The integration of other Web services in the Web application is used by using market standard technologies that allow exchange information quickly, easily and transparent manner with the Web application.
CR 3.2
management information exchange between the Web application in the server environment and other Web service is performed using the corresponding access interfaces depending on the technology used.

CR 3.3 Service Searches are performed to obtain the right to design specifications and integrate them into the Web application functionality.



Professional background:





Production facilities:




Computer and peripheral equipment. operating systems and configuration parameters. Office tools. Development and debugging tools. Third-party components. Managers protocols. Communications lines. Web servers. Application servers. management systems databases. File transfer tools (content synchronization). virtual machines. current browsers, and new technological concept. Security systems. Change control tools. Version control tools. SOA tools.



Products and results:



Source code software components. executable software code components. static and dynamic documents whose content is to be interpreted source code. own components of the server layer. Development documentation done.



Information used or generated:



Overview of the system to perform, deliver and exploit. Manuals and operation of computer systems. Software operating manuals. Manuals used programming languages. Training materials. technical design defined. technical support for assistance. Job Templates. Development documents made components.



COMPETITION UNIT 3: IMPLEMENT, DOCUMENT WEB APPLICATIONS VERIFY AND ENVIRONMENTS Internet, intranets and extranets





Level: 3





Code: UC0493_3





professional accomplishments and performance criteria:



RP 1: Deliver and distribute the Web application developed to be used by users as implementation plans and established quality standards.

CR 1.1 installation requirements for client development made and server environments are clearly expressed in regard to management and file system management needs within the parameters of installing applications in the organization.

CR 1.2 The security levels of application users are configured for proper use of it by source: Internet, intranet or extranet.

CR 1.3 Installation packages are created and configured so as to allow their distribution according to the rules of implementation of the organization.
CR 1.4
processes and installation scripts of the application are created and configured according to the specifications of implementation of the organization.

CR 1.5 documentation packages and scripts application installation is performed according to the parameters of the organization.

CR 1.6 installation processes are verified and checking the operation according to the quality standards of the organization.

RP 2: Perform tests to verify the operation of the software elements developed and ensure quality levels according to the design specifications that integrate the server environment and the client environment within the system.
CR 2.1
games tests and scenarios are arranged and controlled to perform the same, following design specifications of components and quality standards of the organization.

CR 2.2 Structural and functional testing of components are made with data sets and scenarios arranged in component design specifications and quality standards of the organization.

CR 2.3 Integration testing of component and access to data and other services are performed in response to functional specifications and quality standards of the organization.

CR 2.4 The documentation of evidence, both affecting the preparation, implementation and results thereof, is carried out according to specifications and standards development organization.

CR 2.5 The tests are performed in response to version control of components in verification and the tests themselves.

RP 3: Develop and maintain documentation of the Web application developed using documentation tools, according to the established quality standards.

CR 3.1 The documentation is drawn up in accordance with the rules and tools of documentation and meeting the quality specifications in the organization and taking appropriate specifications ergonomics.

CR 3.2 documentation generation tools are used to obtain adequate by the standards of documentation and organizational quality products.

CR 3.3 The documentation is developed taking into account the versioning and subsequent updates and maintenance according to design specifications and standards development company ensuring your understanding.




Professional background:





Production facilities:



Computer and peripheral equipment. operating systems and configuration parameters. Office tools. Browsers content. structured languages. Object-oriented languages. Development tools. Web servers. Debugging and testing tools. Component software distributed by computer companies. Documentation tools. Continuous integration tools. Ftp tools content publishing.



Products and results:



Test programs. Test games. Documents testing, certification, quality control, delivery and implementation among others. Production application.



Information used or generated:



Overview of the system to perform, deliver and exploit. Manuals and operation of computer systems. Software operating manuals. Manuals of development tools used. Documentation of training courses. Documentation server operating environment, and integration. technical support for assistance. Job Templates.



Training Module 1: WEB PROGRAMMING ENVIRONMENT CUSTOMER





Level: 3





Code: MF0491_3





Associate UC: Develop software elements in the client environment





Duration: 180

hours





Capabilities and evaluation criteria:



C1: Prepare documents using markup languages ​​and software development standards.

CE1.1 determine the different parts of a document created with markup language used for implementation.

CE1.2 recognize the different development techniques existing software on the market to improve system integration and production of documents by the specified design.

CE1.3 Use appropriate to generate internal documentation development according to design specifications brands.

CE1.4 In a practical course, properly characterized, of making documents with a markup language that allow interaction with the user having given specifications:

- Write brands that allow change text attributes used and change the background color and image of the document.

- Create marks concerning tables and lists and links to other documents.

- Integrate brands that allow the inclusion of static or dynamic images, sounds and videos and frameworks to relate concerning various documents.

- Integrate brands that allow the execution of client programs and controls.

- Build forms to collect and validate user information and design interactive maps to facilitate accessibility.

- Plan special effects to be applied in the documents to be processed.

CE1.5 Describe general characteristics concerning 'stylesheets' to be applied in drawing up the documents according to the specified design.

Use CE1.6 brands to provide different styles to documents developed by the specified design.
Build CE1.7
documents using markup languages ​​to allow the user to use mobile devices and specific means of accessibility.

C2: Create software components using tools and scripting languages ​​using structured development techniques.

CE2.1 Relate component functionality to develop software development techniques structured to meet standards such functionality.

CE2.2 Formulate data structures and control flow through scripting languages ​​as the functionality of the software component to develop.

CE2.3 Create appropriate procedures and the functionality of the software component developed using scripting languages ​​functions.

CE2.4 In a practical course, properly characterized, creation and maintenance of software components in the customer's environment through development tools and scripting languages ​​providing detailed design documentation:

- Create and archive software components.

- Modify and remove software components.

- Debug and verify developed software components.

- Documenting the developed software components according to design specifications.

C3: Creating specific device applications using specific tools and development environments.

CE3.1 Relate application functionality to develop specific development techniques for that device.

CE3.2
Defining data structures and control flow through structured according to software functionality to develop languages.

CE3.3 Create procedures, functions and interfaces adapted to the specific application functionality using structured languages ​​to develop user.

CE3.4 In a duly characterized, creation and maintenance of specific device applications in the client environment using specific tools and development environments providing detailed design documentation practical course:

- Create and archive specific device applications.

- Modify and delete specific device applications.

- Debug and verify the applications developed.

- Post, if any, applications in public repositories of applications for that device type.

- Documenting applications developed according to design specifications.

C4: Create and manipulate multimedia components using scripting languages ​​and specific tools.

CE4.1 Identify the standard formats of distribution and use of multimedia components, audio, video, illustrations, photographs, among others, for integration into customer documents environment.

CE4.2 develop animations and interactivity in multimedia components by specific script languages ​​following parameters given.

CE4.3 Create or manipulate multimedia components using specific tools to adapt the content to the formats specified in the specifications.

CE4.4 In a practical course, properly characterized, integration of multimedia components in a Web document:

- Analyze the formatting of the original multimedia components.

- Perform the necessary adjustments in the formats of the multimedia components to achieve the required performance.

- Develop interactive processes defined in the specifications.

- Integrate multimedia components in the document the client environment.

- Check the integration and functionality of the components according to design specifications.

C5: Apply techniques of usability and accessibility in developing user interfaces.

CE5.1 Distinguish and explain content accessibility guidelines in the documents produced to allow better navigation and understanding by users.

CE5.2 Distinguish and explain the usability guidelines contained in the documents produced to allow better quality, effectiveness and user satisfaction.

CE5.3 In a practical course, properly characterized, application of standards of accessibility and usability components and software already developed to improve their use documents:

- Use accessibility standards to improve their use.

- Apply usability standards to optimize its use.

C6: Select software components developed by their functionality and to integrate them into documents.

CE6.1 Analyze requirements using software components to be used by the document in the client environment.

Insert CE6.2 software client application components that will be used by the document in the client environment.

CE6.3 In a practical course, properly characterized, selection of already developed software components to be integrated into documents, development tools and scripting languages ​​based on detailed design documentation:

- Integrate software components oriented file management techniques on the server.

- Integrate software components that enable error handling.

- Integrate software components to store dictionary information type.

- Integrate software components to control and validate the information entered by the user.

- Integrate software components to display information about the file system on the server.

- Integrate software components to allow dynamic effects related to the document or device used.

- Integrate software components to use other features in the document developed.

- Check that the functionality provided by the component match the expected and that no conflicts occur with other system components.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.4; C3 respect CE3.4; C4 respect CE4.4; C5 respect CE5.3; C6 respect to CE6.3.
Other capabilities
:

Keep the work area with the appropriate degree of order and cleanliness.


Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.

Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Development Web software on the client



Technological platforms and development environments on the client.

Choosing a platform: criteria.

Browsers.



2. Markup languages ​​



Features markup languages.

Versions of markup languages.

Markup language elements.

Structure created a document markup language.

Brands to document specific documents.

Presentation style: text size; color, font, and other text characteristics; formatted text.

Lists; types of lists.

Tables; types of tables.

Links: hypertext documents.

Marcos.

Integration of client applications.

Marquesinas.

Forms: Treatment of user information.

Interactive maps: operation; construction.

Dynamic effects in the document.

Other features of markup languages.

Oriented languages ​​marked mobile technologies: features; Specifications.



3. Style Sheets



Concepts stylesheets.
Types
style sheets.

Stylesheets and scripting languages.

Style attributes for text, margins and alignment and background colors among others.

Association of styles.

Class assignment.



4. Multimedia content



Storage formats: graphics (illustrations and photographs); Audio; video.

Multimedia tools: graphic processing and retouching; Audio; video processing.

Integration of multimedia components: players; 'Plugins'.

MIME Types.



5. structured programming techniques



Basic elements: constants, variables, operators and expressions.

Control structures: sequential, conditional and repeat.

Functions and procedures: current and formal parameters; parameter passing; calls to functions and procedures.

Structured programming methodology.



6. Scripting languages ​​



Features scripting languages ​​on the client environment.

Language data types.

Operators.

Control structures of language.

Choice of language. Characteristics.

Procedures and functions.

Library functions and procedures.

Specific brands for internal documentation of developments.

Client application integration.

Managing Files on the server (copy, delete, modify, write, etc.).

Handling errors.

Storage of information and data dictionaries.

Management attributes of the file system on the server.

Special effects text, messages, backgrounds, forms, navigation, menus, images, mouse, keyboard, among others.

Additional features implemented with components developed with scripting languages.

Processes of animation and interactivity.

Development Tools scripting languages.

Types of development tools: integrated development environments; authoring tools.

Features of development tools.

Debugging and verification.



7. Techniques of accessibility and usability



Web Accessibility concepts; problematic; advantages of accessibility; accessibility guidelines and techniques.

Web Usability Concepts; importance of usability; usability failures.

Combination of usability and accessibility.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the development of software elements in the client environment, which is accredited by one of the following two ways:


- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: WEB SERVER PROGRAMMING ENVIRONMENT





Level: 3





Code: MF0492_3





Associate UC: Develop software elements in the server environment





Duration: 240

hours





Capabilities and evaluation criteria:



C1: Create software components technologies object-oriented development.

CE1.1 In a practical course management software components in the server environment using development tools and programming languages ​​from detailed design documentation:

- Create and archive software components.

- Modify and remove software components.

- Debug and verify developed software components.

CE1.2 Create objects, classes, and appropriate software component functionality to programming languages ​​developed using object-oriented methods.

CE1.3 Formulate data structures and control flow through programming languages ​​based object-oriented software component functionality to develop.

CE1.4 Documenting the software component developed.

CE1.5 In a practical course, properly characterized, creation of software components using development tools and programming languages ​​object-oriented from detailed design documentation:

- Integrate software components control the content of the documents located on the server to be used in the environment of the type servlet client.

- Integrating file management and errors in the software development component.

- Use server variables in the software component to be developed to provide access to the server properties.

- Integrate tracking user sessions and properties of the Web application to develop the software component to build.

- Create software components with the client application functionality to be used in the type applet client environment.

- Create software components that can provide functionality to other software components on the same server or other servers on the network.

C2: Develop components that allow access and manipulation of information supported databases and other structures.

CE2.1 Create software components using objects or components specific connectivity to access information stored in databases and other structures.

CE2.2 Integrate SQL statements in the software components to access and manipulate information in databases located.

CE2.3 In a practical course of development of software components that access data supported in databases or other storage structures:

- Identify elements and structures contained in a database.

- Use objects, connectors, and middleware needed in building component for access to the data supported in the database or other structures according to given specifications.

- Perform operations supported definition and manipulation of information in databases using SQL.

CE2.4 determine the main features of a standard extended markup language for sharing information between software components and databases or other structures.

CE2.5 integrate features of a standard extended markup language in the development of software components supported to share information in databases or other structures.

C3: Select and use distributed for the Web application integration services.

CE3.1 Identify the possibilities offered by distributed Web services for integration into the application to develop.

CE3.2 specify the characteristics of the market standard protocols to use Web services in the application to develop.

CE3.3 Select and use the most suitable for use in the Web application design based on the specified Web services.

Capabilities whose acquisition should be completed in a real working environment:

C1 and CE1.5 CE1.1 respect; C2 respect to CE2.3.
Other capabilities
:


Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Keep an assertive, empathetic and conciliatory attitude with others showing warmth and kindness in treatment.

Adapt to new situations or contexts.
Respect
procedures and internal rules of the organization.



Contents:





1. The software development process



The process of software development: life cycle; methodologies and techniques.

Management of software development projects.

Tools and software development standards.

Software Quality: criteria; metrics and quality standards.



2. Characteristics of object-oriented programming (OOP)



Basics of OOP: classes, subclasses and objects; messages; methods.

Features of OOP.

Abstraction: heritage; encapsulation; polymorphism.

Features object-oriented languages.



3. management systems databases and other storage structures



Data Structures: definition and basic elements; types of data structures: simple and structured; static and dynamic.
Data files
Concepts; terminology; types of data files; organization of data files; access to data files.

Databases: concepts; terminology; database model; relational model.

Transactions.



4. Characteristics of Structured Query Language (SQL)



Main structure of an SQL statement.

SQL query statements data.

SQL Statements maintenance data.

Advanced management statements SQL databases.



5. technological platforms and development tools, programming languages ​​server



Technological development platforms in the server environment.

Types of development tools.

Features of development tools.

Debugging.



6. Server Programming Languages ​​



Choice of language. Characteristics. Criteria.

Language data types.

Operators.

Control structures of language.
As
document the software component.

Automatic generation of documentation.

Development of software components oriented business logic.

Handling errors.

File Management.

Event Management.

Using server variables.

Monitoring session.

Developing client applications for use in the client browser.

Access to databases and other structures using different technologies sources or data sources.

Integration of SQL statements in the software components.

Additional features programming language server.



7. Extended standard languages ​​(XML)



History Standards Extended marked languages.

Structure of an extended marking language: well-formed documents; validated documents.

Specifications extended markup language: document type definition (DTD); extensible style language (XSL); extensible language links (XLL); user agent extended standard language marked (XUA); Extensible Markup Language hypertext (XHTML).

XML schemas.

Analyzers XML.

Entities.

Exchange of information between software components using XML.

Additional specifications of XML.



8. Distributed Services



Concept of distributed services.

Features distributed client and server services distributed services.

Distributed services and extended markup language (XML).

Technologies used in distributed services.

Technical interoperability using the HTTP protocol.

Technologies used in the publication of distributed services.

Access to directories distributed publishing services.



9. Access to services distributed using a programming language server



Features client software components on the server to access other software components distributed.

Features server software components to be accessible by other software components distributed.


Features client or server software components using a programming language server using the techniques and methods described in a publication distributed directory services.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to web server programming environment, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: IMPLEMENTATION OF WEB APPLICATIONS IN ENVIRONMENTS INTERNET, intranets and extranets





Level: 3





Code: MF0493_3





Associate UC: Implement, verify and document web applications in environments internet, intranet and extranet





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Establish installation processes and application distribution in different areas of implementation.

CE1.1 determine the different phases, processes and information technologies involved in the installation and distribution of the Web application.

CE1.2 In a duly characterized, installation and distribution of a Web application in the fields of Internet, intranet and extranet practical course:

- Establish the installation requirements and application distribution.

- Define the directory structure on the server environment to locate documents and software components developed in the Web application, identifying resources affected by the development made.

- Indicate the necessary services on the server environment to run the Web application.

- Specify the configuration parameters and security on the server and client for the Web application.

- Create and configure the installation packages so.

- Check the proper functioning of the installation process and distribution.

C2: Develop and maintain documentation using the Web application generation tools and controlling documentation versions.

CE2.1 Identify the different tools documentation generation and control of existing versions.

CE2.2 In a duly characterized, processing and maintaining documentation Web application practical course:

- Assess whether the documents and software components have been documented by the standards of documentation and quality of the organization.

- Check that the documentation is developed and updated taking into account the version control.

- Assess whether the documentation is made using existing documentation tools in the business organization.

C3: Select and use methods and test kits to verify the functionality and performance specifications of the Web application.

CE3.1 Sort the different methods used to verify the proper functioning of the Web application developed.

CE3.2 In a practical course, properly characterized, verification of the functionality and performance specifications of the Web application using test kits:

- Check on the client environment: documents developed using markup languages, the software components developed using scripting languages, usability and accessibility in developing user interfaces and integration of software components already developed web application .

- Check developed software components in the server environment using programming languages ​​object-oriented.

- The software components access databases or other structures.

- The use of Web application Web services.


- The server performance according to the Web application developed and the number of users at any given time using the application.

- Optimizing the Web application based on the parameters obtained in the validation of the tests.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.2; C2 respect to CE2.2; C3 respect CE3.2.
Other capabilities
:

Treat the customer with courtesy, respect and discretion.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Demonstrate flexibility to understand the changes.



Contents:





1. Architecture of Web applications



The dimensions of the network: Internet, intranet and extranet.

Introduction to network services.

Principles and components of the Web.

Servers and clients on the Web: characteristics; hardware and software for servers and clients; browsers: characteristics.

Web Applications: Web applications development; Web development technologies applications; types of Web applications.

Architecture of a Web application: the multilayer architecture.

Hypertext Transfer Protocol (HTTP).

Features and functions of servers: databases; Web servers; LDAP servers; application servers.

Existing support services in the computer system: characteristics.



2. Implementation of Web applications



Directory structure.

Resource allocation.

Services in the computer system used by a Web application.

Configuration Files Web application.

Security levels of the Web application.

Verification process of installing a Web application.



3. Verification of Web applications



The testing process.
Planning
testing.

Testing strategies.
Testing
defects; black box testing; structural testing; testing interfaces; stress tests.

Checks static Web applications. Testing user interfaces. Inspections of the elements of the Web application.

Performance statistics.



4. Documentation Web applications



Documentation: characteristics; types; technical documentation for the technical user; guide to using the Web application.

Automatic generation of documentation.

Tools documentation.

Versioning: Versioning administration; monitor changes; version control group; confirmation of changes, preventing changes; reduction changes.

Tools for version control.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the implementation, verification and documentation of web applications in environments internet, intranet and extranet, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX VII


Professional qualifications: Preparation and Publication of Web Pages



Professional Family: Computers and Communications





Level: 2





Code: IFC297_2





General competence




Create Web pages that integrate text, images and other elements, using appropriate markup languages ​​and editors, according to specifications and conditions 'usability' given and publish them on the appropriate server.



Competence units



UC0950_2: Build web pages

UC0951_2: Integrate software components in web pages

UC0952_2: Post websites



Professional environment





Professional field



Develops his professional activity in the IT department dedicated to software development with Web technologies, public entities or private, small enterprises / medium / large or micro, both self-employed basis, regardless of its legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located mainly in the service sector, subsector software development with Web technologies or services marketing analysis, design and construction of infrastructure applications for intranets, extranet and internet, as well as in any productive sector that uses computer systems to manage them.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Website Developers



Editors Web pages Programmers

client Web pages


Associate Training

(510 hours)





Training modules



MF0950_2: Construction of web pages (210 hours)

MF0951_2: Integration of software components in web pages (210 hours)

MF0952_2: Publication of web pages (90 hours)



COMPETITION UNIT 1: BUILD WEB PAGES





Level: 2





Code: UC0950_2





professional accomplishments and performance criteria:



RP 1: Prepare the environment for the creation and verification of Web pages, according to the quality standards of the organization.
CR 1.1
editing tool is installed and configured in order to use it in developing Web pages, following the specifications received.

CR 1.2 Attendees who provide editing tools are identified and used to facilitate the creation of pages, according to the technical specifications of the tool.

CR 1.3 The elements provided by the authoring tool are inserted and configured, using the options (menus, toolbars, controls) that provides, according to the design specifications received.

CR 1.4 Web publishing tool is installed and configured pages for publishing pages developed, following the quality standards of the organization and the technical specification of it.

CR 1.5 software verification tools are installed and configured in order to perform testing and debug pages developed, following the quality standards of the organization and technical specifications thereof.

RP 2: Create Web pages and retouch already made using markup languages, according to the design specifications received.

CR 2.1 The information provided by the markup language used to present information on Web pages according to design specifications received.

CR 2.2 The type of content to display (text, images, tables, multimedia, links, etc.) on the page is identified and the corresponding labels provided by the language, following the design specifications received are used.

CR 2.3 Attributes and values ​​of the elements are identified and adjusted to improve the format, functionality and design of the page, according to the design specifications received.

CR 2.4 Style sheets are created to standardize the look of the pages and make them more attractive, according to design specifications and development received.

CR 2.5 The layers are created to add behaviors within the Web page, using the information provided by the tool according to design specifications and development received.


CR 2.6 The modifications to be made on the website are developed to adapt the page to the new changes, according to the design specifications received.

CR 2.7 The page developed documented for later use and modification following the patterns, rules and procedures established in the design and quality standards of the organization.

RP 3: Adding functionality to Web pages creating interactive interfaces and other reusable items, following the design specifications received.

CR 3.1 templates are created by defining the elements that compose and editable and non-editable regions and apply to the pages to fit a predefined design, following the design specifications and development received.
CR 3.2
form objects (text fields, list boxes, check boxes and radio buttons, etc.) are identified and inserted into pages to interact with the data according to design specifications and development received .
CR 3.3
already developed components and Web pages are integrated throughout the website to ensure the integrity and functionality of the system, according to the design specifications received.

CR 3.4 The new component is configured to integrate through its properties and methods to adapt its functionality to user requirements and design specifications received.

CR 3.5 The type and format of content to dynamically create the page is identified and configured using the tools of content management system and following design specifications received.
CR 3.6
system access to content is configured to prevent unauthorized entry, according to the design specifications received, the safety standards of the organization and the applicable regulations.
CR 3.7
developed new functionalities are documented for later use and modification following the patterns, applicable regulations and procedures established in the design and quality standards of the organization.

RP 4: Testing to verify the correct operation of the developed Web pages and ensure quality levels according to the design specifications received.

4.1 CR tested performed pages in Web browsers to verify compliance with the functions specified in the design as well as criteria of 'usability' and accessibility defined by the organization, according to established procedures.

CR 4.2 Modified pages are tested on Web browsers to verify their integration into the Web site and that meet specified design features and criteria of 'usability' and accessibility defined by the organization, according to established procedures.
CR 4.3
errors made pages are detected and corrected using the editing tool itself, to ensure compliance with design specifications, quality criteria and testing procedures of the organization.

CR 4.4 Integration testing of software already developed components are made in response to functional specifications and quality standards of the organization.

CR 4.5 tests data access and other services are performed to verify the security level of the Web site, based on functional specifications and quality standards of the organization.

CR 4.6 The test results documented for registration and subsequent use following the applicable regulations and procedures established in the design and quality standards of the organization.



Professional background:





Production facilities:



Computer and peripheral equipment. Operating systems. Office tools. Web publishing tools. current browsers, and new technological concept. Markup languages. Languages ​​'script'. multimedia tools. Communication protocols. Web servers. Standards 'usability' and accessibility. Applications for verification of accessibility of Web sites. Content management systems (CMS).



Products and results:



Web pages made and tested. interactive interfaces and reusable elements on Web pages.



Information used or generated:




Design specifications and pages to perform. Operating Manuals Web editing tools. Job Templates. Specifications corporate graphic design. Applicable regulations on intellectual property and copyright. Documentation associated with the developed pages. Manuals 'usability'. Quality standards and criteria 'usability' and accessibility defined by the organization. CMS technical documentation. Specification format and content. Rules on access to the Web page. Documentation of developed pages. Documentation of performance tests of developed pages.



COMPETITION UNIT 2: INTEGRATE SOFTWARE COMPONENTS IN WEB PAGES





Level: 2





Code: UC0951_2





professional accomplishments and performance criteria:



RP 1: Run and interpret software components developed in languages ​​'script' client, following specifications received.

CR 1.1 operating logic scripts interpreted correctly identifying the elements needed to encode them to determine the necessary structures to develop, according to design specifications and development received.

CR 1.2 data types used in the scripts are identified to describe the values ​​that store, taking into account the technical specifications of language and design specifications and development received.
CR 1.3
operations input, output and calculation performed in the scripts are developed to obtain the required functionality, following the design specifications and development received.

CR 1.4 The scripts are developed using the elements, objects and event handlers provided by the language 'script' for the required functionality, following the design specifications and development received.

RP 2: Adjust software components already developed in Web pages to add functionality to them, following specifications received.
CR 2.1
already developed components are searched and selected collections of the organization or on the Internet, in order to integrate them into the pages according to the established procedure.

CR 2.2 functional specifications of the components developed and interpreted, to locate and configure it within the page to be carried out according to established procedures.
CR 2.3
already developed components are adjusted and integrated into the pages to include specific functionality according to the established procedure.

CR 2.4 attributes and properties of the elements that form the components already developed are identified and modified, to fit the functionality of the page which is to be integrated according to the specifications received.

CR 2.5 Documentation on changes made to the Web page development is performed for subsequent registration in accordance with the rules of the organization.

RP 3: Check the integration of software components into Web pages to ensure compliance with the expected features, according to the quality criteria of the organization.

CR 3.1 component integration testing are performed to verify the functionality of the page, based on functional specifications and quality standards of the organization.

CR 3.2 pages already developed software components are tested using a browser to verify that it meets the specifications given in accordance with established procedures.
CR 3.3
integration errors are detected and corrected using the specified tools to ensure compliance with the functionality of the component within the page.

CR 3.4 documentation integration testing is performed for subsequent registration, according to the specifications and quality standards of the organization.

CR 3.5 The use of already developed software components is carried out, ensuring the integrity of the system and the distribution criteria and standardization of the organization.



Professional background:





Production facilities:




CR 3.3 The initial page 'home page' and all that are defined as linkable externally, are linked by hyperlinks from the source system to verify the relationships of all the pages that make up the site as per the specifications received.

CR 3.4 Developed pages are published to expose their information, using manual or automated procedures, search engines and directories, according to preset criteria availability.



Professional background:





Production facilities:



Computer and peripheral equipment. operating systems and configuration parameters. Publishing Tools page. Transfer tools. Browsers. Internet browser. Communication protocols. Debugging and testing tools. Web servers.



Products and results:



Web pages, published and verified its operation.



Information used or generated:



Design and specifications of the application. Manuals and operation of computer systems. Software operating manuals. Manuals publishing tools used. Documentation of training courses. Documentation client operating environment. Documentation management server environment. Quality standards and criteria 'usability' and accessibility defined by the organization. Test plan.



TRAINING MODULE 1: CONSTRUCTION OF WEB PAGES





Level: 2





Code: MF0950_2





Associated with UC: Build web pages





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Identify the elements provided by markup languages ​​and make Web pages using these languages ​​considering their technical specifications.

CE1.1 Describe the structure of a Web page written using markup languages, as well as sections header and document body, to identify parts that form as a specified design.

CE1.2 Describe the tags and attributes that are used to format the document and to present information in tabular and lists.

CE1.3 Describe the tags and attributes that are used to insert links and routing, both within the Web page as other documents and pages located at any destination.

CE1.4 Identify the types of media files formats, both audio and video that are integrated into the Web pages.

Quote CE1.5 tags and attributes needed to insert images and multimedia elements as well as to create image maps based on the specifications received.

CE1.6 Explain the criteria of 'usability' and accessibility to Web content, to allow better navigation quality and understanding of users, taking into account defined criteria and standards of accessibility and 'usability'.

CE1.7 Create a Web page containing multiple frames for presentation of other pages, following some design specifications received.

CE1.8 In a duly characterized, realization of Web pages to present information with a markup language according to a specified design practical course:

- Choose tags to format the document, presenting information in lists and tables, applying criteria of 'usability' and accessibility.

- Mapping an image creating multiple active zones.

- Insert labels, applying criteria of 'usability' and accessibility, for:

- Move within the same page.

- Link documents and Web addresses

- Present images, sounds and videos.

- Allow execution of programs.

- Specify labels to create frames and link multiple pages.

- Create layers to present information in different parts of the page.

- Identify multiple browsers and test the functionality of the page and document page made.

C2: Identify the features and functionality of the Web publishing tools and use them in creating Web pages taking into account their development environments.

CE2.1 Identify the functions and features of the tools used for editing Web pages, taking into account the technical specifications thereof.

CE2.2 Interpret technical documentation provided by the authoring tool to use to help in making Web pages, according to the technical specifications thereof.


CE2.3 In a practical course, properly characterized, installation and configuration of an editing tool Web page, according to a specification received:

- Install editing tool following the technical specifications.

- Set the tool to use.

CE2.4 In practical cases, properly characterized, of making a Web page with Web publishing tools, according to a specified design:

- Identify the components that provides the tool to insert elements on the page.

- Set the attributes and properties of inserted elements.

- Test page made using various web browsers.

- Correct any errors that arise in the development of the page.

- Documenting the page made.

C3: Make templates for Web pages in response to the design specifications received.

CE3.1 Describe the features offered by the Web templates in developing pages with identical design.

CE3.2 Describe the utilities that provide editing tools to create Web pages templates, taking into account the technical specifications of the tool.

CE3.3 In a practical course, properly characterized, creation of Web templates with editing tools, according to a specified design:

- Identify the editable and non-editable regions that form the template.

- Insert the elements and assign the specified attributes.

- Apply criteria 'usability' and accessibility.

- Apply a template created a Web page.

- Test the Web page associated with the template using various Web browsers.

- Documenting the template done.

C4: Create forms and integrate them into Web pages to include interactivity in them, following a functional specifications received.

CE4.1 identify tags and attributes used in the creation of forms, taking into account the markup language specification.

CE4.2 Describe the tags and attributes that are used to define the controls that make forms based interactions to drive.
In a practical
CE4.3 course, properly characterized, pages embodiments incorporating forms for interacting with the user, according to a specified design:

- Identify the controls to be created and placed within the form.

- Assign the properties specified input controls.

- Assign properties to the form (action, method and type of coding).

- Apply criteria 'usability' and accessibility.

- Test the page and the form using various Web browsers.

- Correct any errors that arise in the development of the page and the form.

- Documenting the page made.

C5: Describe the characteristics of style sheets to format Web pages, and create style files according to a specified design.

CE5.1 Identify the features and benefits provided style sheets to define the presentation of Web pages according to the specified design.

CE5.2 Describe the tags and attributes that are used to define styles for a page and for parts of it, given some design specifications.

CE5.3 Describe the syntax and attributes that are used to create styles in order to create files with statements of styles.

CE5.4 Linking the pages of a Web site with a style file to standardize the appearance of a website according to specifications received.

Ce5.5 In a practical course, properly characterized, embodiment of a file with style declarations to standardize the format of a Web site, according to a specified design:

- Identify the syntax used to assign the style tags.

- Link Web pages to file styles.

- Test pages using various Web browsers.

- Apply criteria 'usability' and accessibility.

- Documenting the file created.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.8; C2 and CE2.4 CE2.3 respect; C3 respect CE3.3; C4 respect CE4.3; C5 respect ce5.5.
Other capabilities
:

Demonstrate creativity in the development of the work done.

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.


Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Adapt to new situations or contexts.



Contents:





1. markup languages ​​



Features markup languages.

Structure created a document markup language.

Web Browsers.

Marked to format the document.

Creating tables and lists.

Links and addresses.

Marcos and layers.



2. Images and multimedia



Inserting images: formats and attributes.

Imagemaps.

Image processing.
Treatment
video.

Inserting multimedia elements: audio, video and programs.

Audio and video formats.

Marquesinas.



3. Techniques accessibility and usability



Web Accessibility advantages of accessibility.

Web Usability, importance of usability.

Applications to verify the accessibility of Web sites (standards).

Design usable Web sites.

Adaptation of usable Web sites.



4. Tools Web edition



Functions and features.



5. Forms in building Web pages



Features.

Form elements and attributes.

Form controls.

Forms and events.

Accessibility and usability criteria in designing forms.



6. Templates in building Web pages



Functions and features.

Editable and non-editable fields.

Apply templates to Web pages.



7. Style Sheets building Web pages



Functions and features.

Style Sheets and accessibility.

Style types: embedded, linked, imported online.

Selectors and style rules.

Style attributes for font, color and background, text and blocks (paragraphs).
Creating
style files.



8. Verification and validation of Web pages



Validation tests.

Verification tests.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to building Web pages, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: INTEGRATION SOFTWARE COMPONENTS IN WEB PAGES





Level: 2





Code: MF0951_2





Associate UC: Integrate software components in web pages





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Identify programming structures and data types used in the development of scripts, according to a specification received.

CE1.1 Describe the sequential structures, conditional and iteration are used to group and organize the actions of a program.

CE1.2 recognize the language syntax 'script' that describe the programming structures in developing scripts, according to the technical specifications of language.

CE1.3 Explain the types of data used to represent and store the values ​​of the variables in the development of scripts, according to the technical specifications of language.
Identify CE1.4
operators are used to make the calculations and operations within a script.


Quote CE1.5 instructions provided by the language 'script' to perform input and output data, according to the technical specifications of language.

CE1.6 Distinguish methods to execute a script using various Web browsers.

CE1.7 In a practical course, properly characterized, interpretation of scripts that previously specified solve a problem:

- Identify and describe the type and use of the data reported in the 'script', as well as programming structures used to organize the program's actions.

- Recognize the instructions provided by the script language used in handling operations, input and output data.

- Insert the script into the Web page using the appropriate tags.

- Test script functionality using a browser.

- Detect and correct syntax errors and execution.

- Documenting the changes made in the 'script'.

C2: Distinguish the properties and methods of objects provided by the language 'script', depending on the technical specifications of language.

CE2.1 Explain browser objects and their properties and methods, which are used to add functionality to your Web pages taking into account the technical specifications of language.

CE2.2 Identify predefined by the language 'script' to handle new structures and utilities that add new functionality to the pages, according to the technical specifications of language objects.

CE2.3 Describe and identify objects in the document for adding interactivity between the user and the 'script' and their properties and methods.

CE2.4 Describe the events provided by the language of 'script': mouse, keyboard, focus, form and cargo, among others, to interact with the user and relate language objects.

CE2.5 In a practical course, properly characterized, interpretation of scripts that add aesthetic effects to the presentation of pages:

- Identify the objects on which the aesthetic effects and properties and methods used to add the effects are applied.

- Recognize the events used to perform actions.

- Describe the function or functions of identifying parameters effects thereof.

- Make changes to the specifications received following a script.

- Detect and correct syntax errors and execution.

- Documenting the changes.

CE2.6 In a practical course, properly characterized, interpreting scripts in which data entries of the form fields are validated:

- Identify the form objects that are validated within the 'script' and the properties and methods used to validate each entry.

- Recognize the functions provided by the language of 'script' used for data validation.

- Describe the events that are used in carrying out the actions and validation function or functions identifying the parameters of it.

- Make changes to the specifications received following a script.

- Detect and correct syntax errors and execution.

- Documenting the 'script' done.

C3: Identify and developed scripts that suit the specified functions and integrate them into Web pages according to a received specifications.

CE3.1 Locate and download the component already developed either from the Internet or from the collections indicated following the specifications received.

CE3.2 identify objects, their properties and methods and their functionality within the script and developed in order to adjust them to the page where they are joining.

CE3.3 Identify the events included in the script to distinguish user interactions.

CE3.4 Describe the logic of the script identifying programming structures and data with which it operates.

CE3.5 In a practical course, properly characterized, integration scripts already developed into a Web page, to add specific functionality according to specifications received:

- Download the component already developed.

- Modify the properties and attributes of the objects that make up the 'script' to fit the specifications received, using an editing tool 'script'.

- Check availability of using the script given copyright and applicable regulations.


- Integrate the script to the previously mentioned webpage.

- Test the functionality of the resulting page using a browser.

- Correct the errors.

- Documenting the processes performed.

C4: Apply technical testing and verification of the integration of the components in the Web page to check parameters of functionality and 'usability', according to a specification received.

CE4.1 Identify the phases involved in the verification of the integration of components into pages.

CE4.2 Sort the different types of files to be integrated into the page, verifying the installation of the 'plug-in' corresponding to the Web browser.

CE4.3 In a practical course, properly characterized, verification and integration scripts in Web pages developed to test its functionality:

- Select multiple browsers.

- Define test environments.

- Identify the parameters to verify.

- Documenting the processes performed.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.7; C2 and CE2.6 CE2.5 respect; C3 respect CE3.5; C4 respect CE4.3.
Other capabilities
:

Keep the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.

Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Language 'script'



Language features.

Language Relationship 'script' and markup language.

Syntax language 'script'.

Types of scripts: immediate, deferred and hybrids.

Running a 'script'.

Development Tools, use.

Debugging errors: syntax errors and execution.

Error messages.



2. Basic elements of language 'script'



Variables and identifiers.

Data Types.

Operators and expressions.

Control Structures.

Functions.

Instructions input / output.



3. Managing language objects 'script'



Object Hierarchy.

Properties and methods of objects in the browser.

Properties and methods of objects in the document.

Properties and methods of objects on the form.

Properties and methods of objects of language.



4. The events of language 'script'


Using
events.

Events form elements.

Mouse events.

Keyboard Events.

Focus events.

Form Events.

Events window.

Other events.



5. Search and analysis of 'script'


Search
specialized sites.

Boolean operators.

Search techniques.

Search refinement techniques.

Reusing scripts.



6. Data Validation in Web pages



Validation functions.

Validations alphabetic, numeric and date.
Check
forms.



7. Special effects on Web pages



Working with images: rollovers and multiple images.

Working with texts: aesthetic effects and movement.

Working with frames.

Working with windows.

Other effects.



8. Testing and verification Web pages



Verification techniques.

Debugging Tools for different browsers.

Verification script compatibility.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the integration of software components into Web pages, which will be accredited by one of the following two ways:


- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: PUBLICATION OF WEBSITES





Level: 2





Code: MF0952_2





Associated with UC: Post web pages





Duration: 90 hours





Capabilities and evaluation criteria:



C1: Identify resources available on the Web site and create storage structure for publishing pages and components.

CE1.1 Distinguishing features and security parameters file system Web site that will make publishing pages.

CE1.2 Sort commands and commands possible use for the generation or modification of the storage structure on the Web site in accordance with instructions received.

CE1.3 In a practical course of creating storage infrastructure of a Web server with access to a directory that is available to permit creation, modification and deletion of elements, and following some specifications received: | ||
- Check the directory access permissions.

- Create the elements of the storage structure according to specifications received.

- Use commands creation, modification and removal of container elements in the storage structure.

- Identify errors in the creation and modification of elements in the storage system.

- Documenting the processes performed.

C2: Transfer files to the publishing site using the tools established according to specifications received.

CE2.1 Identify the functions and features of the tools used for file transfer, taking into account the functional specifications of the same.

CE2.2 Identify commands and orders which provides the tool for transfer operations according to specifications received.

CE2.3 specify possible configurations of the transfer tool to create the connection to the Web site in accordance with a specification received.

CE2.4 In practical cases, properly characterized, update a Web site, using a transfer tool according to specifications received:

- Add new pages and components to the Web site.

- Delete pages and Web site components.

- Refresh pages and components on the Web site.

- Documenting the tasks performed.

C3: Check the transferred pages, taking into account quality criteria and 'usability' to ensure functionality.

CE3.1 Identify test environments to be used for verification according to the specifications received.

CE3.2 Check browser runtime components ( 'plug-ins') for playback of special content on the website, according to the specifications received.
Sort
CE3.3 to verify the features in browsers used on the market, to ensure compatibility of the pages with the same, according to established specifications.

CE3.4 In practical cases, properly characterized, verification of the transferred pages, to ensure the functionality of the same:

- Check that the aesthetic appearance of the pages comply with the specifications established design and quality.

- Redirecting the links needed in the transferred pages.

- Identify potential trouble spots in developed pages.

- Check that the links in the pages meet specifications.

- Documenting the processes performed.

C4: Exposing the pages developed in search engines and directories according to preset criteria availability.

CE4.1 identify and locate search engines and directories on which to publish the developed pages.

CE4.2 Identify and describe the descriptors that summarize the content of the pages in order to be found by search engines.

CE4.3 In practical cases, properly characterized, high search engine pages published to expose the information contained in them:

- Select the search engines.


- Include descriptors on pages made using the appropriate tags.

- Use automatic publishing application to publish pages made.

- Manually publish pages that can not be published with an automatic procedure.

- Periodically check the functionality of the published page.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.3; C2 respect to CE2.4; C3 respect CE3.4; C4 respect CE4.3.
Other capabilities
:

Responsibility for the work carried out and the fulfillment of the objectives.

Finish work according to criteria of suitability, speed, economy and efficiency.

Use time and effort to expand knowledge and background information for use in their work.

Demonstrate creativity in the development of the work done.

Demonstrate stress resistance, stability of mood and impulse control.

Adapt to new situations or contexts.



Contents:





1. Safety features in publishing Web pages


Safety
different file systems.

Access permissions.

Orders creation, modification and deletion.



2. File Transfer Tools



Configuration parameters.

Connecting to remote systems.

Operations and commands / orders to transfer files.

Operations and commands / orders to update and delete files.



3. Publishing web pages



Generic search engines.

Specialty search engines.

Descriptors: keywords and standardized 'metadata' systems.

Automated publishing applications.

Publication procedures.



4. Testing and verification of Web pages in browsers



Verification techniques.

Debugging Tools for different browsers.

Browsers: types and 'plug-ins'.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the publication of web pages, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX VIII


Professional qualification: Installation and Repair of Microcomputer Systems



Professional Family: Computers and Communications





Level: 2





Code: IFC298_2





General competence



Install, repair and expand, equipment and components forming a microcomputer system, ensuring the quality of its operation and repairing faults detected hardware and software.



Competence units



UC0219_2: Install and configure the software based on microcomputer systems

UC0953_2: Mount microcomputer equipment

UC0954_2: Microcomputer equipment repair and expand



Professional environment





Professional field



Develops his professional activity in the area of ​​computer support dedicated to the assembly and repair of microcomputer systems in public entities or private, companies of any size, both self-employed persons, irrespective of their legal form. It operates depending appropriate, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors




It is located mainly in the service sector, subsector on the sale, installation and repair of equipment and technical assistance services microcomputers or any other productive sector that use computer systems for management as part of the carrier medium.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.


Equipment installers Microcomputer

Repairers of microcomputer equipment
Repairers microcomputer systems peripherals



Associate Training

(450 hours)





Training modules



MF0219_2: Installation and Configuration (120 hours) operating systems

MF0953_2: Installation of microcomputer equipment (150 hours)

MF0954_2: Microcomputer Repair equipment (180 hours)



UNIT OF COMPETENCE 1: Install and configure BASED SOFTWARE Microcomputer Systems





Level: 2





Code: UC0219_2





professional accomplishments and performance criteria:



RP 1: Perform installation processes operating systems for use in microcomputer systems, following specifications received.

CR 1.1 The characteristics of operating systems and templates are classified, to decide which version to install and the type of installation, depending on the technical specifications received.

CR 1.2 installation requirements and operating system templates are checked to verify that there are sufficient resources and support in the installation destination, and follow the established procedure.

CR 1.3 The installation target team prepares to locate the operating system, enabling infrastructure in mass storage devices and the necessary connectivity, according to the technical specifications received.

CR 1.4 operating system is installed using the processes indicated in the installation manuals that accompany it, using an image where appropriate, for a computer in functional status, following the established procedure.

CR 1.5 The operating system is configured for operation within the specified parameters, following established procedures and as indicated in the technical documentation.

CR 1.6 Utility programs included in the operating system are installed for use, according to the technical specifications received.

CR 1.7 programs running on servers for publication are installed, according to the technical specifications received.

CR 1.8 installation verification is performed to verify the functionality of the operating system, by testing starting and stopping, and performance analysis, following established procedures.

CR 1.9 documentation is constructed processes performed and recorded for later use, following internal models established by the organization.

RP 2: Updating the operating system to ensure operation, received following technical specifications and procedures of the organization.

CR 2.1 based versions of software, system add-ons and device drivers are checked to ensure their suitability, following the established procedure.

CR 2.2 Outdated versions of database software, system add-ons and device drivers are identified to proceed to update and ensure their functionality, following technical specifications and procedures.

CR 2.3-ins and 'patches' for the operation of the base software are installed and configured to display the system administrator to maintain security in the same, according to established procedures.

CR 2.4 Verification of the update is performed, to test the functionality of the operating system by testing starting and stopping, and performance analysis, according to established procedures.

CR 2.5 documentation processes performed are prepared and filed for later use, according to the standards set by the organization.

RP 3: Exploit the features of microcomputer system using base software and standard applications, taking into account the needs of use.


CR 3.1 The functions and applications provided by the software basis are identified for use, according to the instructions of the technical documentation and usage needs.

CR 3.2 Operations with the file system are made using the interface provided by the operating system, following techniques and specifications according to usage needs.

CR 3.3 configuration tools provided by the operating system are executed to select options work environment, according to specifications received and usage needs.

CR 3.4 application execution processes are performed to exploit the functions of each according to operational and functional needs.

CR 3.5 The messages provided by the software are interpreted based, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications provided by the organization.

CR 3.6 Procedures of use and management by users, peripherals connected to the microcomputer system are made to exploit its functionality, following the technical documentation and procedures established by the organization.



Professional background:





Production facilities:



IT equipment. Peripherals. Operating systems. Utilities and incorporated into operating systems and applications. Upgrade versions of operating systems. Disk cloning tools. Technical documentation associated with the operating systems. Utilities not incorporated into the operating system. Mass storage devices.



Products and results:



Computer equipment installed and configured operating systems. operating configured and operating systems. computer logically organized. Operating systems upgraded. Published applications available.



Information used or generated:



Manuals and technical documentation of operating systems. Manuals upgrade operating systems. Manuals of the applications included in the operating system and published. Reports installation, configuration and operating system upgrade. Plan safety and quality of the organization. Incident management applications.



COMPETITION UNIT 2: ASSEMBLE EQUIPMENT Microcomputer





Level: 2





Code: UC0953_2





professional accomplishments and performance criteria:



RP 1: Install the hardware components that form a microcomputer equipment following established specifications, according to needs of use and safely.

CR 1.1 The performance and features of the hardware components are identified ahead of their inclusion in the assembly of microcomputer equipment.
CR 1.2
mounting specifications received are interpreted in order to identify the components for assembly, consult the specific technical documentation.

CR 1.3 Receipt of equipment and components is effected by documentation procedures, labeling, registration, storage and handling established, ensuring their locations on appropriate environmental and safety standards according to established conditions.

CR 1.4 The components are assembled using appropriate tools and ensuring the connections between them and verifying the subject, following the procedures established by the organization, the manufacturer's installation recommendations and measures and elements for prevention occupational hazards.
CR 1.5
packaging waste and disposable components are treated in accordance with applicable environmental regulations, ensuring safety and health at work.

1.6 CR identification and labeling of each of the components forming the assembled and complete set of equipment, is made using the external and internal systems documentation set.

CR 1.7 The result of assembly procedures and equipment assembly and detected incidents are documented for later use, following internal models established by the organization.

RP 2: Check the assembly of components to ensure the functionality of the microcomputer system, following established and in accordance with the security specifications.


CR 2.1 The verification process of the assembled components is carried out following the guidelines established by the organization, standards and regulations applicable standard both in electrical engineering aspects such as safety and prevention of occupational hazards.

CR 2.2 The integration of the assembled components in your computer is done in the BIOS (Basic Input-Output System, basic input-output system) to maximize equipment performance, according to the established procedure.

CR 2.3 The operating system is configured according to the specifications received to verify that the components using drivers are recognized and produce conflicts.

CR 2.4 The assembly equipment is checked to ensure that the components are recognized and enabled checking messages POST (Power-On Self Test, test automatic ignition) and operating system according to technical specifications and following the established procedure.

2.5 CR components, both firmware and hardware, are adjusted so that the equipment operation is ensured, according to the specifications received.
CR 2.6
stability tests and equipment safety are performed to verify functionality following the recommendations of the manufacturers own company, industry standards and applicable regulations.

CR 2.7 measurement software used for testing performance and evaluate and compare the characteristics of the equipment, according to established procedures.

CR 2.8 The work done and the incidents detected during verification are documented for later use, following internal models established by the organization deriving incidents to the appropriate service.

RP 3: Install and configure peripherals microcomputer equipment, for exploitation, according to established specifications, according to the needs of use and safely.
CR 3.1
receipt and verification of peripheral devices, storage and handling, are made in environmental and safety conditions appropriate, following the established procedure.

CR 3.2 Peripheral devices, device drivers and connecting wiring to be installed are checked, to ensure compatibility and consistency with the received specifications, following established procedures.

CR 3.3 Peripheral devices are installed using specific tools, ensuring its connection to the computer, power supply, stability, ergonomics and labeling among others, and applying criteria of safety, quality and efficiency, according to established procedures.

CR 3.4 The configuration of each peripheral for commissioning is carried out following the instructions of the technical documentation and installation specifications.

CR 3.5 Device drivers and software utilities associated with peripheral, if required, are installed and configured to ensure its operation as a system component, following technical specifications.

CR 3.6 Comprehensive testing to verify operation of the installed peripherals are carried out according to established procedures.
CR 3.7
work, as well as the incidents detected during installation and configuration are documented for later use, following internal models established by the organization.



Professional background:





Production facilities:



Elements and personal safety protection (glasses and insulated gloves, etc.). Elements protection equipment (fire extinguishers, emergency ventilation, etc.). Tools and tools commonly used in electrical / electronic maintenance. specific measurement and diagnostic tools for assembly. Computer components: chassis, boards, power supplies, cards, media and memories, among others. Peripherals: monitors, printers, scanners, readers and backup tapes, among others. Interconnection elements. Posts with special equipment for assembly. computer equipment. Software installation and diagnostics. operating systems installed on removable media prepared for execution. Software documentation tools. Cloning tools. Installation tools unattended operating systems and networking.



Products and results:



Computer equipment assembled and tested. Documented equipment. Recording and storing the items used for assembly.



Information used or generated:



Delivery notes and documentation
receiving equipment. Documentation of calibration of measuring equipment. Rules on guarantees (coverage as appropriate). Tests and control samples according to sampling rules. Specifications for the installation of computer equipment and peripherals. Rules on labeling and serialization of components. Installation manuals and technical information of equipment and / or components. Based software manuals. Specific software manuals. Product catalogs, suppliers, prices. Assembly Recommendations manufacturers. Manufacturer support. Work parts. Parts of incidents and historical incidents assembly. technical and performance of the equipment documentation. Installation Guide and commissioning of the equipment. Health and safety regulations. National legislation electrotechnology. applicable international rules and standards (ISO, EIA, IEEE, etc.). internal regulations of the organization. Standards for protection against electrostatic discharge (ESD). Reports performance. Mount incident reports, cataloged stored and controlled. Installation documentation (processes, schemes, memory components, etc.) cataloged, stored and controlled. Documentation of the installation and commissioning of equipment for customers. Applicable regulations regarding health and safety, data protection, intellectual property and environmental. internal rules of the company.



COMPETITION UNIT 3: EXPAND EQUIPMENT REPAIR AND Microcomputer





Level: 2





Code: UC0954_2





professional accomplishments and performance criteria:



RP 1: Correcting errors in microcomputer equipment, repairing or replacing the faulty hardware components, following the procedures established by the organization.

CR 1.1 The cause of abnormal behavior is established by performing functional tests and described in the incident portion of the same characteristics (physical or logical nature), assessing the possibility of repair or replacement costs based on economic thereof.

CR 1.2 hardware diagnostic tools are used to detect faults in the components of microcomputer system when the computer does not start, according to established specifications.

CR 1.3 diagnostic software tools are used to determine intermittent failures or problems in the operation of the system, according to established procedure.

CR 1.4 safeguard backing is performed before the repair or replacement of components to ensure system integrity, in accordance with the received specifications.

CR 1.5 The affected software components are configured with the parameters indicated, for its operation, according to the technical specifications received.

CR 1.6 hardware faulty components are repaired using specific tools and devices, ensuring connections and securing, preparing the necessary cables for connections, following the procedures established by the organization and applying criteria of functionality, quality, safety and efficiency.

CR 1.7 Malfunctions that have not been achieved diagnose, are reported to the higher level of responsibility for its management, following the protocols and procedures for the organization.
CR 1.8
packaging waste and disposable components are treated in accordance with applicable environmental regulations, ensuring safety and health at work.
CR 1.9
testing system startup and shutdown are performed to verify and ensure the operation of equipment and components repaired or replaced, following established procedures.

CR 1.10 The documentation made on the management of incidents produced is recorded for later use, following internal models established by the organization.

RP 2: Expand microcomputer to add new functionality to the system, according to the specifications established teams.

CR 2.1 update operations in microcomputer equipment components for the extension thereof, are carried out by checking the possibilities of expansion and assessing the economic costs, following the established procedure.

CR 2.2 safeguard backing is performed before installation of the components to ensure system integrity, according to the received specifications.


CR 2.3 Compatibility of the new components is verified to ensure the integrity of equipment and data, checking the operation of updated equipment, following established technical specifications.

CR 2.4 The components are assembled using specific tools and to secure connections between them and verify subject, following the rules of physical security, procedures established by the organization and technical specifications of the manufacturer.

CR 2.5 The software associated with the update is set to verify that the added components are recognized and produce conflicts, verifying and ensuring the functioning of the system by starting and stopping tests.

CR 2.6 The documentation made on enlargement and incidents that may have occurred is recorded for later use, following internal models established by the organization.

RP 3: Repair logical failures microcomputer equipment, using specific software tools and following established procedures.

CR 3.1 The cause of abnormal behavior is established by performing initial functional tests to verify the symptoms collected in the part of failures and specify the characteristics of the same, setting the logical nature of the problem, following established procedures.

CR 3.2 running processes are checked to detect excessive consumption of resources due to possible attacks from viruses and malicious programs, following established technical specifications.

CR 3.3 The detection and security software (antivirus and antispyware) is used to diagnose and repair any damage and data loss caused by viruses and malicious programs, following the established procedure.

CR 3.4 The file system is verified using specific software tools, in order to maintain the integrity of the same, according to the technical specifications received.
CR 3.5
accidentally deleted or affected by a fault or incident files are restored using recovery tools and following established procedures.

CR 3.6 The system is restored from images if necessary.

CR 3.7 safeguard backing is performed before repairing software failure to ensure the integrity of the system, in accordance with the received specifications.

CR 3.8 applications affected are reconfigured to its operation, following technical specifications received and in accordance with the established procedure.

CR 3.9 Documentation of the repair that has been done and detected incidents are recorded for later use, following internal models established by the organization.

CR 3.10 faults that have not been achieved are reported to overcome higher level of responsibility for its management, following the protocols and operating procedures established by the organization.

RP 4: Correcting errors in printers and other peripherals using adjustment programs and tools, following the recommendations made by the manufacturers.

CR 4.1 Receipt of the damaged peripheral is effected by the description of the fault produced using standardized in order to establish the best possible implementation procedure, in accordance with the rules of the organization documentation.

CR 4.2 The cause of abnormal behavior is established by performing initial functional tests, and describes the characteristics and nature of the fault in the part, advising the possibility of repair with suitable equipment or other more specialized facilities , as indicated in the protocols of the organization.

CR 4.3 The process of repair and adjustment of the components of printers and other peripheral equipment is carried out, to ensure the functioning of the device, following the guidelines established by the organization, standardized and legal regulations applicable standards, both in electrical engineering aspects such as safety and prevention of occupational hazards.

CR 4.4 The faulty components are replaced using specific tools in order to enable all the features of the device, taking into account the manufacturer's recommendations, following the procedures established by the organization and applying criteria of functionality, ergonomics, quality, safety and efficiency.

CR 4.5 Performance tests of the repaired peripheral are performed to verify and ensure the operation thereof, following established procedures.


CR 4.6 Malfunctions that have not been able to isolate reported to the higher level of responsibility for its management, following the protocols and procedures for the organization.

CR 4.7 Documenting the repair performed, as well as those produced incidents is recorded for later use, following the protocols and operating procedures established by the organization.



Professional background:





Production facilities:



IT equipment. Protection elements (insulated footwear, goggles, gloves, downloader static electricity, etc.). Tools and tools commonly used in electrical / electronic maintenance. computer components. peripheral devices. Printers. operating systems, drivers, utilities. Antivirus and antispyware software. Hardware diagnostic tools. Tools diagnostic software. Computer maintenance software under the corresponding or free license. Tools backup and cloning.



Products and results:



Computer equipment repaired. Extended equipment. Repaired and replaced printers and peripherals.



Information used or generated:



Specifications for mounting peripheral devices. Technical documentation associated with the removal of viruses and malware. technical and performance of peripheral devices documentation. technical manuals printers. Rules on labeling and serialization of components. Installation manuals and technical information of the peripheral devices. Based software manuals. Specific software manuals. Product catalogs, suppliers, prices.

Assembly Recommendations manufacturers. Manufacturer support associated with the devices. Work parts. electrotechnical national regulations. Documentation associated with expansions and repairs made. International regulations and standards. Applicable regulations regarding health and safety, data protection, intellectual property and environmental. internal rules of the company.



Training Module 1: INSTALLATION AND CONFIGURATION OF OPERATING SYSTEMS





Level: 2





Code: MF0219_2





Associated with UC: Install and configure the software based on microcomputer systems





Duration: 120

hours





Capabilities and evaluation criteria:



C1: Sort the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main microcomputer systems architectures detailing the mission of each of the functional blocks.

CE1.2 Explain the concept of operating system and identify the functions performed in the microcomputer system.

CE1.3 Distinguish the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.
Sort
CE1.4 operating systems and versions that are used in computers detailing its main characteristics and differences, according to technical specifications.

CE1.5 Identify the phases involved in installing the operating system by checking the computer system requirements to ensure the possibility of the installation.

C2: Apply processes Installation and configuration of operating systems to enable the functionality of the computer, according to some specifications received.

CE2.1 In a practical course, properly characterized, installation of an operating system on a computer for its operation:

- Check that your computer meets the requirements and has the necessary resources for the installation of the base software.

- Prepare the installation destination formatting and creating partitions specified equipment.

- Install the operating system following the steps in the technical documentation.

- Configure the system with the specified parameters.

- Install utility programs indicated and verify the installation.

- Documenting the work done.

CE2.2 Identify procedures that are used to automate the installation of operating systems on computers of the same characteristics by using cloning software tools and other installation tools unassisted.

CE2.3 In a practical course, properly characterized, installation of an operating system on computers with the same characteristics:


- Prepare one of the computers to install the operating system and utilities.

- Install and configure the operating system and utilities indicated.

- Select the software tool for cloning equipment and proceed to obtain images of the system installed for distribution.

- Implement by management tools disk images, those obtained on multiple machines with similar characteristics to the original order to activate their functional resources.

- Testing of starting and stopping to check the facilities.

- Documenting the work done.

C3: Updating the operating system of a computer to include new features and address security issues, based on technical specifications.

CE3.1 Identify the components of a software operating system susceptible reset for updating, considering its technical specifications.

CE3.2 Identify and classify the sources of obtaining update elements for the implementation processes of patches and operating system updates.

CE3.3 Describe the procedures for updating the operating system taking into account the security and integrity of the information in the computer.

CE3.4 In a duly characterized upgrade an operating system for incorporating new features practical course:

- Identify the components to update.

- Check the software update requirements.

- Update specified components.

- Check made processes and the absence of interference with other system components.

- Documenting the update process.

C4: Using applications that provide operating systems for the operation thereof according to technical specifications.

CE4.1 use the applications provided by the operating system by describing its characteristics for use and exploitation thereof, taking into account their technical specifications and functional requirements.

CE4.2 use the applications provided by the operating system for the organization of the disk and the file system, according to technical specifications received.

CE4.3 Use accessibility options operating systems to configure accessible environments for people with disabilities, in accordance with technical and functional specifications.

CE4.4 Set options work environment using the tools and applications provided by the operating system, following specifications received and usage needs.

CE4.5 Describe the applications provided by the operating system to exploit the capabilities of the peripherals connected to the system, according to usage needs.

CE4.6 Sort the messages and warnings provided by the microcomputer system to discriminate their importance and criticality and implement response procedures in accordance with instructions given.

Capabilities whose acquisition should be completed in a real working environment:

C2 and CE2.3 CE2.1 respect; C3 respect CE3.4.
Other capabilities
:

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Keep an assertive, empathetic and conciliatory attitude with others showing warmth and kindness in treatment.

Adapt to new situations or contexts.
Respect
procedures and internal rules of the organization.

Adopt appropriate working environment postural attitudes.



Contents:





1. Computer Architecture



Block diagram of a computer: subsystems.

The central processing unit and its elements: Internal memory, types and characteristics; the input and output units; mass storage, types and characteristics.

Buses: characteristics and types.

Correspondence between the physical and logical subsystems of a computer.



2. Operating Systems



Classification operating systems.

Functions of an operating system.

Equipment Microcomputer Operating Systems: characteristics and use.

Command mode.

Graphic mode.



3. Installation of operating systems



Procedures for installing operating systems.

Substrate Preparation: partitioned and formatted.
Types
installation of an operating system: minimal, standard and customized.


Device configurations.

Tools for cloning disks.

Update operating systems.



4. Utilities OS



Features and functions.

Based Software Utilities: work environment configuration; administration and management of file systems; process management and resources; management and editing files.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation and configuration of software in microcomputer-based systems, which are accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: INSTALLATION EQUIPMENT Microcomputer





Level: 2





Code: MF0953_2





Associated with UC: Mount microcomputer equipment





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Sort the components used in the assembly of the microcomputer equipment, identifying their functional parameters and characteristics, taking into account their technical specifications.

CE1.1 Identify chassis formats used in the installation of computer equipment, indicating its features and functionality.

CE1.2 Describe the types of power supplies that are used for microcomputer equipment installation, identifying their functional parameters and use, considering its technical specifications.

CE1.3 Sort the types of motherboard identifying features, connectivity and usage recommendations, taking into account their technical specifications.

CE1.4 Describe the types of current processors detailing their functional parameters, guidelines, and its influence on the overall performance of the team.

CE1.5 Identify the types of RAM, features, technology, functional parameters and recommendations for use to assess their influence on the overall performance of the team.
Define CE1.6
mass storage systems, indicating its technology, connection mode, functional parameters, guidelines, and its influence on the overall performance of the team, for use in the assembly of microcomputer equipment.

CE1.7 Describe the characteristics, functional parameters and influence on the overall performance of the team, adapters used in the installation of microcomputer equipment for connection to other devices or communications networks.

CE1.8 define the characteristics of the peripherals that are connected to a microcomputer team detailing its peculiarities and most significant parameters.

CE1.9 In a practical course, properly characterized, assembly preparation of a microcomputer team:

- Search the characteristics of the components in catalogs distributors and manufacturers.

- Sort and select components based on the characteristics set out in the application, the established budget and approval and guarantee them.

- Check the compatibility of components.

- Prepare the assembly of the components to ensure the quality of the result.

C2: Install the elements of the microcomputer equipment, applying criteria of quality, efficiency and safety, according to technical specifications received.

CE2.1 Describe the characteristics of an assembly station of microcomputer equipment and tools and instruments necessary to perform the assembly and installation processes of components.


CE2.2 Describe the procedures for carrying out the assembly of microcomputer equipment based on its technology and characteristics, taking into account the criteria defined quality and safety.

CE2.3 In a practical course, properly characterized, realization of a microcomputer assembly equipment for use:

- Identify each of the functional blocks that make up the computer and associate them with the components to be assembled on the computer.

- Choose the components that make up the team.

- Apply the established safety measures.

- Interpret the technical documentation of the components to be assembled.

- Perform the assembly and adjustment of the components using the tools and supplies needed.

- Perform the documentation of all aspects of the assembly phase by using documents and templates set.

C3: Check microcomputer mounted equipment and ensure its functionality, stability, security and performance, according to the given specifications.

CE3.1 Describe the procedures specified tests to verify the functionality of the assembly.

CE3.2 Identify and apply the initial configuration ( 'setup') equipment to optimize performance, according to the manufacturer's recommendations, technical characteristics and requirements.

CE3.3 Identify settings BIOS ( "Basic Input / Output System ') associated with each of the components to be recognized by the assembly equipment.

CE3.4 Sort messages BIOS to locate possible mismatches in the assembly of components, taking into account the technical specifications thereof.

CE3.5 Describe and apply the types of software tests performed to verify functionality using specific equipment and software measurement for assessing performance.

CE3.6 In a practical course, properly characterized, check the mounting a microcomputer to check its functionality, stability, security and performance team:

- Run an operating system from a removable storage device.

- Check POST messages and operating system and device adapters and peripherals are recognized and authorized by the system, with no conflicts.

- Conduct tests to ensure start stop operation.

- Perform the diagnosis of possible conflicts using verification tools and diagnostic software.

- Testing of stability, security and performance using specific software tools.

- Perform documentation installation and configuration made and the results obtained using formats and templates given.

C4: Install peripherals for operation in the microcomputer equipment, according to a given specification.

CE4.1 Sort the types of peripheral devices, identifying their technical and functional characteristics, configuration parameters and recommendations for use, taking into account their technical specifications.

CE4.2 you identify requirements for installation procedures with respect to conditions of power supply, cabling, physical connections and environmental circumstances, as indicated in the technical documentation provided by the manufacturer.

CE4.3 Describe the procedures for installing device drivers ( 'drivers') and necessary to exploit the capabilities of the peripheral software utilities, taking into account technical specifications of the device itself.

CE4.4 Sort functional and operational tests to be performed with the peripheral to ensure its operation, according to technical specifications.

CE4.5 In a practical course, properly characterized, installation and connection of peripherals to the microcomputer system:

- Check that you have the necessary elements for installation: wiring and other physical elements, storage devices with device drivers ( 'drivers') and software utilities.

- Check that the microcomputer system resources are available to connect with the device, both with regard to ports, connectors and bays, and availability of supply pins and other environmental requirements.

- Perform installation of applying the safety means and protection specified by the regulations and using specific tools for each device.

- Set the device driver ( 'driver') in the operating system.


- Apply the functional and operational procedures to test device installed.

- Documenting processes and results achieved.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.9; C2 respect to CE2.3; C3 respect CE3.6; C4 respect CE4.5.
Other capabilities
:

Alternatives to improve results propose.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Finish work according to criteria of suitability, speed, economy and efficiency.

Acting quickly in difficult situations and not just wait.

Show at all times an attitude of respect toward peers, procedures and internal rules of the organization.



Contents:





1. Components of a microcomputer team



Components. OEM and retail.

Symbology standard components. Symbology of national and international approvals.

Components of a computer, types, features and technologies: the chassis, power supply, motherboard, processor, memories, hard drives, devices, magnetic devices, permanent memories (flash) , adapters and peripherals: keyboard, mouse, monitor, printers, document scanners and optical readers, among others.



2. Regulations and safety recommendations in the assembly of computer equipment



Rules and regulations on ergonomics.

Regulations on the handling and storage of contaminants, toxic and combustible products.

Standards for ESD protection.



3. Procedures for mounting equipment microcomputer



The assembly station: use, devices, tools, safety.

The assembly out of the chassis: testing of new devices and components.

Boot process of a computer: booting electrical level, error signals BIOS POST.

The assembly process of a microcomputer equipment.



4. Verification of computer equipment



The verification process equipment.

Integrity and stability tests under extreme conditions.

Performance Testing.

POST messages and operating system.

Setting the BIOS.

Tests with diagnostic software.

Tests with operating systems on removable storage.

Hardware diagnostic tools.

Diagnostic Tools and / or verification: diagnostic tools operating systems.



5. Installation of peripheral



Procedures for mounting. Peripheral configuration.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation of microcomputer equipment, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: REPAIR EQUIPMENT Microcomputer





Level: 2





Code: MF0954_2





Associate UC: Repair and expand microcomputer equipment





Duration: 180

hours





Capabilities and evaluation criteria:



C1: Describe the electrical, electronic and electromechanical components contained within the devices of microcomputer equipment capable of adjustment, calibration and production failures to discriminate causes production of incidents.


CE1.1 Identify the components of analog and digital electronics and its applications more features, to associate the metrics and measurement equipment necessary to estimate the functionality of a device, according to their technical specifications.

CE1.2 Interpret functional diagrams of circuits and components, and symbols used, relating to the actual elements to diagnostic procedures and verification teams with functional issues.

CE1.3 Identify electrical, electronic, optical and electromechanical elements contained within the devices of a computer susceptible adjustment, calibration and / or repair, to perform the actions of repair or replacement, depending on the information obtained through diagnostic procedures and specifications received.

C2: Establish the cause of the breakdown of equipment and components of the microcomputer system, identifying its nature by using specified techniques and tools.

CE2.1 describe the characteristics of a post repair of microcomputer equipment and tools and instruments to perform troubleshooting tasks with quality, efficiency and safety required.

CE2.2 Describe power signals, control and data connectors, buses, and interfaces of the components of a computer, indicating the procedure and devices for evaluation and assessment of their functional parameters, according to specifications techniques device to be monitored.

CE2.3 Describe the process of disassembly of components, microcomputer and peripheral equipment to perform actions on them.

CE2.4 Explain the type and characteristics of microcomputer equipment breakdowns in describing the general technical and specific means for its location in order to optimize repair procedures.

CE2.5 describe the characteristics of the hardware and software tools used to diagnose faults in the microcomputer system, taking into account their technical specifications.

CE2.6 In a practical course, properly characterized, location of a fault to isolate the cause that produces it and characterize it:

- Establish a first hypothesis based on the documentation and identify the critical points of the equipment and / or component by consulting historical troubleshooting and maintenance elaborate statistics about it.

- Identify the symptoms and the nature of the fault, characterizing the effects it produces and measurements on the test points established by the manufacturer or defined by the specified procedure.

- Locate the function block or component responsible for the same fault and identify security elements that must be taken into account.

- Use diagnostic software tools if intermittent faults occur in the system and hardware diagnostic if the computer will not start.

- Connect an emulator and perform comparative tests with various motherboards.

- Perform the documentation of the activities and the results obtained using the specified formats and templates.

C3: Apply the procedures for adjustment, repair and verification of damaged elements, ensuring the operation of the equipment or component.

CE3.1 Describe the tools and equipment troubleshooting a microcomputer equipment depending on the types of devices to repair, according to the technical specifications of the equipment itself.

CE3.2 Describe the components of the devices of a microcomputer system susceptible adjustment, repair and replacement for fault resolution, depending on the types of devices to repair.

CE3.3 In a practical course, properly characterized, repair a fault occurs in an element of the microcomputer system:

- Identify the cause component failure and apply the specified safety measures.

- Evaluate the replacement of the faulty component or the possibility of repair, and set a budget, evaluating repair costs, both parts and labor.

- Activate mechanisms to ensure the integrity of information and replace or repair the (physical or logical) element responsible for the failure.

- Replace or repair (physical or logical) element responsible for the failure and perform the checks and adjustments specified in the software and configuration.


- Testing of starting and stopping to check the operation of the repaired item.

- Report fault to a higher level if necessary and document the activities and the results obtained.
Perform CE3.4
making different computer cabling by pressure, 'crimp' or welding, adapters, splitters, connectors and cable assemblies to meet specific needs of difficult connection commercially available, using the right tools and checking that connectivity obtained corresponds to the theoretical schemes thereof.

C4: Apply enlargement procedures computer equipment ensuring operation of the equipment or component, according to a received specifications.

CE4.1 Identify the characteristics of the components without documentation or lack of associated or updated in order to perform operations for expanding the team by interpreting the manufacturer labeling information (codes, symbology) and search software and obtaining information through the Internet considering specifications available techniques.

CE4.2 In a duly characterized, assessing the feasibility of an extension to add new features to the team practical course:

- Identify needs and prerequisites.

- Detect possible interactions with other computer components.

- Assess the difficulty of obtaining components.

- Estimate the increase in the overall yield obtained.

- Perform the necessary procedures to avoid loss of information.

- Estimate and document the economic cost of the upgrade.

CE4.3 In a practical course, properly characterized, expansion of a computer to increase their functional capabilities:

- Backing up data from the hard disk to ensure data integrity.

- Identify the components to update.

- Apply the established safety measures.

- Perform the expansion, replacement or updating the specified components and install and configure the associated software.

- Perform checks and adjustments both hardware and software to verify expansion.

- Perform the documentation of activities indicating the initial computer setup and configuration after enlargement.

C5: Retrieve functionality by identifying and applying computer repair procedures logical faults according to specifications received.
Distinguish CE5.1
procedures used to resolve logical faults according to specifications received.

CE5.2 Identify the processes running on a computer to detect excessive consumption of memory and processor.

CE5.3 Recognizing the symptoms produced by the attack of viruses and malicious programs that can affect computer equipment to proceed with disposal using antivirus software and 'anti-spyware' according to established specifications.

CE5.4 Using data recovery tools to recover deleted files following a specifications received.

Ce5.5 In a practical course, properly characterized, repair a computer with simulated logical fault:

- Check the file system and running processes.

- Check and eliminate the presence of viruses and spyware using software tools indicated.

- Re-install and configure the software affected.

- Testing of starting and stopping to check the operation of the system.

- Report fault to a higher level of responsibility, if necessary.

- Documenting the activities and the results obtained using the formats and templates given.

C6: Apply repair procedures of printers and other peripherals using specific tools, to put them into operation, following some given specifications.

CE6.1 Identify the types of printers and peripherals used in the market most distinguishing characteristics between them, according to technical specifications.

CE6.2 Describe the functional blocks of each type of printer, and the operation of its components, according to technical specifications thereof.

CE6.3 recognize malfunctions of each type of printer to replace parts of the fault cause, taking into account the characteristics of the same and following the established procedure.


CE6.4 Identify consumables, their types and replacement procedures to detect and fix any faults in printers, taking into account the technical characteristics thereof.
Distinguish CE6.5
procedures used for fault resolution printers and other peripherals, depending on their technical specifications.

CE6.6 In a practical course, properly characterized, repair a printer or other peripheral device for its operation, following technical specifications and procedures given:

- Testing according to identify the cause of failure.

- Identify the components causing the failure.

- Perform the repair or replacement of the component, or report the fault to a higher level of responsibility, if necessary.

- Perform functional tests to verify functionality.

- Documenting the activities and the results obtained using established formats and templates.

Capabilities whose acquisition should be completed in a real working environment:

Respect CE2.6 C2; C3 respect CE3.3; C4 respect CE4.2 CE4.3 and; C5 respect ce5.5; C6 respect to CE6.6.
Other capabilities
:

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Treat the customer with courtesy, respect and discretion.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Demonstrate flexibility to understand the changes.



Contents:





1. Electricity-Electronics applied to the repair of microcomputer equipment


Notions of electronics
Concepts voltage, current, resistance and power; each magnitude measures; use of basic instrumentation: multimeter, oscilloscope and low-frequency generator; analog and digital signals; analog components; logic functions and logic gates; printed circuits.



2. Operation of the devices in a microcomputer system



Functional diagrams of devices and peripherals on computers. electrical, electronic and electromechanical components making up the devices, functions of each. Magnetic storage brackets: characteristics, components and functional diagrams.



3. Breakdowns in computers



Types of faults in computer equipment: classification and characteristics; typical faults of both logical and physical computers.

Diagnosis and troubleshooting in computer equipment: diagnostic techniques, software measurement, diagnosis and detection. Diagnostic software tools: types and characteristics. Hardware diagnostic tools: types and characteristics. Connectivity of computer equipment: signal measurement interfaces, buses and connectors of the various components of a microcomputer system: power, control and data. The external and internal wiring of computer equipment: cable types, connector types, meaning the pins of the various interfaces and connectors of a computer, making techniques different wiring.

Repair of computers: the repair station; repair budget: cost of components, pricing criteria: time, type of repair and component type; the repair procedure.



4. Computer Virus and antivirus



Computer virus: concept, means of propagation, evolution, effects. Precautions to prevent infection. Virus mails, programs and documents. Antivirus programs: concept and function. Active components of the virus. Turning protections. Virus removal and data recovery. Updating antivirus patterns.



5. Expansion of a computer



Updatable components on a computer: logical and physical. The enlargement process: assessment of need, compatibility of components, budget expansion and information assurance, among others. Typical physical and logical extensions of computer equipment.



6. Repair of printers and other peripherals




Types of printers: most common brands and models, features and differences. Operation and technical details of printers and other peripheral devices. Problem resolution. Troubleshooting and consumables incidents. preventive and corrective maintenance of printers.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the repair and expansion of microcomputer equipment, which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX IX


Professional qualifications: Departmental Networks Operation



Professional Family: Computers and Communications





Level: 2





Code: IFC299_2





General competence



Perform procedures to ensure connectivity offered by a departmental network as well as access to the same resources by configuring and monitoring the connection elements, the network software installation, operational maintenance, the resolution of problems or incidents detected following specifications.



Competence units



UC0220_2: Install, configure, and verify the elements of the local network according to established procedures

UC0955_2: Monitor processes the local network communications

UC0956_2: Making processes connection between private networks and public networks



Professional environment





Professional field



Develops his professional activity in the IT department dedicated to the operation of networks, public entities or private, companies of medium or large, both on its own and others, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located mainly in the service sector, subsector installation and maintenance of computer networks and any other productive sector that by its size and organization need to have departmental networks.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.


Local network operators
Operations technicians telematic networks

Personal
Support

Telecare computer operators


Associate Training

(540 hours)





Training modules



MF0220_2: Implementation of the elements of the local network (210 hours)

MF0955_2: Monitoring local network (180 hours)

MF0956_2: Interconnection of private networks and public networks (150 hours)



COMPETITION UNIT 1: install, configure and VERIFY THE ELEMENTS OF PROCEDURES ESTABLISHED BY LOCAL NETWORK





Level: 2





Code: UC0220_2





professional accomplishments and performance criteria:



RP 1: Install and configure the local network nodes and software to implement internal communications services, following established procedures.

CR 1.1 modules of network equipment are installed to provide the connectivity features specified by the physical configuration indicated and following established procedures.


CR 1.2 version of 'firmware' network equipment is installed or updated in accordance with the desired features and functionalities.
CR 1.3
processes installation and configuration of devices on the local network are documented for registration using the formats specified by the organization according to the established procedure.

RP 2: Perform the minimum configuration of network node for subsequent management, following established procedures.

CR 2.1 The network connection is determined and set for the management of network equipment, based on the network topology.

CR 2.2 The operation of management protocols (SNMP, Telnet, SSH, CDP, etc.) required for remote management is enabled communications equipment check according to the project specifications or standards and procedures the organization.

CR 2.3 configuration are documented using the formats specified by the organization.

CR 2.4 The network node is prepared / packaged for transport if the team should refer to another venue, taking care not deteriorate during it.

RP 3: Install the network node in its final location, allowing subsequent access to the same specifications as the organization.

CR 3.1 The equipment is installed in the final frame following the manufacturer's instructions and according to the environmental conditions of temperature and humidity.

CR 3.2 The electrical connections are made following the procedure established by the organization, taking into account the independent circuit connection in the case of equipment with redundant power supply and checking the ground.

CR 3.3 data connections are made network node according to the specifications of the organization and being accessible device for remote management.
CR 3.4
documented installation made indicating the interconnections made following the rules or procedures of the organization.

RP 4: Set the device to ensure its functionality in the network according to the procedures established by the organization.

CR 4.1 protocols associated with network applications installed on the servers are configured to support the services implemented in accordance with the installation manual and following the specifications received.
CR 4.2
routers and switches are configured to manage protocols and services according to specifications received and work predefined procedures.

CR 4.3 Encryption software is installed and configured on the network nodes to be determined according to the specifications received and procedures to create virtual private networks.

CR 4.4 Functional tests of the configuration of the communication devices are performed to ensure compliance of the same with respect to the requirements in the operating specification of the organization.

CR 4.5 The network node is included in the monitoring systems of network infrastructure, including collection of characteristic parameters of operation (managed frames, bandwidth used, errors / collisions, etc.).

CR 4.6 configuration operations performed are documented, following the procedures established by the organization.

RP 5: Managing the incidents detected in the network devices to correct or report them, according to established protocols and procedures predefined performance.

CR 5.1 Incident reporting systems are seen to address any alarms as operational and organizational security procedures.

CR 5.2 The location of the element in which the incidence has occurred is done by interpreting the information received and the technical documentation, to isolate the physical and logical problem, according to the technical documentation and protocols of the organization for contingencies.

CR 5.3 Symptoms reported by the user or by incident management systems are verified for a diagnosis of the problem according to the technical documentation.
CR 5.4
detected and isolated incidence is diagnosed and its solution arises to rehabilitate interrupted or impaired services, according to quality standards and contingency plans.

CR 5.5 The incidence that has not been isolated reports to higher level of responsibility for management according to the protocols and procedures for the organization to contingencies.


CR 5.6 The incidence repair is done with the right tools and compliance with safety standards set by the organization.

CR 5.7 Documentation detection, diagnosis and resolution of the incidence is constructed for registration of the same according to the protocols of the organization.
CR 5.8
status information of the impact to the end user is transmitted to complete the process of its management accordance with the rules of the organization.



Professional background:





Production facilities:



Network analyzers. Certifiers wiring. Hand tools for electrical and mechanical works. Software tools for testing connectivity. Software tools for inventory control network elements. Computers, printers and peripherals. Operating systems. Hubs, switches, routers. Network cards. Cables and connectors. Network client software. Network management software. Owner Software network devices. Office tools. Network map.



Products and results:



Communications equipment connected to the data lines. local network installed and configured according to specifications. Inventory and descriptive record of physical communications devices and network configuration.



Information used or generated:



Network Map. Hardware inventory of the organization. Work orders. Network documentation. Installation manuals of the devices. Manual configuration of devices. operational specifications of the organization. Quality Manual. Standards and quality criteria of the organization. Security plan. Maintenance plan. applicable environmental regulations. Regulations applicable health and safety at work. Reliable and updated documentation network.



COMPETITION UNIT 2: MONITORING PROCESSES COMMUNICATIONS NETWORK LOCAL





Level: 2





Code: UC0955_2





professional accomplishments and performance criteria:



RP 1: Monitor local network so as to allow verification of the communication parameters within the established functional limits, to ensure the absence of network traffic congestion, according to procedures network management and quality control service of the organization.
CR 1.1
remote monitoring probes are installed and configured on the indicated points network, to provide information to a centralized management platform, according to established procedures.

CR 1.2 software agents are installed in network nodes manage to provide information to a centralized management platform, according to established procedures.
CR 1.3
activity log files of the various services are collected in order to maintain storage resources and management process under appropriate conditions, as specified by the organization.

CR 1.4 tool interface network management and selection filters alarms and alerts are configured to optimize the processes of reporting and management of incidents, according to the established safety procedures in the organization.

RP 2: Apply the processes of periodic and preventive maintenance of devices on the local network, in order to ensure communications services within the parameters set out in the communications requirements of the organization.

CR 2.1 The network map is updated launching equipment discovery tasks from the management platform, to provide a true picture of the network, according to the received specifications.
CR 2.2
network devices, assets and liabilities are checked for possible damage or alterations according to established procedures.

CR 2.3 The deficiencies detected, localized through inspection processes are overcome by implementing appropriate measures for their solution according to established procedures and standards of quality and service organization.

CR 2.4 The causes of the anomalous behavior of network devices are identified to proceed to its solution by applying the methodology established diagnostic, hardware and software using the right tools and consulting technical documentation according to established procedures.

CR 2.5 The adequacy of security and network configuration policies and established standards is verified by specific tests and using the right tools.


CR 2.6 The test results are collected and documented for registration, using the formats specified by the organization according to the established procedure.

RP 3: Upgrade the hardware and software components of the communication devices of the local network to adapt its functionality to changing technologies according to plans of the organization.

CR 3.1 hardware communications equipment is updated partially or fully in order to adapt it to new features, according to specifications received and following the established procedure.

CR 3.2 software communications equipment is updated to adapt to new features, according to specifications received and following the established procedure.

CR 3.3 configurations communications equipment are modified to change their functionality or adapt to new equipment introduced, following the procedures established by the plans of the organization.

CR 3.4 updated hardware and software components are verified by testing, to ensure their functionality following the procedures established by the plans of the organization.

CR 3.5 The actions carried out on the devices are documented to facilitate monitoring using the formats specified by the organization, according to the established procedure.

RP 4: Apply the procedures of logical and physical security concerning communications devices on the local network, to ensure access to services authorized in accordance with the safety standards of the organization users.

CR 4.1 Notification of security alerts will cater for the occurrence of security incidents according to specifications received.
CR 4.2
communications devices are reviewed to ensure that their physical and logical access is controlled according to safety specifications given.
CR 4.3
audit files of communications devices are collected to detect unauthorized access following the indications of safety procedures.
CR 4.4
'network analysis' or any of its sections is performed periodically or to incidents to observe network traffic using specialized equipment and tools, according to the established safety procedures.

CR 4.5 The actions taken are documented to facilitate monitoring using the formats specified by the organization, according to the established procedure.



Professional background:





Production facilities:



Network analyzers (sniffers). Certifiers wiring. Hand tools for electrical and mechanical works. Diagnostic tools. Software tools for testing connectivity. Tools software inventory network equipment. Computers, printers and peripherals. Operating systems. Hubs, switches and routers. Network cards. Cables and connectors. Network client software. Network management software. Network monitoring software. Probes remote monitoring (RMON). Owner Software network devices. Office tools. Auditing tools. Network map. Monitoring tools coverage in wireless networks.



Products and results:


Local network
monitored. Updated network map. updated inventory and descriptive record of physical communications devices on the network, its configuration and testing.



Information used or generated:



Network Map. Inventory hardware and network configuration. Work orders. Network documentation. Installation manuals of the devices. Manual configuration of devices. operational specifications of the organization. Quality Manual. Maintenance plan. Security plan. Regulations applicable environmental and health and safety at work matters. Reliable and updated documentation network.



COMPETITION UNIT 3: MAKING PROCESS CONNECTION BETWEEN PRIVATE AND PUBLIC NETWORKS NETWORKS





Level: 2





Code: UC0956_2





professional accomplishments and performance criteria:



RP 1: Install nodes interconnection of public and private networks to enable communication between the two, according to the instructions of the organization.

CR 1.1 The requirements of device implantation as well as communication lines with their corresponding interfaces are checked for compatibility conditions are met in accordance with the technical documentation thereof.


CR 1.2 interfaces and modules adaptation of the communication lines are installed and verified to proceed to its subsequent connection to the requirements of implementation of the communications device.

CR 1.3 The device is installed and the corresponding power parameters, and other mechanical fastening are checked to ensure the provision of communications services, according to the specifications received.

CR 1.4 The connections between communications lines and the device is made to ensure communication between the public and private network, according to the technical specifications and instructions relating to the work order.

CR 1.5 Installation work done is documented to resolve the technical and administrative needs of the organization according to specified protocols.

RP 2: Configure communication protocols on the network interconnect devices to ensure connectivity between public and private network, according to specifications of the organization.

CR 2.1 The configuration of communications equipment assets is created and modified to allow coexistence and / or interconnection of virtual local networks through public networks.
CR 2.2
Physical and logical configuration of routers connection to external networks is checked, using the right to find out if they are ready for connection or lack a hardware component or software, tools according to established procedures.

CR 2.3 External interfaces of the routers are configured to provide connectivity to the outside as directed by the operating company communications.

CR 2.4 interconnect devices are verified by testing services to ensure their functionality, according to the criteria of quality and communication plan of the organization.

CR 2.5 The tasks performed are documented to meet the needs of registration, according to the protocols of the organization.

RP 3: Keeping network interconnect devices to ensure continuity of service, according to the communication plan of the organization.

CR 3.1 Communication services are checked periodically to verify continuity and performance, using network management tools according to technical specifications and quality criteria of the organization.

CR 3.2 alerts and alarms systems are checked periodically to ensure the provision of communications services, according to the communication plan of the organization.

CR 3.3 device connectivity with other networks is checked performing functional tests to verify the functionality of the same, according to the procedures established in the operating specification of the organization.

CR 3.4 Tasks performed in interconnect devices are documented to meet the needs of registration according to the protocols of the organization.

RP 4: Attend and manage incidents and alerts in the elements of the private network connectivity, to maintain the connection with the public network according to specifications of the organization.

CR 4.1 Applications for troubleshooting and alerts detected are collected or redirected to the Customer Care Center, according to established procedures, to keep track of them and be able to follow, study and analysis.

CR 4.2 Symptoms collected in the part of incidents and alerts are checked by performing initial tests to diagnose and locate the nature of it using the appropriate troubleshooting guide according to the procedure established performance.

CR 4.3 Diagnosis and location of the incident and alert and its resolution is done to maintain the connection using the appropriate troubleshooting guide.
CR 4.4
solved incidents and alerts addressed are completed and closed in the incident management applications, to continue the flow of resolution and notifies the user following established procedures.

CR 4.5 The final report of incident or alert is performed in the standard format, collecting enough to update the historical incident information.



Professional background:





Production facilities:




Active network elements. Wiring analyzers. Network management tools. Control tools public communications lines. 'Sniffers'. Hand tools for electrical and mechanical works. Software tools for testing connectivity. Office tools. Diagnostic tools. Updates 'firmware'. Incident management applications. Map of the private network.



Products and results:



Routers, switches and jumpers properly installed according to specifications. Incidences be settled. Alerts generated by monitoring systems treated and managed network. Interconnection elements maintained and operating public and private networks.



Information used or generated:



Work Orders. Incidences parts. Troubleshooting guides. Historical reports of incidents. Standards and quality criteria defined by the organization. Technical Reports commissioning.



TRAINING MODULE 1: IMPLEMENTATION OF THE ELEMENTS OF LOCAL NETWORK





Level: 2





Code: MF0220_2





Associated with UC: Install, configure, and verify the elements of the local network according to established procedures





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Sort the elements that make up a local communications network, to identify the components that make up the physical map.

CE1.1 Explain a local network topologies considering architectures and technologies.

CE1.2 List the elements that can be found in the physical map of a local network based on the scope and network infrastructure used.

CE1.3 Describe each of the elements of a local network taking into account its characteristics and associated features.

CE1.4 In a practical course classification communications elements an installed local network:

- Develop your physical map as a received specifications.

- Develop your logical map as a received specifications.

CE1.5 identify the applicable rules and technical regulations affecting the implementation of local networks according to the procedures given.

C2: Apply the installation procedures and configuration of the local network nodes as well as protocol handlers and other programs that support communications services.

CE2.1 List and explain the characteristics of the protocols that are configured on a local network taking into account the technology and standards used.

CE2.2 Explain the addressing system nodes used in the local network based on network technologies used.

CE2.3 In a practical course setup and configuration of the nodes of a network to implement internal communications services, according to a received specifications:

- Identify the different outlets network nodes and their representation in the control cabinet, interpreting technical documentation.

- Select the appropriate tools for installation.

- Install network adapters with their corresponding drivers.

- Install and configure the network protocols used according to specifications received.

- Install and configure different network services according to the specifications received.

- Documenting activities, including all relevant aspects.

CE2.4 Apply the settings specified for the active elements (switches and routers), using a specified procedures.

CE2.5 identify the applicable rules and technical regulations affecting the implementation of local networks according to some given specifications.

C3: Apply the test procedures and verification of the elements of network connectivity and tools for these processes.

CE3.1 Explain the stages of a verification process on a local network connectivity.

CE3.2 List the tools used to verify connectivity to a local network, according to the technologies implemented in local networks.

CE3.3 Explain the operation of the network management tools to check the status of communications devices, taking into account the technical specifications of the tools.

CE3.4 In a practical course check the connection already installed in a local network, and from procedures given:


- Check the connection options permitted and prohibited.

- Check access to shared resources, following procedures given.

- Documenting processes and verification test performed according to technical specifications.

C4: Set the configuration parameters of the communications protocols in the network nodes, for integration into the network itself, following procedures given.

CE4.1 Identify parameters to configure communications protocols, their function and range of allowed values.

CE4.2 Interpret the specifications of a particular configuration of communications protocols, taking into account integration needs node on the network and the implementation of related services.

CE4.3 Enumerate the procedure for applying a predetermined configuration to a network node.

CE4.4 In a practical simulation, configure the different communication protocols using technical specifications given.

CE4.5 Identify the configuration parameters of the protocols with security features transmission and encryption, for integration into secure networks taking into account the safety criteria given.

CE4.6 Documenting processes to be performed in the configuration of the protocols on the local network nodes according to a given specification.

C5: Address the issues of the elements of the local network communications, and to solve the issue following a given specification.

CE5.1 Describe any incidents that occur in the communications elements of local networks, as the communications technologies used and the elements involved with them.

CE5.2 List the procedures and tools used for incident detection elements of the local communications network, according to specifications defined contingency plan.

CE5.3 Describe the techniques and tools that are used to isolate and diagnose the causes that have produced a reported incidence in the network, as indicated in the contingency plan.

CE5.4 Explain the systematic procedures for troubleshooting communications elements of the local network, depending on the devices that are detected incidents.

Ce5.5 In practical cases, properly characterized, failures simulated resolution within a local network, according to a specification received and following procedures given:

- Interpret alarms generated by the incident detection system.

- Locate the cause of the incidence element.

- Resolve the issue by applying pre-established procedures.

- Register the impact on the document prescribed for that purpose.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.3; C3 respect CE3.4; C5 respect ce5.5.
Other capabilities
:

Responsibility for the work carried out.

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Demonstrate some autonomy in solving small contingencies related to their activity.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Adopt appropriate working environment postural attitudes.



Contents:





1. Local networks



Features.

Topologies.

Architectures.

Elements of a local network.

Physical and logical network maps.

Applicable regulations and technical regulations affecting the implementation of local networks.



2. link layer protocols on a local network



Protocols logical link control.

Media Access Protocols: protocols contention, token passing, among others.

Physical addresses.

MAC address.



3. network layer protocols on a local network



Protocol IP network.

Logical addressing.



4. Verification Procedures and test connectivity elements of local networks



Verification tools connectivity elements of local networks.

Systematic verification procedures and test connectivity elements of local networks.



5. Configuration Procedures communication protocols in local networks nodes



Characteristic parameters of common communications protocols.

Systematic procedures
configuration protocols common communications nodes local networks.



6. Detection and diagnosis of incidents in local networks


Diagnostic Tools
communications devices in local networks.

Incident management processes in local networks.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation, configuration and verification of the elements of the local network according to established procedures, which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 2: LOCAL NETWORK MONITORING





Level: 2





Code: MF0955_2





Associated with UC: Monitor processes the local network communications





Duration: 180

hours





Capabilities and evaluation criteria:



C1: Describe the techniques and procedures for monitoring the local network as a given specifications.

CE1.1 identify the parameters that detect the performance of a local network given its architecture and technology support network.

CE1.2 List the hardware and software tools used in a local network monitoring considering its technical specifications.

CE1.3 Explain the operation of management tools for network traffic information and communications performance local network, according to technical specifications of the tools themselves.

CE1.4 Explain the process to continue to monitor traffic from a local network based topologies and network protocols implemented.

CE1.5 In a practical course of implementing monitoring procedures from an already installed local network:

- Check network traffic using hardware and software tools available.

- Check the performance of the local communications network, using the tools available.

- Configure network management tool to select alarms and alerts that yield the monitored network.

C2: Identify anomalous behavior of devices on the local network, and proceed to their attention and resolution following procedures given.
Identify CE2.1
alarm notifications reporting on incidents and abnormal behavior as a preventive maintenance plans given.

CE2.2 Describe the functions and properties of diagnostic and monitoring tools, used to isolate the cause of the incident according to the specifications of the tools themselves.

CE2.3 Describe troubleshooting procedures according to plan preventive and periodic maintenance.

CE2.4 Describe procedures documentation of corrective actions according to specifications received.

CE2.5 In a practical course of troubleshooting in a local network that have been characterized simulated faults in network devices, according to procedures given:

- Identify the symptoms of malfunction.

- Characterize depending on effects produced.

- Formulate a hypothesis of the possible cause of the dysfunction.

- Describe the intervention plan to address the anomaly.

- Implement the plan described and correct the malfunction detected.

- Documenting activities.

C3: Describe and perform the update process hardware and software communications devices, to ensure its integrity and reliability.


CE3.1 List updatable components of communications devices describing their characteristics.

CE3.2 Identify the parameters component compatibility update to ensure effectiveness in the processes according to technical specifications of these components.

CE3.3 Describe the steps for updating software communications devices, detailing the actions taken at each step and the software tools used.

CE3.4 In a duly characterized, upgrade components from a given configuration to achieve practical course:

- Carry out the replacement of components in communications devices, adjusting settings as specified.

- Carry out software update communications devices, adjusting settings as specified.

- Test changes, checking its operation.

- Documenting the actions taken, justifying the configuration adopted.

C4: Identify security alerts collected using management tools or facilities inspected.

CE4.1 Describe the functions of a network management tool according to specifications, the tool itself and architectures and network technologies implemented.
List
CE4.2 security alerts that may appear on a local network, describing its manifestations.

CE4.3 Describe the characteristics alerts discharged in management tools and set limits, to be displayed in such tools as technical specifications of the tool.

CE4.4 Locate the component and the cause that triggered a security alert in a management tool, noting that tool and equipment affected following procedures defined.

CE4.5 Describe the types and severity of alarms that can be detected with a management tool, taking into account the information provided by the tool and a given contingency plans.

CE4.6 In a practical course, properly characterized, a network analysis with a case of alert simulated and from a security protocol established:

- Describe the steps according to the protocol.

- Check the communications devices are controlled.

- Addressing the possible security alerts according to the protocol.

- Documenting the actions carried out, using the format given.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 respect to CE2.5; C3 respect CE3.4; C4 respect CE4.6.
Other capabilities
:

Responsibility for the work carried out.

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Demonstrate some autonomy in solving small contingencies related to their activity.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.



Contents:





1. Management and control communications protocols



Factors that determine the performance of a local network.

Metric.

Measuring Tools.

Management protocols.



2. Procedures Analysis of communication protocols in local networks



Protocol Analyzers.

Applying filters to capture traffic.

Traffic analysis at the network level.

Probes remote monitoring and intrusion detection.



3. Diagnostic procedures in local networks



Diagnostic tools included in the operating system.

Specialized diagnostic tools: logic analyzers and analyzers wiring. Network management tools.



4. Drawing tools for network design and documentation



Types and functions of graphic design tools and documentation to local networks.



5. Security management of the local network



Safety factors in the local network.

Safety procedures in local networks.

Probes remote monitoring and intrusion detection.

Tools notification alerts and alarms local networks.



Parameters context of training:





Spaces and facilities:




The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to process monitoring communications on the local network, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: INTERCONNECTION OF PRIVATE AND PUBLIC NETWORKS NETWORKS





Level: 2





Code: MF0956_2





Associate UC: Making processes connection between private networks and public networks





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Identify the characteristics of interconnection devices according to public and private networks standards communications technologies.

CE1.1 Explain the characteristics of the devices interconnection of private networks with public networks to identify their functions according to communications technologies and architectures used.

CE1.2 List the technologies used in networking, describing its characteristics to identify the characteristics of the integration of communications technologies according to their technical specifications.
Identify CE1.3
connection services and their interrelation and how to implement them on computers in the local network for the provision of communications services, according to the technologies used.

CE1.4 Identify interconnection services that support communications service providers that connects the private network, describing the profiles of the services provided to assess the adequacy of these services taking into account the functional specifications that should be addressed.

C2: Apply installation procedures and verification of interconnection devices private and public networks following a given specification.

CE2.1 identify the parameters that make interconnection services to the public network according to the technical characteristics of the service itself and the interconnect device.
Identify
CE2.2 in the quality standard in force, corresponding to the interconnection with the public network requirements.

CE2.3 Describe the interfaces that are used in connecting private networks to public networks, depending on the type of network used (connecting devices and communication lines, etc.).

CE2.4 Explain safety regulations applicable to the installation of a device interconnect private and public networks according to the technical characteristics of the devices to install and environmental conditions of the installation itself.

CE2.5 In a duly characterized, installation of a device interconnect private and public networks to support communications services practical course following a given specifications:

- Interpret the technical documentation of equipment to verify compliance with the pre-installation requirements.

- Install and connect the modules required adaptation using tools and following the instructions in the technical documentation.

- Testing to verify the functionality of the devices installed.

- Register in the computer documentation activities undertaken.

C3: Configure the protocols and parameters interconnect devices link between private and public networks, following a specified instructions.

CE3.1 Identify configuration parameters and management of virtual private network interconnection in the link devices according to a given configuration specifications.


CE3.2 Sort according to their functions, the protocols used in devices interconnection between private and public networks and identify the services that will be borne by them.

CE3.3 Describe the procedures and tools used to implement configurations on devices interconnect private networks with public networks for communication services are supported.

CE3.4 Explain the role and values ​​of each of the parameters involved in configuring a link device according to technical specifications of the device.

CE3.5 In a practical course of implementation of a configuration in an interconnecting device to support communications services, following some specifications received:

- Interpret work order by selecting the configuration to implement.

- Load the selected configuration using the specified media.

- Verify that communication services between interconnected networks are enabled.

- Documenting activities.

C4: Monitor and verify the operation of equipment interconnection with external networks using specific software tools.

CE4.1 identify functionality and application range of tools and applications monitoring and monitoring, depending on the characteristics of interconnection equipment.

CE4.2 Explain operating procedures of monitoring tools based on interconnection equipment to monitor.

CE4.3 Select tool monitoring test function to perform and explain how to connect following some specifications given.

CE4.4 Describe the monitoring procedures established to ensure the provision of operational services according to specifications received.

CE4.5 In a practical course of monitoring interconnection equipment, according to a specification received and following a given instructions:

- Select monitoring tool.

- Connect the tool to the computer and configure it.

- Monitoring equipment to detect traffic congestion and anomalies in service.

- Write a report on the activities undertaken and the results obtained.

C5: Resolve incidents detected in the interconnect devices private and public networks, following some instructions given.

CE5.1 Describe any incidents that occur on the devices interconnection of private networks with public communication networks, according to information received from reporting tools or other means.

CE5.2 Identify procedures and tools used for the detection of incidents, based on interconnect devices private and public networks.

CE5.3 Describe the techniques and tools that are used to isolate and diagnose the causes of incidents in interconnection devices private and public networks according to procedures and specifications given.

CE5.4 Explain systematic troubleshooting procedures depending on the specifications of a given contingency plans.

Ce5.5 In practical cases, properly characterized, troubleshooter in interconnection devices with simulated malfunctions, according to a specification received and following instructions given:

- Interpret alarms generated by the incident detection system.

- Locate the cause of the incidence element.

- Solve the impact applying specified procedures.

- Register the incidence in the specified documentation.

Capabilities whose acquisition should be completed in a real working environment:

Respect CE2.6 C2; C3 respect CE3.5; C4 respect CE4.5; C5 respect ce5.5.
Other capabilities
:

Responsibility for the work carried out.

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Demonstrate some autonomy in solving small contingencies related to their activity.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.



Contents:





1. Interconnection networks



Architecture of a networking device.

Concepts Routing: network segmentation, routing algorithms.



2. networking devices



Common internetwork interfaces.


Features networking services.



3. networking protocols



Stack TCP / IP protocols.

Virtual Networks.

Security mechanisms: masking and forwarding addresses.

Packet filtering.

Encryption.

Private Networks.



4. Procedures installation and testing of networking devices



Physical security regulations applicable to electrical and networking devices. Procedures for loading configuration networking devices.



5. Procedures monitoring devices internetwork



Monitoring tools in networking devices.

Systematic monitoring procedures networking equipment.



6. Procedures in troubleshooting networking devices



Types of incidents in the interconnection of public and private networks.

Diagnostic tools and reporting of incidents in the networking devices.

Incident management procedures.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the implementation of processes connection between private networks and public networks, which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX X

Professional qualification
:
systems operation


Professional Family: Computers and Communications





Level: 2





Code: IFC300_2





General competence


Apply
management procedures and hardware and software configuration of the computer system, ensuring its security and resolve any incidents that may occur in normal operation thereof and monitor their performance and consumption, following specifications received.



Competence units



UC0219_2: Install and configure the software based on microcomputer systems

UC0957_2: To maintain and regulate the physical subsystem in computer systems

UC0958_2: Run management and maintenance procedures in the base software and client application

UC0959_2: To maintain the security of the hardware and software subsystems in computer systems



Professional environment





Professional field



Develops his professional activity in the area of ​​support and CAU (User Attention Centre) dedicated to information technology in public entities or private, companies of any size, both self-employed basis, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located mainly in the service sector, the subsectors dedicated to the commercialization of equipment and computer services, computer technical assistance, TCNs and in all productive sectors that use computer systems for management.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Technical computer support


System operators (oriented machine)




Associate Training

(540 hours)





Training modules



MF0219_2: Installation and Configuration (120 hours) operating systems

MF0957_2: Maintenance of the physical subsystem of computer systems (150 hours)

MF0958_2: Maintenance subsystem logical systems (150 hours)

MF0959_2: Maintaining security in computer systems (120 hours)



UNIT OF COMPETENCE 1: Install and configure BASED SOFTWARE Microcomputer Systems





Level: 2





Code: UC0219_2





professional accomplishments and performance criteria:



RP 1: Perform installation processes operating systems for use in microcomputer systems, following specifications received.

CR 1.1 The characteristics of operating systems and templates are classified, to decide which version to install and the type of installation, depending on the technical specifications received.

CR 1.2 installation requirements and operating system templates are checked to verify that there are sufficient resources and support in the installation destination, and follow the established procedure.

CR 1.3 The installation target team prepares to locate the operating system, enabling infrastructure in mass storage devices and the necessary connectivity, according to the technical specifications received.

CR 1.4 operating system is installed using the processes indicated in the installation manuals that accompany it, using an image where appropriate, for a computer in functional status, following the established procedure.

CR 1.5 The operating system is configured for operation within the specified parameters, following established procedures and as indicated in the technical documentation.

CR 1.6 Utility programs included in the operating system are installed for use, according to the technical specifications received.

CR 1.7 programs running on servers for publication are installed, according to the technical specifications received.

CR 1.8 installation verification is performed to verify the functionality of the operating system, by testing starting and stopping, and performance analysis, following established procedures.

CR 1.9 documentation is constructed processes performed and recorded for later use, following internal models established by the organization.

RP 2: Updating the operating system to ensure operation, received following technical specifications and procedures of the organization.

CR 2.1 based versions of software, system add-ons and device drivers are checked to ensure their suitability, following the established procedure.

CR 2.2 Outdated versions of database software, system add-ons and device drivers are identified to proceed to update and ensure their functionality, following technical specifications and procedures.

CR 2.3-ins and 'patches' for the operation of the base software are installed and configured to display the system administrator to maintain security in the same, according to established procedures.

CR 2.4 Verification of the update is performed, to test the functionality of the operating system by testing starting and stopping, and performance analysis, according to established procedures.

CR 2.5 documentation processes performed are prepared and filed for later use, according to the standards set by the organization.

RP 3: Exploit the features of microcomputer system using base software and standard applications, taking into account the needs of use.

CR 3.1 The functions and applications provided by the software basis are identified for use, according to the instructions of the technical documentation and usage needs.

CR 3.2 Operations with the file system are made using the interface provided by the operating system, following techniques and specifications according to usage needs.

CR 3.3 configuration tools provided by the operating system are executed to select options work environment, according to specifications received and usage needs.


CR 3.4 application execution processes are performed to exploit the functions of each according to operational and functional needs.

CR 3.5 The messages provided by the software are interpreted based, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications provided by the organization.

CR 3.6 Procedures of use and management by users, peripherals connected to the microcomputer system are made to exploit its functionality, following the technical documentation and procedures established by the organization.



Professional background:





Production facilities:



IT equipment. Peripherals. Operating systems. Utilities and incorporated into operating systems and applications. Upgrade versions of operating systems. Disk cloning tools. Technical documentation associated with the operating systems. Utilities not incorporated into the operating system. Mass storage devices.



Products and results:



Computer equipment installed and configured operating systems. operating configured and operating systems. computer logically organized. Operating systems upgraded. Published applications available.



Information used or generated:



Manuals and technical documentation of operating systems. Manuals upgrade operating systems. Manuals of the applications included in the operating system and published. Reports installation, configuration and operating system upgrade. Plan safety and quality of the organization. Incident management applications.



UNIT OF COMPETENCE 2: KEEP AND REGULAR PHYSICAL SUBSYSTEM IN COMPUTER SYSTEMS





Level: 2





Code: UC0957_2





professional accomplishments and performance criteria:



RP 1: Check the status and maintaining connections of physical devices for use, following established procedures.

CR 1.1 checking and verification tasks to ensure the physical connection and network devices are made as established or as directed by the system administrator and always under conditions of safety procedures.
CR 1.2
physical devices damaged, malfunctioning or underperforming are updated or replaced with the same or similar components that fulfill the same function and ensure compatibility in the system to keep operating the same, according to established procedures.

CR 1.3 Detected issues are documented and recorded, if they are not already registered, according to established procedures.

RP 2: Review and ensure consumable items for operation of the computer system according to the specifications and requirements of use.
CR 2.1
consumables are tested to ensure compatibility and functionality using tools and techniques, as established and under conditions sufficient security procedures.

CR 2.2 exhausted, damaged or unusable consumables are replaced by the same or similar that fulfill the same function and ensure compatibility with the system devices following the procedure established manufacturer standards and under conditions of safe handling of fungible material.

CR 2.3 The operation of the computer system with installed consumables, is checked to ensure its viability, according to the established procedure.
CR 2.4
procedures recycling and reuse of fungible materials are applied to achieve both environmental and economic objectives, according to regulations of the organization and environmental specifications.

CR 2.5 Detected issues are documented and recorded, if they are not already registered, according to established procedures.

RP 3: Performance Monitoring physical subsystem reporting the incidents detected as specifications.

CR 3.1 Monitoring tools are checked to verify their operation, according to the procedures established by the organization.

CR 3.2 The operation of physical devices on the system is checked for possible anomalies, using monitoring tools and following the procedures established by the organization.

CR 3.3
measurement programs are run to check the performance of physical devices, according to established procedures and usage needs.
CR 3.4
monitored alarms and events are documented and is to file for later use, according to established procedures.

CR 3.5 Corrective actions established to address specific alarms and incidents are carried out according to established procedures.

CR 3.6 Detected issues are documented and recorded, if they are not already registered, according to established procedures.

RP 4: Monitor and review the physical inventory subsystem to ensure its validity according to established procedures.

CR 4.1 Inventories of physical components of the system are checked to ensure their validity, under the rules of the organization.

CR 4.2 The changes detected in features, configuration or status of physical components are documented according to established procedures, to maintain updated inventory.

CR 4.3 incidents detected on faulty components, unauthorized configuration changes, unauthorized components or misuse of these are documented and archived for later use installation according to established procedures.



Professional background:





Production facilities:



Computer equipment components, peripherals, cables and equipment for laptops, among others. Equipment half ( 'minis') and large ( 'mainframes') range. Assembly and measurement equipment: assembly and disassembly tools, strain gauges, tools for making wiring. expendables for system operation. Operating systems. Software automatic inventorying. Office tools. Monitoring software. Diagnostic software. Management tools. Network connection.



Products and results:


Inventories
revised and updated physical subsystem. Connections proven physical subsystem. proven consumables. Performance of the controlled system. computer system configured to have network connectivity and optimal physical performance.



Information used or generated:



Inventory computer system. Technical documentation of the physical system devices. Technical documentation database software system. Operating manuals monitoring software. Operating manuals inventoried software. Technical Documentation consumables manufacturers. Technical documentation diagnostic system and peripheral devices. Guide network connection. Environmental standards and safety recommendations. Regulations applicable health and safety at work. Incident reports maintenance of physical devices. Incident reports maintenance consumables. Reports of incidents of physical subsystem performance.



COMPETITION UNIT 3: IMPLEMENT PROCEDURES AND MAINTENANCE MANAGEMENT SOFTWARE BASED ON CLIENT APPLICATION AND





Level: 2





Code: UC0958_2





professional accomplishments and performance criteria:



RP 1: Keep updated user applications to ensure operation according to technical specifications and procedures of the organization.

CR 1.1 software application is installed to support the functional needs of users of the system administrator indication and according to established procedures.

CR 1.2 application software updates are made to maintain and renew the system functionality according to manufacturer's technical specifications and standards of the organization.

CR 1.3 The unused application software is uninstalled to avoid a bad use of storage space, according to established procedures.

CR 1.4 Detected issues are documented and recorded, in case you are not, according to established procedures.

CR 1.5 software application published in the central services is updated according to the established periodicity, user management and permissions are maintained and uninstalled when the organization decides to do without it.
CR 1.6
diagnostic processes are performed on computers that have been detected using specific incidents and remote management tools in order to solve them or scale them following established procedures.


RP 2: Perform administration tasks based software to keep the computer system running, according to established procedures.

CR 2.1 The hardware and software maintenance and cleaning information media are held periodically, with specific tools to ensure their integrity and functioning, according to established procedures.
CR 2.2
management tasks for maintaining software configuration and application base on client computers are performed according to established procedures and usage needs.

CR 2.3 peripherals connected to the client computers are configured logically application software, for exploitation, according to established procedures and technical specifications.

CR 2.4 Execution of management tasks are performed using specific software tools to facilitate its implementation, according to technical specifications and usage requirements.

CR 2.5 The execution of scheduled tasks administration is checked to ensure its operation and frequency, according to established procedures and usage needs.

CR 2.6 The implementation of programs or scripts is done, a display manager, and according to established procedures, to perform administrative tasks, documenting the result.

CR 2.7 Detected issues are documented and recorded, if they are not already registered, according to established procedures.

CR 2.8 Detected issues are resolved or scale, to proceed to its solution, according to established procedures.

RP 3: Performance Monitoring database software and application, reporting the results, according to established procedures.

CR 3.1 Monitoring tools are checked to verify their operation, according to the procedures established by the organization.

CR 3.2 Monitoring tools are used to detect possible anomalies in the functioning of basic software and application system and the source system for published applications, following procedures established by the organization.

CR 3.3 software measurement programs run in both positions as on servers running published applications, to check the performance of processes, according to established procedures.
CR 3.4
monitored alarms and events are documented and is to file for later use, according to established procedures.

CR 3.5 Corrective actions established to respond to certain alarms and incidents are carried out according to established procedures.

CR 3.6 Detected issues are documented and recorded, if they are not already registered, according to established procedures.

RP 4: Monitor and review software inventories to ensure its validity and updating, according to specifications received.

CR 4.1 Inventories logical system components are checked to ensure their validity, under the rules of the organization.

4.2 CR detected changes in version, configuration or status of logical components are documented to maintain updated inventory, according to established procedures.
CR 4.3
identifiers logical components subject to copyright are checked, to maintain control over the licenses installed according to applicable regulations.
CR 4.4
incidents detected on software malfunction, unauthorized configuration changes, unauthorized components or misuse of these are documented for later use, installation according to established procedures.



Professional background:





Production facilities:



Computer equipment and peripherals. Information media. Database software. office automation applications. Application software. Monitoring software. Patches and updates. Compression software files. Disk managers. Bootloaders. Management tools. Software automatic inventorying. Remote management tools. Tools 'workflow' for collaborative management of monitoring and documentation. Internet connection (activations and upgrades) and / or departmental network.



Products and results:


Inventories
reviewed and updated the logical subsystem. User applications running and updated. Computer system with logical subsystem running. Performance based software monitored.



Information used or generated:




Technical documentation of the physical system devices. Technical documentation database software system. Inventories logical subsystem. Operating manuals monitoring software. Operating manuals inventoried software. Organization charts. Plan safety and quality of the organization. Environmental standards and safety recommendations. Applicable regulations regarding data protection and confidentiality of information. Manuals administrative tools. Incident reports maintenance base and application software. Incident reports logical subsystem performance.



COMPETITION UNIT 4: KEEP SAFETY IN PHYSICAL SUBSYSTEMS AND LOGIC SYSTEMS





Level: 2





Code: UC0959_2





professional accomplishments and performance criteria:



RP 1: Perform backup to ensure data integrity, according to established procedures and safety plan.

CR 1.1 backups are performed to protect system data, depending on the frequency, support and procedure established in the system security plan.

CR 1.2 backups are verified to ensure the use of the same, according to the procedures established in the system security plan.

CR 1.3 Storing backups, to avoid loss of information is carried out under the conditions and according to the procedure outlined in the plan system security and support manufacturer's recommendations.

CR 1.4 Detected issues are documented and recorded, if they are not already registered, according to established procedures.

RP 2: Check access to the computer system, to ensure the application of established procedures and safety plan, reporting the detected anomalies.
CR 2.1
monitoring tools to access and trace system activity are checked to ensure their operation, according to the system security plan.

CR 2.2 trace files connecting users and system activity files are collected to locate the existence of access or unwanted activities.

2.3 CR access incidents detected and recorded system are documented in the case where they are not already registered, according to established procedures.

CR 2.4 The changes detected in the configuration of user access to the system are documented, to keep updated inventory, according to established procedures.

RP 3: Check the operation of the mechanisms established safety reporting anomalies detected persons of superior responsibility.

CR 3.1 permits user access to the system are checked to ensure their validity, according to the system security plan.

CR 3.2 user security policies are checked for cerciorar valid, according to the system security plan.
CR 3.3
protection systems antivirus and malicious programs are reviewed, with regard to updating and functional configuration, to ensure the safety of the equipment, according to the procedures established by the organization.

CR 3.4 Detected issues are documented and recorded, if they are not already registered, according to established procedures.
CR 3.5
diagnostic processes are performed on computers that have been detected using specific incidents and remote management tools in order to solve them or scale them following established procedures.

RP 4: Verify that environmental and safety conditions are maintained in accordance with established plans, reporting any anomalies.

CR 4.1 The technical specifications of the devices are checked to ensure that manufacturers recommendations regarding environmental and safety conditions are met.

CR 4.2 The location of equipment and physical devices are checked to ensure that requirements are met in terms of safety, space and ergonomics set by the organization.

CR 4.3 Detected issues are documented and recorded, if they are not already registered, according to established procedures.

CR 4.4 Corrective actions established to resolve certain incidents detected are performed according to established procedures.



Professional background:





Production facilities:




Computer and peripheral equipment. Information media. Database software. office automation applications. Monitoring software. Software for performing backups. antivirus software. Patches and updates. Compression software files. Disk managers. Bootloaders. Management tools. Tools and safety devices.



Products and results:



I backup system to prevent data loss. Computer system with logical subsystem running. access secured computer system front and unwanted actions. organized in conditions of environmental safety computer system.



Information used or generated:



Technical documentation of the physical system devices. Technical documentation database software system. Operating manuals monitoring software. Operation manuals of the devices and security tools. Organization charts. Plan safety and quality of the organization. Environmental standards and safety recommendations. Applicable regulations regarding data protection and confidentiality of information. Manuals administrative tools. Incident reports of system access. Incident reports of system security mechanisms. Incident reports backup.



Training Module 1: INSTALLATION AND CONFIGURATION OF OPERATING SYSTEMS





Level: 2





Code: MF0219_2





Associated with UC: Install and configure the software based on microcomputer systems





Duration: 120

hours





Capabilities and evaluation criteria:



C1: Sort the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main microcomputer systems architectures detailing the mission of each of the functional blocks.

CE1.2 Explain the concept of operating system and identify the functions performed in the microcomputer system.

CE1.3 Distinguish the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.
Sort
CE1.4 operating systems and versions that are used in computers detailing its main characteristics and differences, according to technical specifications.

CE1.5 Identify the phases involved in installing the operating system by checking the computer system requirements to ensure the possibility of the installation.

C2: Apply processes Installation and configuration of operating systems to enable the functionality of the computer, according to some specifications received.

CE2.1 In a practical course, properly characterized, installation of an operating system on a computer for its operation:

- Check that your computer meets the requirements and has the necessary resources for the installation of the base software.

- Prepare the installation destination formatting and creating partitions specified equipment.

- Install the operating system following the steps in the technical documentation.

- Configure the system with the specified parameters.

- Install utility programs indicated and verify the installation.

- Documenting the work done.

CE2.2 Identify procedures that are used to automate the installation of operating systems on computers of the same characteristics by using cloning software tools and other installation tools unassisted.

CE2.3 In a practical course, properly characterized, installation of an operating system on computers with the same characteristics:

- Prepare one of the computers to install the operating system and utilities.

- Install and configure the operating system and utilities indicated.

- Select the software tool for cloning equipment and proceed to obtain images of the system installed for distribution.

- Implement by management tools disk images, those obtained on multiple machines with similar characteristics to the original order to activate their functional resources.

- Testing of starting and stopping to check the facilities.

- Documenting the work done.


C3: Updating the operating system of a computer to include new features and address security issues, based on technical specifications.

CE3.1 Identify the components of a software operating system susceptible reset for updating, considering its technical specifications.

CE3.2 Identify and classify the sources of obtaining update elements for the implementation processes of patches and operating system updates.

CE3.3 Describe the procedures for updating the operating system taking into account the security and integrity of the information in the computer.

CE3.4 In a duly characterized upgrade an operating system for incorporating new features practical course:

- Identify the components to update.

- Check the software update requirements.

- Update specified components.

- Check made processes and the absence of interference with other system components.

- Documenting the update process.

C4: Using applications that provide operating systems for the operation thereof according to technical specifications.

CE4.1 use the applications provided by the operating system by describing its characteristics for use and exploitation thereof, taking into account their technical specifications and functional requirements.

CE4.2 use the applications provided by the operating system for the organization of the disk and the file system, according to technical specifications received.

CE4.3 Use accessibility options operating systems to configure accessible environments for people with disabilities, in accordance with technical and functional specifications.

CE4.4 Set options work environment using the tools and applications provided by the operating system, following specifications received and usage needs.

CE4.5 Describe the applications provided by the operating system to exploit the capabilities of the peripherals connected to the system, according to usage needs.

CE4.6 Sort the messages and warnings provided by the microcomputer system to discriminate their importance and criticality and implement response procedures in accordance with instructions given.

Capabilities whose acquisition should be completed in a real working environment:

C2 and CE2.3 CE2.1 respect; C3 respect CE3.4.
Other capabilities
:

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Keep an assertive, empathetic and conciliatory attitude with others showing warmth and kindness in treatment.

Adapt to new situations or contexts.
Respect
procedures and internal rules of the organization.

Adopt appropriate working environment postural attitudes.



Contents:





1. Computer Architecture



Block diagram of a computer: subsystems.

The central processing unit and its elements: Internal memory, types and characteristics; the input and output units; mass storage, types and characteristics.

Buses: characteristics and types.

Correspondence between the physical and logical subsystems of a computer.



2. Operating Systems



Classification operating systems.

Functions of an operating system.

Equipment Microcomputer Operating Systems: characteristics and use.

Command mode.

Graphic mode.



3. Installation of operating systems



Procedures for installing operating systems.

Substrate Preparation: partitioned and formatted.
Types
installation of an operating system: minimal, standard and customized.

Device configurations.

Tools for cloning disks.

Update operating systems.



4. Utilities OS



Features and functions.

Based Software Utilities: work environment configuration; administration and management of file systems; process management and resources; management and editing files.



Parameters context of training:





Spaces and facilities:




The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation and configuration of software in microcomputer-based systems, which are accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: PHYSICAL SUBSYSTEM MAINTENANCE SYSTEMS





Level: 2





Code: MF0957_2





Associated with UC: To maintain and regulate the physical subsystem in computer systems





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Identify the physical components of the computer system detailing their connections and main operation and status indicators for appropriate operating parameters, according to established specifications.

CE1.1 Identify the types of physical components of classifying system according to different criteria: functions and device types, among others.

CE1.2 Describe technologies connecting devices, expansion slots and ports detailing the basic characteristics to identify the possibilities of interconnection with the system components, according to technical specifications.

CE1.3 Describe inventory techniques and tools used in the system for registration of physical components and changes therein in accordance with the specified technical indications.

CE1.4 In a practical course, properly characterized, identification of the physical devices that make up the system, to classify and describe its functionality:

- Sort devices by type and functionality.

- Recognize indicators and operating status of the devices as shown in the technical manual.

- Check the registration of devices in inventory and record the changes detected.

- Relate physical devices to their respective connectors.

C2: Manipulating the types of consumables associating them to physical devices, to ensure its functionality, according to technical specifications.

CE2.1 Describe the types of devices that use consumables as part of its operational performance to implement control procedures and replacement thereof according to technical specifications.

CE2.2 Sort the types of consumables manufacturer according to criteria of function, duration, material, degree of reuse and recyclability among others to identify the characteristics thereof.

CE2.3 Identify tasks and maintenance problems for each type of fungible material according to technical specifications of the documentation.

CE2.4 Explain how to handle the types of consumables to ensure health and safety at work according to the specifications in the technical documentation.

CE2.5 Describe procedures recycling and waste of consumables to meet environmental regulations.

CE2.6 In a practical course, properly characterized, handling of consumables to replace it or replace it:

- Relate fungible material with the corresponding physical devices, according to their technical specifications.

- Choose the consumables for the device according to criteria of functionality and economy.

- Interpret signals about the device consumables.

- Install the consumables on the device and testing device operating.

- Implement handling procedures established consumables: insertion, removal, handling for recycling and handling for recharging a fungible unit, among others.


- Documenting the processes performed.

C3: Regular physical performance devices using monitoring tools, following some given specifications.

CE3.1 detail the critical components that affect the performance of the computer system to identify the causes of possible deficiencies in the operation of the equipment, according to technical specifications.

CE3.2 Explain the types of metrics used for testing and performance assessment of physical devices, according to technical specifications of the devices themselves.

CE3.3 Identify configuration parameters and performance of physical devices in the system to optimize the functionality and quality of the services performed by the computer taking into account parameters of quality and performance.

CE3.4 Describe the tools for measuring physical performance and system monitoring, classifying the metrics available in each case, to implement the evaluation procedures in the elements of the computer system, according to technical specifications received.

Apply measurement procedures CE3.5 physical performance using the right tools to verify the functionality of the computer system is within preset parameters, using technical specifications given.
Apply CE3.6
verification procedures and anomaly detection event logs and alarms on physical performance devices for notification to the system administrator, following technical specifications given.

CE3.7 In a practical course, properly characterized, performance evaluation of physical devices in the system to check its functionality and operability, according to given performance specifications:

- Select the measuring tool according to given specifications or indications of the administrator.

- Run measurement procedures using the selected tool.

- Check the results to ensure that the measures are within normal parameters, and act according to procedures established to abnormal situations.

- Perform configuration changes to the specified physical devices according to specifications received.

- Record inventory configuration changes made.

- Documenting the work detailing the detected abnormal situations.

C4: Interpret incidents and alarms detected in the physical subsystem and take corrective action for a given solution following specifications.

CE4.1 operating Identify incidents caused by the physical devices that make up the subsystem to classify implement corrective actions to specifications received.
Explaining CE4.2
strategies to detect malfunctions in operation of the subsystem.

CE4.3 Apply procedures for incident detection using specific tools and monitoring activity indicators of physical devices in the system taking into account the operating technical specifications.
Apply CE4.4
response procedures established for the resolution of incidents detected in the operation and performance of physical devices according to a given specification.

CE4.5 In a practical course, properly characterized, implementation of corrective actions to resolve the malfunction of physical devices in the system, given procedures to be applied:

- Conduct measurement procedures using the selected tool.

- Check the connections of the devices.

- Compare the measurement results with the expected results to check whether or not there has been an incident.

- Replace or update the component or device causing the fault ensuring compatibility with the system.

- Run established procedures to respond to the incidents produced.

- Record inventory corrective actions and document detailing the work produced impact situations.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 and CE2.6 CE2.3 respect; C3 respect CE3.7; C4 respect CE4.5.
Other capabilities
:

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Interpret and execute instructions work.


Acting quickly in difficult situations and not just wait.

Demonstrate flexibility to understand the changes.
Respect
procedures and internal rules of the organization.



Contents:





1. Components of a computer system



The central processing unit: functions and types, purpose and scheme of operation and internal structure.

The memory system: functions and types, address spaces and memory maps, and memory hierarchies.

The system I / S: functions and types, controllers E / S, peripherals, storage devices and printing devices, among others.

Connection between components.

Ports and connectors.



2. Techniques inventory systems



Inventory records to physical devices.

Tools software inventory computer system.



3. consumables physical devices in a computer system



Devices with consumables.

Classification of fungible material.

Maintenance consumables.

Recycling and reuse.



4. Monitoring techniques and performance measurement of physical devices



Performance metrics.

Representation and analysis of measurement results.
Performance
physical devices.

Configuration parameters and performance.

Monitoring tools physical devices.



5. Diagnostic Techniques incidents and alarms physical subsystem



Classification of incidents and alarms physical devices.

Diagnostic tools and alarms incidents of physical devices.

Established methods for solution incidents.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to maintenance and regulation of the physical subsystem in computer systems, which are accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: MAINTENANCE SUBSYSTEM SOFTWARE SYSTEMS





Level: 2





Code: MF0958_2





UC associate Run management and maintenance procedures in the base software and client application





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Identify the software components of a computer system detailing its characteristics and configuration parameters as a functional specifications given.

Quote CE1.1 types of software for classification according to the purpose, functions and modes of implementation among others, according to the technical specifications of software manufacturers.

CE1.2 describe the characteristics of the software components of the system, distinguishing their features, taking into account the technical specifications.

CE1.3 Explain and describe the types of user interfaces discriminating the main features of each of them, according to technical specifications of the systems used.

CE1.4 Identify configuration items of software components to ensure system performance, according to specifications received.

CE1.5 In a practical course, properly characterized, software identification system components for use, according to a given specification:

- Operate user interface software component using the usual mechanisms for each type.


- Operate the functional options of each software component as indications of technical documentation.

- Identify the software configuration of a component according indications established procedures.

- Check the registration of a software component inventory and record the changes detected.

- Check the software user licenses taking into account copyright and applicable regulations.

C2: Install and update software application programs to provide functionality to users, following some given specifications.

CE2.1 In one, properly characterized practical case, the installation of software application components to add functionality to the system:

- Check the software installation requirements to be implemented in the system.

- Check that the licenses of use of software components meet the applicable regulations.

- Perform component installation procedures.

- Configure the software components installed to use peripherals and devices of the computer system.

- Perform procedures uninstaller software components, if necessary.

- Check made processes and the absence of interference with other system components.

- Documenting the installation and uninstallation processes performed detailing the activities.

- Keep updated software inventory recording the changes.

CE2.2 List the main procedures to maintain the updated software, according to the technical specifications of the software type and manufacturer.

CE2.3 Describe the procedures to apply an update, detailing safety problems in installing and updating software to maintain the functional parameters of the equipment.

CE2.4 In a duly characterized, software update application on a system to readjust to the new needs practical course:

- Identify the software component version to upgrade and compatibility conditions to be considered for the update.

- Locate the updates made available by the manufacturer, not yet implemented and identify the "patches" and other code modules available to increase the functionality of the component or to correct an improper behavior, checking user licenses of software components meet the applicable regulations.

- Uninstall the components involved before applying an update, as shown in the technical documentation, established procedures and instructions of the administrator.

- Apply the above-identified software component updates as indications of technical documentation, established procedures and indications administrator, configuring the software component according to the specifications given after the upgrade.

- Check that the software component has the desired functionality conducting performance tests.

- Documenting the update process produced detailing incidents and maintain inventory software updated by recording changes.

C3: Apply management procedures and maintain system operation within specified parameters as given technical specifications and usage requirements.

CE3.1 Identify administrative tools available in the detailing its features and applications system to perform management procedures.

CE3.2 Explain the types of physical media for storing information detailing the tasks for maintaining data structures.

CE3.3 Describe the types of management tasks computer systems detailing its features, implementation modes and mechanisms available for automatic execution taking into account the technical specifications.

Quote CE3.4 maintenance techniques configuration software and application base it needed to maintain the operation of the system.

CE3.5 In a practical course, properly characterized, maintenance of system components, following some given specifications:

- Select the appropriate administrative tool.

- Apply procedures for maintaining the information carriers and for maintaining software configuration and application base.

- Configure and verify the operation of the installed devices from the application software.


- Run and check the schedule of automatic administrative tasks.

- Run scripts and administrative programs as directed by the administrator.

- Document all procedures applied detailing the incidents detected and maintain software inventory updated by recording changes.

C4: Identify the basic performance parameters and application software using specific techniques and monitoring tools to verify and measure the quality and functionality of services provided by the computer system.

CE4.1 Explain the basics of performance measurement software detailing the techniques used for the assessment of system functionality.

CE4.2 Identify configuration parameters and performance based elements and application software to monitor the system.

CE4.3 Describe the performance measurement tools software, sorting the metrics available in each case, taking into account the associated technical specifications.
Explaining CE4.4
monitoring techniques and measurement made by the tools, to enhance performance and application software basis, taking into account the associated technical specifications.
Apply CE4.5
verification procedures and anomaly detection event logs and alarms performance software for notification to the system administrator, following some given specifications.

CE4.6 In a practical course, properly characterized, performance measurement and application software base to detect abnormal situations:

- Select the measuring tool according to administrator instructions.

- Run measurement procedures using the selected tool.

- Check the results to ensure that the measures are within normal parameters.

- Documenting the work done.

C5: Identify incidents and alarms detected on logical to take corrective action as a subsystem specifications given.
Sort CE5.1
incidents and alarms operation and access produced in the software elements of the system to detect malfunctions in the software.
Sort CE5.2
diagnostic tools used to isolate the cause that produces the alert or incident, taking into account the troubleshooting procedures given.

CE5.3 Apply specified response procedures to address issues detected in the operation of the base and application software, following the instructions.

CE5.4 In a practical course, properly characterized, for corrective actions to address the malfunctioning of the base and application software:

- Identify the incidents detected in the operation of the software or application basis.

- Using diagnostic tools in case of malfunction of the software.

- Run established procedures to respond to the incidents produced.

- Using tools of local or remote management of the system to resolve the issue.

- Document detailing the work produced impact situations.

- Keep updated software inventory recording incidents and changes.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 and CE2.4 CE2.1 respect; C3 respect CE3.5; C4 respect CE4.6; C5 respect CE5.4.
Other capabilities
:

Finish work according to criteria of suitability, speed, economy and efficiency.
Keep
oriented proactive process improvement.

Demonstrate stress resistance, stability of mood and impulse control.

Acting quickly in difficult situations and not just wait.



Contents:





1. The software in the computer system



Software types.

System software and user software.

Functions and features.



2. Procedures for installing software components



System Requirements.

Licensing ownership, use and distribution of software.

Inventory software.

Parameters and system configuration in the installation process.

Records and databases installed software.

Configuring Applications for access to peripherals.



3. Software Maintenance Procedures



Objectives of a maintenance plan.


Software Update application, requirements verification and updating processes.



4. Methods of Administration



Types of administrative tasks.

Administrative Tools.
Maintenance
file system and media information.

Scheduled Tasks.



5. Monitoring techniques and performance measurement software elements



Configuration parameters and performance of software components.

Software monitoring tools.

Performance measurement procedures.



6. Incidents and alarms computer system software



Classification of incidents and alarms software.

Diagnostic Tools software incidents and alarms.

Established methods for troubleshooting software.

Remote Maintenance: Tools and configuration.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the implementation of management procedures and maintenance in the base software and client application, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 4: MAINTAINING SECURITY SYSTEMS





Level: 2





Code: MF0959_2





Associated with UC: Maintaining the security of the hardware and software subsystems in computer systems





Duration: 120

hours





Capabilities and evaluation criteria:



C1: Apply procedures for backup and restore, verify its performance and handling storage media to ensure the integrity of information computer system, following some specifications given.

CE1.1 Sort the various storage media and data security of computer system for use in copying processes based on established technical specifications.

CE1.2 Explain procedures and tools for conducting, restoration and verification of backup and data storage computer system to ensure the integrity of the information system, according to some given specifications.

CE1.3 In a practical course, properly characterized, in which has a data storage system with multiple devices, from performing backups to ensure data integrity, given procedures to follow:

- Select the storage device and the tool to back.

- Perform backup at the intervals and the specified or administrator to display procedure.

- Check the copy.

- Label the copy made and storing them under the environmental conditions specified location and security.

- Check and record incidents detected.

- Documenting the processes performed.

CE1.4 In a practical course, properly characterized, restore backups to retrieve the stored information given procedures to follow:

- Select the tool for restoration according to the type and support backup made.

- Perform the restore process as directed received.

- Check the restoration process checking the destination of it.

- Check and record incidents detected.

- Documenting the processes performed.


C2: Identify the types of access to the computer system, and the mechanisms it up, describing its main and most common associated tools to ensure the use of system resources characteristics.

CE2.1 Describe the mechanisms of access control system detailing the organization of users and groups to ensure information security and functionality supported by the computer, according to the technical specifications.

CE2.2 Explain the procedures of systems to set permissions and user rights, detailing their organization and associated management tools to organize security policies, according to procedures established in the base software.
Sort
CE2.3 common security mechanisms in systems detailing its objectives, features and associated tools to ensure information security and functionality supported by the computer.
Identify mechanisms
CE2.4 system protection against viruses and malicious programs to ensure their update.

CE2.5 In a practical course, properly characterized, identification of mechanisms to maintain system security its protection:

- Identify users and groups defined in the system using administrative tools indicated in the procedures given.

- Find, for each user, access permissions and security policies associated operating with administrative tools indicated in the procedures given.

- Verify that antivirus and malware protection are updated.

- Check the registration of users and groups inventory, recording the changes detected.

C3: Interpret traces monitoring access and activity of identifying abnormal situations system, following some specifications given.

CE3.1 List the mechanisms of traces of access and activity monitoring for detailing its scope, main characteristics and associated tools.

CE3.2 Describe any incidents arising in user access and activity of classifying tiered security system to detect malfunctions in these processes.

CE3.3 Identify tools to extract trace files connecting users and system activity files for easy reference and handling, according to their technical specifications.

CE3.4 interpret the content of trace files connecting users and system activity files to locate and access unwanted activities following the procedure specified by the administrator.

CE3.5 In a practical course, properly characterized, analysis and evaluation of trace files connecting users and file system activity to detect unwanted access and activities, according to a given specification:

- Identify the characteristics of a set of user records.

- Locate a record of a given user and explain its features.

- Extract and record abnormal situations relating to a user.

- Documenting the actions performed.

CE3.6 Distinguish the tools used for the diagnosis and detection of incidents in both local and remote application to their management, solution or scaling them, according to a given specification.

C4: Describe the environmental and safety conditions for the operation of equipment and physical devices that guarantee operating parameters given.

CE4.1 Describe the environmental factors that influence the location and physical space conditioning devices, consumables and media information to complete the installation requirements of devices, according to the technical specifications thereof.

CE4.2 Identify safety factors and ergonomics to consider the physical location of equipment and devices to ensure their conditions of implementation, according to their technical specifications.

CE4.3 In a practical course, properly characterized, check the environmental conditions to ensure the status of equipment and physical devices:

- Check the location of physical devices, consumables and information carriers they meet the established standards and technical specifications.

- Check the location register physical devices and consumables inventory, recording the changes detected.


- Identify appropriate safety conditions and environmental and inadequate.

- Propose corrective actions to ensure the safety requirements and environmental conditions.

Capabilities whose acquisition should be completed in a real working environment:

C1 and CE1.4 CE1.3 respect; C2 respect to CE2.5; C3 respect CE3.5; C4 respect CE4.3.
Other capabilities
:

Acting quickly in difficult situations and not just wait.

Demonstrate a good professional.

Finish work according to criteria of suitability, speed, economy and efficiency.

Keep an assertive, empathetic and conciliatory attitude with others showing warmth and kindness in treatment.

Adapt to new situations or contexts.
Respect
procedures and internal rules of the organization.
Keep
oriented proactive process improvement.



Contents:





1. Managing computer security



Aim of security.

Process safety management.

Threat identification methods: external and internal attacker.



2. Logical System Security



File systems and access control.

Permissions and user rights.

User Registries: weak authentication systems; strong authentication systems; Biometric authentication systems and other systems.

Tools for managing users.

Virus detection software and malware, recovery techniques and disinfection of affected data.

Remote Management Tools incident.



3. Backup


Types
copies.

Architecture backup service.

Storage media for backups.

Tools for performing backups.

Restoration of copies and verifying the integrity of the information.



4. Procedures for monitoring access and system activity



Objectives of monitoring.

Trace monitoring procedures: monitorable or auditable aspects; classification of events and incidents: system, application, security; trace monitoring mechanisms: alarms and corrective actions; information records trace.

Monitoring techniques and tools.

Monitoring reports.



5. Physical environment of a computer system



The equipment and the environment: adaptation of physical space.

Regulations and regulations.

External agents and their influence on the system.

Negative effects on the system.

Creating the right environment: control of environmental conditions: temperature and humidity; industrial factors: dust, smoke, noise, noise and vibration; Human factors: functionality, ergonomics and quality of the installation; other factors.

Risk factors: electrical safety concepts; electrical installation requirements; electrical and electromagnetic interference; static electricity; other risk factors.

Measuring devices.

Corrective actions to ensure safety requirements and environmental actions.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the maintenance of security hardware and software subsystems in computer systems, which will be evidenced by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XI


Professional qualifications: Network Management Voice and Data



Professional Family: Computers and Communications





Level: 3





Code: IFC302_3






General competence



Define and monitor the installation procedures, configuration and maintenance of the resources of a communications network to provide voice, data and multimedia to users and make the integration of the resources offered by the transmission and switching systems.



Competence units



UC0228_3: Designing computer network infrastructure

UC0962_3: To integrate voice, data and multimedia

UC0963_3: Manage and provide communication services to users



Professional environment





Professional field



Develops his professional activity in the department of communications networks and dedicated / to the area of ​​communications in companies or public or private entities of any size, both on its own and others, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located in the telecommunications sector in the subsector of marketing communications services as well as voice and data in any sector that has a communications network infrastructure with integrated voice and data.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Administrators

communications services
Technical support transmission and switching systems



Associate Training

(540 hours)





Training modules



MF0228_3: Design of computer networks (210 hours)

MF0962_3: Integration of voice communications services, data and multimedia (180 hours)

MF0963_3: Managing communications services for users (150 hours)



COMPETITION UNIT 1: DESIGNING TELEMATICS INFRASTRUCTURE NETWORK





Level: 3





Code: UC0228_3





professional accomplishments and performance criteria:



RP 1: Determine the topological configuration of network interconnection equipment that adequately meets the needs of the project.

CR 1.1 The system specifications are developed collecting and functional performance requirements, technical and cost.

CR 1.2 The topology of the system is determined by the choice of a standard reference model that satisfies the requirements of the applications that are to be used, such as response time, quality of service, addressing scheme, volume data transfer, distance or access to other networks.

CR 1.3 Communication elements are valued taking into account the existing infrastructure and the state of technology in this evolution and its possible short and medium term.

CR 1.4 The topology and network elements are chosen in accordance with the requirements of accessibility, confidentiality and integrity required by the user and current regulations.

RP 2: Analyze the possibilities of connectivity communications equipment market to integrate them into an infrastructure project of telematic networks.

CR 2.1 features and specifications of communications equipment are identified to determine their suitability for network design.

CR 2.2 The different physical transmission media are distinguished by their technical characteristics and their suitability for use for different types of networks, interpreting technical documentation.

CR 2.3 Environmental requirements of communications equipment (occupied area, power consumption, heat dissipation, etc.) are contrasted with the possibilities of installation.

CR 2.4 The conditions of employment and service means access to basic public networks offered by telecommunications operators are included in the network design specifications, reviewing the content.

CR 2.5 The performance and features of communications hardware and software products similar products such as: routers, hubs, switches, VPN servers virtual-private-networks, or firewalls, are compared towards their inclusion in the network design, interpreting the technical documentation.


CR 2.6 The implementation of communications software products are evaluated on different platforms and operating systems, taking into account all possible cases.

RP 3: Determine the physical configuration of network interconnection equipment by selecting equipment, devices and software to fit the needs of the project.

CR 3.1 The location of the equipment and network devices is determined taking into account the conditions of ergonomics, safety and use of space.

CR 3.2 software components of the network infrastructure are chosen according to the system requirements and performance required by applications and previously specified.

3.3 CR wiring system and the type of support used for the local network are determined based on the distances between nodes of the system, the speed required for data transmission and environmental conditions.
CR 3.4
equipment and network devices are selected according to the following criteria:

- The condition of approval thereof, both internally and externally, for internal approval proposing those items whose use is essential.

- Compliance with the prescribed technical and economic conditions.

- The supply security and availability in the agreed deadlines.

CR 3.5 The sketches and block diagrams of the system are made reflecting the structure of the system and the various elements that compose it, identifying the user jobs in the plane and its connections in the rack plant, interconnections with other racks the building, and the identification and location of communication devices each rack.

RP 4: Prepare or supervise the preparation of technical documentation that allows the execution of the installation of data network and subsequent maintenance.

CR 4.1 The specification of the installation is made detailing the nature and scope of it.

CR 4.2 The technical documentation is made including schematics and assembly drawings and detail necessary, using the symbology and standardized presentation.

CR 4.3 The relationship of materials, equipment and devices is performed using standard encoding and ensuring its internal acquisition and / or external.

CR 4.4 installation construction plans are made collecting the characteristics of the equipment for its implementation, such as physical dimensions, location of devices and cards, encoded identification E / S and wiring, among others.

CR 4.5 The network software and communication programs are documented system so as to allow the implementation and subsequent maintenance of the functions thereof.

CR 4.6 The technical documentation is made so that meets the standards of the organization, contains chapters required for installation and maintenance of the system, and include:

- The process to be followed in the commissioning.

- Tests and adjustments to be made in the process of commissioning the system.

- Parameters to be checked and adjusted.

- Stable operating margins.

- Guidelines for the implementation of preventive maintenance.



Professional background:





Production facilities:



Instruments for performing installations schemes (CAD / CAM / CAE, among others). manufacturer's technical documentation. Project planning tools. Configurators communications services operators.



Products and results:



Network design: flat and block diagrams. Memory components. Maintenance Guidelines network infrastructure. Guidelines for verification and testing of components and equipment.



Information used or generated:



Security policy communications infrastructure. Installation manuals, reference and use of communications equipment. Information and extensive local networks and systems of public and private media area. Information communications equipment and software. applicable regulations and standards of communications networks. technical project documentation and communications facilities. Manuals times and prices of communications facilities.



COMPETITION UNIT 2: integrating voice, data and multimedia





Level: 3





Code: UC0962_3





professional accomplishments and performance criteria:




RP 1: Define and implement procedures for implementing gateways, which allow integration of functionality as services to support their specifications.
CR 1.1
analysis maps IP addresses and lines and voice transmission nodes is performed to verify the installation conditions gateway system according to technical specifications and description of the services to be integrated.

CR 1.2 The characteristics of the lines of communications, environmental requirements and power supply are determined to ensure the functioning of the system as signaling standards and digitizing, technical specifications of the devices and applicable environmental regulations.

CR 1.3 Installation procedures hardware and software that make up the catwalk, are defined and documented for later execution according to specifications and functional and technical criteria.

CR 1.4 The gateway is configured to ensure the provision of services will be borne by it, according to specific needs and indications of the organization.

CR 1.5 Functional and structural tests are performed on the catwalk, to verify the delivery of the services specified according to needs of the organization.

CR 1.6 Safety parameters of the gateway, are set to verify access to the same resources and is performed by default users, according to the needs of the organization.

CR 1.7 documentation tasks that have been carried out, is performed according to the protocols of the organization needs to complete registration.

RP 2: Manage incidents arising in the integration of voice and data services, for continuity in the provision of the same, according to quality specifications and conditions of service criticality.

CR 2.1 The incidence detection channels are determined and means for detecting and reporting them to those responsible for their care and management are enabled to proceed with the solution according to protocols established by the organization.

CR 2.2 Isolation procedures and detection of incidents producing causes stipulated in the action plan for contingencies, to provide references to those responsible for managing problems on the runway according to the protocols of the organization.

CR 2.3 Incident management is organized indicating the tools used and the procedures to follow and the Escalation system to ensure intervention assistance team with speed and quality criteria according to internal standards the organization.
CR 2.4
bulletins incidents and associated documentation are made to control and manage the processes of intervention and solution according to the protocols of the organization.

RP 3: Define and implement procedures for implementation and maintenance of communications systems for multimedia services, depending on quality specifications of the organization and the multimedia service itself.
3.1 CR
elements of the communications system for multimedia services, are identified according to the requirements specified for establishing services.

CR 3.2 The parameters of communication lines are identified by the specified requirements for the establishment of multimedia services.

CR 3.3 The configuration of the transmission protocols specific multimedia content, is planned for implementation in communication devices according to technical specifications and needs of the organization.

CR 3.4 Installation procedures and maintenance of hardware and software that make up the communications system for multimedia services are defined and documented for later execution according to specifications and functional and technical criteria.

CR 3.5 Functional parameters of equipment forming the communications system for multimedia services are defined and configured to ensure the quality of services according to specific needs and indications of the organization.

CR 3.6 Functional and structural tests are performed in the communications system equipment for multimedia services, to verify delivery of the services specified according to needs of the organization.



Professional background:





Production facilities:




Technical documentation of manufacturers, in printed or electronic form. Configuration and parameterization tools manufacturer service. Internal management tools, registration and management of incidents. Computer and peripheral equipment. Communications equipment. Office tools. Monitoring and testing tools. Measuring instruments. Tools / applications monitoring and management. Communication lines. Test terminals, telephones and computers to test the service. Telephone switching equipment. 'Call Managers'.



Products and results:



Network communication services voice, data and multimedia configured and running. Implantation procedures defined gateways and multimedia services. Guidelines defined verification and periodic tests. Parameters set in communication lines. managed and resolved issues.



Information used or generated:



Maps IP addresses of lines and voice transmission nodes. Service specification that will support the catwalks. Parameters contracted by the client quality. Quality standards of the organization. Technical specifications of the devices and manufacturers recommendations. Environmental regulations applicable safety and signaling standards and digitizing. Manuals and operation of the runways. Associated software manuals. Technical documentation of manufacturers, in printed or electronic form. Information on configuring network operator with which the gateway is connected. IP information. Installation manuals, reference and use of communications equipment. Test plan. Internal scaling procedure. Scaling procedure agreed with the client. Report result of the installation. Reports performance. Act of acceptance by the customer. Bulletins incidents. Report result of functional and structural testing. List of the parameters set in communication lines. List and interpretation of the configured alarms. Safety report with default by the organization users. Action plan for contingencies and escalation levels.



COMPETITION UNIT 3: MANAGE AND PROVIDE COMMUNICATIONS SERVICES TO USERS





Level: 3





Code: UC0963_3





professional accomplishments and performance criteria:



RP 1: Apply maintenance procedures and upgrade the network to provide and "provisioning" new communications services, taking into account the specifications received.

CR 1.1 The network map is interpreted and communications nodes are identified in it, to assess the state of existing infrastructure and resources as organizational procedures.

CR 1.2 hardware and software updates are made to keep up the communications infrastructure, following established procedures.

CR 1.3 updates made are verified and performed functional tests on the updated components to ensure the provision of services according to specifications of the organization.

CR 1.4 updates and modifications are documented and reported, to complete the requirements for registration following established procedures.

RP 2: Provide and manage communication services to meet the needs of users, according to specifications received and quality criteria of the organization.

CR 2.1 Communication services and resources to provide them, are located to meet requests made under the procedures established in the organization.
CR 2.2
communications resources are allocated to users, for the implementation of the services required by technical specifications and procedures in the organization.

CR 2.3 Resources are allocated using specific software tools for the management and delivery of services, according to specifications of the organization.
CR 2.4
monitoring processes communications services are defined and implemented, to verify the level of quality in the provision of the same according to specifications of the organization.

CR 2.5 Operational tests of the resources allocated to services are made to ensure quality in the provision of the same under the rules of the organization.


CR 2.6 Documentation of processes executed is made to complete the registration needs using the tools and procedures established by the organization.

RP 3: Managing resources data and voice communications to ensure their functionality according to quality specifications.

CR 3.1 Performance management systems are configured to analyze the performance and continuity of services provided, according to the parameters of service contracted by the client and the quality criteria of the organization.
CR 3.2
monitoring tools are set to play alerts and alarms indicating failure or deterioration in the performance of the services gateway, according to the services contracted by the customer and the quality specifications of the organization.

CR 3.3 software and firmware updates devices are made to improve yields and solve performance problems, according to technical specifications of the devices and indications of manufacturers.
CR 3.4
processes are defined and periodic verification performed to ensure the functionality and security in the provision of services according to specifications of the organization.
CR 3.5
use of information resources of the communication system is recorded and analyzed for future deficiencies and problems management services in quality or quantity according to the quality standards of the organization.

CR 3.6 documentation tasks performed for the maintenance of the runway, is performed according to the protocols of the organization.

RP 4: Attend and manage incidents and complaints of users relating to communications services provided, in order to guarantee its performance.
CR 4.1
incidents and complaints received by the use of communications resources are checked to proceed with the solution according to procedures of the organization.
CR 4.2
incidents or solution whose identification is not possible, communicate to higher levels of responsibility for resolution by processes of the organization.

CR 4.3 Documenting incidents, checking and corrective actions taken, are reflected in the corresponding newsletter for registration and subsequent treatment according to regulations of the organization.

RP 5: Install and configure applications in customer terminal equipment to provide specific communications services, according to specifications received and quality criteria of the organization.

CR 5.1 The characteristics of the application to be installed are analyzed to ensure the functionality of the services that will be supported by it, according to technical specifications of the application, the terminal and quality criteria of the organization.

CR 5.2 The client application is installed and tested to verify functionality, following documentation application vendor and manufacturer of terminal.

CR 5.3 The installed application is tested to ensure the provision of the service, as specified by the service provider.

CR 5.4 The tests are documented and are reported installation errors or mismatches regarding specifications, in order to complete registration requirements in accordance with procedures established by the organization.

CR 5.5 The installation process is documented and installation errors are reported, in order to comply with registration requirements, according to procedures established by the organization.

CR 5.6 user guide the application is written for distribution, following the style guide service provider.



Professional background:





Production facilities:



Specific software tools for the management and delivery of services. Internal use tools for documenting processes performed. Terminal with corresponding operating system. Line voice and data. Tools network management software and services. Tools incident management software. Office tools. Communications equipment.



Products and results:



Network services and resources maintained and updated. Incidents and complaints handled and managed. Applications installed and configured terminals.



Information used or generated:




Map of the communications network. Specifications of the service provider. Organization procedures for recording changes and updates. Quality standards of the organization. Guidelines for the organization in terms of procedures and tools to use. Incident management procedures and care claims. Specifications and installation requirements of the application. Guides application installation and user guide terminal. Service profiles and subscribers. Work orders. Network documentation. Manuals and configuration service provision. Inventory hardware / software communications network. operating procedures of the organization. Telecommunications and regulations applicable standards. Incidences bulletins. Reports performance. Installation and verification reports. Trial and error reports. User Guide application. Update result reports. Inventory of available services and assigned profiles. Registration updates.



TRAINING MODULE 1: DESIGNING Telematic networks





Level: 3





Code: MF0228_3





Associated with UC: Designing computer network infrastructure





Duration: 210

hours





Capabilities and evaluation criteria:



C1: To analyze the characteristics and requirements of a telematic network project from the customer's needs.

CE1.1 Identify sources of information.

CE1.2 Apply interview techniques and information gathering.

CE1.3 Explain the problem of the feasibility study of a project.

CE1.4 Develop a document user requirements.

CE1.5 Synthesize information collected.

CE1.6 In a practical course, properly characterized, information collection:

- Simulate an interview with the client.

- Conduct a requirements document.

- Conduct a study of technical and economic feasibility.

C2: Differentiate the characteristics of the existing transmission media market.

CE2.1 Explain reasonably the relationship between bandwidth and transmission speed.

CE2.2 Identify the characteristics of a product from its specifications.

CE2.3 Describe the problem of installation of a given transmission medium.

CE2.4 Sort transmission means according to the technical characteristics of its use in network installations.

CE2.5 detail the influence of each transmission medium on overall network performance.

CE2.6 properly interpret the symbology and encoding used commercially for different transmission media.

CE2.7 In a practical course, properly characterized, design of computer networks:

- Analyze the market communications products required for the design, consulting online documentation, journals, catalogs of manufacturers, among others.

- Perform several proposals based on criteria of economy and performance.

C3: Explain existing levels in the TCP / IP protocols.

CE3.1 interpret the OSI reference model.

CE3.2 Describe the functions and services of each level of the OSI reference model.

CE3.3 Explain the TCP / IP architecture.

CE3.4 Establish correspondences between the architecture of TCP / IP and the OSI reference model.

CE3.5 Associating functions and services at each level of the TCP / IP architecture.

CE3.6 Describe the IP addressing system.

CE3.7 Apply IP addressing system in subnetting.

CE3.8 Describe the different routing protocols in IP networks: BGP, OSPF, RIP.

CE3.9 Describe application-level protocols TCP / IP, FTP, HTTP, SMTP, Telnet, SNMP, among other architecture.

C4: Explain the technical characteristics and mode of operation of different network interconnection equipment.
Sort
CE4.1 operation of network equipment compared to the OSI reference model.

CE4.2 Describe the functions of the various interconnection devices.
Detail
CE4.3 techniques interconnection equipment characteristics to determine their influence on network performance.

CE4.4 software analyze the different alternatives with respect to communications hardware equivalent products.

CE4.5 Describe interconnect architecture using VPN (Virtual Private Network, virtual private networks).

CE4.6 interpret the information in catalogs communications products.


C5: Select a particular computer interconnect for network infrastructure.

CE5.1 Justify the choice of interconnection equipment according to criteria of performance and economy.

CE5.2 Describe the problem of interconnection of local area networks.

CE5.3 Describe the problem of network interconnection local-area network wide area.

CE5.4 Justify the choice between hardware and other software solution according to criteria of performance, economy, and ease of management complexity.

Ce5.5 Explain the influence of collision domains and IP domains in network performance.

C6: Design the network topology, including transmission media and equipment best suited to the specifications received communications.

CE6.1 In a practical course design data communications from a given specification networks:

- Design topology that meets the specifications on performance, cost and quality of service expected.

- Choose the transmission means for the design of the network according to quality criteria and expected cost.

- Locate on interconnection design teams so that the quality criteria are met.

CE6.2 In a practical course of interconnection and logical configuration of equipment, from a given design:

- Set the addressing mode and configuration, including the subnets that are necessary and taking into account safety.

- Select the interconnection system with wide area network according to the topology of choice and meeting the criteria agreed cost and effectiveness.

- Establish backup lines if necessary.

- Using simulation programs that verify the operation of the design obtained.

C7: Develop necessary for the implementation of the project documentation.

CE7.1 Identify the quality standard in force paragraphs that apply to network design process.

CE7.2 In a practical course description or analysis of a process related to the design activity or identify states:

- Data input to the process.

- Function associated with the process.

- Data or documentation generated in the process.

- Records and evidence generated.

- Relationship with other processes.

- Metrics that can be applied and possible improvements.

CE7.3 In a practical course, properly characterized, technical documentation of an existing project:

- Identify the location of the equipment.

- Identify the means of transmission used.

- Identify network addresses used.

- Interpret encoding interconnection equipment used.

CE7.4 Describe and differentiate the sections that make up a project, under the applicable rules.

CE7.5 To prepare, from the specifications developed a network map that contains:

- The location of the equipment.

- The transmission medium.

- Network addresses used.

- Coding of interconnection equipment.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 respect to CE2.7; C6 and CE6.2 CE6.1 respect; C7 and CE7.3 CE7.2 respect.
Other capabilities
:

Finish work according to criteria of suitability, speed, economy and efficiency.

Treat the customer with courtesy, respect and discretion.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Demonstrate flexibility to understand the changes.



Contents:





1. Introduction to communications and computer networks



Data communication.

Communication across networks.

WAN networks. LAN networks. Protocols and protocol architecture.

The OSI model.

Architecture TCP / IP protocols.

Regulations and standards bodies. IETF. ISO. ITU ICT.



2. Data communication



Principles of Data Transmission.

Coding. Multiplexing. Commutation.

Analog and digital data.

Analog and digital transmission.

Disturbances.

Transmission media.

Guided media.

Wireless media.

Data link control.



3. Classification Communications networks



Switched networks.


Circuit Switched.

Packet Switched.

ATM and Frame Relay.

Network Broadcasting.

Network bus.

Ring networks.

Network star.

Local Area Networks.

LAN architecture.

LAN-LAN interconnection.

LAN-WAN interconnection.



4. Design of communication networks



Transmission medium.

Equipment connection.

Network Cards.



5. Protocols



Networking protocols.

IP Protocol.

Transport Protocol.

Protocols TCP / UDP.

Network Security.

Application level.

Protocols: HTTP, SMTP, SNMP, FTP, and others.



6. Documentation Project



Information gathering techniques.

Feasibility study.

Quality.

Regulations and certifications.

The Quality System of a company.

Processes and procedures.

Quality Plans.

Records and evidence.

Metric.

Audits.

Improvement and problem prevention.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the design of computer network infrastructure, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: INTEGRATION SERVICES COMMUNICATIONS VOICE, DATA AND MULTIMEDIA





Level: 3





Code: MF0962_3





Associate UC: Integrate voice, data and multimedia





Duration: 180

hours





Capabilities and evaluation criteria:



C1: Analyze the infrastructure of the communications network identifying the constituent elements for the provision of voice and data services, according to functional and technical specifications.

CE1.1 Identify and describe network architectures existing voice and data, to select the communications elements to provide voice and data services, according to own specifications architectures and standards bodies and standardization of communications services .

CE1.2 Sort transmission techniques and multiplexing voice and data channels in high-speed links for the provision of communications services, according to specifications of communication operators and standardization bodies and standardization of communications services.

CE1.3 Explain signaling technologies and digitalization of voice and data, to identify functionality of communications systems according to technical specifications of these services.

CE1.4 Describe the processes and elements of the communications network that are subject to legal regulations and requirements to be applied under that legislation.

CE1.5 In a duly characterized practical case analysis of a communications infrastructure, with technical and functional specifications of the needs of voice and data communications of an organization and infrastructure interconnection lines and devices for the provision services:

- Identify elements of network equipment and communication lines.

- Identify access to public networks.

- Make a diagram of the network map and synthesize information.

- Apply the legal rules of communication processes and elements.

C2: Set up communications gateways to implement transmission services and transport of voice and data, based on a functional technical specifications and requirements of the services.


CE2.1 Distinguish transmission services and voice and data transport, identifying their settings according to a given functional specifications.

CE2.2 Identify and describe the types and functions of communications gateways to implement the integration of voice and data services as depositories techniques and communications infrastructure specifications.

CE2.3 Sort integration technologies of voice and data in order to identify their specific functions as functional specifications given.

CE2.4 identify the mechanisms of coding and encryption of data, to implement the security system in the transmission and transport data according to criteria and safety regulations given.

CE2.5 Configure gateways using specific tools (terminal emulators, remote desktops, programs specific configuration, etc.) according to technical specifications given.

CE2.6 In a practical course, properly characterized, gateway implementation that supports the integration of transport services and voice and data transmission for the 'provision' of these services:

- Distinguish implement services according to the needs communicated.

- Configure protocols to provide the service.

- Conduct tests to ensure the functioning of the services implemented.

- Documenting the processes performed according to specifications.

CE2.7 Identify the actors involved in the provision of communications services, for the allocation of functional and legal responsibilities each of them, taking into account the structure and operation of the telecommunications market.

CE2.8 Sort communications services offered business environment in the telecommunications market, assessing their functional characteristics according to technical specifications given.

C3: Define detection procedures and incident management services voice, data and multimedia services according to quality specifications.

CE3.1 Describe features and functionality of the tools used for the detection and incident management, taking into account a specification of service.
Sort CE3.2
incidents and establish levels of severity, depending on the results obtained in diagnostic procedures performed using specific tools for the establishment of a contingency response plan in communications services, according to specifications given delivery services.

CE3.3 Develop action plans to incidents planned to provide a systematic process of solution to the staff responsible for it as a specification given delivery services.

CE3.4 In a practical course, properly characterized, definition of operating procedures to different types of incidents communications equipment for voice, data and multimedia, to perform the tasks of detecting and reporting the same:

- Use specific tools for the detection of incidents.

- Isolate and diagnose incidents using predefined tools and processes.

- Proceed to the solution or scaling the incidence according to the results of the diagnoses.

- Identify the actors involved in the provision of services and the responsibility of each of them.

- Documenting the processes performed.

C4: Establish and maintain multimedia communications services based on the functional specifications received.

CE4.1 Distinguish the elements and functions that make up the architecture for implementing multimedia communications services, to a given design implementation services.

CE4.2 Evaluate technical equipment and communications lines that make up the multimedia system to determine the degree of compliance with the specifications given characteristics communication needs, taking into account the technologies multimedia data communications .

CE4.3 Identify the configuration parameters of the protocols for implementation in communication equipment multimedia content, according to functional specifications and quality of the services provided.

CE4.4 In a duly characterized, implementation of a communications system to support multimedia services practical course:


- Evaluate the devices, lines and protocols used to implement the system according to given needs.

- Define the configuration parameters and processes hardware and software devices and protocols of the system installation to ensure functionality.

- Describe the system test procedures to verify the functionality of the services provided.

- Documenting the processes performed according to specifications.

CE4.5 maintenance procedures Develop hardware and software systems for multimedia communications services, taking into account the technical and functional specifications of the devices, lines and services to maintain.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 respect to CE2.6; C3 respect CE3.4; C4 respect CE4.4.
Other capabilities
:

Adapt to the specific organization of the company integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute the operation according to the instructions received, with quality and safety criteria, applying specific procedures of the company.

Show at all times an attitude of respect toward peers, procedures and internal rules of the company.



Contents:





1. voice communications networks and data



Elements of a communications network.

Multiplexing techniques.

Switching, transport and signaling.



2. Architecture of voice and data networks



Network Access: unguided tours.

Backbones: MTA (Asynchronous Transfer Mode - ATM). JDS (Synchronous Digital Hierarchy - SDH). JDP (Plesiochronous Digital Hierarchy - PDH).

Mechanisms coding and encryption information.

Security systems in data transport.



3. Communication services



Voice Services.

Corporate services and intelligent network.

Data services, IP services. IP telephony.

Telematic and interactive services. Other value-added services.

Criteria of quality of service (QoS).

Delays and congestion control.

Tools for the detection and incident management: types and characteristics.



4. Multimedia Communications Services



Structure of a multimedia system.

Multimedia standards.

Architecture and elements of a multimedia system services: client applications and server applications.



5. Implementation and configuration of gateways



Types and functions of gateways.

Configuration parameters.

Configuration Tools.

Management protocols.

Parameters of service quality.

Commands for maintenance and troubleshooting.



6. Telecommunications Market



Situation of telecommunications. legal framework and standards bodies.

Main services market.

Agents in the telecommunications market: manufacturers and suppliers, service providers, operators, profiles of the operators, users.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the integration of voice, data and multimedia, to be evidenced by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: COMMUNICATIONS MANAGEMENT SERVICES FOR USERS






Level: 3





Code: MF0963_3





Associate UC: Manage and provide communication services to users





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Maintaining the infrastructure of the communications network, both hardware and software, taking into account the technical and functional specifications of the elements that form the network.

CE1.1 Describe the properties and characteristics of the switching elements and transmission of the communications network to identify maintenance needs using technical specifications.

CE1.2 Distinguishing features and functions of the hardware elements that form the network, to update it according to specified requirements.

CE1.3 Distinguishing features and software features of the computers on the network, to proceed with the upgrade.

CE1.4 Describe the tools to access the elements of the communications infrastructure for software update operations and functional parameters set according to the technical specifications of the equipment and geographical accessibility.

CE1.5 Sort the methods, techniques and tools used to perform procedures for corrective and preventive maintenance in the communications network, according to technical details of the elements and communication lines.

CE1.6 In a duly characterized, management of communications services for users, properly characterized, update and configure infrastructure elements switching and transmission network to ensure the provision of system services practical course following technical specifications given:

- Locate the switching elements and transmission on the map of the communications network to identify its characteristics.

- Identify the hardware elements that are to perform the upgrade procedures.

- Perform upgrade and software configuration using management tools and remote control of the elements of the communications network.

- Discriminating test procedures to be applied depending on the configuration and update operations performed on the elements of the communications network to verify component compatibility and reliability in the provision of services.

- Documenting the processes performed.

C2: Specify maintenance procedures and management of communications services for voice and data, according to a given technical and functional specifications.
Distinguish CE2.1
performance parameters of voice and data services, to ensure continuity and quality of the service, according to technical specifications of the communications infrastructure.

CE2.2 Identify features of management tools communications network for monitoring of voice and data services with respect to its configuration, use and performance, security and fault management as required in the management of voice and data services.

CE2.3 Describe the functionality of network management protocols for use in configuring and monitoring of communications equipment, according to criteria of quality and continuity in the provision of voice and data services.

CE2.4 analyze the use and integration of communications resources by voice and data services, to make proposals resize them depending on the quantity and quality of services provided communications.

CE2.5 In a practical course, properly characterized, perform maintenance tasks resources data and voice communications to ensure functionality and service provision:

- Identify management tools to gauge the effectiveness and performance parameters of services according to criteria of quality and continuity of providing them.

- Perform remote management tasks on computers using communications network management tools corresponding.

- Perform tasks upgrade hardware and software communications equipment according to technical specifications of the network elements.

- Check compatibility and absence of conflict between devices and components updated to ensure service delivery in optimum quality and continuity.

- Documenting the processes performed.


- Develop the plan periodic maintenance of communications equipment as a given functional specifications.

C3: Planning process performance monitoring resources and communications services, according to technical specifications given.

CE3.1 Sort consumption measurement systems and performance of resources and services of the communication system, according to existing standards and systems standardization.

CE3.2 identify performance parameters of the services offered in the communications network to ensure quality levels preset in providing the same functional specifications given.

CE3.3 Distinguish and use specific tools and monitors that enable performance evaluation of communications services, according to levels of quality and continuity of the service given.

CE3.4 In a duly characterized, management of communications services for users, properly characterized practical course, plan monitoring yields resources and communications services to evaluate the criteria of quality and continuity in the provision thereof:

- Determine the metrics to be used in collecting information.

- Define the analysis parameters consumption and performance.

- Use monitoring tools to verify consumption and yields are within preset limits.

- Documenting the processes performed.

C4: Assign communications resources to users, to attend the services requested specifications following a given.

CE4.1 Sort the services it can provide the communications network to identify functionality that can be offered to users, taking into account the type and network architecture.

CE4.2 identify the relationship between resources and the availability of communications services, to ensure the provision of the same according to technical specifications of the elements and lines of communications network and functional details of the configuration of service lend.

CE4.3 Assess the availability of sufficient resources to provide service to users, according to criteria of quality and continuity in the service.

CE4.4 Allocate resources and services to enable users using specific tools and differentiating their functions, according to technical information of the tools themselves.

CE4.5 Documenting the allocation of resources and services enabling users performed according a given specification.

C5: Address the incidents produced in the allocation and use of communications services and resources, according to a given specification.

CE5.1 Identify the meaning of the alarms and alerts of elements that form the infrastructure of the communications network to ensure the provision of services according to quality specifications therein.

CE5.2 identify and isolate the impact from the symptoms detected in the communications network and information reported by users, to proceed to the diagnosis using specific and incident detection techniques in communications systems tools.

CE5.3 Apply diagnostic procedures and repair of the impact on the communications network, following instructions given.

CE5.4 Distinguish types of incidents in order to identify the causes that produce them, they are the responsibility of the operator, user or service provider, taking into account the characteristics of the services and resources provided.

Ce5.5 In a practical course, properly characterized, attention and resolution of alarms in a system in which different types of incidents are simulated in the communications network to interrupt totally or partially a communications service:

- Interpret alarms caused by communication elements.

- Isolate the causes of the incidence and diagnose possible solutions.

- Make the solution or scaling the incidence according to the process.

- Documenting the processes performed.

C6: Define procedures for installing applications communications terminal equipment according to technical and functional specifications.

CE6.1 Identify specific communications services for terminals offering communications operators, depending on the infrastructure used.

Sort CE6.2
terminal types in order to assess its performance, considering its features, support services and technical characteristics of the same taking into account the needs, requirements and specifications of the services to implement them .

CE6.3 deploy and configure applications on terminals to enable specific services according to functional specifications given.

CE6.4 Verify functionality in providing communication service exist in the client terminal to ensure quality levels.

CE6.5 In a duly characterized, installation of applications and services enable communications terminals for defining the procedures practical course:

- Use client terminals simulators for pretesting implementation and configuration of applications and services.

- Define processes deployment of applications and instructions service configuration.

- Perform testing applications and services in different client communications terminals to determine parameters ensure compatibility and quality standards in the provision of services.

- Documenting the processes performed.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 respect to CE2.5; C3 respect CE3.4; C5 respect ce5.5; C6 respect to CE6.5.
Other capabilities
:

Adapt to the specific organization of the company integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute the operation according to the instructions received, with quality and safety criteria, applying specific procedures of the company.

Used to the pace of work of the company meeting the daily performance objectives defined in the organization.

Show at all times an attitude of respect toward peers, procedures and internal rules of the company.



Contents:





1. Maintenance and updating of switching elements and transmission of the communications network



Functions and features.

Tools remote access and control features.

Corrective and preventive maintenance.



2. Resource management and network services communications



Map of the communications network.

Quality of Service.

Network Management Center: design and resources involved.

Relationship between resources and services.

Tools for resource allocation: types and characteristics.

Monitoring and performance of services and resources.



3. Managing communications networks



Functional aspects of network management.

Network Management Protocols.

Tools for network management.

Monitoring a communications network: types of incidents in the provision of services, tools notification alerts and alarms.

Centralized and distributed management.

Management systems in telecom operators.

Processes detection and diagnosis of incidents: specific tools.

Software Updates.

Contingency plans.



4. Communications Terminals



Types and features.

Operating systems and specific programming languages ​​terminal.

Specific Terminal Services.

Client applications, management and configuration.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the administration and provision of communication services to users, which is accredited by one of the following ways:


- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XII


Professional qualifications: Computer Systems Programming



Professional Family: Computers and Communications





Level: 3





Code: IFC303_3





General competence



Develop software components from a concrete specifications, providing management and supervisory functions of the operating system for managing the resources of a computer system and interaction with other development technologies using object-oriented and component systems.



Competence units



UC0490_3: Manage services in the computer system

UC0964_3: Create software elements for system management and resources

UC0965_3: Develop software elements based programming technology components



Professional environment





Professional field



Develops his professional activity in the area of ​​systems development or dedicated programming and maintenance of computer systems, public entities or private, small enterprises / medium / large or micro, both self-employed and others regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



Is located mainly in the service sector, mainly in the production and marketing services subsector analysis, design and construction of applications or any other productive sector that uses computer systems to manage part of the programming team and maintenance.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.


Systems programmers

Components Programmers


Associate Training

(510 hours)





Training modules



MF0490_3: Service management in the computer system (90 hours)

MF0964_3: Development of software for systems management elements (210 hours)

MF0965_3: Development of software components based on oriented technologies (210 hours)



COMPETITION UNIT 1: MANAGE THE SYSTEM SERVICES





Level: 3





Code: UC0490_3





professional accomplishments and performance criteria:



RP 1: Manage the system configuration to ensure process performance according to the needs of use and within the guidelines of the organization.
CR 1.1
processes involved in the system are identified so as to evaluate performance parameters.
CR 1.2
parameters affecting system components: memory, processor and peripherals, among others, they meet the needs of use.
CR 1.3
execution priorities are suitable processes depending on the specifications of the business plan of the organization.
CR 1.4
monitoring tools are deployed and configured by determining the levels of alarms depending on the business plan of the organization.

RP 2: Managing storage devices according to the needs of use and within the guidelines of the organization.

CR 2.1 storage devices are configured for use on different operating systems used in the computer system.

CR 2.2 storage structure is defined and implemented according to the needs of different file systems and specifications for use of the organization.
CR 2.3
object naming requirements and restrictions of use of each storage device is properly documented.


CR 2.4 storage devices are integrated to provide a functional system to the user according to the specifications of the organization.

RP 3: Manage user tasks to ensure system access and availability of resources according to specifications operating the computer system.

CR 3.1 user access to the computer system is configured to ensure the security and integrity of the system as specified by the organization.

CR 3.2 user access to resources administered by assigning permissions based on the needs of the organization.

CR 3.3 The resources available for limited users with appropriate based on specified in the rules of use of the organization tools.

RP 4: Manage network services to ensure communication between computer systems according to operating requirements.

CR 4.1 Communication services are established with a system service quality so that these communications are guaranteed.

CR 4.2 Communications devices are checked with regard to its configuration and performance as specified by the organization.

CR 4.3 Resource Consumption communications services are analyzed, verifying that are within permitted by the specifications of the business plan of the organization.
CR 4.4
incidents detected in communications services are documented to inform those responsible for the operation of the system and manage them according to the protocols of the organization.



Professional background:





Production facilities:



Operating systems. User management tools and management resources permit. Performance monitoring tools. Process monitoring tools. Monitoring tools memory usage. Monitoring tools storage device management. User management tools.



Products and results:



System operating correctly. Performance system suitable operating parameters.

Safe and full access and use of system resources. Communication services running.



Information used or generated:



Operating manuals operating system and device. Operating Plan of the organization. Manuals monitoring tools used. Graphics and performance analysis. Listings user access and restrictions. Incident report. Action protocol to incidents.



COMPETITION UNIT 2: CREATING ELEMENTS FOR SOFTWARE MANAGEMENT SYSTEM AND ITS RESOURCES





Level: 3





Code: UC0964_3





professional accomplishments and performance criteria:



RP 1: Develop software components that implement services and management tools operating system, using languages ​​oriented programming systems to support administrative tasks as given functional needs.
CR 1.1
resources to use in the development of software components or management tool to implement are defined by analyzing the detected technical specifications and functional requirements.

CR 1.2 diagramming and documentation prior to the development of the component is made by specifying the requirements for inclusion in libraries so that reuse is facilitated.

CR 1.3 software components are coded according to the technical specifications of the supplied design, using programming and debugging tools and reusing system library functions.

CR 1.4 The test plan is drawn up so that the functionality of the developed components ensure, according to specifications and quality criteria.

CR 1.5 software components developed services and tools are tested and debugged, to correct errors using the debugging tools programming environment according to quality criteria.

CR 1.6 documentation services software components and management tools is made, following patterns, rules and procedures specified by the organization.

RP 2: Encode functions system libraries for use in software development and optimization components according to technical developments and functional specifications.

CR 2.1
documented functions of system libraries are identified and categorized to facilitate locating information thereof as development needs.

CR 2.2 The functions of the system libraries are used in the development of new software components to improve yields of developments by reusing code written and tested according to the technical specifications of each function invocation and requirements from the same.

CR 2.3 software components are developed with specified requirements to be included in libraries for later use and distribution according to needs and technical specifications.

CR 2.4 Functional and structural component tested are planned and carried out, to check and ensure the objectives of development according to technical specifications and quality of the organization.

CR 2.5 Documenting libraries developed operating system is performed, to complete the registration needs following the patterns, rules and procedures specified in the design.

RP 3: Develop software components using languages ​​oriented programming systems, according to specifications established to handle hardware devices.

CR 3.1 The characteristics and parameters of the software components to be developed are defined in terms of hardware specifications to manage devices and operating system used, detailing the requirements for inclusion in libraries so as to facilitate They reuse.

CR 3.2 Device drivers are coded using programming and debugging tools and library functions using the existing system.

CR 3.3 The test plan is prepared in a way that ensures the functionality of the component and the absence of conflicts with other system components.

CR 3.4 device handlers are tested, following the plan drawn up and the possible scenarios that can be implemented.

CR 3.5 The technical and user documentation developed handler is constructed according to the parameters and rules of the organization.

RP 4: Develop software components that implement communications services to link different systems according to standards development.

CR 4.1 Characteristics of software components to develop (ports of communications between systems, protocols, standards, etc.) are defined in terms of communication service specifications implementing and operating system used, detailing the requirements for inclusion in libraries so that reuse is facilitated.

CR 4.2 software components are coded communication between systems using programming and debugging tools, and using the library functions of the existing system.

CR 4.3 The component is subjected to test batteries replicas of the possible scenarios subsequent implementation, to ensure the functionality and integrity according to criteria of quality and safety of the organization.

CR 4.4 documentation development and testing is constructed following the patterns, rules and procedures specified in the design.



Professional background:





Production facilities:



Antivirus firewalls and proxy servers. Integrated Development Environments. computer hardware, peripherals and hardware devices. Version control tools. Test Tools. Debugging tools. Integrated development tools or environments (IDE). Application delivery tools. Documentation tools programming elements. Office tools. Modeling languages. structured languages. Object-oriented languages. Concurrent programming languages.



Products and results:



Services software components and operating system tools. Management software components hardware devices. Software components for communications services.



Information used or generated:




Documentation on cases and test data developed. Technical documentation design software to develop. technical and user documentation developed software. Software operating manuals. Manual programming interfaces (API) operating system. Manuals used programming tool. Manuals operating system. Manuals programming environment (IDE). Manual programming language used. technical manuals of hardware device programming. corporate standards of software development, testing, quality control. Support systems for computer applications. for technical support (phone, Internet, messaging and forums, among others) assistance.



COMPETITION UNIT 3: ELEMENTS TO DEVELOP SOFTWARE TECHNOLOGIES COMPONENTS BASED PROGRAMMING





Level: 3





Code: UC0965_3





professional accomplishments and performance criteria:



RP 1: Designing the software component to ensure its development according to specifications received.

CR 1.1 diagramming and documentation prior to the development of the component is made according to technical specifications of the component architecture and functional needs.

CR 1.2 component interfaces are defined develop software for intercommunication with other system components according to technical specifications of the component architecture and functional needs.

CR 1.3 The structure of the component is designed using standard building components to facilitate and ensure integration in architecture and development procedures, according to technical specifications of the architecture used and functional needs.

CR 1.4 The design documentation is made made following the standards, norms and procedures specified by the organization.

RP 2: Develop software for integration component in a defined architecture, according to the design specifications made and received.

CR 2.1 The component is encoded using the languages ​​supported by the architecture used, according to design specifications, using programming and debugging tools.

CR 2.2 interface component is done with specific tools and languages ​​to implement the communications path with the other components according to standard interface definition of architecture.

CR 2.3 The component is subjected to test batteries to verify its functionality according to criteria of quality and safety of the organization.

CR 2.4 documentation development and testing are developed following the standards, norms and procedures specified by the organization.

CR 2.5 tools centralized or distributed control versions are used to ensure proper control of software changes facilitating the development and testing of modifications to new features and bug fixes.

RP 3: Perform deployment and implementation developed for integration into the system components according to technical specifications of architecture.

CR 3.1 The structure of the component is tested by verifying that communicates with the other components and does not produce conflict, according to criteria of quality and safety of the organization.

CR 3.2 deployment procedures are defined according to the component requirements developed and following standards of quality, safety and organizational architecture specifications to ensure the implementation of it with the provision of its functionality and the absence of conflict.

CR 3.3 The performance of the developed components are monitored to ensure their integration into the system according to criteria of quality and safety of the organization.

CR 3.4 deployment and implementation documentation is prepared following the standards, norms and procedures specified by the organization.



Professional background:





Production facilities:




Integrated development environments. computer equipment and communications peripherals. Version control tools. Debugging tools. Integrated development tools or environments (IDE). Application delivery tools. Documentation tools programming elements. Change management tools, incidents and configuration. Test Tools. Office tools. Modeling languages. Data manipulation languages. structured languages. Object-oriented languages. File transfer services and messaging. operating systems and configuration parameters.



Products and results:



Design and development of software components to be integrated into defined architecture. Component integrated in the system and operating software.



Information used or generated:



Documentation on cases and test data developed. Technical documentation design software to develop. technical and user documentation developed software. Manual programming interfaces (API) operating system. Manuals operating system. Manuals and operation of computer systems. Manuals programming environment (IDE). Manual programming language. Manual programming language used. technical manuals communications devices on which to be programmed. corporate standards of software development, testing, quality control. technical media (telephone, Internet, messaging and forums, among others) assistance.



Training Module 1: MANAGEMENT SERVICES IN THE SYSTEM





Level: 3





Code: MF0490_3





Associated with UC: Managing services in the computer system





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Analyze system processes to ensure adequate performance to the parameters specified in the business plan.
Identify
CE1.1 system processes and parameters that characterize (parent process, process status, consumption of resources, priorities and users affected among others) to determine their influence on system performance.

CE1.2 Describe each of the tools provided by the system to process management in order to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a practical course of analyzing the performance of a computer system with a load of well characterized processes:

- Use the system tools to identify how many active processes exist and the particular characteristics of some of them.

- Perform operations activation, deactivation and modification of priority among others with a process using system tools.

- Monitor system performance using specific tools and set alarms that indicate risk.

C2: Apply management procedures to storage devices to offer the user a registration system of the full, safe and available information.

CE2.1 Identify the different file systems used in a given storage device to optimize registration procedures and access to them.

CE2.2 Explain the characteristics of file systems based storage devices and operating systems used.

CE2.3 Describe the overall structure of the computer system storage devices associating with other existing file systems.

CE2.4 In a practical course of implementation of management procedures storing information with multiple devices:

- Perform partitioning, where necessary, and generating infrastructure file systems to be installed on each device.

- Implement the overall structure integrating all storage devices and their corresponding file systems.

- Documenting the requirements and restrictions of each file system implemented.

C3: Managing Access to the system and the resources to verify the proper and safe use thereof.

CE3.1 Identify opportunities for access to remote access system distinguish local access.


CE3.2 Describe the tools used in the management of permissions to users for the use of system resources.

CE3.3 In a practical course management system access in which it has right of user administration:

- Identify possible a user accesses the system.

- Modify the permissions to use a system resource to a user.

- Define use limitations of a system resource users.

C4: To evaluate the use and performance of communications services to keep within the specified parameters.

CE4.1 Explain the configuration parameters and operation of communications devices to ensure their functionality within the system.

CE4.2 Relate active communications services in the system with the devices used by them in order to analyze and evaluate performance.

CE4.3 In a case study evaluation of use and performance of a computer system connected to the outside through various communications lines:

- Identify communications devices and describe their characteristics.

- Check the status of communications services.

- Evaluate the performance of communications services.

- Identify and document any incidents arising in the system.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.4; C3 respect CE3.3; C4 respect CE4.3.
Other capabilities
:

Keep the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.

Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Processes



States of a process.
Management
signals between processes.

Process Management.

Changing priorities.

Process monitoring.

Management resource consumption.



2. Storage Systems



Storage devices.

File systems.
General structure
storage.

System tools for managing storage devices.



3. User Management



Access to the system.

Permissions and access to resources.

Limitations of use of resources.



4. Communication services



Communications devices.

Communications protocols.

Communications services.

Yields communications services.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to service management in the computer system, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: DEVELOPMENT OF ELEMENTS FOR SYSTEMS MANAGEMENT SOFTWARE





Level: 3





Code: MF0964_3





Associate UC: Create software elements for system management and resources





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Analyze the technical specifications provided for the development to be carried out, checking their validity and optimization.


CE1.1 Sort major architectures (monolithic, modular, 'microkernel', distributed systems) operating systems and their characteristics, to identify the needs of management and administration of these systems according to technical specifications.

CE1.2 Explain paragraphs of a requirements analysis, detailing the basic diagrams used for functional and data specification as design methodologies and standards.

CE1.3 analyze the technical specifications of the service or management tool to be implemented to identify the resources required component according to the functional specifications given.

CE1.4 Perform pre-development phase diagrams following the technical specifications and quality criteria specified.

CE1.5 In a practical course of interpretation of a requirements analysis given to the development of a software element, taking into account the needs of resource management computer system:

- Define the software modules to perform from the technical specifications and requirements catalog.

- Establish relationships between modules determining inputs, outputs and data streams according to the functional design and system specifications.

- Determine the necessary structures to represent the information specified in the requirements.

- Create needed to track requirements for software coding element according to quality criteria specified structures.

C2: Develop software elements for managing system resources, using tools and programming languages ​​systems.

CE2.1 List the tools and structured languages, development-oriented programs for managing system resources, detailing its features.

CE2.2 operating Describe the techniques and principles of memory systems, detailing your organization hierarchies, to develop software elements that use them according to the functional specifications provided.

CE2.3 Sort architectures input / output bus and microprocessor systems, explaining the technical and functional processes used for the development of the software elements as a functional specifications given.

Distinguishing features CE2.4 system libraries for the development of new software components, reusing the code already developed.

CE2.5 Describe how to incorporate new elements into the system libraries, according to criteria specified optimization and quality.

CE2.6 Describe the types of tests, both functional and structural, and purification processes that must be submitted a component developed and the tools used to verify functionality and integration with other system components, according to criteria specified quality.

CE2.7 Sort the tools used in the development stages: code generation, creation of executable modules, version control, debugging and testing, documentation and packaging for distribution to optimize the generation and ensure quality development products, according to criteria specified safety and quality.

CE2.8 In several practical cases of software design and coding elements for managing system resources, given technical specifications:

- Design software algorithms associated element using structured development techniques.

- Encode software modules from the algorithms designed using structured tools and languages.

- Encode data structures using the functionality provided by the structured and using resources available in libraries and development tools for coding algorithms language.

- Design and code error handlers needed to ensure optimum performance of the software module.

- Design and code components that allow concurrent access to system resources.

- Documenting modules developed for easy review and future modifications and extensions.

CE2.9 In several practical cases of software testing and modifying elements for managing system resources, given a coded element, its documentation and technical specifications:

- Debug modules developed using the tools available.


- Design and implement test batteries on developed modules to check for proper operation and document the results.

- Develop the necessary changes in coding element to solve possible malfunctions found.

- Documenting changes in developed modules for easy review and future modifications and extensions.

- Perform the implementation of the process modules and documenting incidents detected.

C3: Use the techniques and standards used in the development, distribution and implementation of device drivers (drivers) for the integration of peripherals in the computer system according to technical and functional specifications given.

CE3.1 Use the techniques, standards and programming tools to develop and debug device driver possible errors in the developed code, according to technical specifications of the given tools and functional needs.

CE3.2 Perform testing device driver developed in the possible scenarios that can be implemented to ensure its functionality and the absence of conflicts with other system elements according to technical specifications and quality standards given .

CE3.3 To prepare technical and user documentation developed handler as parameters and rules given.

CE3.4 In a practical case of modification of a device driver in which you are making a change in their design, according to a given functional specifications:

- Modify the code to incorporate the necessary changes following the specified quality criteria.

- Check, through testing, that the modification has been successfully built and has not altered the functionality of other drivers, in particular, and the system in general.

- Perform updating all documentation is affected by the proposed change.

CE3.5 In a practical course, properly characterized, development of a device driver from a given functional specifications:

- Designing a device driver development using structured techniques and appropriate standards for the type of device.

- Encode the device driver using the selected tool, using the previously obtained using structured design and languages.

- Implement the handler documenting the generated code, the results obtained and the device detected incidents.

C4: Implement communications services between systems using techniques and software development standards elements, in accordance with technical and functional specifications given.

CE4.1 Sort architectures communications services to distinguish services provided in client server environments peer (point to point) environments /.

CE4.2 Describe the protocols and ports used for communication between systems, taking into account the support that offer communications services.

CE4.3 Identify the main API's (Application Program Interface) and libraries and their use for development through structured programming.

CE4.4 Encode the component using appropriate programming tools and to optimize the development phase purification using technical specifications given.

CE4.5 submit to the component test batteries replicas of the possible scenarios subsequent implementation, to verify the absence of conflict and its integration with other system components, according to criteria of quality and safety given.

CE4.6 Sort the standards defined for the development of communication services between systems based on different criteria: standardization organizations, types of services and protocols supported, among others.

CE4.7 List the main security problems in the field of communications and describe the strategies to be applied to the development of components that implement safe according to standards and specifications given services.

CE4.8 In several practical cases of development of components for establishing communications services between systems, given technical specifications:

- Design component development techniques using structured and defined standards.

- Encode the software element using the right tool, applying the previously obtained using structured design and languages.

- Debug and test the component ensuring optimum performance.


- Design batteries possible attacks against the service and try to detect potential vulnerabilities.

- Implement components to verify the communications service documenting the results and detected incidents.

- Documenting the code developed tests and the result of the implementation processes of the components.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 and CE2.9 CE2.8 respect; C3 and CE3.5 CE3.4 respect; C4 respect CE4.8.
Other capabilities
:

Demonstrate a good professional.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Use time and effort to expand knowledge and background information for use in their work.

Learn new concepts or procedures and make effective training using the knowledge acquired.



Contents:





1. Features of the architecture of operating systems



Main operating system architectures and features.

Resource management.

Libraries and system functions.



2. Analysis of development requirements



The software development cycle management systems.

Analysis, design and programming for systems management.

Process models: nomenclature and representation.

Data Models: nomenclature and representation.

Diagramming tools and documentation.

Metrics and quality standards for software development.



3. Development of software elements for system management and resources



Development tools: editors, compilers.

Programming techniques and tools oriented structured programming systems: data types and structures, operators, logical structures, sentences, recursion, concurrent programming, exceptions.

Calls to system functions.



4. Testing and documentation of software elements for system management and resources



Planning and design tests.

Technical and software debugging tools.

Testing and verification of development.

Techniques and tools developed software documentation.

Compression tools and software packaging.

Techniques and distribution systems and software deployment.

Control systems development (CVS).



5. Device drivers (drivers)



Architecture computer subsystems.
Management
buses and ports operating systems.

Management devices operating systems.

Specific modes and standards development device drivers.

Development Tools and verification of device drivers.

Procedures distribution and installation of device drivers for operating systems.



6. Developing communications processes between systems



Concurrent access to system resources.

Communication protocols.

Physical devices and communication ports.

Communications services.

Yields communications services.

Network Programming.

Client / server applications.

'Sockets'.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the creation of software elements for system management and resources, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.


- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: SOFTWARE DEVELOPMENT BASED ON TECHNOLOGY ORIENTED COMPONENTS





Level: 3





Code: MF0965_3





Associate UC: Develop software elements based programming technology components





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Identify the characteristics and architectures technology development-oriented components for the creation and modification of software components integrated into these environments, according to existing standards and standardizations.

CE1.1 Describe development techniques and methods involved in the development paradigm, oriented components for making and modifying software elements, by the standards of this technology.
Sort CE1.2
tools and object-oriented languages ​​used in component-oriented development, describing its characteristics to identify those that are specific to the creation or modification of the software elements, according to the functional specifications given.

CE1.3 Sort standards component models, describing the gateways to interoperate among heterogeneous components, to perform the tasks of integrating the elements developed as functional and technical specifications.

CE1.4 Identify technical diagramming and documentation for software development based on components oriented technologies, according to design standards component-oriented methodologies.

CE1.5 In a practical course design components within a given and with precise functional specifications architecture:

- Perform diagramming and documentation prior to the development of the component, to optimize the process of creating the component according to specifications received.

- Identify the different interfaces and techniques used for intercommunication of components, to apply to the development of new components.

- Defining component interfaces to develop software for intercommunication with other system components, according to technical specifications of the component architecture and functional needs.

- Design component structure using standard building components according to technical specifications of the architecture used and functional needs.

- Make the design documentation carried out following patterns, standards and specified procedures.

C2: Build software elements from requirements specifications and conditions of development of component technology used.

CE2.1 Explain the development and implementation approaches for creating components using the principle of reuse.

CE2.2 Describe the process of adapting an existing component for inclusion in the architecture that you want to reuse, according to technical specifications of the component technology used.

CE2.3 Outlining the characteristics of the design process of a new component for inclusion in the architecture that you want to use, ensuring future reuse.

CE2.4 Sort programming tools and debugging to optimize the development phase of the components according to a given specification.

CE2.5 Identify the elements and parameters of the interface component for development with specific tools and languages ​​to implement the communications path with the other components according to standard interface definition of architecture.
Apply techniques CE2.6
component installation, checking that executes the required actions and their availability for applications that invoke, according to technical specifications of architecture.

CE2.7 In a practical course of development of reusable software components, given its structure and design a functional and technical specifications:

- Check functionality can be extended component designed for future reuses, but modifying it to do so.

- Develop the component using tools and object-oriented languages ​​and according to design specifications resulting from the previous check.


- Debug and test the component developed using the tools available.

- Documenting the component and its interfaces to facilitate future reuse.

CE2.8 In a practical course of software development by reusing components, given a functional and technical specifications:

- Use repositories to locate those components that conform to the given specifications and can be reused.

- Design modifications are to be made on the existing component to meet the given specifications.

- Modify the component using tools and object-oriented languages.

- Debug and test the modified component using the tools available.

- Documenting the modifications made on the component and its interfaces to facilitate future reuse.

- Use tools centralized or distributed control to ensure proper control of software changes facilitating the development and testing of modifications to new features and bug fixes versions.

C3: Apply procedures deployment and integration component in an environment of component-oriented technology, according to technical specifications of architecture.

CE3.1 Describe the techniques available to make the search process components that meet the requirements in the initial design.

CE3.2 Sort the methods of evaluation and selection of components, based on a series of requirements imposed by the initial design specifications.

CE3.3 Perform structural tests to verify that the selected component communicates with other components and does not produce conflict, according to criteria of quality and safety dice, and preliminary design.

CE3.4 Define procedures for deployment and adaptation for software implementation element, according to the component requirements developed and following standards of quality, safety and architecture specifications.

CE3.5 Describe the processes of integration, configuration and interconnection of selected components to that build the final application according to the criteria of quality and safety specified in the initial design.

CE3.6 monitor the performance of components developed or selected to ensure their integration into the system, according to criteria of quality and safety.

CE3.7 Documenting the deployment and implementation following the patterns, standards and specified procedures.

CE3.8 In a properly characterized practical case, deployment of a software component already developed as a functional and technical specifications given:

- Apply techniques to test structural component developed according to standards and quality criteria.

- Incorporate deployment, adaptation, configuration and integration of the component according to technical specifications and implementation of development.

- Charting component testing according to standards of quality and safety given.

- Set the tool to perform automated test batteries according to standards and quality criteria given.

- Develop documentation using templates provided or incorporated in the tool itself.

- Generate quality reports and metrics, and interpret the results.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 and CE2.8 CE2.7 respect; C3 respect CE3.8.
Other capabilities
:

Demonstrate a good professional.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Use time and effort to expand knowledge and background information for use in their work.

Learn new concepts or procedures and make effective training using the knowledge acquired.



Contents:





1. Object-oriented programming



The paradigm of object orientation.

Objects: relationships, attributes and methods.

Classes and data types.

Object-oriented development.

Techniques representation of object-oriented programming.

Development Tools OOP.



2. Conceptual Foundations of component orientation



The concept of component components and objects.


The objective code reuse.
Dependencies
context.

Components and interfaces.

Component states.

Specification and implementation of the component.



3. Architectures components



Features architectures components.

Current Architectures.

Integration and deployment of components.



4. oriented programming components



Oriented programming components from OOP.

Concepts of component-oriented programming.

Interface Description Languages ​​(IDL).



5. Programming distributed



Planning and design of software testing with component-based programming technologies.

Technical and software debugging tools.

Testing and verification of development.

Techniques and tools developed software documentation.

Compression tools and software packaging.

Techniques and distribution systems and software deployment.

Control systems development (CVS).



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to software development technologies elements with component-based programming, which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XIII


Professional qualifications: Mounting Auxiliary Operations and Maintenance Microcomputer Systems



Professional Family: Computers and Communications





Level: 1





Code: IFC361_1





General competence



Auxiliary operations Perform assembly and maintenance of microcomputer and peripheral equipment under the supervision of a responsible, applying criteria of quality and acting in conditions of safety and respect for the environment, following instructions and procedures.



Competence units



UC1207_1: Perform assembly operations auxiliary equipment Microcomputer

UC1208_1: Perform auxiliary maintenance of microcomputer systems

UC1209_1: Perform auxiliary operations with information and communications technology



Professional environment





Professional field



Develops his professional activity in the area of ​​support and CAU (User Attention Centre) dedicated to information technology in public entities or private, companies of any size, both self-employed basis, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located mainly in the service sector, the subsectors dedicated to the marketing, installation, maintenance and repair of microcomputer equipment and services, computer technical assistance, TCNs and in all productive sectors using systems computer for management.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.

Handlers in assembly of microcomputer equipment
Operatives
maintenance of microcomputer systems

Microcomputer Auxiliary equipment in assembly
Auxiliary
maintenance of microcomputer systems



Associate Training


(330 hours)





Training modules



MF1207_1: Auxiliary operations assembly of computer components (150 hours)

MF1208_1: Auxiliary operations maintenance of microcomputer systems (90 hours)

MF1209_1: Auxiliary operations with information and communications technology (90 hours)



COMPETITION UNIT 1: PERFORM OPERATIONS MOUNTING AUXILIARY EQUIPMENT Microcomputer





Level: 1





Code: UC1207_1





professional accomplishments and performance criteria:



RP 1: Assist in the assembly and replacement of internal components of a microcomputer equipment for its operation, using detailed guidelines, following instructions and in compliance with established safety standards and quality.

CR 1.1 Detailed connection of internal devices and components are located guides for mounting and replacing elements in a microcomputer, and follow instructions received.
CR 1.2
microcomputer components are installed or replaced equipment fixing them in the various ports and internal bays, following instructions, using specific tools and protective elements, and meeting safety standards and quality criteria established by the organization.

CR 1.3 Internal devices are connected microcomputer system with buses and existing cables, both data and power to mount the computer, taking into account their physical characteristics and following detailed guidelines.

CR 1.4 Installation or replacement of the component is checked to ensure its fixation inside the computer, recording the results according to regulations of the organization.

CR 1.5 Waste and disposables replacement of components are treated for disposal or recycling, following instructions and in accordance with applicable environmental regulations on waste treatment.

RP 2: Collaborate in the assembly, replacement and connecting peripherals to maintain and / or increase the functionality of the computer system, using detailed installation and connection guides, following instructions and in compliance with established safety standards and quality.

CR 2.1 Detailed installation and connection of peripheral guides are located to connect the same to the microcomputer team, following instructions received.

CR 2.2 peripherals connect via cables and connectors to the appropriate bus to allow communication with the system, taking into account their physical characteristics and following detailed installation and connection guides.

CR 2.3 connecting peripherals to the computer, other peripherals, auxiliary equipment required by the device itself or communications lines is done to increase system performance, ensuring the fastening and electrical connections, and compliance safety and quality criteria established by the organization.

CR 2.4 network connection devices as repeaters, switches or 'routers' are located in cabinets or racks called default to extend the local network and share resources across it, following instructions received, using specific tools sites and protection elements, and meeting safety standards and criteria for internal quality work.

CR 2.5 The location and fastening and connecting peripheral cables and power data are checked to ensure their assembly, recording the results according to regulations of the organization.

CR 2.6 peripherals of a microcomputer mounted equipment are replaced or following the instructions received and recognized safety standards and criteria for internal quality work.

CR 2.7 Waste and disposables replacement of peripherals are treated for disposal or recycling, following instructions and in accordance with applicable environmental regulations on waste treatment.

RP 3: Apply procedures and implement programs for testing and monitoring to verify the operation of the computer, following detailed guidelines and instructions received.

CR 3.1 The testing procedure is applied methodically to ensure its implementation, following the guidelines in the working guidelines.
CR 3.2
testing tools are used to test the functionality of the computer, following instructions received.


CR 3.3 The results obtained by the application of procedures and implementation of testing programs are compared with the results shown in the working guidelines to verify the completion of the process, following instructions received.
CR 3.4
check tasks performed and recorded the incidents detected to maintain control of the equipment verified, according to the procedures of the organization.



Professional background:





Production facilities:



IT equipment. Protection and safety elements: goggles, gloves, downloader static electricity, among others. Tools and tools commonly used for assembly of computers and peripherals. Internal computer components: processors, memory modules, motherboards, among others. Network adapters, video and communications, among others. Storage devices. Network connecting devices: repeaters, switches, 'routers', among others. Physical interfaces. Input devices, output and input / output. Tools hardware and software testing. Uninterruptible power supply. Structured cabling.



Products and results:



Computer equipment assembled and checked. Peripherals connected to the computer.



Information used or generated:



Detailed guidance manuals and assembly of components in the computer. Detailed manuals and connecting peripherals to the computer guides. Technical information equipment. Hardware product catalogs, suppliers and prices. Quality plan of the organization. Documentation applicable regulations regarding health and safety and occupational risk prevention. Registration assembly operations, check and connecting peripherals.



COMPETITION UNIT 2: MAKE AUXILIARY OPERATIONS MAINTENANCE Microcomputer Systems





Level: 1





Code: UC1208_1





professional accomplishments and performance criteria:



RP 1: Apply routine procedures of checking and cleaning media and peripherals computer system to maintain its functionality, following detailed guidelines and instructions received.

CR 1.1 peripherals read / write removable magnetic and optical media and standard operating procedures identified for maintenance purposes as instructed.

CR 1.2 Cleaning of magnetic and optical media and peripherals is performed using cleaning devices and techniques of the read / write to maintain its functionality, following detailed guidelines, and meeting safety standards and quality criteria by the organization.

CR 1.3 Cleaning document printing devices is performed using specific tools, following detailed guidelines, and complying with safety standards and quality criteria established by the organization.

CR 1.4 keyboards, mice and other devices are cleaned using brushes, vacuums and devices and specific products, complying with safety standards and quality criteria established by the organization.

CR 1.5 checking the status of peripherals is done to detect any anomalies in its functioning and report to the higher level technician produced incidents, following instructions received.

CR 1.6 The tasks performed and recorded the incidents detected to control the maintenance of equipment, according to the plans of the organization.
CR 1.7
waste and disposable items are treated for disposal or recycling, following instructions and in accordance with applicable environmental regulations on waste treatment.

RP 2: Replace wiring and consumables and peripheral equipment to ensure continuity of its use, following detailed instructions and compliance and established safety guidelines.

CR 2.1 Replacing consumable items in peripherals and other devices is performed using specific tools as peripheral or device, applying the means to open the cover thereof without risk and safety for the operator and the device, in compliance with established safety standards.
CR 2.2
cartridges or toner ink document printing devices are replaced to maintain its functionality, following the detailed guidelines included in the own documentation of the peripheral or indications within the device, and instructions.

CR 2.3
printing devices feed on paper or forms and tasks of adjustment or alignment of the peripheral are made to maintain its operation, following detailed guidelines and instructions received.

CR 2.4 patch cords and network cabling power and data between computers and peripherals are replaced, to maintain the desired functionality, using specific tools and in compliance with established safety standards, taking into account the interconnection to make and following the instructions received.

CR 2.5 peripherals The new consumables are replaced following the detailed guidelines included in the own documentation of the peripheral or instructions received.

CR 2.6 Replacing consumables is checked conducting tests to verify the functionality of peripherals, following established procedures.

CR 2.7 Tasks performed and detected incidents are recorded to control the maintenance of equipment and peripherals, following maintenance plans of the organization.
CR 2.8
packaging waste and disposable items are treated for disposal or recycling, following instructions and in accordance with applicable environmental regulations on waste treatment.

RP 3: Apply procedures for installation / upgrade of microcomputer equipment unattended for installations through a local network, intranet or extranet, following detailed guidelines and instructions received.

CR 3.1 The different physical elements needed for installation / update unattended between microcomputer devices are identified and tested, following detailed work and instructions received guides.

CR 3.2 Installation procedures / equipment unattended upgrade of microcomputer are conducted methodically and following the guidelines in the installation guides to ensure duplication of a microcomputer equipment.

CR 3.3 The image is installed using the techniques and applying the procedures in the installation guide for commissioning the microcomputer equipment, following instructions received.

CR 3.4 installed / updated equipment is checked to verify its functionality, using the techniques and applying the verification procedures and verification system, indicated in the installation guide, following instructions received.

CR 3.5 Specific system parameters are configured to suit the environment, following the instructions of the installation guide and instructions received.

CR 3.6 Tasks performed and detected incidents are recorded to keep track of cloned equipment as maintenance plans of the organization.

RP 4: Collaborate in the work of labeling, packaging and transporting equipment, peripherals and consumables for easy storage, according to safety instructions and documentation provided by the organization.

CR 4.1 The delivery of equipment, peripherals, components and consumables is checked to verify that the delivery matches the order and that they are in good condition, following instructions.

CR 4.2 computers, peripherals and consumables are labeled for easy storage and control 'stocking', using specific tools and following documentation standards and guidelines in the organization.

CR 4.3 computers, peripherals and consumables are packaged for easy storage, using resources and materials available to that effect, following the criteria established organization and security.

CR 4.4 computers, peripherals and consumables move to replace or change its location, using the resources indicated by the organization, following the instructions and complying with the safety standards set by the organization.

CR 4.5 The packaging waste and disposable items are treated for disposal or recycling, following instructions and in accordance with the applicable regulations on environmental issues on waste treatment.

CR 4.6 Tasks performed and detected incidents are recorded to facilitate control of the warehouse, following maintenance plans of the organization.



Professional background:





Production facilities:




IT equipment. Cleaning Tools supports and peripherals. Storage devices. Network devices: repeaters, switches, routers and others. Physical interfaces. Input devices, output and input / output. consumables and other corporate peripheral devices. Network patch cords and cabling power and data between computers and peripherals. Packing material equipment, peripherals and consumables. Tools product labels. Labelers. Applications software 'cloning' equipment. Programs and applications.



Products and results:



Peripherals and supports clean and maintained. consumable items replaced. updated computer equipment up and running. Peripherals and consumables packaged, labeled and transported.



Information used or generated:



Documentation and user manuals and system operation. Detailed manuals and guides maintaining peripherals. Detailed manuals and guides replacing consumables. Manuals and detailed application guidelines and processes 'cloning'. Catalogs consumables. Tags hardware and software products. Documentation on safety and hygiene and prevention of occupational hazards. Quality plan of the organization. applicable environmental regulations on waste treatment. Registration of maintenance carried out. Delivery orders component.



COMPETITION UNIT 3: MAKE AUXILIARY OPERATIONS information and communications technology





Level: 1





Code: UC1209_1





professional accomplishments and performance criteria:



RP 1: Manage the file system and peripherals, using the user tools environment that provides the operating system and network services, following instructions received.

CR 1.1 The computer is turned on and visually check the boot messages and connections to peripherals, following the established procedure.

CR 1.2 graphical user interface provided by the operating system is used to locate and access tools and utilities thereof according to usage needs.
CR 1.3
management tools file system are used to perform operations creation and manipulation of folders and files, and organize information for easy use, following instructions received.

CR 1.4 peripheral devices such as printer and scanner are used to present and manipulate information or with specific applications, according to usage needs and following instructions received.

CR 1.5 devices and storage media (USB drives, CD, DVD, removable drives, etc.) are used to access it and manipulate it according to usage needs and following instructions received.
CR 1.6
a local network resources are used to access folders, shared files and devices, following instructions received.

RP 2: Use devices and multimedia applications to handle information, following instructions received.

CR 2.1 multimedia devices such as microphones, digital cameras, tablets, music players, WebCams, are connected and are used to obtain or access your information, following the instructions.

CR 2.2 The attached or included in the operating system (photo viewers, music software, etc.) multimedia software used to access information associated with the multimedia devices, following instructions received.

CR 2.3 multimedia learning applications (educational games, encyclopedias, computer assisted instruction, etc.) are used to support technical training and retraining of the individual, according to usage needs.

RP 3: Using office applications word processing to make simple documents in a clean and orderly manner, following instructions and using specific formats.
CR 3.1
options office automation word processing application that have to do with the creation, storage, printing and print preview are used for handling documents, following instructions received.


CR 3.2 office automation options word processing application for formatting documents: bold, italic, underline, font size and type, bullets and numbering, tabs, and paragraph alignment, among others, they are used to improve the presentation, following instructions.
CR 3.3
functions for handling blocks of text within a document are used to cut, copy, move and apply formatting to them within the document, following instructions received.

CR 3.4 The images are inserted using the options provided by the word processing application, adjusting and applying the format shown to improve the presentation of the documents, following instructions received.

CR 3.5 Headers and footers are added to customize documents using the options provided by the word processing application, inserting AutoText and applying the format shown, following instructions received.

CR 3.6 The contents of the document is checked for error-free text, using spellcheck tools providing word processing application and making the necessary changes, following instructions received.

RP 4: Use other office applications (databases, presentations, spreadsheets, etc.) to store and retrieve information using ready-made designs, following instructions received.

CR 4.1 databases already designed and created by executing the corresponding open office application to enter and display data using forms and reports already prepared, following instructions received.

CR 4.2 and elaborate calculation leaves open the corresponding running office application to enter, display and print data, following instructions received.

CR 4.3 and elaborate presentations are opened running the corresponding office application, print and view slides, following instructions.

RP 5: Using Internet resources to search and obtain information on the internal and external network using browsers and following the instructions.

CR 5.1 The browser starts and is used to access Web pages and move through the links they provide, following instructions received.

CR 5.2 Searchers Web pages are used to locate information on specific topics denoted by search criteria, following instructions received.
CR 5.3
localized information is downloaded and stored on the computer for later use, following instructions received and taking into account the applicable regulations.

CR 5.4 browser options are used to configure the home page and save the addresses of sites for quick access (favorites), following instructions received.

RP 6: Exchanging information using Internet services (mail services, messaging and virtual training platforms, among others) and those provided by corporate intranet, following instructions received.
CR 6.1
e-mail account used to send and receive messages and attachments, according to usage needs and following instructions.
CR 6.2
forums and blogs news, among others, are used to query and leave opinions, ask and answer questions about specific topics, according to usage needs and following instructions received.

CR 6.3 tools instant messaging and videoconferencing are used for message communications with other users connected, according to usage needs and following instructions received.

CR 6.4 virtual training platforms are used for learning, exchanging information between users and the tutor, according to usage needs and following instructions received.

CR 6.5 The exchange of files between users of the corporate intranet and the Internet is performed using specific tools, according to usage needs and following instructions received.



Professional background:





Production facilities:



IT equipment. Operating systems. LAN configured as an intranet. Email local network. Internet connection. Internet tools: browser, e-mail. multimedia software. multimedia devices. Tools and office applications. Mobility devices, tablets, smartphones.



Products and results:




System organized and connected to the corporate network drives use local file. Images and sounds captured and stored. external information obtained or exchanged on the Internet and stored. Documents and presentations.



Information used or generated:



Manuals operating systems. Manuals multimedia devices and applications. Manuals office applications. User guides Internet utilities. Documents produced, verified orthographically and correctly presented.



Training Module 1: AUXILIARY OPERATIONS COMPUTER COMPONENTS ASSEMBLY





Level: 1





Code: MF1207_1





Associate UC: Perform assembly operations auxiliary equipment Microcomputer





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Handle in electrical and electronic items safely in assembly tasks by identifying instruments and equipment applicable regulations.

CE1.1 Explain the different components of a microcomputer equipment, identifying those who need a safety assembly tasks.

CE1.2 Describe preflight operations and safe handling of electronic components, taking into account, in particular, the instructions to prevent static electricity.
Identify CE1.3
measuring instruments and devices necessary for safe handling of electronic equipment, following indications of such guidelines.

CE1.4 Identify security measures to be applied in handling electrical and electronic elements taking into account the safety regulations on prevention of occupational risks.

CE1.5 In a practical course, properly characterized, mounting components on a computer:

- Identify the components to manage security measures in the assembly procedure.

- Indicate the security measures to be considered according to the different electrical and electronic elements involved in the assembly process.

- Describe the devices and personal security elements needed to perform the activity.

C2: Identify hardware components in a microcomputer system distinguishing features and functionality to assemble, replace and connect to a computer.

CE2.1 identify the functional blocks of a microcomputer system for location based plates from different manufacturers, given the form factor of the computer.

Quote CE2.2 each of the hardware components of a microcomputer system specifying its features and elements that form.

CE2.3 Distinguish types of ports, internal bays and existing cables connecting a microcomputer system, identifying them regarding whether they are data or power.

CE2.4 In a practical course, properly characterized, identification of components in different types of base cards and devices (hard drives, optical readers and recorders supports extensions buses, etc.) plates: | ||
- Recognize the various hardware components.

- Identify the functions of each of the components.

- Describe the types of connection that will require components that need.

C3: Identify the elements involved in assembly procedures and assemble the internal hardware components using appropriate tools and following instructions, to mount the microcomputer equipment.

CE3.1 guides Interpret instructions regarding integration procedures or internal component assembly hardware of a microcomputer system to proceed to assembly, taking into account the form factor computer.

Quote CE3.2 different tools to use in assembly procedures, replacement or internal connection hardware components of a microcomputer system.

CE3.3 on motherboards Distinguishing different microprocessors connection sockets and heatsinks, identifying the attachment means of each.

CE3.4 distinguish the different types of ports, internal bays and existing cables connecting a microcomputer system, and fixing systems, identifying them by means of graphical schemes.

CE3.5 identify, by the look and the colors, the Microcomputer card connectors equipment through schemes and diagrams.


CE3.6 Identify the right to install a device or card into the corresponding slot or bay as detailed installation guide positions.

CE3.7 Describe the different safety standards established in the use and management of the tools used in the integration procedures and internal hardware components assembled in a microcomputer system.

CE3.8 In a practical course, properly characterized, assembly, replacement and internal connection hardware components in a microcomputer system, detailed work following guidelines:

- Interpret the instructions detailed guide and identify the components to assemble, replace or connect.

- Use cabinets and boxes that allow organized tools to use and choose the best for installation or removal of access components.

- Integrate or assemble internal hardware components (memory, processor, video card, battery, etc.) on the motherboard of the microcomputer system and connect the internal hardware components (hard disk, DVD, etc.) that need cables connection for integration into the microcomputer system.

- Install and properly fix the cards and internal components in the microcomputer equipment meeting the safety standards set for installation, replacement or connection hardware component used.

- Collect tools and disposable items for disposal or recycling after performing the work according to the guideline.

- Register operations performed by following a given formats.

C4: Describe the elements involved in assembly procedures, replacement or connecting peripherals and apply these procedures to expand or maintain the functionality of the system, following detailed guidelines and instructions given.

CE4.1 Interpret instructions guide assembly procedures, replacement and connecting peripherals of a microcomputer system to perform these procedures, taking into account the different technologies.

CE4.2 Describe the different tools used in assembly procedures, replacement and connecting peripherals of a microcomputer system, using specific guidelines.

CE4.3 Identify a microcomputer external ports for connecting computer peripherals, using sketches and graphic schemes.

Quote CE4.4 features and connector types of data cables and power to use in connecting peripherals to the microcomputer equipment.

CE4.5 Describe the procedures and tools used for making data connection cables between peripheral and microcomputer equipment, using detailed guidelines.

Quote CE4.6 different safety standards established in the use and management of the tools used in assembly procedures, replacement and connecting peripherals in a microcomputer system.
List CE4.7
preventive measures for safe handling of data connections and power, taking into account the type of component.

CE4.8 In a practical course, properly characterized, assembly, replacement and connecting peripherals in a microcomputer system work following detailed guidelines:

- Identify peripherals to assemble, replace and connect components and the various ports and corresponding cables and connectors, distinguishing those with power supply connections that do not have it and select appropriate tools for mounting, replace and connect a peripheral.

- Make data connection cables between peripheral and microcomputer systems if necessary and mounting or replacement of peripheral and connection, with confidence, accuracy and compliance with the safety standards.

- Locate network connection devices (relay, switch and 'router', among others) in cabinets or predetermined sites using the right tools.

- Check, by means of LEDs, which are attached peripherals, power and data connections.

- Collect disposable items for disposal or recycling following the guideline.

- Register operations performed following formats established.

CE4.9 In a duly characterized, and made installation of equipment and microcomputer peripherals practical course:

- Recognize different types of connectors and cables intended for connection to the mains.


- To distinguish the different types of connectors and cables routed to data communication.

- Use appropriate to replace the hoses and wiring network power and data between computers and peripheral tools, complying with safety standards established prior to replacement procedures of connectors and wiring equipment and peripherals.

- Collect disposable items for disposal or recycling following the guideline.

- Register operations performed following the established formats.

C5: Identify and implement procedures and testing tools of the microcomputer system to verify the installation, replacement and connecting peripherals and components, following detailed guidelines.
Identify CE5.1
guides testing procedures to apply in the process of mounting or replacement, taking into account the item to verify.

CE5.2 Sort the various tools and testing procedures associated with each hardware component.

CE5.3 Describe test tools handling data cabling detailed guidelines.

CE5.4 Describe and implement procedures to verify that the microcomputer team performing the procedure Power and POST ( 'Power On Self Test), identifying the source of the problems, if any.

Ce5.5 Describe the loading of the operating system and possible failures that occur in the startup phase of microcomputer equipment.

CE5.6 In a practical course, properly characterized assembly verification, substitution and connection of peripherals and components in a microcomputer system:

- Check the functionality of the data cable connections between the computer and peripherals microcomputer.

- Perform tasks check connections microcomputer computer and peripherals connected to it.

- Turn on the computer and watch the output phase of POST.

- Interpret information Microcomputer equipment during loading the operating system.

- Select and use configuration tools and testing to verify system operation.

- Register operations performed by following a given formats.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 respect to CE2.4; C3 respect CE3.8; C4 respect CE4.8 CE4.9 and; C5 respect CE5.6.
Other capabilities
:

Adapt to the specific organization of the company, integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute operations in accordance with the instructions received, with quality and safety criteria, applying specific procedures of the organization.

Used to the pace of work of the organization to meet the daily performance objectives defined in the organization.

Show at all times an attitude of respect toward peers, procedures and internal rules of the organization.



Contents:





1. Architecture and internal components of microcomputer equipment



The Central Processing Unit.
Case
types.

Power Supplies, types.

Fans and heat sinks.

The motherboard, the 'chipset', the EPROM.

Microprocessors, plinths and types.

Memories: Memories RAM, features and formats.

Buses and data connectors.

Cables and power connectors.

Sockets and expansion bays.

Expansion cards: characteristics; types: graphics, sound, network, among others.
Types
fasteners and components to the housings.

Systems Input / Output: storage devices: hard drives, characteristics and types; readers / optical and magneto-optical recorders, characteristics and types.

Other types of components.



2. Connectors and external buses of a microcomputer system



Ports: parallel, serial, USB (Universal Serial Bus), 'Firewire' (IEEE 1394), among others.

Wireless Connectors: infrared port (IrDA standard), radio frequency ( 'Bluetooth' standards and 'ZigBee'), among others.

Network cabling: cable types and connector types.



3. Systems Input / Output: microcomputer peripheral



Basic peripherals: monitor, keyboard, mouse and printer.

Other peripherals: speakers, microphone, scanner, multimedia devices, among others.


Connectivity devices: modem, repeater, switch, 'router', among others.

Connections.



4. assembly techniques, substitution and connection components and peripherals microcomputer



Mounting rails.

Tools used in assembly procedures, replacement or connection of computer components and peripherals.

Installation procedures and setting microcomputer components to the housing and the motherboard.

Connecting peripheral devices in the microcomputer system.

Software testing and verification.

Testing and verification procedures.

Safety in the use of tools and electrical and electronic components.

Electrical safety: prevention of electrical hazards; Damage caused by electric shock.

Regulations of environmental protection.

Criteria and conditions security procedures.

Prevention most common accidents.

Personal protective equipment and safety means.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the performance of ancillary assembly operations of microcomputer equipment, which is accredited by one of the following two ways:

- Academic Training Level 1 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 2: AUXILIARY OPERATIONS MAINTENANCE Microcomputer Systems





Level: 1





Code: MF1208_1





Associate UC: Perform auxiliary maintenance of microcomputer systems





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Describe the techniques and apply the verification procedures of the media functionality and peripherals for verification thereof, following detailed instructions.

CE1.1 Identify different verification techniques functionality and supports peripheral, taking into account the technology each.

CE1.2 interpret instructions received guidelines regarding testing procedures and peripherals media functionality to check and verify the proper operation thereof.

Quote CE1.3 characteristics of the tools used to check the status of the media and the information contained therein, following usage guidelines.

CE1.4 In a duly characterized, practical course of a check with reader units microcomputer equipment and various media:

- Describe the characteristics of the media.

- Describe the risks inherent in each bracket.

- Apply the media verification procedures using specific tools, recording the results and produced incidents.

C2: Identify and implement cleaning procedures media and peripherals using detailed inherent characteristics of these hardware elements to maintain the functionality of these guides.

CE2.1 interpret instructions received guidelines regarding cleaning procedures media and peripherals to perform, taking into account the different ways of opening access to elements inside.

CE2.2 describe the characteristics of the media and peripherals, taking into account aspects affecting maintenance.

CE2.3 Identify the different types of maintenance and cleaning which must be submitted holders, their units read / write, printers, keyboards, mice and other devices.


CE2.4 Sort the different tools and devices needed to apply the cleaning procedures media and peripherals, using guidelines for their use.

CE2.5 In a practical course, properly characterized, cleaning media and peripherals, following the instructions specified in the detailed guide:

- Identify the media and peripherals to clean and cleaning procedures.

- Use devices and tools necessary to implement cleaning procedures media and peripherals.

- Comply with established safety procedures before applying cleaning media and peripherals.

- Collect waste and disposables media and peripherals for disposal or recycling.

- Check that the support or peripheral retains its functionality.

- Register operations performed following the formats given.

C3: Describe the consumable items required to be used in the microcomputer system and its peripherals, and make replacing them using detailed guidelines.

CE3.1 Describe the types of peripherals attached to the existing in a microcomputer system consumable items, taking into account the different technologies.

Quote CE3.2 existing regulations on recycling and disposal of consumables framed on respect for the environment.

CE3.3 Interpret replacement procedures consumables in printers and other peripherals from detailed guides and documentation provided by the manufacturer.

CE3.4 In a practical course, properly characterized, replacement of consumables such as ink cartridges and 'toner' printers, paper forms, sheets of adhesive labels and envelopes elements, among others following detailed instructions:

- Prepare the consumable item as step prior to replacement.

- Interpret guides the device to proceed to the paper feed as needed.

- Replacing consumables complying with the safety standards set and apply verification procedures and testing of peripherals.

- Use the means necessary for the recovery and recycling of consumable materials according to environmental conditions.

- Check after replacing consumables and consumable item computing device maintain their functionality.

- Register operations performed following the formats given.

C4: Identify the elements involved in physical replica of microcomputer equipment and installation procedures apply / unattended upgrade following detailed guidelines.

CE4.1 Describe the physical replication functions ( "cloning") disks and partitions in microcomputer systems, taking into account the different facilities inherent to each type of user software.

Quote CE4.2 different physical elements involved in a process of installation / upgrade unattended between microcomputer equipment, indicating its use and the problems that may arise from them.

CE4.3 Describe the features of the software tools used for installing disk images or partitions pointing restrictions applying them.

CE4.4 Discriminate different storage media or disk images disk partitions, for transport and subsequent installation, according to detailed guidelines.

CE4.5 Enumerate the starting phases of a microcomputer system to verify the functionality of the installed image, taking into account the type of installation performed unattended.

CE4.6 In a practical course, properly characterized, installation / update unattended between multiple computers on instructions received:

- Interpret the instruction guide concerning the procedure for installation / upgrade unattended to apply.

- Analyze the target computer (which is to implement the image) and verify that it meets the previous conditions.

- Using image management tool and proceed to the implementation of the same, complying with safety standards.

- Check the result.

- Register operations performed following the formats given.

C5: Describe and perform labeling, packaging, storage and transportation of equipment, peripherals and consumables, depending on the needs and procedures.

CE5.1 Describe the conditions of handling, transport and storage of equipment and components of a microcomputer system.


CE5.2 Identify the different types of packaging equipment, peripherals and consumables associated with each computing device, taking into account quality standards and respect for the environment.
Recognize CE5.3
necessary to carry out labeling and packaging equipment, peripherals and consumables tools, describing their specific uses.

CE5.4 Itemize the procedures necessary to carry out labeling equipment, peripherals and consumables, taking into account work guides.

Ce5.5 In a practical course, properly characterized, packaging and transporting equipment, peripherals and consumables, following instructions given:

- Identify appropriate to each device packaging.

- Perform pre-packaging the same tasks.

- Label and packaging different devices using the right tools.

- Collect disposables properly for disposal or recycling in compliance with established standards.

- Check the packaging and labeling of such products meet quality standards established in this regard.

- Register operations performed following the formats given.

CE5.6 In a practical course, properly characterized, storage and cataloging of computers, peripherals and consumables, following instructions received:

- Check that the components to be stored correspond to the delivery note and are in good condition.

- Perform pre-labeling and storage of the same tasks.

- Label and store different devices using the right tools.

- Classify and label components so that they are perfectly cataloged.

- Collect disposable items for disposal or recycling and verify that labeling meets quality standards established in this regard.

- Comply with established safety standards and record operations performed following the formats given.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.5; C3 respect CE3.4; C4 respect CE4.6; C5 respect ce5.5 and CE5.6.
Other capabilities
:

Responsibility for the work carried out.

Comply with the production standards set by the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Interpret and execute instructions work.

Learn new concepts or procedures and make effective training using the knowledge acquired.



Contents:





1. Auxiliary Technical maintenance of microcomputer systems



Maintenance of computer systems.

Importance.

Maintenance levels.

Description and classification of auxiliary technical maintenance of microcomputer systems.

Periodic maintenance of storage units.

Maintenance of information media.

Supports cleaning techniques and peripherals.

Verification and diagnostic tools: POST procedures ( 'Power-On Self Test').

Diagnostic Tools systems.

Verification tools and information media optimization.

Software tools for preventive maintenance.



2. Elements of microcomputer systems consumables



Types and features.

Conservation measures and recycling of consumable items.

Replacement Procedures consumable items.

Safety procedures for handling and replacing consumable items.



3. Methods of physical replication of partitions and hard drives in computers Microcomputer



Functionality and objectives of the replication process.

Safety and prevention in the replication process.

Disk partitions: partition types and management tools.

Tools creation and implementation of images and replicas of systems: information sources; implantation procedures and replica images systems; verification procedures pictures and replicas of systems.



4. Techniques labeling, packaging, storage and transportation of equipment and computer components



Labeling procedures.

Labeling tools and accessories.

Conservation and proper functioning of labeling tools.

Labeling software.
Labelling
components of a microcomputer system.


Labelling of consumables: pressing techniques Media CD / DVD / Blu-ray; multimedia use of applicators and pressing.
Packing
internal components of a microcomputer system.

Packing peripherals.
Standards
internal storage, cataloging and conservation of components and peripherals of a microcomputer system.

Precautions to consider the transfer of microcomputer systems.

Computer waste treatment: purpose; methods; treatment, disposal and use of computer waste; places recycling and disposal of computer waste.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the performance of ancillary maintenance of microcomputer systems, which will be accredited by one of the following two ways:

- Academic Training Level 1 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: AUXILIARY OPERATIONS information and communications technology





Level: 1





Code: MF1209_1





Associate UC: Perform auxiliary operations with information and communications technology





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Identify the functional blocks of a computer system and recognize the various items of equipment and peripherals, using their manuals.

CE1.1 identify the physical components of a computer system using functional schemes.

CE1.2 Describe the functions of the central processing unit using diagrams.

CE1.3 Explain the functions and features of peripheral locating their means of connection to the computer system and the type of consumable you are using.

CE1.4 Describe the functions and features of the storage units indicating the supports.

CE1.5 Describe the procedures for starting and stopping the computer and peripherals, identifying problems that may arise during the process.

C2: Describe and handle basic operating system utilities for using the computer, following the established procedure.

CE2.1 Explain the functions of the operating system relating them with elements of the computer system.

CE2.2 Distinguish and use the elements of the user interface provided by the operating system to operate within the computer and prepare a working environment.

CE2.3 Identify tools and functionality provided by the operating system for handling file system folders and differentiating between local and remote units.

CE2.4 List the characteristics of the applications provided by the operating system for the management of peripheral devices connected to computer.

CE2.5 Describe the tools and services provided by the operating system to access and share resources within a local network linking them to the file system.

CE2.6 In a practical course, properly characterized, management operating system of a personal computer properly installed and configured:

- Identify functional physical elements and boot the computer, visually verifying that the system load is performed without errors.

- Operate with folders and files using the tool for managing file system provided by the operating system, scanning the information contained in storage media such as CD, DVD, Blu-ray, memory sticks, USB flash drives, etc. .

- Capture information through the scanner and store it for later use using the tools provided by the operating system.


- Perform local printing of information previously stored using the tools provided by the operating system.

- Apply controlled shutdown procedures personal computer.

CE2.7 In a practical course, properly characterized, access to shared resources and information sharing among multiple computers, using the services of the local network:

- Extracting information from an external CD-ROM drive, DVD or 'pendrive', among other types.

- Access folders and files for information on other computers.

- Print documents from other network printers.

- Manage folders and files using shared resources on the local network.

C3: Identify multimedia devices and obtain information from them using multimedia applications, following instructions received.

CE3.1 Identify multimedia devices and their connection to the computer for use with multimedia applications, connecting them to the corresponding ports.

CE3.2 Identify the types of compression formats used to record multimedia information, relating to uses and applications that use them.

CE3.3 In a practical course properly characterized, to obtain multimedia information using multimedia applications:

- Connect devices at specified ports.

- Identify and use the appropriate multimedia software to each device.

- Get pictures and store them in the format and location specified.

- Get music and sounds and store them in the format and location specified.

- Capture videos and store them in the specified format and location.

C4: Describe and use the main features of a word processor and perform simple and basic documents, according to the instructions received.

CE4.1 Explain the functions and features of a word processor linking them with the types of documents to be processed.

CE4.2 Describe the procedures for creating, modifying and manipulating documents using word processing tools.

CE4.3 Identify formats that can be applied to text in documents to improve the presentation of them: bold, italic, underline, font size and type, bullets and numbering, tabs, and paragraph alignment between other, taking into account the styles applied.

CE4.4 Describe the functions that are used to insert images and graphic objects into documents, taking into account the type of object.

CE4.5 Identify the functions that are used to add headers and footers in documents, style instructions received.

CE4.6 In a practical course, properly characterized, document creation to present information using a word processor, following a specified formats:

- Select and apply formats to text and text blocks.

- Insert images and predesigned objects that provides word processing, and format them.

- Insert headers and footers to documents adding 'AutoText' and applying formats.

- Pass the spell checker.

- Save and print documents.

C5: Describe the functionality of other office applications or use for the treatment and presentation of information using already defined designs and following instructions.

CE5.1 Explain the characteristics and use of office applications spreadsheet, database and presentation slides documents, relating to the treatment of text.

CE5.2 In a practical course, properly characterized, handling a spreadsheet and designed:

- Open and close the spreadsheet.

- Entering data in cells.

- Save the changes.

- Print spreadsheets.

CE5.3 In a practical course, properly characterized, handling a database and designed, with its tables, relationships, forms and reports created:

- Open and close the database.

- View and enter data through forms already created.

- Save the changes.

- Print the data using reports already created.

CE5.4 In a practical course, properly characterized, in which has a designed and presentation, make the following instructions received:

- Open and close the show already created.

- Present the slides.

- Print slides.


C6: Describe and manage utilities that provides Internet to search internal and external network, following instructions received.

CE6.1 Explain the characteristics and functions of the Internet and a corporate intranet linking them with the type of information to find and use.

CE6.2 Enumerate and enunciate the characteristics of a Web page and page navigation possibilities, distinguishing between secure and non-secure pages.

CE6.3 Recognize the tools used to surf the web, search information and add search criteria.

CE6.4 In a practical course, properly characterized, information search on the Internet:

- Open the browser and use it to access pages and their links.

- Use a search engine to locate information according to the criteria.

- Customize the browser using the tool utilities (homepage, link colors, font size, etc.).

- Download this information and store it in the indicated locations.

- Identify ways and means of security when accessing Web pages to prevent unwanted software installation and other threats (lock, HTTPS) and use certificates or digital signatures to navigate through agencies or institutions.

- Add the most visited pages to favorites and use the browser functions to access the history of visited pages.

C7: Describe and manage utilities offered by the Internet and corporate "intranet" for the exchange of information between users.

CE7.1 Explain the functionality offered by mail tools for exchanging information, noting its potential to organize work and track tasks.

CE7.2 describe the characteristics of the news forums and blogs, among others, and the tools used to query and leave opinions on specific topics within them.

CE7.3 identify and distinguish features that offer instant messaging tools and videoconferencing to establish conversations and clarify instructions when it is not possible direct contact.

CE7.4 Recognize the features offered by virtual training platforms ( 'e-learning') for use as a means for continual learning.

CE7.5 In a practical course, properly characterized, sending and receiving messages through a mail service:

- Create an email account through a Web server that provides the service.

- Create a new message by adding recipients and subject, using formatting functions, and send it.

- Check the inbox of the mail tool and open new messages.

- Attach files in mailings.

- Organize mail folders.

CE7.6 In a practical course, properly characterized, sharing information using instant messaging and videoconferencing:

- Access the instant messaging and videoconferencing.

- Enable private IM conversations and allow or deny access to the conversation to others.

- Establish videoconferences with one or more users using the programs and means indicated.

- Use items: whiteboards, desktop sharing and file transfer, among others, which provide messaging tools.

CE7.7 In a practical course, properly characterized, use virtual training platforms:

- Access to the virtual platform.

- Browse content offered by the virtual platform.

- Using communication tools provided by the platform (mail, forum and messaging) to exchange messages and work with the tutor and other users.

Capabilities whose acquisition should be completed in a real working environment:

C2 and CE2.7 CE2.6 respect; C3 respect CE3.3; C4 respect CE4.6; C5 respect to CE5.2, CE5.4 CE5.3 and; C6 respect to CE6.4; C7 respect to CE7.5, CE7.7 CE7.6 and.
Other capabilities
:

Keep an assertive, empathetic and conciliatory attitude with others showing warmth and kindness in treatment.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Interpret and execute instructions work.

Communicate effectively with the right people at all times, respecting the established channels within the organization.



Contents:





1. The computer and its operation in the basic use of ICT




Main components.

Connection and commissioning.

Types of peripherals.

Operating system: characteristics; the graphical user interface, the desktop; managing files and folders: scanning an operating system, basic functions of browsing and searching; use of peripherals.

Local area networks in the basic use of ICT: uses and characteristics; access to shared resources; wireless networks; devices with wireless network and the computer.



2. multimedia environments in the basic use of ICT



Devices and multimedia applications.

Multimedia formats.

Exchange procedures multimedia information between computers and devices.



3. Office applications in basic use of ICT



Word Processor: structure and functions of a word processor; formatting documents; inserting objects into documents; page Setup; the spell checker.

Office applications spreadsheet, database and presentations: opening documents; data entry; slide presentation; print.



4. Internet, email and virtual training platforms in the basic use of ICT



Internet: characteristics and uses; Web documents; Web browsing: 'browsers' Web browser settings, description and operation of the browser; Web clients: characteristics and uses; seekers: characteristics and uses; use of certificates and digital signatures; protection of the operating system and applications against malicious attacks from internet ( 'fishing', 'malware', 'spyware').

Email: features and types; IM: types and characteristics; Videoconferencing: characteristics; Forum: types and characteristics; tools and applications of Internet services; other internet services.

Virtual training platforms 'e-Learning' applications; characteristics and uses.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the performance of auxiliary operations with information and communications technology, which is evidenced by one of the following two ways:

- Academic Training Level 1 (Spanish Qualifications Framework for Higher Education) or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XIV


Professional qualifications: First Level Maintenance Systems Radio



Professional Family: Computers and Communications





Level: 2





Code: IFC362_2





General competence



Making processes deployment of wireless LANs and metropolitan area, and make the software installation, configuration, commissioning, maintenance and troubleshooting of first level of radio equipment for fixed and mobile networks, following established procedures.



Competence units



UC1210_2: Putting into service and maintain local wireless networks and metropolitan area

UC1211_2: Configuring and commissioning radiocommunications equipment fixed and mobile networks

UC1212_2: Maintain and troubleshoot first-level radio systems fixed and mobile networks



Professional environment





Professional field




Develops his professional activity in the communications area dedicated to radio systems in public entities or private, companies of any size, both self-employed basis, regardless of their legal form. It operates depending, where appropriate, functional or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of their professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



Is located primarily in the communications sector in the subsector installation, maintenance and technical assistance to radio networks, communication operators and communications services, but could be located in any productive sector that by its size and organization needs to manage radio networks.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.
Operators
first level maintenance in radio equipment
Operators
first level maintenance in wireless communications networks



Associate Training

(540 hours)





Training modules



MF1210_2: Commissioning and maintenance of wireless LANs and metropolitan area (180 hours)

MF1211_2: Configuration and commissioning of radio equipment for fixed and mobile networks (150 hours)

MF1212_2: Maintenance first level of radiocommunication equipment fixed and mobile networks (210 hours)



COMPETITION UNIT 1: KEEP PUTTING INTO USE AND WIRELESS NETWORKS LOCAL AND METROPOLITAN AREA OF





Level: 2





Code: UC1210_2





professional accomplishments and performance criteria:



RP 1: Configure devices and computers that are part of the wireless LAN or metropolitan area, for optimal coverage, following specifications received and in compliance with the established safety standards.

CR 1.1 devices and equipment of wireless local area network are positioned and oriented for optimum coverage on the basis infrastructure, following specifications received and compliance with safety standards.

CR 1.2 wireless network adapters are assembled and connected on devices and wireless network equipment using recognized drivers for each operating system and guaranteeing the absence of conflict, following the procedures and in compliance with established safety standards.

CR 1.3 Parameters access points are configured to enable communication between devices and network equipment and wireless local area networks, following established procedures.

CR 1.4 The introduction of parameters on the indoor unit subscriber of a fixed link in metropolitan area networks is performed using configuration tools, following instructions and specifications reflected in the discharge order.

CR 1.5 Inventories devices and equipment, their configurations and software that form the wireless local and metropolitan area are established and maintained to ensure their location and availability, following the rules of the organization.
CR 1.6
testing device configuration and equipment are performed to verify the connection to the access point or base of the metropolitan network stations, following established procedures and in compliance with safety standards.
CR 1.7
activities and detected incidents are documented in a standardized format for later use, following the procedure established by the organization.

CR 1.8 The specific technical documentation is interpreted, if any, in the most common foreign language in the sector of use.

RP 2: Perform testing procedures and verification of devices and equipment of wireless LAN and metropolitan area to ensure network functionality and quality of service, following established procedures and in compliance with safety standards.


CR 2.1 The access points and antennas in procedures prior to the implementation of network inspection, are at the test locations identified by the project, providing power to them and setting the basic parameters indicated, following the procedure established and recognized safety standards.

CR 2.2 connectivity and device status and wireless network equipment are checked to ensure the provision of services, following established procedures and quality complying with the rules of the organization.
CR 2.3
physical security systems and access restrictions to the installed equipment are checked, to prevent unauthorized manipulations that may alter the parameters of service provision, following established procedures.

CR 2.4 scan measures the estimated coverage areas are made with specific instrumentation and equipment to check that they have the required quality of service and meet established safety standards, following established procedures, and taking into account the existence of radio channels both intended and interfering.

CR 2.5 The values ​​of the samples are recorded along with other information to determine the exact point and time that have been made, following specifications of the work order.
CR 2.6
activities and detected incidents are documented in a standardized format for later use, following the procedure established by the organization.

RP 3: Attend and resolve incidents produced in first class equipment devices and wireless LAN and metropolitan area to maintain functionality, following established protocols.

CR 3.1 Incident reporting systems are observed for possible alarms as operational and organizational security procedures.
3.2 CR
device location and radio frequency in which incidence and nature of this occurs is identified interpreting information gained through the user, by using functional tests and measurement instrumentation and diagnosis.
CR 3.3
measures signal strength in the wireless environment where incidents are recorded are performed in passive mode (receive only) using the instrumentation or appropriate to each case and applying the standards established safety applications.

CR 3.4 The configuration of devices and equipment fixed and / or mobile with problems associated with the wireless network is checked to verify that it meets the established parameters.

CR 3.5 The detected and isolated incidence is diagnosed and its solution arises determining their exact location to rehabilitate interrupted services and following the protocol established.

CR 3.6 The incidence has not been able to isolate and resolve reports to higher level of responsibility for management according to the protocols and procedures for the organization to contingencies.
CR 3.7
repair services to rehabilitate incidence is done with specific tools and applying established safety standards.
CR 3.8
activities are documented according to internal models established by the organization in order to record the information for later use.



Professional background:





Production facilities:



Computer Equipment. Computers and wireless communications devices. Field meter. Computerized tools for connectivity testing. Office tools. Wireless network adapters. Installation tools. Antennas, cables, connectors and accessories. Laptop computer with special purpose software for all frequency bands involved. GPS positioning, digital camera. Access points, network electronics and base stations metropolitan networks. Indoor and outdoor units fixed subscriber metropolitan networks. Mobile devices. portable testers wired and wireless networks. Protection and safety elements. RF power meters.



Products and results:




Wireless network devices properly configured. functional parameters in devices configured connection to external networks. Computers and devices on the wireless network of Local and metropolitan area verified. Wireless data networks with extended coverage inside buildings. Wi-Fi public access 'hotspot' indoor and outdoor. meshed wireless networks in local and metropolitan areas. I aim point wireless links (backhaul) in local networks and metropolitan area configured. Measures exploration conducted electromagnetic fields. First level support for network services and user devices established.



Information used or generated:



Configuration Technical documentation and technical reports prepared test equipment. Work orders. Incidences parts. technical documentation of devices. Historical reports of incidents. Plans functional verification. Testing protocols. Quality manuals. Standards and quality criteria defined by the organization. Safety regulations applicable in installations of electronic equipment. Audit reports and verification. Installation procedures and basic configuration parameters. IEEE 802.11, 802.15, 802.16 and 802.20. Installation manuals access points and base stations. Information about installing communications equipment and software. applicable rules, regulations and standards. Documentation on safety and prevention of occupational hazards. Documentation WIFI security protocols.



COMPETITION UNIT 2: SETTING UP AND PUT IN SERVICE EQUIPMENT RADIOCOMMUNICATION
fixed and mobile networks




Level: 2





Code: UC1211_2





professional accomplishments and performance criteria:



RP 1: Check the installation of the devices and radio equipment fixed and mobile networks and its connection to the heating system associated, in order to verify whether it conforms to the specifications received.

CR 1.1 specifications and technical documentation of equipment and radio communication devices to service are recognized and interpreted in order to identify computers and devices to verify.

CR 1.2 Installation of the transceiver and the heating system is checked in order to preserve them for possible installation failures, using specific tools and, following established procedures and in compliance with safety standards.

CR 1.3 interconnect various devices and radio equipment with the heating system are verified to ensure its installation and operation, using specific tools, following established procedures and in compliance with safety standards.

CR 1.4 The orientation and tilt of the antennas is checked to ensure it matches the specifications received, and taking into account possible influences of magnetic metal objects nearby.
CR 1.5
activities and detected incidents are documented in a standardized format for later use, following the procedure established by the organization.

RP 2: Install the software devices and radio equipment of fixed and mobile networks for commissioning, following established procedures.

CR 2.1 software devices and radio equipment is installed for operation using specific tools, following the established procedure.

CR 2.2 The functionality of the various hardware components radio equipment is verified using specific software tools, following established procedures.

CR Software version 2.3 devices and radio equipment is recorded following the established procedure, to keep information on the version used on all devices.
CR 2.4
activities and detected incidents are documented in a standardized format to keep record and track work, following the procedure established by the organization.

CR 2.5 The specific technical documentation is interpreted, if any, in the most common foreign language in the sector of use.

RP 3: Configure devices and radio equipment for fixed and mobile networks in order to enable the communications link, following established procedures.


CR 3.1 The values ​​of the configuration parameters of radio equipment are determined by interpreting the technical documentation for each team, as well as specifications and commissioning procedures.
CR 3.2
specific software tools for loading parameters are used to configure devices and radio equipment of fixed and mobile network, and enable communications link, following the instructions on the work order.

CR 3.3 The device configuration is verified using the specified tools and to check its functionality by following the instructions on the work order, resetting the device to load the configuration if necessary.
CR 3.4
activities and detected incidents are documented in a standardized format for later use, following the procedure established by the organization.

RP 4: Perform verification procedures connection devices and equipment fixed and mobile radio, to ensure network functionality, following instructions in the test protocol.

CR 4.1 Communication between fixed radio devices is verified by following the procedures established by the organization, using appropriate tools and supplies, and in compliance with established safety standards.

CR 4.2 Communication between mobile radio devices is verified by following the procedures established by the organization, using appropriate tools and supplies, and in compliance with established safety standards.
CR 4.3
exposure measurements are performed to verify that the radiation is not excessive, using suitable instrumentation and equipment, following the procedure established by the organization and with established safety standards.

CR 4.4 The measures to check the coverage area of ​​the base station are performed to verify the estimates made in the project and the areas being serviced following the procedure established by the organization and with standards established security.

CR 4.5 Integration testing of devices and equipment in the radio network are performed to verify functionality, following established procedures and taking into account the quality criteria of the organization.
CR 4.6
activities and detected incidents are documented in a standardized format for later use, following the procedure established by the organization.



Professional background:





Production facilities:



Radio equipment fixed and mobile networks. Equipment for measuring specific parameters of fixed and mobile radio networks. Specific tools for measuring and loading parameters on computers and software in the system. Internal use tools for documenting processes performed. Software installation tools. Tools network management software and services. Office tools. Instrumentation and measurement equipment exposure. Instrumentation measure of the quality of the connection between antenna and transceiver. Protection and safety elements. laptops. Spectrum analyzers.



Products and results:



Installation of devices and radio equipment verified. Radio equipment for fixed and mobile networks with installed software. Radio equipment for fixed and mobile networks configured and verified.



Information used or generated:



Project (or part of the project) radio system. Specifications and installation requirements for radio equipment. Regulations and standards. Quality criteria of the organization. Setup procedures. Installation procedures. Test protocol. Documentation on safety and prevention of occupational hazards. Safety regulations for electronic equipment installations. Manuals and technical specifications of radio equipment. Installation and verification reports. Trial and error reports. Measurement reports. Documentation on security protocols in fixed and mobile networks.



COMPETITION UNIT 3: KEEPING INCIDENTS AND RESOLVE TOP LEVEL radio systems fixed and mobile networks





Level: 2





Code: UC1212_2






professional accomplishments and performance criteria:



RP 1: Conduct periodic maintenance of radio equipment devices and fixed and mobile networks to ensure communications services within the quality parameters required by the organization, following established procedures and regulations security applicable.
CR 1.1
preventive maintenance procedures of the different elements and equipment of the radio system are interpreted to identify the tasks necessary to maintain system functionality with the required level of quality, taking into account the technical specifications thereof .

CR 1.2 Visual indicators alarm summary that presents the hardware of radio equipment are inspected to verify proper operation thereof, following the established procedure.

CR 1.3 The wiring between radio equipment and other transmission systems, between them and feeding systems and the associated heating system is visually inspected to verify that have not suffered damage that may provoke failures the system, following the established procedure and in compliance with applicable safety regulations.

CR 1.4 Visual inspection of the installation is performed to determine if there have been changes in the environment thereof which have led to the emergence of possible obstacles that may disturb the signal strength, following the established procedure.

CR 1.5 applications management software Local radio equipment used for field measurements, checking if there are significant variations in the values ​​reflected in the document of acceptance testing equipment in question, which could give evidence of a malfunction of a module of radio equipment.
CR 1.6
ventilation units radio equipment are cleaned or replaced to ensure the functioning of the equipment in proper operating climatic conditions, following the established procedure and in compliance with safety regulations.
CR 1.7
batteries equipment radio equipment and associated power systems are checked or replaced to maintain its operation, following established procedures and compliance with applicable safety regulations.

CR 1.8 software updates radio equipment are made to correct errors or add new features, following established procedures.
CR 1.9
activities and detected incidents are documented in a standardized format for later use, following the procedure established by the organization.

RP 2: Address the alarms presented by the hardware devices and radio equipment of fixed and mobile networks, and local management software thereof, to detect the source of the anomaly, following specifications received.
CR 2.1
visual alarm indicators presented each hardware module radio equipment, are inspected to try to narrow the modules that may be something wrong, considering the critical aspects of the alarm they present.

CR 2.2 applications management software Local radio equipment fixed and mobile networks are used, for additional information on the incidents that have different units forming equipment, and show an indication of damage or malfunction, following specifications received.

CR 2.3 applications management software Local radio equipment of fixed and mobile networks are used for field records needed to verify whether the incidence presented by the radio equipment corresponds to the actual failure of a unit , or it occurs by abnormal propagation condition.

CR 2.4 The incidence presented is diagnosed when it is not an abnormal condition propagation, interpreting the information they provide local management applications of the different teams, identifying the physical or logical component that presents anomalies and at a time commensurate with the level of service established.

CR 2.5 The activities and detected incidents are documented in a standardized format for later use, collecting information to update the historical incidents, following the procedure established by the organization.


RP 3: Repair faults devices and equipment fixed and mobile radio to maintain network functionality, following established procedures and protocols applicable performance and safety regulations.

CR 3.1 The wiring associated with a radio equipment unit is checked by checking that it is properly labeled, and if necessary labeled, so that during the replacement of the faulty unit no connection errors, following the procedure established and in compliance with established safety standards.

CR 3.2 devices and radio equipment malfunction presented are adjusted using specific return them to their optimum performance, with the required precision, following established procedures and safety standards compliance tools.
CR 3.3
code spare drives are identified to ensure that is the same or is compatible with the unit to be replaced, as shown in the technical documentation of the equipment.

CR 3.4 The hardware configuration of the faulty unit is queried if required be copied to the replacement drive, following established procedures.

CR 3.5 The damaged units are replaced using specific tools to prevent the deterioration of the same in the replacement process, following the procedure established and recognized safety standards.

CR 3.6 The operation of radio equipment, after repair of the fault, is checked and verified that conforms to the conditions stipulated in the acceptance testing specific equipment, using the alarm indicators presented computer hardware and software applications local management, following the established procedure.

CR 3.7 The inventory of existing units is kept updated after damage, using software applications local management of radio equipment, following the established procedure.
CR 3.8
activities and detected incidents are documented in a standardized format for later use, collecting information for updating the historic equipment breakdown, following the procedure established by the organization.



Professional background:





Production facilities:



Tools for electrical and mechanical work. Instruments for measuring electrical quantities. Software and hardware diagnostics. Power meter. Installation software and utilities radio equipment. Computers and peripherals. multitest equipment. Camera. Software programs with specific local management of radio equipment Frequency. Specific installation tools. Copper cables, fiber optic cables, coaxial cables and waveguides. Protection and safety elements. laptops.



Products and results:



Equipment fixed and mobile radio maintained. Reports of damaged units. Inventory files installed drives. Files 'back-up' of the configurations of radio equipment.



Information used or generated:



Work Orders. Parts fault description. Technical information devices. technical service manuals teams that are going to maintain and repair. Internal service leaves on damage statistics per team. Historical incidents. Personal safety standards and materials and equipment. Procedure manuals. Maintenance plans. Technical documentation of equipment manufacturers radio and radiant systems. Outcome document of acceptance testing protocol radio station. Document software update procedure. Technical documentation of radio equipment. Technical documentation supply systems associated with radio equipment. Manuals installation of radio equipment. Manuals programs local management of radio equipment. Rules, regulations and standards. Documentation on security protocols in fixed and mobile networks.



Training Module 1: COMMISSIONING AND MAINTENANCE OF WIRELESS LOCAL AREA NETWORKS AND METROPOLITAN





Level: 2





Code: MF1210_2





Associate UC: Putting into service and maintain local wireless networks and metropolitan area





Duration: 180 hours






Capabilities and evaluation criteria:



C1: Identify the functions and features of the devices and computers on a wireless LAN and metropolitan area for further configuration.

CE1.1 Describe the main features of the reference standards of wireless technologies depending on data transfer rate, the scope of coverage and its typical application.

CE1.2 Define the functions and features of the devices and / or computers on a wireless LAN or metropolitan area: access point, antennas, network adapter, indoor subscriber unit 'router', among others, for commissioning.

CE1.3 Explain the basic techniques of placement and orientation of the devices and equipment of a wireless local area network for optimal coverage.

CE1.4 Describe the techniques of power over twisted pair (PoE) access points and to recognize the limitations imposed by this means.

CE1.5 Describe the techniques and tools used in the network inventory for registration of devices and equipment that form as well as their configurations and changes.

CE1.6 In a practical course, properly characterized, identification devices and computers that are local and metropolitan area network to classify and describe its functionality, following technical specifications given:

- Sort devices by type and functionality.

- Recognize indicators and operating status of the devices as shown in the technical manual.

- Check the registration of devices in inventory.

- Identify connections between devices and computers.

C2: Apply the configuration procedures of equipment and devices for wireless local and metropolitan area for commissioning, following technical specifications.

CE2.1 Describe the configurable parameters of the equipment and devices on a wireless LAN and metropolitan area.
Interpret CE2.2
setup procedures computers and devices on a wireless LAN and metropolitan area.

CE2.3 Using software tools and wizards for configuring devices and equipment based on the technical and functional specifications.

CE2.4 In a practical course, properly characterized, configuration of a wireless network with a single point of access and local coverage inside a building to enable communication in the same:

- Locate the items on the network map and identify the roles.

- Check the location of the access point and wired network and power meet the requirements.

- Determine from the information specified in the work order and in the technical documentation of the access point, such as setting a configuration session from a laptop.

- Established the configuration session to introduce the basic parameters (SSID, radio channel, encryption keys and type), giving priority in this work using assisted menus ( 'Wizard') and save the configuration of the access point .

- On a computer with wireless network adapter, create a network connection with the SSID of the access point is set, enter the password and type of encryption security, verify that the association occurs.

- Register configurations of equipment in inventory and record the tasks performed following indications guide the procedure.

CE2.5 In a practical course, properly characterized, integration of computer and communications equipment in a wireless network inside a building with several access points already configured and installed to enable communication between computers and network, following given specifications:

- Locate the items on the network map and identify the roles.

- Sort the available network adapters (PCI, PCMCIA, USB and MiniPCI, etc.) each adapting to the requirements of the installation and equipment to be integrated into the wireless network.

- Collect all available information about network adapters and drivers necessary drivers for each operating system, as well as software utilities that are required for installation, and install the wireless network adapter, observing the safety means and established protection and using appropriate tools in each case.


- Enter using the software tools installed network adapter or parameters that allow the association to the appropriate access point and that are reflected in the work order OS.

- Apply the procedures of functional and operational testing device installed, verifying that the equipment is properly associated with the wireless network.

- Record tasks, settings made and the configuration software inventory as directed by the guide procedure.

C3: Implement testing and verification procedures to determine the connectivity of devices and equipment of wireless LAN and metropolitan area, following given specifications.

CE3.1 Describe test procedures and applicable to each device and wireless network equipment, according to their technical specifications verification.

CE3.2 Distinguishing physical security systems and access restrictions devices and network equipment for use in testing procedures and verification.

CE3.3 In a practical course, properly characterized, of conducting screening measures during a process prior to the implementation of a network of local or metropolitan area inspection:

- Identify the necessary tools to take measurements: laptop with wireless network adapter, network monitoring software and access point test, among others.

- Place the access point configured to scan measures the required location, following standard procedures.

- Browse user defined zones and record the signal levels and signal / noise ratio for each point indicated.

- Detect during scanning measures the possible existence of active channels used by neighboring access points other than test scoring the busy channel and signal level for further analysis.

- Determine the approximate area of ​​coverage for the access point under test, according to the standard employee and specifications of the work order.

- Locate, performing, if necessary photographs thereof, the construction or furniture items that may pose a potential impediment in the propagation of radio signals and are not covered by the instructions is the inspection process and record the values ​​in the order and format described by the instructions of the inspection process.

CE3.4 In a practical course, properly characterized, verification of connectivity equipment and devices already implemented a local or metropolitan area to ensure wireless network functionality:

- Identify computers and network devices to verify.

- Recognize the testing and verification procedure applicable to each device and equipment.

- Identify the impact on the service of the verification procedure to be applied.

- Perform the test with the right equipment.

- Record the tasks performed following indications guide the procedure.

C4: Describe the types and characteristics of incidents of devices and equipment of wireless LANs and metropolitan area, and to solve the issue following a given specification.

CE4.1 Define the meaning of the alarms and alerts for devices and equipment that are local and metropolitan area wireless network and the types of incidents that occur in them, to ensure the provision of services.

CE4.2 Describe the techniques and tools that are used to isolate and diagnose the causes that have produced an impact, taking into account the symptoms detected in the wireless network and the information reported by users to proceed to its solution.

CE4.3 Select and apply diagnostic procedures and repair of the impact on the wireless network based on the device and affected equipment.

CE4.4 In a practical course, properly characterized, simulation of an incident in which a user equipment can not be associated with a wireless network, following some given specifications:

- Check reference from another computer if possible association to determine if the failure occurs on the end user or access point.

- Check the basic settings for the selected network connection to the user equipment.

- Verify that the operating system correctly recognizes the wireless adapter and that there are no conflicts with other hardware devices.


- Verify that the network connection selected by the user is adequate and that no other access points or adjacent networks that interfere with it.

- Check that the lights on the access point are in the proper state and that the unit is properly fed by the power source and the orientation of the antenna is appropriate and that are in good condition.

- Establish a configuration session using a direct wired connection and check the basic settings of the access point.

- Restart the access point before returning to retesting association with it.

- Write down the symptoms and record the procedure used and the tasks performed following the guidance of the procedure.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 and CE2.5 CE2.4 respect; C3 and CE3.4 CE3.3 respect; C4 respect CE4.4.
Other capabilities
:

Responsibility for the work carried out and the fulfillment of the objectives.

Finish work according to criteria of suitability, speed, economy and efficiency.

Alternatives to improve results propose.

Demonstrate creativity in the development of the work done.

Demonstrate stress resistance, stability of mood and impulse control.

Adapt to new situations or contexts.



Contents:





1. Wireless networking standards



Wireless Local Area Networks: classification, reference standards.

Wireless Metropolitan Area Networks: classification, reference standards.

Standard 802.11: architecture, development, security.



2. Wireless Networks Local and metropolitan area



Fundamentals and RF propagation.

Devices and equipment of local area networks: network adapters, access points, antennas, among others. Power supply over twisted pair.

Wireless devices and computers metropolitan area networks: subscriber unit, base stations and antennas.



3. Integration and configuration of equipment in wireless LANs and metropolitan area



Equipment integration: installation processes and adapters 'drivers' dispute resolution. Configuring wireless local area networks: parameters and configuration tools. Configuring metropolitan wireless networks parameters and configuration tools. Special features configuration for different operating systems.



4. Operations test and verification in wireless LANs and metropolitan area



Map coverage.
Basic procedures
measures exploration and coverage.

Testing connectivity between devices and computers.

Management utilities and specific instrumentation.

Documentation of the measurements.



5. Diagnostics and troubleshooting in incidences of first level local wireless networks and metropolitan area



Diagnostic procedures, localization and troubleshooting of first level.

Diagnostic tools.

Types of faults in networks local and metropolitan area: alarms and alerts, partnership, power, antenna orientation, connection equipment, device conflicts and interferences.

Protection and safety measures.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the commissioning and maintenance of wireless local and metropolitan area, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.


2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 2: CONFIGURATION AND COMMISSIONING OF EQUIPMENT RADIOCOMMUNICATION
fixed and mobile networks




Level: 2





Code: MF1211_2





Associate UC: Configure and commissioning radiocommunications equipment fixed and mobile networks





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Distinguishing features of the devices and radio equipment of fixed and mobile networks and their connections, and perform the installation verification following the technical specifications given.
List CE1.1
radio technologies used in networks of fixed and mobile radio, taking into account the standards and associated protocols.

CE1.2 Explain the functions of the devices and radio equipment for fixed and mobile networks, as well as the interfaces used for connection between them, and them to the backbone.

Quote CE1.3 protocols used in networks of fixed and mobile radio, according to the technologies used in the connection.

CE1.4 Enumerate applicable to interfaces connecting radio devices, including backbone and explaining their characteristics and functional data rate standards.

CE1.5 Describe the techniques and tools used in the process of verification of the installation of devices and network equipment fixed and mobile radio.

CE1.6 In a practical course, properly characterized, check the installation of equipment of a radio system, following given specifications:

- Identify the computers and devices that make up the system to verify.

- Identify safety rules to comply with the verification.

- Check the installation of the transceiver and antenna system using tools and specific tools.

- Check the connection between the devices and equipment and the heating system using specific tools.

- Register the activities and incidents produced according to specified formats.

C2: Apply procedures for software installation and configuration of devices and radio equipment fixed and mobile networks for commissioning following given specifications.

CE2.1 Describe the procedures for implementing the software and loading configurations radiocommunication devices fixed and mobile networks.

CE2.2 Explain the role and values ​​of the main parameters involved in the configuration of radio devices fixed and mobile networks, taking into account the technical specifications thereof.

CE2.3 In a duly characterized, software installation of radio devices fixed and mobile networks for further practical course configuration:

- Identify the software to install and associated equipment.

- Install the software using the specified tools.

- Register the software version to keep updated the computer's registry.

- Check the functionality of the device with the new software installed.

- Record the activities and produced incidents.

CE2.4 In a duly characterized, configuration in a radio communication device fixed and mobile networks for the implementation of a communications service practical case, according to a specification given and following established procedures:

- Identify the computer on the network radio set.

- Select the configuration to be implemented using the means and tools specified.

- Perform the setup following the established procedure.

- Check that the required communication services are enabled.

- Register the activities and incidents produced according to specified formats.

C3: Apply test procedures and verification devices and radio equipment for fixed and mobile networks to ensure the functionality of the following given specifications.

CE3.1 Identify the parameters to be tested, according to the particular implementation of radio devices used fixed and mobile networks.

Quote CE3.2 techniques and test tools used to check radio devices implanted fixed and mobile networks.


CE3.3 Sort test procedures to be applied to verify communication between devices of radio network, taking into account the control equipment characteristics.

CE3.4 Describe the processes and tools used for taking measures both exposure and exploration of the coverage area.

Quote CE3.5 regulations and safety recommendations regarding measures of exposure to radiation in radio systems to meet the working environment.

CE3.6 In a practical course, properly characterized, verification commissioning of radio devices fixed and mobile networks:

- Identify the teams involved in the practice setting.

- Identify the characteristics of the equipment installed from their specifications and test procedures applicable.

- Discriminating parameters and test procedures and order fulfillment.

- Apply the rules of safety at work.

- Testing.

- Interpret the results.

- Register the activities and incidents produced according to specified formats.

CE3.7 In a practical course, properly characterized, exposure metering received following a specifications:

- Select the measuring elements to use.

- Identify and implement safety measures at work and exposure to electromagnetic fields.

- Perform exposure measurements.

- Record the results of the measures and scale to the top level.

- Register the activities and incidents produced according to specified formats.

CE3.8 In a practical course, properly characterized, measuring scanning coverage area following a received specifications:

- Select the measuring elements to use.

- Identify and implement security measures at work and exposure.

- Perform scan measures the coverage area.

- Record the results of the measures and scale to the top level.

- Register the activities and incidents produced according to specified formats.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 and CE2.4 CE2.3 respect; C3 respect to CE3.6, CE3.8 CE3.7 and.
Other capabilities
:
Demonstrate interest
extensive knowledge of the organization and its processes.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Demonstrate stress resistance, stability of mood and impulse control.

Used to the pace of work of the organization.



Contents:





1. Networks of fixed and mobile radio



Elements and technologies in radiocommunication systems. Private mobile networks.

Mobile phone networks, protocols, services and technologies.

Radio access networks in terrestrial fixed systems, sorting and technologies.



2. Components of networks of fixed and mobile radio



Equipment and devices fixed radio networks: types, characteristics, operation, connections.

Equipment and devices of mobile radio networks: types, features, operation, connections.



3. Commissioning of equipment in fixed and mobile radio



Commissioning procedures.

Parameters and configuration tools on fixed networks, performance and features.

Parameters and configuration tools on mobile networks, performance and features.



4. Test and verification operations in fixed and mobile radio



Instrumentation, features and measurement applications, tools to verify the operation of the equipment.

Instruments for measuring electromagnetic fields.

Measures parameters.

Measures on devices.

Test Procedures.



5. Safety regulations applicable to the commissioning of equipment fixed and mobile radio



Protection and safety measures.

Personal safety standards.



Parameters context of training:





Spaces and facilities:




The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to configuration and commissioning of radio equipment for fixed and mobile networks, which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: FIRST LEVEL MAINTENANCE OF EQUIPMENT RADIOCOMMUNICATION
fixed and mobile networks




Level: 2





Code: MF1212_2





Associated with UC: Maintain and troubleshoot first-level radio systems fixed and mobile networks





Duration: 210

hours





Capabilities and evaluation criteria:



C1: Identify the physical structure of radio equipment for fixed and mobile networks, modules and units that form, to facilitate maintenance and replacement of damaged units.

CE1.1 Sort the types of fixed and mobile radio networks as technology and standards used and the function they perform.

CE1.2 Perform block diagram of the various radio equipment forming the fixed and mobile networks.

CE1.3 Explain the internal structure and functional blocks of radio equipment for fixed and mobile networks, enumerating and describing the different functional parts thereof, according to technology and standards.

CE1.4 Explain the technical characteristics and identify the specific parameters of each of the modules and radio units of a system of fixed and mobile networks according to technical specifications.

CE1.5 Describe the service protection systems (redundant systems) against malfunction and / or possible problems propagation incorporating the radio equipment of fixed and mobile network.

CE1.6 Describe the type of installation of radio equipment of fixed and mobile networks by identifying the 'subframes' and units that form.

CE1.7 In a duly characterized, description of the physical structure of fixed and mobile equipment from radio documentation practical course:

- Describe the units of the different modules, relating the real elements with the symbols shown in the diagram.

- Explain the type, features and functionality of the units.

- Quote functional blocks, explaining its type and characteristics.

- Describe the variation in the parameters characteristic of the units forming equipment, making changes in them, explaining the relationship between the detected effects and causes that produce them.

- Develop a memory report of the activities and results, structuring them in sections necessary for proper documentation thereof.

C2: Apply to equipment and auxiliary systems of fixed and mobile radio preventive maintenance procedures to ensure operation and minimize or avoid service cuts.

CE2.1 Recognize preventive maintenance procedures to be applied to the various teams of networks of fixed and mobile radio.

CE2.2 Identify feeding systems and ventilation equipment radio, and the various auxiliary elements required, taking into account its functionality.

CE2.3 In a practical course, properly characterized, preventive maintenance of a base of a mobile network to maintain service and system functionality station:

- Identify the various equipment and items to maintain.

- Comply with established safety standards.

- Perform visual inspection of the alarm indicators, power wiring and connection of the heating system.


- Check and clean ventilation units and equipment batteries and power systems, and if necessary replace them.

- Perform software updates.

- Register the activities and incidents produced according to specified formats.

CE2.4 In a practical course, properly characterized, preventive maintenance of a mobile radio network controller to maintain service and system functionality:

- Identify the different elements to maintain.

- Comply with established safety standards and perform visual inspection of the alarm indicators, power cabling and connection.

- Check and clean ventilation units and equipment batteries and power systems, and if necessary replace them.

- Make backups of configuration and software updates.

- Check level of occupancy of the hard drives, occupancy rate of the transmission lines, and the CPU.

- Register the activities and incidents produced according to specified formats.

CE2.5 In a practical course, properly characterized, preventive maintenance of a fixed network radio terminal to maintain service and system functionality:

- Identify the different elements to maintain.

- Comply with established safety standards.

- Perform visual inspection of the alarm indicators, power cabling and connection.

- Check and clean ventilation units and batteries of equipment, and if necessary replace them.

- Make backups of configuration and software updates.

- Register the activities and incidents produced according to specified formats.

C3: Identify alarms, describing the incident types and repair faults first level of the devices and radio equipment for fixed and mobile networks, following some given specifications.

CE3.1 first Sort alarms own devices and equipment fixed and mobile radio level to facilitate the diagnosis of incidents taking into account the technical specifications.

CE3.2 identify incidents that occur first level alarms on devices and radio equipment for fixed and mobile networks, linking them with each unit in order to detect possible malfunctions.

CE3.3 Describe the connection and the type of input signals and output units forming radio equipment to avoid errors during the repair of the fault.

CE3.4 Sort typical radio equipment for fixed and mobile networks that have to do with radio services failures.

CE3.5 Explain systematic troubleshooting procedures and troubleshooting situations to restore communications service interruption.

Quote CE3.6 software functionality of local management applications for use in the detection, treatment and resolution of alarms that have radio equipment.

CE3.7 In a practical course, properly characterized, alarm detection and resolution:

- Inspect visual indicators showing radio equipment to locate the alarm.

- Interpret the computer documentation, identifying the various functional blocks and characteristic parameters.

- Use local management applications for information on the alarm and to characterize the impact it has on the network.

- Measure and interpret signals and parameters of radio equipment, making the necessary adjustments, according to its documentation and using appropriate instruments.

- Locate the device responsible for the failure, making modifications and / or replacements necessary for such location with the prescribed quality, following standard procedures in a timely manner.

- Register the activities and incidents produced according to specified formats.

CE3.8 In a practical course, properly characterized, troubleshooter, perform the replacement of a defective unit, following the established procedure:

- Comply with established safety standards.

- Determine whether necessary or not to cut the power to the unit to proceed with the replacement and check the wiring to prevent labeling errors after replacing wiring.


- Select suitable for the extraction of the cables connected to the unit and to remove the unit 'subframe' and check the compatibility of the replacement drive with the broken tools.

- Identify the hardware configuration of the unit to replace if necessary, to set the replacement drive, and insert the new unit.

- Check the disappearance of alarms associated both hardware and at the level of local management software.

- Use local management applications to verify operation and update the inventory of units and record the activities and incidents produced according to specified formats.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.7; C2 respect to CE2.3, CE2.5 CE2.4 and; C3 and CE3.8 CE3.7 respect.
Other capabilities
:

Finish work according to criteria of suitability, speed, economy and efficiency.

Challengers set goals that involve a level of performance and efficiency than previously achieved.

Demonstrate stress resistance, stability of mood and impulse control.

Interpret and execute instructions work.

Acting quickly in difficult situations and not just wait.

Demonstrate flexibility to understand the changes.



Contents:





1. Physical Architecture of fixed radio networks



Physical architecture of a radio system fixed network.

Radio radio terminals fixed network internal structure and functional blocks, units and modules that form, mounting types.



2. Physical architecture of mobile radio networks



Physical architecture of a mobile radio system network.

Base stations of mobile radio networks: internal structure and functional blocks; mounting types. Mobile radio network controllers: internal structure and functional blocks; mounting types.



3. Antennas and service protection systems



Antennas: Antenna types ( 'arrays', omni, parabolic), the concept of polarization antennas.

Service protection systems (redundancy).



4. Operations preventive maintenance of equipment and devices fixed networks and mobile radio



Tools, for installing and setting up radio equipment.

Base maintenance, network controller, radio station terminals and antennas.

Power Systems (rectifiers, batteries and generators): characteristics and measurements to be made, electrotechnology regulation characteristics circuit breakers and fuses, power system wiring, grounding systems, relays.

Air conditioning systems.

Transmission media: coaxial cables, waveguides; identifying types of cables and connectors; Waveguide pressurization systems.

Instruments and measurement procedures for radio equipment.

Conditions for proper operation: maximum curvature, influence of near electromagnetic fields, humidity.



5. Diagnostics and troubleshooting in first-level incidents in fixed and mobile radio



Types of faults.

Diagnostic procedures and troubleshooting.

Diagnostic tools: management systems local network and centralized.

Troubleshooting during top-level incidents.



6. Safety equipment maintenance applicable to fixed and mobile radio



Protection and safety measures.

Personal safety standards.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to maintenance and troubleshooting of top-level radio systems fixed and mobile networks, which will be accredited by one of the following two ways:


- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XV


Professional qualifications: Administration and Programming Systems Enterprise Resource Planning and Customer Relationship Management



Professional Family: Computers and Communications





Level: 3





Code: IFC363_3





General competence



Install, configure and manage systems, enterprise resource planning and management of customer relationships (CRM-ERP: Enterprise Resource Planning - Customer Relationship Management), adapting them by scheduling software components from a specification design, in order to support the business rules of the organization, and ensuring its operation within the organizational parameters of the company.



Competence units



UC1213_3 install and configure systems, enterprise resource planning and customer relationship management

UC1214_3: Managing systems enterprise resource planning and customer relationship management

UC1215_3: Develop and maintain software components in an enterprise resource planning and customer relationship management



Professional environment





Professional field



Develops his professional activity in the IT department dedicated to management and scheduling systems enterprise resource planning and customer relationship management (CRM ERP-systems), public entities or private nature, size companies small / medium / large or micro, both self-employed and others, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



It is located mainly in the service sector, subsector computer consulting and application development or in any productive sector that use integrated systems for enterprise resource planning and customer relationship management for management.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.

System administrators enterprise resource planning and customer relationship management
Developers of software components
systems enterprise resource planning and customer relationship management



Associate Training

(600 hours)





Training modules



MF1213_3: Installing and configuring systems enterprise resource planning and customer relationship management (150 hours)

MF1214_3: Systems Management enterprise resource planning and customer relationship management (210 hours)

MF1215_3: Creation and maintenance of software systems components in enterprise resource planning and customer relationship management (240 hours)



UNIT OF COMPETENCE 1: Install and configure SYSTEMS ENTERPRISE RESOURCE PLANNING AND MANAGEMENT OF RELATIONS WITH CUSTOMERS





Level: 3





Code: UC1213_3





professional accomplishments and performance criteria:



RP 1: Install and configure the data warehouse system (data warehouse) in ERP-CRM systems for exploitation, following technical specifications received and according to the needs of the organization.

CR 1.1 The server computer on which the data warehouse is installed is configured to host it, following technical specifications received and product guides.

CR System 1.2 software data store is installed and configured on the servers for its operation, following the manufacturer's recommendations and guidelines and indications of experts or consultants.


CR 1.3 migration tools and installation of components in development environments, testing and exploitation of data warehouse software, configured to perform adaptive and corrective maintenance and verification themselves before releasing them for use by the end user in as technical and organizational needs specifications.
CR 1.4
tests installation and system configuration data store are performed to verify functionality, technical specifications and requirements following implantation.

CR 1.5 The relevant details of the installation and system test data store, and the impact produced during the process are reflected in the documentation to keep track and monitor the work, following the procedure established by the organization.

RP 2: Install and configure the enterprise resource planning (ERP) for further adaptation to the peculiarities of the company and exploitation, following technical specifications received and according to the needs of the organization.

CR 2.1 The server computer on which the enterprise resource planning is installed is configured to host it, following technical specifications received and product guides.

CR 2.2 ERP system software is installed and configured on the servers for its operation, following the manufacturer's recommendations and guidelines and indications of experts or consultants.

CR 2.3 Access services are installed and configured so that users can work with the ERP system, following the guidelines and product recommendations and policies of the organization.
CR 2.4
remote support infrastructure ERP system is installed and configured so that the maintenance company to make such a support, under conditions and agreed protocols and security policy of the organization.

CR 2.5 migration tools and installation of components in development environments, testing and exploitation, ERP systems are configured to perform adaptive and corrective maintenance and verification themselves before releasing them for use by the end user, following techniques and according to needs of the organization specifications.
CR 2.6
tests installation and configuration of ERP system are performed to verify functionality, following specifications received and according to implementation needs.

CR 2.7 Relevant details of the installation and testing ERP system, and the impact produced during the process are reflected in the documentation to keep track and monitor the work, following the procedure established by the organization.

RP 3: Install and configure the system customer relationship management (CRM) for further adaptation to the peculiarities of the company and exploitation, following technical specifications received and according to the needs of the organization.

CR 3.1 server computer on which the management system is installed customer relationship is set to host it, following technical specifications received and product guides.

CR 3.2 CRM software system is installed and configured on the servers for its operation, following the manufacturer's recommendations and guidelines and indications of experts or consultants.

CR 3.3 Access services are installed and configured so that users can work with the CRM system, following the guidelines and product recommendations and policies of the organization.
CR 3.4
remote support infrastructure CRM system is installed and configured so that the maintenance company to make such a support, under conditions and agreed protocols and security policy of the organization.

CR 3.5 migration tools and installation of components in development environments, testing and exploitation, CRM systems are configured to perform adaptive and corrective maintenance and verification themselves before releasing them for use by the end user, following techniques and according to needs of the organization specifications.

CR 3.6 Testing Installation and Configuration CRM system are performed to verify functionality, following specifications received and according to implementation needs.


CR 3.7 Relevant details of the installation and testing system CRM, and the impact produced during the process are reflected in the documentation to keep track and monitor the work, following the procedure established by the organization.



Professional background:





Production facilities:



IT equipment. Hardware equipment required for installation of an enterprise resource planning, management and customer relationship data warehouse. Communications infrastructure. Operating system software and its installation and configuration tools. Software Databases and installation and configuration tools. Software Installation each of the systems, free or proprietary: ERP, CRM, data warehouse and other horizontal modules. Remote support software tools.



Products and results:



ERP systems, CRM and store data installed and configured. initial charge and / or data migration.



Information used or generated:



Guides and manuals installation of the operating system and data management. Guides and installation manuals of the various systems of ERP, CRM and data warehouse. Installation manuals other business management modules. Implementation plan and guidelines for documentation of the organization. Documentation prepared on installation and configuration of the systems implemented and the initial charge and / or data migration performed. Inventory incidents. Installation and testing reports.



COMPETITION UNIT 2: MANAGE SYSTEMS ENTERPRISE RESOURCE PLANNING AND MANAGEMENT OF RELATIONS WITH CUSTOMERS





Level: 3





Code: UC1214_3





professional accomplishments and performance criteria:



RP 1: Manage the data warehouse (data warehouse) to maintain and ensure its operation, according to the criteria established by the organization and the product manufacturer's recommendations.

CR 1.1 access service decided by the organization is managed and maintained so that administrators can work with the data warehouse system, following the guidelines and recommendations of the product and security policies of the organization.

CR 1.2 system monitoring tools data warehouse used for the detection of processes that overload and collapse the system, following technical and organizational needs according to specifications.

CR 1.3 data extraction processes and other background processes are monitored and tracked, following the guidelines and procedures.
CR 1.4
incidents detected or reported are resolved to maintain system stability data warehouse, according to the technical documentation and following the instructions received, provided that there are these and correspond to the organization; otherwise the manufacturer or the contractor are reported and recorded to manage the maintenance contract.

CR 1.5 The new components and software elements of data storage system are installed in environments development, testing and operation, and configured to perform maintenance and check them before releasing them for use by CRM systems and ERP, following technical and organizational needs according to specifications.
CR 1.6
processes performed and the impact produced in the administration are reflected in the documentation to keep track and monitor the work, following the procedure established by the organization.

RP 2: Managing enterprise resource planning (ERP) to maintain and ensure its operation, according to the criteria established by the organization and the product manufacturer's recommendations.

CR 2.1 access service decided by the organization is managed and maintained so that users can work with enterprise resource planning, following the guidelines and recommendations of the product and security policies of the organization.
CR 2.2
monitoring tools ERP system are used for the detection of processes that overload and collapse the system, following specifications received and according to needs of the organization.

CR 2.3 data extraction processes and other background processes are monitored and tracked, following the guidelines and procedures.


CR 2.4 incidents detected or reported are resolved to maintain the stability of the ERP system, according to documentation and following the instructions received, provided that there are these and correspond to the organization; otherwise the manufacturer or the contractor are reported and recorded to manage the maintenance contract.

CR 2.5 tools saturation control system and the delay in access to data manager are managed to refine and optimize the use of the ERP system, according to technical specifications and needs of the organization.

CR 2.6 The new components and software ERP system elements are installed in environments development, testing and operation, and configured to perform maintenance and check them before releasing them for use by the user end, following technical and organizational needs according to specifications.
CR 2.7
processes performed and the impact produced in the administration are reflected in the documentation to keep track and monitor the work, following the procedure established by the organization.

RP 3: Managing system customer relationship management (CRM) to maintain and ensure its operation, according to the criteria established by the organization and the product manufacturer's recommendations.

CR 3.1 access service decided by the organization is managed and maintained so that users can work with the CRM system, following the guidelines and recommendations of the product and security policies of the organization.
CR 3.2
monitoring tools are used CRM system for the detection of processes that overload and collapse the system, following technical and organizational needs according to specifications.

CR 3.3 data extraction processes and other background processes are monitored and tracked, following the guidelines and procedures.
CR 3.4
management tools are managed CRM system to facilitate management of all elements of the CRM system, following the guidelines and procedures.

CR 3.5 or communicated Detected issues are resolved to maintain stability CRM system, following documentation and instructions, provided that there are these and correspond to the organization; otherwise the manufacturer or the contractor are reported and recorded to manage the maintenance contract.

CR 3.6 tools saturation control system and the delay in access to data manager are managed to refine and optimize the use of CRM system, following technical and organizational needs according to specifications.

CR 3.7 The new software components and system elements are installed in CRM development environments, testing and operation, and configured to perform maintenance and check them before releasing them for use by the user end, following technical and organizational needs according to specifications.
CR 3.8
processes performed and the impact produced in the administration are reflected in the documentation to keep track and monitor the work, following the procedure established by the organization.

RP 4: Implement safety procedures ERP systems, CRM and data warehouse to ensure controlled access and data integrity, meeting the needs of the organization.
CR 4.1
operations backup of data in ERP systems, CRM and data warehouse are made to prevent loss, following established procedures and following the policy established by the organization.

CR 4.2 The creation and management of users, roles and profiles is made to meet the requests related to access to ERP systems, CRM and data warehouse and its various modules, following specifications received and according to needs of the organization .

CR 4.3 components that are accessed from the CRM are configured to ensure that they can only access them who should, following the guidelines and procedures and according to the security policy of the organization.

CR 4.4 Data used ERP systems, CRM and data warehouse subject to the Data Protection Act (LOPD) are identified and reported to the security department to take the necessary measures, following the procedures established .


CR 4.5 The processes performed as well as those produced incidents are reflected in the documentation to keep track and monitor the work, following the procedure established by the organization.

CR 4.6 The procedures for making backup copies and levels of these copies are planned according to the needs of the organization, from the time of making copies of recovery times, storage spaces required and the validity of historical copies.
CR 4.7
verification tests backups are performed and verified its functionality in response to the quality specifications of the organization and the applicable regulations.

CR 4.8 Backups are labeled and stored for later retrieval according to the quality standards of the organization, specifications of the security plan of the organization and legal regulations.
CR 4.9
backups are recorded in an inventory for identification and retrieval, according to the safety regulations of the organization and the applicable regulations.
CR 4.10
documentation procedures for obtaining and verifying backups as well as contingency plans and troubleshooting is constructed according to the rules of the organization and the applicable regulations.



Professional background:





Production facilities:



IT equipment. operating systems and databases. ERP, CRM and data warehouse. User management tools and management permissions to resources in ERP, CRM and data warehouse. Performance monitoring tools in ERP, CRM and data warehouse. Process monitoring tools in ERP, CRM and data warehouse. Monitoring tools memory usage in ERP, CRM and data warehouse. Monitoring tools storage device management ERP systems, CRM and data warehouse. Stress test tools in pre-exploitation in ERP, CRM and data warehouse.



Products and results:



ERP systems, CRM and integrated data store managed and operating correctly. Performance ERP systems, CRM and data warehouse appropriate operating parameters. ERP systems, CRM and store safe and sound in access and resource utilization data. Backup.



Information used or generated:



Operating manuals. Manuals operating system management and data management. Manuals and guides management of the various systems of ERP, CRM and data warehouse. Guidelines for documentation of the organization. Operating Plan of the organization. Manuals monitoring tools. Graphics and performance analysis. Listings user access and restrictions. Incident report. Action protocol to incidents. current data protection legislation. internal rules of the organization. Backup inventory. Inventory incidents. Backup plan. Contingency plan for backups.



COMPETITION UNIT 3: MAKING AND KEEPING SOFTWARE COMPONENTS IN A enterprise resource planning AND CUSTOMER RELATIONS MANAGEMENT





Level: 3





Code: UC1215_3





professional accomplishments and performance criteria:



RP 1: Perform maintenance data dictionary and reference systems enterprise resource planning and customer relationship management (CRM ERP-systems) for the extraction and subsequent processing of information, following design specifications established.

CR 1.1 data dictionary objects and their relationships are created and maintained using the tools provided by the ERP-CRM systems, following design specifications received and internal rules of the organization.

CR 1.2 tools and query languages ​​and handling provided by the ERP-CRM systems are used to extract information contained therein, following the specifications received, according to its characteristics and in compliance with applicable rules on data protection.

CR 1.3 Access to data managers is performed to extract information using tools and languages ​​provided by the ERP-CRM systems, following the specifications received and the characteristics thereof.


CR 1.4 The tasks performed are documented for registration and subsequent use following rules of the organization.

CR 1.5 Data and information are extracted safely by following the quality standards of the organization and the applicable rules on data protection.

RP 2: Create and maintain software components to manipulate and load information systems enterprise resource planning and customer relationship management (CRM ERP-systems) using languages ​​and tools provided, following established design specifications.

CR 2.1 The tools provided by the ERP-CRM systems are used to manage data and generate forms and lists, following technical specifications and meeting the needs of use.
CR 2.2
elements own programming language used to create components that handle the data contained in ERP-CRM systems, following techniques and according to the needs of the organization specifications.
CR 2.3
processes to automate data extractions ( 'batch inputs') are created using the tools and languages ​​provided by the ERP-CRM systems, following the specifications received and the characteristics thereof.

CR 2.4 software components are maintained and modified to add new functionality to ERP-CRM systems, according to needs of the operation of the system.

CR 2.5 software developed or modified components are tested to demonstrate the added or changed functionality in ERP-CRM systems, complying with the rules of the organization.

CR 2.6 software components created on ERP-CRM systems are documented for registration and subsequent use, in line with the rules of the organization.

RP 3: Develop components and system consultations within the data warehouse (data warehouse) to store and collect information ( 'data mining'), established according to design specifications.

CR 3.1 The information structures (cubes, multicubos) and their relationships are implemented to store corporate information system data warehouse and easy handling, following technical and design specifications, meeting standards of the organization.

CR 3.2 data sources that make up the data warehouse system are managed so that they are available, according to needs and fulfill safety standards of the organization.
CR 3.3
withdrawals system information store and integrate data are generated according to criteria of efficiency, following technical specifications as standards organization and with the applicable rules on data protection.

CR 3.4 Extracting data from the external system is configured by defining the communication structure, transfer and transfer rules, following technical specifications as standards organization and with the applicable rules on data protection.

CR 3.5 The software components are created to gather information from data warehouse system and the source system using query languages ​​and handling, according to technical specifications and in compliance with applicable rules on data protection.

CR 3.6 software components created and consultations are documented for registration and subsequent use following rules of the organization.



Professional background:





Production facilities:



IT equipment. operating systems and data managers. ERP, CRM and data warehouse. Tools and query languages ​​and data manipulation systems ERP, CRM and data warehouse. Design specifications. Technical specifications. Rules of the organization. Programming languages. Test tools and software verification. Documentation tools.



Products and results:



Query components, forms and lists for obtaining and handling data in ERP, CRM and data warehouse. Components for data extraction systems ERP, CRM and data warehouse.



Information used or generated:




Operating manuals operating system and database. Operating manuals of different systems of ERP, CRM and data warehouse. Manuals of languages ​​and tools for manipulating information in ERP, CRM and data warehouse. Guidelines for documentation of the organization. Operating Plan of the organization. Documentation developed components. Applicable rules on data protection. internal regulations of the organization. Technical specifications. Test plan. Data documentation and components.



Training Module 1: INSTALLATION AND CONFIGURATION SYSTEMS ENTERPRISE RESOURCE PLANNING AND MANAGEMENT OF RELATIONS WITH CUSTOMERS





Level: 3





Code: MF1213_3





UC Associate install and configure systems, enterprise resource planning and customer relationship management





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Identify the functionality and configuration parameters and install the data warehouse system in ERP-CRM systems for further exploitation, following deployment models and using manual installation and configuration.

CE1.1 Distinguishing features and general characteristics of the systems store data in ERP-CRM systems to determine the options that arise during installation, using schematics and diagrams.

CE1.2 Identify the different components and modules of a data warehouse system in ERP-CRM systems to add different features to it, defining different types of implementation.

CE1.3 Recognize the parameters of system configuration data warehouse ERP-CRM systems to adjust its operation, according to the installation guide.

CE1.4 Recognize the necessary elements to connect the data warehouse system with the ERP system for data collection.

CE1.5 Explain the transport system components between different development environments, testing and operation and data warehouse system, to initiate flow modification and verification before being released for use by the user end, according to technical specifications.

CE1.6 In a practical course, properly characterized, installation and configuration of a data warehouse system within ERP-CRM systems for subsequent operation following the manuals and installation guides:

- Perform software installation data store using wizards and taking into account the various modules to implement, also installing the required patches for operation following indications installation guides.

- Set and adjust parameters of the data warehouse, ERP and CRM, running scripts and configuration using tools provided by the system, following installation and configuration guides.

- Test the connection and data flow between the system data warehouse and ERP systems and CRM.

- Set of transporting objects between different environments.

- Conduct tests to ensure the functionality of the installation.

- Documenting procedures performed as specified formats.

C2: Identify the functionality and configuration parameters and install the ERP system for further exploitation, following deployment models and using manual installation and configuration.

CE2.1 Distinguishing features and general characteristics of ERP systems to determine the options that arise during installation, using schematics and diagrams.

CE2.2 Identify the different components and modules of an ERP system: finance, sales and purchases, among others, to add different features to it, defining different types of implementation.

CE2.3 recognize the configuration parameters of the ERP system to adjust its operation, taking into account the different implementation models by economic sector and type of exploitation.
Distinguish CE2.4
access services for clients and their configuration parameters for connecting users to the ERP system.

CE2.5 Identify the configuration parameters required to install remote support infrastructure, depending on the features of this service.

CE2.6 Recognize the necessary elements to connect ERP system with other systems such as deployment types.


CE2.7 Explain the transport system components ERP systems among different development environments, testing and operation, to start the flow modification and verification before being released for use by the end user, according to technical specifications.

CE2.8 In a practical course, properly characterized, installation and configuration of an ERP system for its operation, following the manuals and installation and configuration guides:

- Perform software installation ERP system using wizards and taking into account the various modules to implement, also installing the required patches for operation.

- Set and adjust parameters of the ERP system, using and running configuration scripts and tools provided by the system.

- Install and configure the environment access services to customers.

- Install and configure remote support infrastructure.

- Set transporting objects between different environments.

- Testing to verify the operation together with the operating system and data management.

- Documenting procedures performed as specified formats.

C3: Identify the functionality and configuration parameters and install the CRM system for further exploitation, following deployment models and using manual installation and configuration.

CE3.1 Distinguishing features and general characteristics of CRM systems to determine the options that arise during installation, using schematics and diagrams.

CE3.2 Identify the different components and modules of a CRM system (mobility and call center, etc.) to add different features to it, defining different types of implementation.

CE3.3 recognize the configuration parameters CRM system to adjust its operation, distinguishing deployment models by economic sector and type of exploitation.
Distinguish CE3.4
access services for clients and their configuration parameters for connecting users to the CRM system.

CE3.5 Identify the configuration parameters required to install remote support infrastructure, depending on the features of this service.

CE3.6 Recognize the necessary elements to connect CRM system with ERP system, to obtain data that need.

CE3.7 Explain the transport system CRM system components among different development environments, testing and operation, to start the flow modification and verification before being released for use by the end user, according to technical specifications.

CE3.8 In a practical course of installation and configuration of a CRM system for its operation, manuals and installation and configuration guides following:

- Perform the installation of CRM software system using wizards and taking into account the various modules to implement, also installing the required patches for operation.

- Set and adjust system parameters using CRM and running scripts and configuration tools provided by the system.

- Install and configure the environment access services to customers and remote support infrastructure.

- Set of transporting objects between different environments.

- Carry out tests to verify the operation of the installation and configuration.

- Documenting procedures performed as specified formats.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 respect to CE2.8; C3 respect CE3.8.
Other capabilities
:
Demonstrate interest
extensive knowledge of the organization and its processes.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Demonstrate stress resistance, stability of mood and impulse control.

Used to the pace of work of the organization.



Contents:





1. ERP systems



Architecture and features of an ERP system.

Organization company, characteristics of the functional modules of an ERP system.

The basic module in an ERP system operational functions.


Modules of an ERP system: description, type and interconnection between modules.



2. Systems CRM



Architecture and features of a CRM system.

Organization of a company and its external relations, characteristics of electronic business (e-business).

The basic module in a CRM system operational functions.

Features of the functional modules of a CRM system, typology, interconnection between modules.



3. Systems Data Warehouse (data warehouse) in ERP-CRM systems



Architecture and characteristics of data warehouse systems on ERP-CRM systems. Use and advantages of data warehouse systems in the company.

Components modules and data warehouse systems.



4. Installation, configuration and software update data warehouse



System Installation Process data warehouse.

System configuration parameters datastore, definition, types and characteristics. System Update Datastore and application updates.

System connection data warehouse with ERP systems and CRM: features and settings.

Development environments, testing and operation of data warehouse systems: installation and configuration of the transport system.

Performance testing.

Error Log.

Documentation installation and configuration data store.



5. Installation, configuration and updating the ERP system



Installation Process ERP system.

Configuration parameters ERP system: description, type and use.

Update ERP system and application updates.

Other modules, features and installation.

Services access to the ERP system: characteristics and configuration parameters, installation. Development environments, testing and operation; installation, configuration of the transport system.

The remote technical assistance in the ERP system: installation and configuration.

Performance testing.

Documentation installation and configuration of ERP system.



6. Installation, configuration and updating the CRM system



Installation processes CRM system.

Configuration parameters CRM system, definition, types and characteristics.

Update CRM system and application updates.

Other modules, features and installation.

Services access to CRM system: characteristics and configuration parameters, installation. Development environments, testing and operation of CRM systems: installation and configuration of the transport system.

The remote technical assistance in the CRM system: installation and configuration.

Performance testing.

Documentation installation and configuration of CRM system.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the installation and configuration of systems, enterprise resource planning and customer relationship management, which is evidenced by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: MANAGEMENT SYSTEMS ENTERPRISE RESOURCE PLANNING AND MANAGEMENT OF RELATIONS WITH CUSTOMERS





Level: 3





Code: MF1214_3





Associate UC: Managing systems enterprise resource planning and customer relationship management





Duration: 210

hours





Capabilities and evaluation criteria:




C1: Identify the data warehouse processes, monitor them and resolve incidents that occur to maintain the functionality and performance of the system, following techniques and specifications according to usage needs.

CE1.1 Describe the data warehouse parameters that influence their performance, according to technical specifications.

CE1.2 Describe the main data warehouse processes and characteristics of monitoring tools for tracking purposes.

CE1.3 Use tools that evaluate store performance data to detect problems and code performance thereof, among others, and correct them, following the technical specifications received.

CE1.4 Detail procedures for monitoring and incident detection data warehouse to proceed with its resolution or scaled to the top level, following the indications of technical manuals and specifications received administration.

CE1.5 In a practical course, properly characterized, troubleshooter based on an ERP, CRM and data warehouse in which an incident occurs on the data store and following technical specifications given system:

- Analyze the detected symptoms, recognizing performance parameters affected and identify the processes involved that should be monitored using appropriate tools.

- Resolve incidents using the appropriate procedures and technical manuals administration or escalate them to the next level.

- Check the operation of the system, once solved the problem.

- List and quantify improvements in system performance shares obtained after applying for it.

- Describe procedures backtracking in anticipation that the changes do not produce the desired effect.

- Documenting the operations performed on the system to be applied if the circumstances reproduce again, as specified formats.

C2: Identify ERP system processes, monitor them and resolve incidents that occur to maintain the functionality and performance of the system, following techniques and specifications according to usage needs.

CE2.1 Describe ERP system parameters that influence their performance, according to technical specifications.

CE2.2 Describe the main processes of the ERP system and the characteristics of monitoring tools for tracking purposes.

CE2.3 Use tools that evaluate the performance of the ERP system to detect code issues and performance thereof, among others, and correct them, following the technical specifications received.

CE2.4 Detail procedures for monitoring and detection of incidents ERP system to proceed with the resolution or scaled to the top level, following the indications of technical manuals and specifications received administration.

CE2.5 In a duly characterized troubleshooter from the simulation of poor performance or failure of execution of one or more processes and an occupancy rate of 100% practical course server memory on a system ERP, using stress generation tools in 'pre-exploitation':

- Capture the basic performance data (number of processes running, percentage of memory used by process) using tools for performance.

- Analyze the data sorting, classifying, grouping them and making graphs.

- Check that the environment meets the hardware and software requirements determined by the manufacturer.

- If loss of performance or failure is reproducible, determine the steps to play and do it without other users connected to know which item causes the problem.

- If loss of performance or failure is not reproducible, increase levels of trace components of the server and wait recur loss to determine their causes and play voluntarily.

- Documenting tasks and incidents produced according to specified formats.

C3: Identify CRM system processes, monitor them and resolve incidents that occur to maintain the functionality and performance of the system, following techniques and specifications according to usage needs.

CE3.1 Describe CRM system parameters that influence their performance, according to technical specifications.

CE3.2 Describe the main processes of the CRM system and the characteristics of monitoring tools for tracking purposes.


CE3.3 Use tools that evaluate the performance of the CRM system to detect code issues and performance thereof, among others, and correct them, following the technical specifications received.

CE3.4 Detail procedures for monitoring and detection of incidents CRM system to proceed with the resolution or scaled to the top level, following the indications of technical manuals and specifications received administration.

CE3.5 In a practical course, properly characterized Telephony Integration - Computer (CTI) in which the management tool CTI do not appear to users who need CRM system:

- Check that the communications server and the CTI driver installed and running.

- Check communications settings, especially those that refer to the maximum number of active sessions per agent communications.

- Check that there are no orphan communications sessions (active server without user connected to the agent).

CE3.6 In a practical course, properly characterized, failure in response to a browser request for a web client connection to a CRM system:

- Check the environment: browser versions, installed patches, additional software and other hardware requirements, meet product requirements.

- Note the date and time when the error occurred subsequently to verify the error log of the machine that there were no other critical errors that may arise this.

- Enable mechanisms available diagnostic to determine values ​​occupation of CPU, memory occupation, among others, successive occasions that give the error again.

- If the error is reproducible, whether occurs with standard or only application in the application set 'as' by developers. If the error only occurs with the configured application, try disabling different parts of the configuration performed to detect the source of the error.

- If the error is not reproducible, increase levels of trace components of the server and wait for the error recur to determine their causes and play voluntarily.

- Documenting tasks and incidents produced according to specified formats.

C4: Identify the techniques and tools to ensure customer access systems ERP, CRM and data warehouse, following established technical specifications.

CE4.1 Itemize the characteristics of the access channels to ERP systems, CRM and data warehouse.

CE4.2 determine the modules or components of ERP systems, CRM and store data required to allow access through possible channels.

CE4.3 Describe the monitoring procedures of the access channels to ERP systems, CRM and data warehouse to observe their status and performance.

CE4.4 Create users, groups, roles, privileges and authorization profiles to ERP systems, CRM and data warehouse, to ensure access to it and the work of users, according to specifications given.

CE4.5 In a practical course, properly characterized, management of client access to ERP, CRM and data warehouse, following technical specifications given:

- Identify possible access channels in accordance with the requirements set.

- Configure modules or components necessary to create the client connection.

- Configure the connections between ERP, CRM and data warehouse, and 'mobile' system.

- Create users and authorization profiles, associating profiles to users.

- Check the operation of the connection made and users and profiles created and associates.

- Documenting tasks and incidents produced according to specified formats.

C5: Describe the operation and manage the transportation system objects and components between different development environments, testing and operation, to maintain the flow of modifications and verification before being released for use by the end user, according to technical and functional requirements.

CE5.1 Describe the physical and logical architectures development environments, testing and operation of ERP systems, CRM and data warehouse to identify the needs of transport management.


CE5.2 Explain the characteristics of tools transport between development environments, testing and operating systems ERP, CRM and data warehouse, taking into account technical and functional specifications.

CE5.3 Describe the components crossing procedures developed between development environments, testing and operating systems ERP, CRM and data warehouse using specific tools for these products.

CE5.4 In a practical course, properly characterized, transport management components between development environments, testing and operating systems ERP, CRM and data warehouse, following specifications:

- Identify the components involved in transport and possible incompatibilities between them.

- Relate versions in each environment (development, testing and operation) of the product or developed components.

- Check the syntax of the component and possible outcomes of transport.

- List the steps for transport between environments.

- Check summaries transport components and their possible outcomes.

- Documenting tasks and incidents produced according to specified formats.

C6: Identify tools and techniques to ensure the integrity and timeliness of data ERP systems, CRM and data warehouse, following technical specifications.

CE6.1 Interpret the backup plan and carry out their implementation to ensure the integrity of ERP systems, CRM and data warehouse.

CE6.2 2 Describe necessary to take to ensure the integrity and confidentiality of stored and manipulated within ERP systems, CRM and data warehouse information measures, taking into account the applicable rules on data protection.

CE6.3 Describe the physical and logical architecture involved in extraction processes data in ERP, CRM and data warehouse.

CE6.4 Describe the procedures for data extraction (batch inputs) between the ERP and CRM systems and the data warehouse; CRM and data warehouse; and CRM and ERP, identifying and executing extractors to obtain the data.

CE6.5 interpret traces (logs) obtained after the release of data extraction procedures in the system to verify or detect incidents in execution.

CE6.6 In a practical course, properly characterized, data extraction from ERP systems, CRM and data warehouse, received following specifications:

- Prepare data extraction processes (batch inputs) following the specifications received.

- Launch the data extraction procedures.

- Observe the traces (logs) and interpret the results.

- Run extractors data store and display logs produced.

- Identify and correct any incidents that occur in the extraction process.

- Documenting tasks and incidents produced according to specified formats.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 respect to CE2.5; C3 and CE3.6 CE3.5 respect; C4 respect CE4.5; C5 respect CE5.4; C6 respect to CE6.6.
Other capabilities
:
Demonstrate interest
extensive knowledge of the organization and its processes.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Demonstrate stress resistance, stability of mood and impulse control.

Used to the pace of work of the organization.



Contents:





1. Maintenance management systems ERP, CRM and data warehouse



Process ERP systems, CRM and data warehouse.

Parameters influencing systems performance.

Monitoring tools and performance assessment: features and functionality. Traces system (logs). Incidents: identification and resolution.



2. Transport of components between development environments, testing and operating systems ERP, CRM and data warehouse



Version control and management of different environments.
Architectures
different environments depending on the operating system.

The transport system: characteristics and elements involved.

Transport tools, features and functionalities.


Errors in the implementation of transport and solution types.



3. Data extraction processes in ERP, CRM and data warehouse



Features and functionalities.

Execution procedures.

Troubleshooter; execution traces.



4. Security system ERP, CRM and data warehouse


Access channels
systems: features and functionality.

Creating Users, roles and authorization profiles.

Backup on-line / off-line and system restoration; planning.

Management assignments in CRM systems: Creating service allocation rules.

Mapping business processes to services.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to systems management enterprise resource planning and customer relationship management, which is evidenced by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: BUILDING AND MAINTENANCE SYSTEMS SOFTWARE COMPONENTS ENTERPRISE RESOURCE PLANNING AND MANAGEMENT OF RELATIONS WITH CUSTOMERS





Level: 3





Code: MF1215_3





Associate UC: Perform and maintain software components in an enterprise resource planning and customer relationship management





Duration: 240

hours





Capabilities and evaluation criteria:



C1: Identify the data dictionary objects and keep using languages ​​and tools provided by the ERP-CRM systems, following design specifications defined.

CE1.1 Explain the characteristics and elements of the data model used in the ERP and CRM systems, according to specifications set design.

CE1.2 Identify the types of objects and structures that make up the data dictionary ERP-CRM system.

CE1.3 Describe mechanisms that ensure the integrity of the data contained in the data dictionary: primary key, foreign key and referential integrity, among others, according to the data model and logical system design.

CE1.4 Describe the features and functionality of the languages ​​and tools provided by the ERP-CRM system used for creating objects and data structures.

CE1.5 Create objects and data structures and their relationships using languages ​​and tools provided by the ERP-CRM system, according to the data model of the system.

CE1.6 In a practical course, properly characterized, maintenance of data dictionary objects in a logical design and specified data model:

- Identify the objects that make up the logical design.

- Identify the objects to be modified.

- Identify relationships between objects.

- Perform maintenance using tools and languages ​​provided by the ERP-CRM system.

- Documenting procedures performed as specified formats.

C2: Create queries, reports and forms using languages ​​and tools provided by the ERP-CRM system to extract and present information from these, following the design specifications.

CE2.1 Describe the features and functionality of query languages ​​provided by the ERP and CRM systems used for information extraction, according to their technical specifications.


CE2.2 describe the characteristics of the tools provided by the ERP-CRM system to extract and present the information from them, according to their technical and functional specifications.

CE2.3 Explain the characteristics of forms and reports, identifying the types and elements that make up for processing following specifications received.

CE2.4 Present extracted information from the ERP-CRM system forms and reports using tools provided by those following technical specifications and received.

CE2.5 In a practical course, properly characterized, extraction of information from ERP and CRM systems using specific query languages ​​and tools thereof, received following specifications:

- Identify sources containing information to be extracted.

- Perform data extraction operations using the query language.

CE2.6 In a practical course, properly characterized, creation of forms and reports to present information according to a specified design:

- Identify sources containing information to be extracted.

- Identify the display format and items to use as the report or form to be processed.

- Prepare the report or form using the tools provided by the ERP-CRM system.

- Test the functionality of the report or processed form.

- Documenting procedures performed as specified formats.

C3: Identify programming techniques and software components make to modify or add functionality to the ERP-CRM system using programming languages ​​and tools provided by these systems, following the design specifications.

CE3.1 Describe techniques, standards, recommendations and procedures for development of components in ERP-CRM systems following technical specifications.

CE3.2 identify query optimization techniques to improve performance access to large volumes of information in ERP-CRM systems.

CE3.3 Using grammar, syntax and semantics of the programming language provided by the ERP-CRM system for the creation and maintenance of software components, following technical specifications.

CE3.4 Identify and use the tools provided by the system to perform and maintain software components, following technical and functional specifications.

CE3.5 components Identify and create data extraction software in the ERP-CRM system using languages ​​and tools provided following technical specifications.

CE3.6 Explain the methods for using application programming interfaces (APIs) provided by the ERP-CRM system, enabling the development of components from other languages, following functional and design specifications.

CE3.7 In a practical course, properly characterized, building components to manipulate the information in the ERP-CRM system, following design specifications received:

- Identify the source of the data to be handled.

- Prepare the component using the language provided by the ERP-CRM system.

- Optimize consultations on the component.

- Verify and debug the component developed to ensure that perform the required functionality.

- Documenting procedures performed as specified formats.

CE3.8 In a practical course, properly characterized, building components for extraction of data between ERP and CRM, following design specifications received:

- Identify and define transactions and possible types.

- Explain and make the process of transferring data between ERP and CRM.

- Describe the possible mechanisms of automatic data entry into ERP systems and CRM.

- Prepare the component using the language provided by the ERP-CRM system.

- Verify and debug the component developed to ensure that performed the required functionality.

- Documenting procedures performed as specified formats.

C4: Specify the structures and develop components for handling and collection information system data warehouse ERP-CRM systems, following given technical and functional specifications.

CE4.1 Identify the types of information structures (cubes, multicubos) and its necessary to store information in the data warehouse system relations, according to technical specifications.


CE4.2 Identify data sources used to load the data warehouse system, following design specifications.

CE4.3 Explain the mechanisms used to create extractors information in the data warehouse system, following technical and functional specifications.

CE4.4 Create software components to extract information from data warehouse system using query languages ​​and handling provided by the same following specifications received.

CE4.5 In a practical course, properly characterized, collecting information in a data warehouse system:

- Create information structures (cubes and multicubos) and their relations following design specifications.

- Identify and prepare data sources.

- List the steps for loading data into a data warehouse system and describe the charging system logs.

- Documenting procedures performed as specified formats.

CE4.6 In a practical course, properly characterized, extraction of information contained in the data warehouse system, following specifications received:

- Identify data sources.

- Perform extractors using the language provided by the data warehouse system.

- Define the communication structure, transfer and transfer rules for data extraction.

- Run extractors information.

- Documenting procedures performed as specified formats.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.6; C2 and CE2.6 CE2.5 respect; C3 and CE3.8 CE3.7 respect; C4 respect CE4.5 CE4.6 and.
Other capabilities
:
Demonstrate interest
extensive knowledge of the organization and its processes.

Communicate effectively with the right people at all times, respecting the established channels within the organization.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Demonstrate flexibility to understand the changes.

Demonstrate stress resistance, stability of mood and impulse control.

Used to the pace of work of the organization.



Contents:





1. Data models in ERP-CRM systems


Models
data types and characteristics.

Data model definition, classification.

Definition, data types and semantic features.

Defining objects and data structures, characteristics.

Extension of the data model in ERP and CRM systems.



2. The data dictionary ERP-CRM systems



Data dictionary objects: definition and creation.

Tools for creating and maintaining the data dictionary.

Creation, modification and deletion of objects and data structures.

Insertion, modification and deletion of data objects.

Operations query tools.



3. Forms and reports ERP-CRM systems



Forms: elements and features.

Architectures reports, report items.

Tools for creating forms and reports.



4. Techniques and standards for the development of components



Functional components for the development of specifications.

Query optimization techniques and access to large volumes of information.



5. The language provided by the ERP-CRM systems



Features and syntax of the language.

Declaration of data.

Programming structures.

Language statements.

Development environments and development tools in ERP and CRM systems.



6. Programming ERP and CRM systems



Generation data extraction programs between systems ( 'batch inputs').

Extractions of information contained in ERP-CRM systems, data processing.

Function calls, library functions (API).

Debugging a program.

Error handling.



7. System Exploration Data Warehouse (data warehouse)



Information Structures, cubes and multicubos.

Data load processes the data warehouse system.

Tools for loading and extracting data from data warehouse systems. Creating extractors.

Visualization tools and dissemination.



Parameters context of training:





Spaces and facilities:




The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the development and maintenance of software components within an enterprise resource planning and customer relationship management, which is evidenced by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XVI


Professional qualifications: Alarm Management and Supervision in Communication Networks



Professional Family: Computers and Communications





Level: 3





Code: IFC364_3





General competence



Supervise and manage the communications network, resolving incidents communications systems, reprogramming routing traffic and maintaining the quality of services, following the specifications set by the organization.



Competence units



UC1216_3: Monitoring the status and availability of the communications network and the services implemented

UC1217_3: Perform configuration operations and control communications network

UC1218_3: Manage the quality of services supported on the communications network



Professional environment





Professional field



Develops his professional activity in the departments of network monitoring and customer support entities public or private, companies of any size, that have communications network infrastructure both on its own and others, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically, superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



Is located primarily in the communications sector, in the subsectors of communications services, such as communications operators in service maintenance and monitoring of communications networks or in any other sector in which they perform these activities.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.

Managers incidents communications networks
Supervisors

communications networks Supervisors
quality communications networks



Associate Training

(600 hours)





Training modules



MF1216_3: monitoring the communications network and troubleshooting (240 hours)

MF1217_3: Reconfiguration and coordination of work on the communications network (240 hours)

MF1218_3: Managing the quality of the services supported by the communications network (120 hours)



COMPETITION UNIT 1: MONITORING THE STATE AND AVAILABILITY OF COMMUNICATIONS NETWORK SERVICES AND IMPLEMENTED





Level: 3





Code: UC1216_3





professional accomplishments and performance criteria:



RP 1: Monitor the network through visualization and treatment of alarms that have communications equipment and transmission lines, to see their status and locate malfunctions, following procedures established by the organization.
CR 1.1
map elements of the network are reviewed to assess their status following procedures established by the organization.


CR 1.2 The integration of communications equipment in the network map is performed to check them and supervise them, preparing the list of the types of equipment and existing communications platforms and management tools specific to each system are necessary, given communications systems that make up the network.
CR 1.3
processes monitoring communications network designed and executed to check the status and availability in the provision of services, taking into account the network equipment and following specifications of the organization.

CR 1.4 The results of the implementation of monitoring processes are analyzed in order to identify the communications system that presents the alarm, following operating procedures established by the organization.

CR 1.5 Monitoring tools are used to locate the alarms in the communications system and identify communications equipment or transmission lines affected, following procedures established by the organization.
CR 1.6
processes performed in the detection and identification of incidents arising alarms are documented for later use, following the procedures established by the organization.

RP 2: Apply corrective procedures to resolve issues arising from alarms submitted by communications equipment and transmission lines, following the procedures established by the organization.

CR 2.1 tools and centralized remote monitoring of the various communications systems that form the network, are used to obtain information from the failure or breakdown in the operation of communications equipment and transmission lines constituting the system, taking into account the technical documentation thereof.
CR 2.2
incidents in communications equipment and transmission lines are diagnosed indicating the cause of the alarm and its solution is proposed to restore disrupted services, following procedures established by the organization.

CR 2.3 The seriousness of the failure or damage is assessed to determine the impact on the provision of services, taking into account the affected computer communications services supported by him and compliance with service level agreements (SLAs ) established by the organization with customers.

CR 2.4 Decisions on actions to be taken are determined, taking into account the service level agreements (SLAs) established by the organization so that there is no breach thereof, following procedures.

CR 2.5 The incidents detected in the communications equipment and transmission lines are resolved systematically applying the procedures established by the organization, minimizing the impact on the provision of other services and scaling to higher level of responsibility those who do not they have succeeded in solving, according to standards set by the organization.

CR 2.6 tools or remote configuration and core systems that manage communications equipment and transmission lines affected are used to resolve incidents, following procedures established by the organization.

CR 2.7 Correcting impact on communications equipment or transmission line is verified by conducting the tests recommended by the organization and checking the disappearance of alarm monitoring panel, following procedures established by the organization.

CR 2.8 The processes used in the resolution of the incident are documented for later use, following the procedures established by the organization.

RP3: Address user complaints received through channels of customer relating to communications services provided by the organization, following the established procedure.

CR 3.1 Claims that have to do with communications services received through the customer service center, they are met and recorded for treatment through the channels provided by the organization.

CR 3.2 permissions and access to services authorized by the customer to the corresponding incident or complaint, are checked in order to confirm that it is a client of the organization and a service contracted by it, and avoid seeking access not allowed clients, taking into account the rules of the organization on data protection.


CR 3.3 user complaints received are checked to see if they have any relationship with any alarm detected on the network, assign it and continue their diagnosis, following established procedures.

CR 3.4 Claims that do not correspond to any network alarm diagnosed and analyzed to know its type and proceed with resolution using diagnostic tools and analysis of incidents, following the procedures established by the organization.

CR 3.5 The resolution of the claim user is done systematically applying the procedures established by the organization, climbing higher level of responsibility to those whose identification or solution can be found, following the protocols established by the organization.
CR 3.6
claims information, checking and corrective actions taken are documented for further processing, following the procedures established by the organization.

RP 4: To monitor the incidents detected in the network and communications services, to have control of them, following the operating procedures established by the organization.

CR 4.1 The incidence corresponding department according to the organization and functions assigned to them to proceed to their solution, taking into account the rules of the organization is assigned.
CR 4.2
incident management tool is configured and maintained, so it can be accessible by the departments of the organization and by external companies, according to the operating procedures of the organization.

CR 4.3 tools for recording and tracking incidents, are used to control and assigning it to relevant departments, following the notification procedures established by the organization.

CR 4.4 times resolution of incidents are controlled, so that meet the service-level agreement (SLAs) established by the organization, in order to obtain customer satisfaction, taking into account standards the organization.

CR 4.5 The reports and newspapers parts of incidents detected alarms and complaints are made to assess the volume of network failures, time resolution and the time commitment of each of the departments involved in resolution processes and detection of repetitive failures at the intervals marked by the organization.



Professional background:





Production facilities:



Management systems communications systems. 'Videowall' network map in which all communication systems are integrated. Equipment and tools for testing services. Inventory system services. Internal use tools for documenting processes performed. Tools incident management software. Alarm monitoring tools. Flow tools for monitoring alarms. Office tools. computer equipment. Inventory system services. Internal use tools for documenting processes performed. Tools incident management software. Alarm monitoring tools. Flow tools for monitoring alarms. Office tools. computer equipment.



Products and results:



Equipment integrated communications system in the corresponding management system. Availability of the monitored network. Supervised delivery services. Monitoring alarms and events performed. Claims of customers served. Failures and breakdowns in communications equipment solved. Management Tool incidents maintained.



Information used or generated:



Techniques communications equipment specifications. Information about the network architecture. applicable rules, regulations and standards. Quality criteria of the organization. Service-level agreement of the organization (SLAs). Procedures for detection and isolation of problems or failures. Technical documentation management systems and network monitoring tools. Information on the network configuration. Technical documentation of incident management tools and flow alarms. Data protection legislation. Periodic reports of occurrences and claims. Registration of shares detection, isolation, and Troubleshooting assessment and breakdowns.



COMPETITION UNIT 2: CONFIGURATION AND OPERATIONS TO ENGAGE CONTROL COMMUNICATIONS NETWORK






Level: 3





Code: UC1217_3





professional accomplishments and performance criteria:



RP 1: Making temporary changes to the configuration of equipment and systems communications network, to continue to provide service to any incident detected, following procedures established by the organization.

Received CR 1.1 The incidence is isolated and required to be performed on the equipment and systems network communications to continue providing the service concerned, taking into account the rules of the organization works are determined.

CR 1.2 The actions or actions established to continue providing the service run following procedures defined by the organization, ensuring that the other services are not affected by these actions temporarily.

CR 1.3 Changes made on equipment, communications systems or transmission lines are held temporarily for the restoration of the affected service, returning to the original settings or architectures once fixed the issue, following the procedure established by the organization.

CR 1.4 software tools on the network performance and configuration are used remotely to resolve issues and make changes in the configuration of communications equipment, checking processes that support computer system software such as the specifications set by the organization.

CR 1.5 The actions taken are verified and performed functional tests on the changes made to ensure the provision of services, following procedures established by the organization.

CR 1.6 The actions on equipment requiring local travel for work, maintenance departments communicate first level to move to the site of the affected equipment, following the procedures established by the organization.

CR 1.7 The actions and work carried out, documented and manager responsible for the incident are reported to fill the needs of recording and monitoring, in accordance with procedures established by the organization.

RP 2: Monitor and review the inventory of the connections between systems and communications equipment on which services are offered to customers, to keep the data of equipment, systems and connections, following procedures established by the organization.

CR 2.1 The inventory system network and communications services is set and maintained to ensure availability, following procedures established by the organization.

CR 2.2 users and profiles are created to allow access and use the inventory system to different departments of the organization, following established procedures.

CR 2.3 data interfaces, cards, channels and lines, for which the services offered to customers by the organization are implemented, are recorded in the inventory of connections for control, following established procedures.

CR 2.4 Registration of new data services implemented is found in the inventory system of the company, to provide that information centrally, following established procedures.

CR 2.5 The inventory is kept updated by recording all updates and modifications on communications equipment serving to fill the needs of registration and following the procedures established by the organization.

RP 3: Track and coordination of the actions and work carried out by other departments of the communications network in order to guarantee the quality and availability of services offered by the organization, following established procedures.
CR 3.1
Works hardware and software update made on the communications network are analyzed in order to identify the network part and the departments concerned before the performance, taking into account the technical specifications of it.

CR 3.2 The upgrade jobs hardware and software to make communications on the network are coordinated and authorized, in order to minimize the impact of outages during the same, following the procedures established by the organization.

CR 3.3 The coordination of the work is done using specific software tools so that they are all registered, according to the specifications of the organization works.


CR 3.4 Contingency plans are interpreted and reviewed to ensure rapid restoration of service to failures in work on the network, as operating procedures of the organization.

CR 3.5 The performance of work on the network can be the right people following the procedures established by the organization, so that jobs are executed in compliance with established safety standards.
CR 3.6
failures notifications sent by network devices are disabled in the element itself in order not to report alarms to monitoring systems, according to established specifications.
CR 3.7
verification processes service recovery are performed to ensure the provision thereof, following the procedures established by the organization.



Professional background:





Production facilities:



Management systems communications systems. Equipment and tools for testing services. Inventory system services. Inventory connections. Control tools work network. Internal use tools for documenting processes performed. Tools incident management software. Office tools. Operating systems. computer equipment.



Products and results:



Changes architecture and configuration for continuity of service. Service operation and configuration architecture changes. System maintained and updated inventory. Monitoring and coordination of actions performed on the network. Authorization of the work of software and hardware changes made.



Information used or generated:



Documentation of work and procedures to be performed. Specifications communications equipment. Information on the network configuration. Inventories communications equipment. Information about the network architecture. applicable rules, regulations and standards. Quality criteria of the organization. Service-level agreement of the organization. Technical documentation management systems. Quality standards of work done on the network. Contingency plans of the organization. User manuals operating system.



COMPETITION UNIT 3: MANAGE THE QUALITY OF SERVICES SUPPORTED ON COMMUNICATIONS NETWORK





Level: 3





Code: UC1218_3





professional accomplishments and performance criteria:



RP 1: Monitoring the performance of the communications network to ensure quality of services, following established procedures.
CR 1.1
processes monitoring of network services are defined and executed to check the level of quality in the provision thereof, in accordance with the specifications of the organization.
CR 1.2
reception counters statistical metrics that make quality and consistency of these is monitored so that they are available in the performance management system, following technical specifications.
CR 1.3
management systems configured according to performance requirements of the organization are used to check and monitor quality metrics.
CR 1.4
quality metrics are checked to ensure they are within established limits functional to verify the absence of traffic congestion or otherwise, climb to the higher level of responsibility, following procedures established by the organization.
CR 1.5
detection metric values ​​quality above the values ​​established by the organization to relevant departments reported, following procedures established by the organization.

CR 1.6 The use of information communications network documents and analyzes using specific tools to detect future deficiencies and problems management services in quality or quantity, following procedures established by the organization.

RP 2: Managing performance management tools to ensure the processing of data collected from the elements of the communications network, following procedures established by the organization.

CR 2.1 Performance management systems are used to schedule receipt of statistical counters, and configured to analyze the performance and continuity of services provided, according to the parameters of service contracted by the client and criteria quality of the organization.

CR 2.2
counters communications equipment that make quality metrics are activated on the computers to be sent through prescribed format files and scheduled basis, the performance management system, following procedures established by the organization.
CR 2.3
metrics defined by the quality departments are interpreted and configured in the performance management system, from accountants or statistics collected from network elements, according to the specifications of the organization marked in identifying metrics.
CR 2.4
performance management systems and alarms are configured to generate alerts indicator of deterioration in the delivery of services, according to the services contracted by the customer and the quality specifications of the organization.

CR 2.5 documentation implemented quality metrics is performed for later use, following procedures set by the organization.

RP 3: Perform quality reports communications network and supported services to cater to all areas of the organization that request, using specific tools management system.

CR 3.1 query tools and scripts provided by the performance management system are selected and used to extract the information contained therein, as technology specifications and manufacturer communications system.
CR 3.2
query languages ​​provided by performance management systems are used to adapt procedures filtering and information extraction, according to specifications of the technology and following the established procedure.

CR 3.3 tools processing of data are used to extract statistics service network, according to technical specifications and needs of the organization.

CR 3.4 The content of the reports is designed in conjunction with the requesting department so that they have the information needed to assess the quality of the network or that network part that interests you, considering rules of the organization.

CR 3.5 The reports are obtained with data presentation tools and graphics processing available for the organization to meet the needs of the requesting department, taking into account rules of the organization.



Professional background:





Production facilities:



Management systems communications systems. Tools software performance management and alarm. Tools and query languages ​​management system performance. Processing tools level statistics network communications equipment. Tools for internal use reporting quality. Software programming tools. Internal use tools for documenting processes performed. computer equipment.



Products and results:



Monitoring the availability of statistics from communications equipment. Monitoring compliance with quality metrics of the organization.



Information used or generated:



Techniques communications equipment specifications. technical documentation available counters in communications equipment. Information about the network architecture. applicable rules, regulations and standards. Quality criteria of the organization. Service-level agreement of the organization (SLAs). Technical documentation management systems. Technical documentation of statistical processing tools. Manuals query language. Reports network quality.



Training Module 1: MONITORING COMMUNICATIONS NETWORK INCIDENTS AND RESOLUTION





Level: 3





Code: MF1216_3





Associated with UC: Monitoring the status and availability of the communications network and the services implemented





Duration: 240

hours





Capabilities and evaluation criteria:



C1: Describe the topologies of various communications networks and elements that form the network map for monitoring processes and maintenance.

CE1.1 Explain the different types of communication networks based on standard technology and used.

CE1.2 Explain communications systems that form each of the networks detailing the mission of each.


CE1.3 Describe communications equipment and various interconnections identifying the function of each, taking into account the technical specifications thereof.

CE1.4 Describe the communication protocols between teams identifying the mission of each, according to technical specifications thereof.

CE1.5 Interpret a diagram of a communications network formed by various systems and interconnected with other networks in order that identifying each equipment and interconnections within it.

C2: Identify techniques and monitoring tools and integrate communications equipment in the network map, monitor their status and detect alarms, following established procedures.
Sort CE2.1
monitoring tools existing for each of the communication systems according to their field of network monitoring.

CE2.2 Describe the techniques and protocols used to integrate the equipment and / or communications systems on the network maps to check their status of functionality.

CE2.3 Sort the various types of alarms that may occur in the communications network, taking into account the communications equipment that form and the services they offer.

CE2.4 Describe the types of filters and correlation rules to be applied alarms communications equipment so that are represented in the network map alarms that interest, taking into account technologies and technical specifications .

CE2.5 Describe the techniques used for monitoring processes of the network and the services offered.

CE2.6 In a case study, properly characterized, integration of a communication device in the network map established by the organization for monitoring equipment in the system:

- Find map position it should occupy based on their geographical location and functional characteristics.

- Identify communication equipment map with which to represent their interconnection.

- Perform definition team on the map, using software applications to create new items, available for the platform where the map resides.

- Set alarms to be sent from communications equipment to the map, and set the severity.

- Generate an updated list of the types of equipment and existing platforms and tools own management system.

- Documenting integrated teams on the map to be taken into account in the monitoring process.

CE2.7 In a case study, properly characterized, monitoring the communications network in which computers are integrated into the network map:

- Use monitoring tools.

- Identify system elements that appear on the GUI monitoring tool.

- Execute processes check to verify the status of the network and service availability.

- Analyze the result of the check to identify anomalies.

- Documenting the processes performed.

C3: Describe the techniques and procedures for troubleshooting network and communications systems, and resolve to ensure its operation, taking into account technical specifications.

CE3.1 Describe the features and functionality of remote monitoring tools and centralized systems and equipment that make up the network.

CE3.2 Sort the types of alarms that may occur in communications equipment based on components, technology and standard.

CE3.3 Describe the techniques and processes used for the diagnosis of the impact that causes alarm equipment and services for the communications network.

CE3.4 Describe the techniques and processes used to resolve incidents in communications equipment, identifying physical media or referenced in the resolution process tools.

CE3.5 In a case study, properly characterized, interpretation simulated alarm communications networks or systems:

- Select the tool specific monitoring affected communications system for information on the nature of the alarm and access that tool.

- Manage a list of alarms: alarms sort by category, by date, by type of item.

- Interpret alarm reported by the monitoring tool.

- Identify the severity of the impact depending on the service concerned and the type of communications equipment.


- Note comments on alarms presented on the tool.

- Perform filters on the list of alarms (single or chained).

CE3.6 In a case of incidence derived from an alarm on a communications or transmission line, to solve the issue by following given specifications:

- Identify the causes of the problem: (if it has been for some hardware component failure, because supply, software failure, filling DB / file systems, etc.).

- Check if the service-level agreement may not be complying with the new issue.

- Manage file systems "logs" of communications equipment or system management of these teams.

- Recreate the alarm again in order that the identification of the cause is correct.

- Locate the item or physical device or logical cause of the alarm and identify the physical tools and means necessary for resolution.

- Resolve the issue by applying pre-established procedures, verify the correctness of the fault and check the alarm monitoring panel disappears.

- Prepare report on the cause stating the actions to take to prevent it from happening and record the incidence and resolution process used again.

C4: Resolve incidents and complaints of users concerning the service provided by the organization, following some given specifications.

CE4.1 identify and check the systems in which user data of the organization and the services hired are stored.

CE4.2 Differentiate whether the incident or complaint is user network failure or terminal configuration or access to the service, taking into account the technical specifications.

CE4.3 Sort the various claims that can report a user, taking into account the availability of services.

CE4.4 Describe the features and functionality of the access terminals to the services provided by communications networks.

CE4.5 In a case study, properly characterized, treatment of an incident or claim a service offered to customers:

- Register the incident or complaint for further treatment.

- Check that the customer has the contracted service.

- Check the possible relationship between the incident or complaint and alarms presented on the network.

- Solve the impact applying established procedures.

- Documenting the resolution process.

C5: Describe the incident management tools and track incidents and complaints alarm, following given specifications.

CE5.1 Explain the features and functionality of management tools and issue tracking as a means to record and delegate those derived from alarms and complaints, and monitor service-level agreement.

CE5.2 Describe the procedures for configuration and maintenance of monitoring tools alarms and incidents arising from claims, taking into account technical specifications.

CE5.3 Identify the information that can be extracted from this tool in order to be able to track incidents and time attention devoted to each.

CE5.4 Explain the functions of each of the departments that exist in the communications company to assign the effect produced on the network to the appropriate department.

Ce5.5 In a practical course, properly characterized, tracking incidents detected in the communications network:

- Identify, access and configure the incident management tool.

- Register incidence, with the information that is available on a first analysis.

- Assign the action to the responsible department.

- Making change of state of the incident, in order to check the different states through which it may be one (open verification attention, rejected, resolved, climbing, closed, etc.) registered alarm.

- Identify and monitor SLAs using the tool.

- Get parts and periodic reports on the volume of network failures, resolution time, the time commitment of each of the departments involved in the process of resolution and detection of repetitive failures.

Capabilities whose acquisition should be completed in a real working environment:

C2 and CE2.7 CE2.6 respect; C3 and CE3.6 CE3.5 respect; C4 respect CE4.5; C5 respect ce5.5.
Other capabilities
:


Adapt to the specific organization of the company, integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute operations in accordance with the instructions received, with quality and safety criteria, applying specific procedures of the organization.

Used to the pace of work of the organization to meet the daily performance objectives defined in the organization.

Show at all times an attitude of respect toward peers, procedures and internal rules of the organization.



Contents:





1. Communication networks



Cellular mobile networks: network architecture.

Frequency bands used by each of the technologies.

Radio system General characteristics, physical and logical channels, radio and access protocols.

Core network architecture, stages of development, interconnection and interoperability with other networks. Network architecture and signaling protocols implemented.

Networks Fixed telephony network architecture.

Circuit switched network signaling, user plane and application.

Transport networks (IP, ATM, 'Frame relay', MPLS, SDH): topology transmission networks. Functioning.

Addressing scheme in the different networks.

Tower protocols.

Private mobile networks: network architecture.

Radio access networks (LMDS, MMDS): architecture, classification, frequency bands operation.



2. Network Management Systems



Contributions of network management systems in the areas of maintenance, supervision, operation, provision, planning, pricing and fraud.

Architecture management systems. Requirements for a management system based communications system.

Models of network management: centralized, distributed and dynamic. Interfaces and communication protocols between the management system and communications system equipment to which it manages.
Feature
DCN and standard protocols SNMP, CMIP and CORBA.

Fault management module: fault detection and alarm generation, alarm cancellation, applications for network monitoring and alarm correlation.



3. Monitoring techniques in communications networks



Monitoring procedures depending on the type of network.

Types of alarms presented by communications systems.

Alarm correlation rules.

Network Map types and methods of interconnection of fault management tools for each of the systems with network maps. Standardized interfaces and interconnection agents.



4. Diagnostic procedures and troubleshooting alarms in communications networks and services



Most frequent alarms presented by communications equipment.

Diagnostic techniques, location and cause of the alarms.

Alarm monitoring tools in management systems.

Configuration tools in communications equipment management systems and other tools possible.

Specific tools: sniffer, 'debugger' call, remote monitoring probes.
Developing
resolution procedures alarms.



5. Supervision of Service in communications networks



Types of service offered by the operator according to the communications network and technology.

Global Architecture of service depending on the type of network.

Model monitoring service.

Care customer complaints and inquiries, tools for managing incidents and complaints.

Types and models of terminals access to the services provided over the network.

Procedures correlation of customer complaints with alarms in the communications network.



6. Procedures tracker alarm and complaints in communications networks



Incident management tools.

Tools for the coordination of tasks between departments, passing responsibility for care of the problem to another department and querying the status of each of the open problems.

Reporting procedures that allow tracking collect resolution time alarms and claims.


Concept of service-level agreement (SLA) types.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to monitoring the status and availability of the communications network and the services implemented, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 2: REDESIGN AND COORDINATION OF WORK ON COMMUNICATIONS NETWORK





Level: 3





Code: MF1217_3





Associate UC: Perform configuration operations and control communications network





Duration: 240

hours





Capabilities and evaluation criteria:



C1: Identify the services supported by communications networks to assess impacts before work and actions carried out there.

CE1.1 Describe the hierarchical and functional structure of the communications networks depending on the scope, infrastructure, technology and standards used.

CE1.2 Explain the characteristics of each communications systems and elements that comprise, taking into account existing technologies in the market.

CE1.3 Describe the types of subsystems for access, switching and transmission, and explain its operation taking into account the technology used.

CE1.4 Describe the functions of signaling in communications networks according to existing standards and standardized systems.

CE1.5 Describe the services you can provide a communications network based on existing technologies and communication systems of which it is composed.

CE1.6 Relate communications systems with the services provided to ensure the provision of the same, according to technical specifications of communications equipment and transmission lines, and the functional details of the services provided.

C2: Manage software utilities provided by the management system that allow you to connect to the communications equipment on the network to perform actions on them, following given specifications.
Identify
CE2.1 operating system commands to enable run the tools, scripts or systems access to communications equipment, as well as those commands that allow scheduling tasks and connecting to the network elements.

CE2.2 Explain transmission technology network management, routing type and range checking procedures to the network element to secure the remote connection to the affected computers.

CE2.3 In a case study, properly characterized, in connection with the management system and production operations running scripts and collection files sent by communications equipment to resolve issues:

- Connect and open session on the machine management system and recognize the 'Shell' or user interface.

- Navigate the directory system, identifying and managing user and group permissions, and perform creation and management of directories and files from the directory.

- Launch processes running in background mode ( 'background') and schedule deferred execution of tasks (cron table ').

- Track process management system via files sent by communications equipment and create new scripts by copying others and adapting them to the required task using an editor.

- Login on other computers by remote connection via TCP / IP protocol.


- Testing connectivity with other machines using commands and tools TCP / IP.

C3: Identify the parameters and techniques of restoration of communications service, and apply configuration changes and wiring systems in order to continue to provide the service, following technical specifications.

CE3.1 Identify the configuration parameters of the communications equipment that have to do with service continuity and reinstatement taking into account the technical specifications and equipment.

CE3.2 Describe the procedures for restoration of services by identifying the equipment, systems and communications transmission lines involved, according to technical specifications.

CE3.3 Explain protection systems traffic in the communications network (redundant systems).

CE3.4 Describe the functionality of the software tools to access communications equipment to make changes in the configuration of operating parameters and wiring according to the technical specifications of the equipment and geographical accessibility.

CE3.5 In a duly characterized, of making configuration changes to restore service provided over the network to simulated failure of any equipment or any of its components case study:

- Identify the modifications to be made on architecture, connection and configuration parameters of the communications equipment.

- Identify tools access to the affected computers to make configuration changes.

- Identify relevant departments of maintenance and actions to take if the modifications require scrolling.

- Perform the changes identified using the procedures described in the technical documentation for each of these actions.

- Check restoration service and check for possible interactions with other services for changes to the network.

- Documenting the steps and the changes made to the initial settings according to specified formats.

C4: Identify the inventory system network and the services offered, and keep using proprietary inventory management tools, following technical and functional specifications.

CE4.1 Describe the features and functionality of a network inventory system in order to recognize registration procedures.

CE4.2 Relate different network data and services want to register with the various record fields containing the system, and the actions that can be performed with each of them.

Defining rules CE4.3 user access to inventory system to ensure safety in the treatment of the data according to given specifications.

CE4.4 Interpret registration procedures and verification of data in the inventory system in order that the information contained in it is reliable and upgradeable.

CE4.5 In a practical course, properly characterized, keeping inventory information system to have the updated data.

- Configure the inventory system following the established procedure.

- Create user profiles and system access.

- Record inventory data relating to connections: interfaces, cards, channels and lines.

- Record data services deployed on the network and all modifications made on network computers that provide services.

- Check that the data contained in the inventory system are updated.

- Documenting the tasks performed as specified formats.

C5: Identify the specifications, details and scope of works and actions on the communications network, and perform coordination and monitoring under a given specification.

CE5.1 Describe the types of work and activities to be performed on the communications network scheduled basis.

CE5.2 Identify the departments concerned to carry out the work or activities in order to assess the impact of work.

CE5.3 Planning the order of business when they coincide in time in order to avoid inconsistencies and network failures.

CE5.4 Describe the features and functionality of software registration tools and job scheduling network, depending on their technical specifications.

Ce5.5 In a properly characterized practical case, coordination of the execution of work on the network:


- Identify elements and services concerned in the work to be performed.

- Using software planning tools work on the network.

- Authorize the execution of the work.

- Apply the contingency plans provided for fault situations before and disable notifications for equipment failures affected.

- Perform service recovery processes once executed work and document the tasks performed as specified formats.

Capabilities whose acquisition should be completed in a real working environment:

Respect CE2.3 C2; C3 respect CE3.5; C4 respect CE4.5; C5 respect ce5.5.
Other capabilities
:

Adapt to the specific organization of the company, integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute operations in accordance with the instructions received, with quality and safety criteria, applying specific procedures of the organization.

Used to the pace of work of the organization to meet the daily performance objectives defined in the organization.

Show at all times an attitude of respect toward peers, procedures and internal rules of the organization.



Contents:





1. networks and services of communications networks



Communications networks, types, features and services they offer. Operation of each of the networks based on standards and technology.

Call origination, contexts, data connections, among others.

End services and applications implemented on each of the networks.

Global Architecture for performance: performance, routing, security architecture, service delivery, service 'roaming' modes 'handover' charging modes.



2. Configuration management communications network



The network management system, features and functionality in configuration management.

Module configuration management: parameter changes, data collection configuration, data consistency configuration, network upgrade, remote loading of software, applications support hardware changes, task management and exploration of the network.

Network management. Types.
Addressing
.

Stack TCP / IP protocols.

Standard protocols SNMP, CMIP and CORBA.



3. UNIX Utilities in the network management system



Connection and user environment on Unix operating system.

Unix File System.

File management commands and directories.

User permissions and groups.

Running programs, modalities: Running background (background), programming task execution delayed ( 'cron table').

Adaptation of scripts using a text editor (vi).

Protocol TCP / IP on UNIX machines: IP address, ports, command. Protocols Telnet, FTP.



4. Configuring network equipment communications



Configuring communications equipment: functional and architectural scheme.

Setting the signaling equipment.

Configuring network equipment transport.

Setting the switching equipment circuit- and packet: functional and architectural scheme.

Setting the connection interfaces between the various teams that make up the communications network.

Measurement signal interfaces, buses, cables and connectors.

Theory queue for load sharing.

Configuration tools in communications equipment management systems.

Redundant systems.

Restoration procedures affected communications services.
Availability management
.



5. Technical Inventory communications services



Software inventory tools.

Architecture: system information storage, user access. Profiles of access to the tool.

Mechanisms maintenance and backup.
Registration procedures
services and network components on which they are deployed.



6. Control Procedures work on the communications network



Classification of works and actions performed on communications systems.


Tools recording software and job scheduling.
Planning
time and phase relationship of the work.

Contingency plans.

Verification backup, restoration mechanisms.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the conduct of operations configuration and control of the communications network, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: QUALITY MANAGEMENT SERVICES SUPPORTED BY THE COMMUNICATIONS NETWORK





Level: 3





Code: MF1218_3





UC Associate Managing the quality of services supported on the communications network





Duration: 120

hours





Capabilities and evaluation criteria:



C1: Identify performance measurement parameters of a communications network, and monitor the quality of the services provided following technical and functional specifications.

CE1.1 Explain the fundamentals of measurement of network performance in order to make a quality monitoring of services provided.

CE1.2 Describe systems and performance measurement tools of a communications network to classify quality metrics available, taking into account technical specifications.

CE1.3 Explain monitoring techniques and measurement carried out by the systems or performance management tools, to know the status of network usage and services.

CE1.4 Describe the procedures for monitoring network performance based communications technology and standard communication systems.

CE1.5 Describe the different types of statistics file format in order to apply the method most appropriate for consultation or procedure.

CE1.6 Relate quality metrics used to measure network performance with systems that form are based on the communications network.

CE1.7 interpret the information from performance management systems to assess quality levels.

CE1.8 In a case study, properly characterized, monitoring the level of quality of services of a communications network to ensure performance:

- Identify quality metrics applied.

- Use the tool to check performance management metrics.

- Monitor counters that make statistical quality metrics.

- Report results to relevant departments check if it detects values ​​above the established order that circumstances have occurred to these values ​​do not return to play.

- Interpret information from performance management systems in use in quality monitoring.

- Documenting the processes performed as specified formats.

C2: Apply management procedures or the tool performance management system in order to collect, process and store quality metrics and statistical counters communications equipment, according to a technical and functional specifications given .

CE2.1 Explain the functionality and features of a performance management system based on technology, network type and geographic scope.


CE2.2 Identify the types of performance management systems based on the technology, the method of collection of statistical counters communications equipment and method of storage of such accountants and quality metrics.

CE2.3 Identify configuration parameters management system performance programming reception statistical counters, treatment and storage.

CE2.4 Sort the different types of counters that can be activated in the computers based communications system and technology.

CE2.5 Relate performance parameters that make quality metrics available counters in communications equipment based on technology, in order to activate them.

CE2.6 In a practical course, properly characterized, management of performance management tools to ensure data processing elements of the communications network:

- Setting the parameters for the receipt and processing of statistical counters.

- Activate the statistical counters corresponding communications equipment.

- Set quality metrics.

- Configure the system to generate alerts for possible deterioration in service delivery.

- Documenting the processes performed as specified formats.

C3: Apply procedures filtering and extracting information using query languages ​​and specific tools provided by the performance management system to generate statistics to assess the level of quality of services.

CE3.1 Explain the features and functionality of query tools and information extraction system performance management.

CE3.2 Describe the language features provided by the management system in order to adapt existing information extraction, creating new queries to increase the functionality of performance management system.

CE3.3 In a practical course, properly characterized, extraction and information retrieval using the tools and languages ​​specific query performance management system:

- Select the tool to use.

- Identify the sentences of the query language to be used in the extraction of information.

- Identify sources of information for creating procedures for consultation and extraction.

- Create procedures that allow copy and adapt queries for information retrieval.

- Retrieve and file queries and extraction procedures previously established to exploit the system information.

- Documenting the processes performed as specified formats.

C4: Identify software tools for creating and publishing reports specific management system, and develop and publish reports of network quality and services as specified needs.

CE4.1 Identify sources of data available in the performance management systems based on communications technology.

CE4.2 determine the means of extracting information available in the management system and its correlation with information from external sources for the preparation of reports requested.

CE4.3 Describe the functionality of publishing tools for communicating specific reports thereof as functional specifications.

CE4.4 Identify the publication procedures and management reports in the format and type of information to allow distribution as specified design.

CE4.5 In a duly characterized, reporting of network quality and services as practical course:

- Relate the information requested data sources available in performance management systems based on the technology.

- Select the tool for data extraction.

- Extract and merge data using the statistical treatment.

- Perform design report using data presentation tools and graphics processing.

- Publish the report using the specified tools.

- Documenting the processes performed as specified formats.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.8; C2 respect to CE2.6; C3 respect CE3.3; C4 respect CE4.5.
Other capabilities
:


Adapt to the specific organization of the company, integrated in the system of technical and industrial relations.

Interpret and execute instructions received and take responsibility for the ongoing work, communicating effectively with the right person at all times.

Organize and execute operations in accordance with the instructions received, with quality and safety criteria, applying specific procedures of the organization.

Used to the pace of work of the organization to meet the daily performance objectives defined in the organization.

Show at all times an attitude of respect toward peers, procedures and internal rules of the organization.



Contents:





1. Procedures for performance monitoring a communications network



Types of available communications equipment counters.

Quality measures.

Traffic measures.

Meaning and types of standardized quality metrics for measuring quality of a communications network.
Procedures
monitoring network quality.

Contracts and service level agreements and quality standards in the industry.
File formats
statistics.



2. Performance Management System



Architecture performance management system.

Requirements of a management system network performance.
Interfaces
interconnection performance management systems associated with communications systems.

Turning counters.

Available tools and methods used.

Collection methods measures.

Transfer measures.
File formats
measures.

Concepts granularity, measures numbers in files, time collection of statistical data.

Storage measures.

Management procedures for the processing and storage measures.



3. Methods of extracting statistical information in the performance management system



Data storage.

Query languages ​​management system performance.

Graphical query tools of statistical information.



4. Reports of quality communications network



Report Design.

Reporting methods.

Reports voice traffic monitoring, signaling, transport traffic.

Service utilization reports.

Interpretation of the results of the reports, depending on external events.

Publishing Tools reports.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the management of the quality of services supported on the communications network, which will be accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XVII


Professional qualifications: Implementation and Management of Information Elements in Domóticos-inmotic Systems, Access Control and Presence and Video Surveillance



Professional Family: Computers and Communications





Level: 3





Code: IFC365_3





General competence



Integrate and maintain computer and communications elements in automation systems automation and building automation buildings, access control and presence and video surveillance hardware and software level, ensuring the functioning of the various modules that compose them, in conditions quality and safety, complying with the rules and regulations.



Competence units




UC0490_3: Manage services in the computer system

UC1219_3: Establish and maintain home automation / building automation systems

UC1220_3: Establish and maintain systems access control and presence, and video surveillance



Professional environment





Professional field



Develops his professional activity in the area of ​​computer support dedicated to the design, implementation and maintenance of home automation / building automation, access control and presence systems and video surveillance in public entities or private, small companies / medium / large or micro, both self-employed and others, regardless of their legal form. It operates depending, where applicable, functional and / or hierarchically, superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors



Is located mainly in the service sector, sub-sector provision and maintenance of services related to the automation of homes, buildings and private security, relating to the implementation and maintenance of systems access control and presence and video surveillance .



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.

Integrators computer elements in home automation / building automation systems

Integrators computing elements in systems access control and presence, and video surveillance systems.

Maintenance of computer experts elements in systems access control and presence and video surveillance systems.



Associate Training

(510 hours)





Training modules



MF0490_3: Service management in the computer system (90 hours)

MF1219_3: Implementation and maintenance of home automation / building automation systems (150 hours)

MF1220_3: Implementation and maintenance of access control systems and presence, and video surveillance (270 hours)



COMPETITION UNIT 1: MANAGE THE SYSTEM SERVICES





Level: 3





Code: UC0490_3





professional accomplishments and performance criteria:



RP 1: Manage the system configuration to ensure process performance according to the needs of use and within the guidelines of the organization.
CR 1.1
processes involved in the system are identified so as to evaluate performance parameters.
CR 1.2
parameters affecting system components: memory, processor and peripherals, among others, they meet the needs of use.
CR 1.3
execution priorities are suitable processes depending on the specifications of the business plan of the organization.
CR 1.4
monitoring tools are deployed and configured by determining the levels of alarms depending on the business plan of the organization.

RP 2: Managing storage devices according to the needs of use and within the guidelines of the organization.

CR 2.1 storage devices are configured for use on different operating systems used in the computer system.

CR 2.2 storage structure is defined and implemented according to the needs of different file systems and specifications for use of the organization.
CR 2.3
object naming requirements and restrictions of use of each storage device is properly documented.

CR 2.4 storage devices are integrated to provide a functional system to the user according to the specifications of the organization.

RP 3: Manage user tasks to ensure system access and availability of resources according to specifications operating the computer system.

CR 3.1 user access to the computer system is configured to ensure the security and integrity of the system as specified by the organization.

CR 3.2 user access to resources administered by assigning permissions based on the needs of the organization.

CR 3.3 The resources available for limited users with appropriate based on specified in the rules of use of the organization tools.


RP 4: Manage network services to ensure communication between computer systems according to operating requirements.

CR 4.1 Communication services are established with a system service quality so that these communications are guaranteed.

CR 4.2 Communications devices are checked with regard to its configuration and performance as specified by the organization.

CR 4.3 Resource Consumption communications services are analyzed, verifying that are within permitted by the specifications of the business plan of the organization.
CR 4.4
incidents detected in communications services are documented to inform those responsible for the operation of the system and manage them according to the protocols of the organization.



Professional background:





Production facilities:



Operating systems. User management tools and management resources permit. Performance monitoring tools. Process monitoring tools. Monitoring tools memory usage. Monitoring tools storage device management. User management tools.



Products and results:



System operating correctly. Performance system suitable operating parameters.

Safe and full access and use of system resources. Communication services running.



Information used or generated:



Operating manuals operating system and device. Operating Plan of the organization. Manuals monitoring tools used. Graphics and performance analysis. Listings user access and restrictions. Incident report. Action protocol to incidents.



COMPETITION UNIT 2: Establish and maintain DOMOTIC / inmotic SYSTEMS





Level: 3





Code: UC1219_3





professional accomplishments and performance criteria:



RP 1: Configure equipment and devices for the commissioning of home automation / building automation system to meet the functional requirements of the project.

CR 1.1 The specifications provided in the proposed installation and / or integration of home automation / building automation system to be implemented are interpreted in order to identify the architecture, components and technologies involved in the system.

CR 1.2 The location and installation of equipment, devices and infrastructure is reviewed, checking that ensures the configuration, programming and commissioning of home automation / building automation system, according to the functional requirements of the project.

CR 1.3 The physical and logical configuration and parameterization of equipment and devices that are the home automation / building automation system is planned and carried out, for commissioning, meet the functional requirements set by the project and according to the procedures established by the organization.

CR 1.4 The residential gateway, if any, is configured to connect the different internal networks that make up the home automation / building automation system with public data networks, to access the services they provide and allow access to the system from the outside, according to project specifications.

CR 1.5 The home automation / building automation system starts up, following the test protocol established by the organization and in accordance with the functional specifications of the project.

CR 1.6 The report implementation of home automation / building automation system is developed, including the configuration of equipment, devices and commissioning tests carried out in order to record the information for later use, according rules of the organization.

RP 2: Develop inventories of equipment, devices and software that make up the home automation / building automation system, to ensure their identification and location, applying the standards set by the organization.

CR 2.1 hardware inventory software components and applications is made to record the characteristics, location and status of them, by the standards of the organization.

CR 2.2 computer configurations and applications of home automation / building automation system are recorded in inventory, according to procedure established by the organization to facilitate recovery efforts in case of failures.


CR 2.3 The inventory is kept updated by recording all changes in the home automation / building automation system, at both hardware and software and configuration according to procedure established by the organization.

CR 2.4 The technical manuals for devices and equipment of home automation / building automation system are recorded and referenced in the documentation generated for subsequent use, according to the procedure established by the organization.

RP 3: Adapt the control software to changes in functionality of home automation / building automation system according to technical specifications and needs.

CR 3.1 The configuration and parameterization of system control software is planned and performed to its operation, according to the functional requirements set by the project configuration protocols established by the software elements of home automation system / building automation and procedures established by the organization.

CR 3.2 The location and installation of equipment monitoring and control system is reviewed, checking that ensures the configuration, programming and commissioning of home automation / building automation system, according to the functional requirements of the project.

CR 3.3 The control software features are scheduled taking into account the different techniques and development languages ​​and reference standards home automation systems / building automation control, using the tools provided by the system, according to technical specifications and usage requirements .

CR 3.4 The residential gateway, if any, is set to implement new services and applications using standard software development services, as specified needs.
CR 3.5
testing commissioning of visualization capabilities and system control are performed to verify compliance with the project specifications, following the protocol established by the organization.

CR 3.6 The implementation report of the monitoring and control application is made, including the activities and findings, closure for later use, following the standards set by the organization.

RP 4: Keep the home automation / building automation both hardware and software system to ensure its operation, according to functional requirements and quality criteria established in the project.
CR 4.1
specific maintenance of equipment and devices that make up the home automation / building automation system are defined to ensure functionality, taking into account the technical specifications thereof.

CR 4.2 The preventive maintenance plan home automation / building automation system is made to ensure continuity in the service, according to the specific procedures required by the system components, and by the organization.
CR 4.3
troubleshooting and repair or replacement of hardware and software components of the computer system that supports home automation / building automation system is done to keep operating, using specific tools, applying standard procedures and compliance with the safety standards set by the organization.

CR 4.4 The manual identification and troubleshooting of home automation / building automation system is developed and is updated whenever a new event is detected, indicating the most relevant information regarding the same, according to the specific procedures required by system components, indicating tasks, timing and expected results.



Professional background:





Production facilities:



Computer equipment, mobile and peripheral devices. proprietary applications for home automation systems configuration. Hardware software bases data elements. Computer software for 2D and 3D design. applications for maintenance management. residential gateways for home automation systems. Measuring instruments: multimeter, stopwatch, light meter, among others. Reference standards for development of home automation / building automation systems. Equipment and devices for home automation / building automation systems. Home automation control software / building automation systems. Remote controls for local control wireless home automation systems (smartphones or tablets).



Products and results:



Configuration and commissioning of building automation / home automation system. preventive and corrective hardware and software components of home automation / building automation system maintenance.



Information used or generated:




Home automation project engineering / building automation system. technical documentation, manuals for installation and use of hardware and software elements of home automation applications / building automation system. Documentation electrical installation of the hardware elements of home automation / building automation system. Regulations applicable to low voltage and communications infrastructures. Specification sheets home automation / building automation system. Planning configuration and parameterisation of home automation / building automation system. Documentation topology, configuration items (parameters, values, IP addresses, physical addresses) of home automation / building automation system. Document test procedure implementation of home automation / building automation system. Act implementation and delivery system. Document process automation maintenance actions / building automation system. Reports / Minutes / preventive and corrective parts of home automation / building automation system maintenance. User manual operation of automation system: hardware and software control home automation / building automation system.



COMPETITION UNIT 3: Establish and maintain SYSTEMS ACCESS CONTROL AND PRESENCE, AND VIDEO SURVEILLANCE





Level: 3





Code: UC1220_3





professional accomplishments and performance criteria:



RP 1: Implement the system access control and presence and video surveillance to meet the requirements of the organization in accordance with the technical specifications of the project.

CR 1.1 architecture and system components to be implanted are determined from the analysis of risk and the specifications contained in the draft system installation access control and presence, and video surveillance to implement.
CR 1.2
develop operations are planned according to available human and material resources, optimizing the process of implementing the systems, taking into account the framework of applicable regulations and design specifications.
CR 1.3
infrastructure (cabling, control cabinets, power supplies) and equipment control elements and drive uptake (barriers, electric strikes, Portillones way, lathes and grinders, etc.) systems access control and presence are checked throughout the implementation process to ensure their integration and functionality, following specifications outlined in the project documentation system.
CR 1.4
infrastructure (wiring, control cabinets, power supplies), the characteristics and location of booths elements image capture (cameras and domes, etc.), presence detectors, equipment signal processing (multiplexers, sequencers, matrices, video recorders, video wall and keyboards, etc.) and display devices (monitors) of video surveillance systems, are verified during the assembly process as regards to functional characteristics, elements and areas to be protected to ensure the functionality of the system, following the specifications of the system design.

CR 1.5 installed equipment and devices that make up the system access control and presence are set and configured to test its functionality and ensure its operation, according to technical specifications of the system design.
CR 1.6
equipment and devices installed and motorized video surveillance system elements are adjusted and configured to ensure the integration thereof and the achievement of the objectives of the system, according to the functional characteristics and prescribed techniques in the technical and design documentation.
CR 1.7
activities are documented in a standardized format for later use, following the procedure established by the organization.

RP 2: Perform commissioning of systems access control and presence in the organization, following the requirements and design specifications of the project.
CR
computer and peripherals 2.1 associated equipment is physically configured, install and configure and control applications and user management according to access profiles established in the design specifications, to ensure the safety and reliability of system information, taking into account the specifications of the organization and the applicable regulations.

CR 2.2
terminals access control and presence of users and their biometrics are programmed and parameterized to complete the rules of access control and presence, according to the profiles and access levels prescribed in the project specifications of the system.

CR 2.3 software application that centralizes control system is installed and configured, and verified that is compatible with computers that have to control, to ratify the functionality of system access control and presence, according to the preset parameters in the design specifications.

CR 2.4 The initial charge of system data access control and presence is made and verified to ensure its integrity and compliance with the applicable rules on data protection, according to the security policy of the organization.

CR 2.5 The information recorded in the system is treated with query tools and report generation for distribution thereof, ensuring continuity of service delivery and security in access and use of such information, in compliance the data protection rules and in accordance with contingency plans and security of the organization.

CR 2.6 generation tool backup controls and records made integrated with the system and is configured so that users have access, according to security plans and the applicable rules on data protection.

CR 2.7 The report commissioning of systems access control and presence is constructed to accurately collect the parameters of functionality, in accordance with the provisions of the system documentation, as well as adjustments and modifications suggested for risk analysis.

RP 3: Perform commissioning of video surveillance system in the organization, following the requirements and design specifications of the project.
CR
computer and peripherals 3.1 associated equipment is physically configured, installed and configured control applications, management and mapping, according to sequences and display quality of images required in specifications established to ensure system functionality and integration of its elements.

CR 3.2 software application (management of cameras, recording process, mapping, remote access) that centralizes control video surveillance system is installed, configured and checked to see that it meets the preset parameters and is compatible with computers you have to control, according to technical specifications.
CR 3.3
registered and recorded information is treated with confidentiality parameters to ensure the continued provision of services of viewing and recording images of established areas, according to the current contingency plan in the organization for systems information and taking into account the applicable rules on data protection.

CR 3.4 generation tool backup recordings made integrated with the system and is configured so that users have access to the system, according to security plans and complying with the rules applicable protection data.

CR 3.5 The report commissioning of video surveillance system is constructed to accurately collect the parameters of functionality according to the provisions of the system documentation, as well as adjustments and modifications suggested for risk analysis.

RP 4: Maintain systems access control and presence and video surveillance, following the technical documentation of the project to ensure its functionality.

CR 4.1 The preventive maintenance plan is interpreted to ensure continuity in the service, according to the specific procedures required by the system components, clearly indicating the frequency of application.

CR 4.2 Specific preventive maintenance procedures systems access control and presence are implemented, to ensure optimal functionality thereof, as indicated in the maintenance plan.

CR 4.3 The specific procedures for preventive maintenance of video surveillance systems running, according to the computers and devices that make up the different parts of the system, to ensure continuity in service delivery and functionality of each components, as indicated in the functional and the maintenance plan.


CR 4.4 Specific maintenance procedures are periodically revised to adapt the system to the changes included in the risk analysis, identify gaps and propose security enhancements, as directed by the manufacturers and rules of the organization.

CR 4.5 The troubleshooting and repair systems access control and presence and video surveillance is carried out systematically applying standard procedures for the organization, respecting the rules of safety and set times, to avoid interruptions in the delivery service and minimize their impact when they occur.

CR 4.6 updates the hardware and software components of systems access control and presence and video surveillance, improvements are made to add and correct any faults, taking into account the technical specifications of manufacturers and rules of the organization .

CR 4.7 The plan preventive maintenance of access control systems and video surveillance presence and is updated to accurately collect the results obtained in implementing the preventive maintenance plan and interventions against dysfunctions and system failures, according to the contingency plans of the organization.

CR 4.8 The documentation generated in the implementation of maintenance procedures stated in the standard for storage and further processing and distribution records, following the protocol established by the organization.



Professional background:





Production facilities:



Computer and peripheral equipment. Hybrid systems and distributed video. Interactive monitors for security and surveillance applications and mobile devices to access the system. Office tools. Planning software tools. Computer software for managing systems access control and presence detection. Computer software for managing video surveillance cameras and surveying. Analysis Tools video integrable with access control and presence detection. Measuring instruments: multimeter, tester coaxial cable and twisted pair cable tester, portable video monitor, luxómetro. Equipment for access control and presence: heads card readers (magnetic stripe, proximity, chip), biometric readers, central control actuators (electrocerraderos, barriers), presence detectors. Equipment for video surveillance systems: analog cameras, IP cameras, lenses for cameras, booths for the cameras, locators, keyboards and control centers, multiplexers, sequencers, recorders analog and digital image, monitors, recording media and storage.



Products and results:



Planning, implementation and monitoring of the implementation of systems access control and presence and video surveillance. Definition video surveillance systems for environments advanced security based (analog and IP) open systems integrated with the data generated in access control, presence, and where appropriate, controls industrial processes video for physical security, quality, traceability and productivity. Verification and implementation of systems access control and presence and video surveillance. Preventive and corrective procedures required for the maintenance of access control systems and video surveillance presence and intervention. Preventive maintenance of systems access control and presence and video surveillance. Troubleshooting systems access control and presence and video surveillance.



Information used or generated:



Risk analysis. Technical specifications of installation projects. Technical documentation of equipment and devices and manufacturers recommendations, in print or electronic form. Installation manuals and user guides. Private security regulations. Manuals and operation of equipment and devices. Associated software manuals. Information about the network configuration and IP address. Reports commissioning of the systems. Service Parts and intervention for the maintenance of the systems. Standards applicable data protection and private security. Maintenance manuals and protocols to access stored data (video capture and historical access control and presence).



Training Module 1: MANAGEMENT SERVICES IN THE SYSTEM





Level: 3





Code: MF0490_3






Associated with UC: Managing services in the computer system





Duration: 90

hours





Capabilities and evaluation criteria:



C1: Analyze system processes to ensure adequate performance to the parameters specified in the business plan.
Identify
CE1.1 system processes and parameters that characterize (parent process, process status, consumption of resources, priorities and users affected among others) to determine their influence on system performance.

CE1.2 Describe each of the tools provided by the system to process management in order to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a practical course of analyzing the performance of a computer system with a load of well characterized processes:

- Use the system tools to identify how many active processes exist and the particular characteristics of some of them.

- Perform operations activation, deactivation and modification of priority among others with a process using system tools.

- Monitor system performance using specific tools and set alarms that indicate risk.

C2: Apply management procedures to storage devices to offer the user a registration system of the full, safe and available information.

CE2.1 Identify the different file systems used in a given storage device to optimize registration procedures and access to them.

CE2.2 Explain the characteristics of file systems based storage devices and operating systems used.

CE2.3 Describe the overall structure of the computer system storage devices associating with other existing file systems.

CE2.4 In a practical course of implementation of management procedures storing information with multiple devices:

- Perform partitioning, where necessary, and generating infrastructure file systems to be installed on each device.

- Implement the overall structure integrating all storage devices and their corresponding file systems.

- Documenting the requirements and restrictions of each file system implemented.

C3: Managing Access to the system and the resources to verify the proper and safe use thereof.

CE3.1 Identify opportunities for access to remote access system distinguish local access.

CE3.2 Describe the tools used in the management of permissions to users for the use of system resources.

CE3.3 In a practical course management system access in which it has right of user administration:

- Identify possible a user accesses the system.

- Modify the permissions to use a system resource to a user.

- Define use limitations of a system resource users.

C4: To evaluate the use and performance of communications services to keep within the specified parameters.

CE4.1 Explain the configuration parameters and operation of communications devices to ensure their functionality within the system.

CE4.2 Relate active communications services in the system with the devices used by them in order to analyze and evaluate performance.

CE4.3 In a case study evaluation of use and performance of a computer system connected to the outside through various communications lines:

- Identify communications devices and describe their characteristics.

- Check the status of communications services.

- Evaluate the performance of communications services.

- Identify and document any incidents arising in the system.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.4; C3 respect CE3.3; C4 respect CE4.3.
Other capabilities
:

Keep the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work done.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Interpret and execute instructions work.


Demonstrate stress resistance, stability of mood and impulse control.



Contents:





1. Processes



States of a process.
Management
signals between processes.

Process Management.

Changing priorities.

Process monitoring.

Management resource consumption.



2. Storage Systems



Storage devices.

File systems.
General structure
storage.

System tools for managing storage devices.



3. User Management



Access to the system.

Permissions and access to resources.

Limitations of use of resources.



4. Communication services



Communications devices.

Communications protocols.

Communications services.

Yields communications services.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to service management in the computer system, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module.

2. pedagogical competence accredited in accordance with established by the competent authorities.



Training Module 2: IMPLEMENTATION AND MAINTENANCE DOMOTIC / inmotic SYSTEMS





Level: 3





Code: MF1219_3





Associated with UC: Establish and maintain home automation / building automation systems





Duration: 150

hours





Capabilities and evaluation criteria:



C1: Interpret technical and functional specifications of a project installation and / or integration of home automation / building automation systems.

CE1.1 Describe the functional requirements of home automation / building automation project, detailing the equipment and devices involved in each of the functions, and identifying the various networks of the system and the interconnections between the elements of each.

CE1.2 Identify the different technologies used in home automation facilities / building automation systems, indicating the characteristics of each.

CE1.3 Distinguish and classify the different architectures and transmission media used (twisted pair, radio, electric network) in the home automation systems.

CE1.4 Check the installation elements and infrastructure of a home automation / building automation system commissioning and configuration, according to the functional specifications of the project.

CE1.5 In a practical course, properly characterized, interpretation of a proposed installation and / or integration of a home automation / building automation system from the technical documentation that defines the project:

- Identify the functional requirements of the project.

- Identify the elements of home automation / building automation system, both hardware and software.

- Identify the various networks that make up the home automation / building automation system.

- Check that the system elements meet the functional requirements.

- Visually check the installation.

- Documenting the work performed according to a given specification.

C2: Identify the functional parameters of the equipment and devices of home automation / building automation system and in a case, make its commissioning, according to the technical specifications of the project.

CE2.1 Identify the characteristics of the standards and protocols involved in home automation / building automation system for proper configuration.


CE2.2 Describe the technical and functional characteristics of the equipment and devices of home automation / building automation system, including standard or proprietary home automation system to which they belong, identifying the configuration parameters and indicating the impact that a change in a project of the same.

CE2.3 Configure hardware and software components of home automation / building automation system, using the specific tools of the system to which they belong.

CE2.4 Explain the features and functionality of residential gateways identifying the types, technologies and configuration parameters and connection home automation system with external networks.

CE2.5 In a duly characterized, configuration and parameterization of equipment and devices that make up the home automation / building automation for commissioning system practical case, according to technical specifications:

- Identify the equipment and devices home automation system to implement and put into service.

- Configure hardware and software elements of home automation / building automation system using proprietary software tools.

- Configure, if any, residential gateway, and integrate the various networks of the system, using specific software tools.

- Test the functionality of the system equipment.

- Develop a report system startup.

C3: Identify procedures and inventory management tools, and develop and maintain an inventory of home automation / building automation system by following given specifications.

CE3.1 Identify the steps to be followed in the process of inventorying a home automation / building automation system, both during initial implementation and during subsequent maintenance.

CE3.2 Describe the features and functionality of the software tools used for inventory management.

CE3.3 Describe the procedures for extracting information inventory of the elements of home automation / building automation systems, depending on their technical specifications.

CE3.4 In a duly characterized, processing and maintaining inventory of equipment and devices that are the home automation / building automation system practical course:

- Identify the equipment and devices, and software configurations and associated inventory.

- Use tools specific inventory management software.

- Record all system information and changes that occur in the inventory.

C4: Identify the parameters and configuration tools control software, and add new features to home automation / building automation system, following technical specifications given.

CE4.1 Explain the features and functionality of the software configuration home automation / building automation, depending on your system specifications.

CE4.2 Identify equipment and home automation control software / inmotic system with its features and functionality, including standard or proprietary home automation system to which they belong.

CE4.3 Describe the configuration parameters of each software module control home automation / building automation system, indicating the impact on a project involving a modification thereof, taking into account technical and functional specifications.

CE4.4 Identify the programming tools that provide home automation / building automation systems, depending on the home automation standards and proprietary systems to which they belong.

CE4.5 Describe the services that can be added to home automation / building automation system through the residential gateway.

CE4.6 In a duly characterized, configuration control software and adding new features to home automation / building automation system practical case, according to technical specifications given:

- Check equipment that will contain the control software.

- Install and configure the software control.

- Add new features using the programming tools or own system configuration.

- Apply technical development to add new functionality to the system.

- Apply test techniques to verify the functionality of the control software.

- Prepare the implementation report following the specified formats.

C5: Develop and implement maintenance procedures home automation / building automation system, taking into account the quality criteria set out in the project and the recommendations of manufacturers of the elements that compose it.


CE5.1 identify and itemize preventive maintenance of home automation / building automation system and each of the computers and devices that form, depending on the technical specifications thereof.

CE5.2 Describe the standard procedures and tools that are used to troubleshoot faults of the components of home automation / building automation system, both hardware and software.

CE5.3 In a duly characterized, maintenance of home automation / building automation system practical course using technical specifications given:

- Identify maintenance of equipment and devices involved.

- Develop maintenance plan for each of the system elements.

- Use specific tools for troubleshooting hardware and software.

- Resolve incidents that occur using standard procedures.

- Update manual identification and detection of incidents.

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.5; C2 respect to CE2.5; C3 respect CE3.4; C4 respect CE4.6; C5 respect CE5.3.
Other capabilities
:

Finish work according to criteria of suitability, speed, economy and efficiency.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Interpret and execute instructions work.

Demonstrate flexibility to understand the changes.
Respect
procedures and internal rules of the organization.



Contents:





1. Home Automation / Building Automation



General aspects of home automation / building automation: comfort, safety, energy saving, multimedia. Infrastructure home automation / building automation, small and large installations systems.
Architectures
control system of a building.

Air conditioning ventilation, cooling and heating. Lighting: general concepts, lighting systems.

Security systems: intrusion, technical alarms, connection to CRA.

Components of a home automation system-building automation.

Sensors, actuators, transmitters, control units, communication gateways.

Topologies home automation / building automation systems.

Physical transmission media: twisted pair, power line carrier, radio frequency, infrared, shared bus, fiber optics.

Concepts attenuation, interference, transmission speed.

Home automation / building automation projects: documentation and interpretation.



2. devices and communication networks protocols applied to smart home / building automation



Protocols in home automation / building automation systems: standard protocols: EIB / KNX, 'lonworks' among others, configuration tools, programming, visualization and control.

Owners cabling systems: configuration tools, programming, visualization and control. Proprietary systems via radio: configuration tools, programming, visualization and control. Other technologies supporting smart home / building automation (EnOcean, ZigBee, RFID - Radiofrequency IDentification-, among others).

Logic functions: doors, truth tables, Karnaugh maps.

Protocols TCP / IP: IP address, TCP / UDP ports, protocols: FTP, TFTP, NTP, http. Concept of routers, switches, 'hubs' and firewalls.

Planning techniques.



3. Inventories home automation / building automation systems



Features inventories in home automation / building automation systems.

Methodologies implementation and updating of inventories in home automation / building automation systems.

Tools for inventory management.



4. Maintenance of home automation / building automation systems



Maintenance procedures automation equipment and devices / building automation systems. Tools and hardware diagnostic software: features and uses.

Applicable regulatory environment.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:




1. Mastery of knowledge and techniques related to the implementation and maintenance of home automation / building automation systems, which are accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module

2. pedagogical competence accredited in accordance with established by the competent authorities.



TRAINING MODULE 3: IMPLEMENTATION AND MAINTENANCE SYSTEMS AND PRESENCE ACCESS CONTROL AND VIDEO SURVEILLANCE





Level: 3





Code: MF1220_3





Associated with UC: Establish and maintain systems access control and presence, and video surveillance





Duration: 270

hours





Capabilities and evaluation criteria:



C1: Interpret the technical and functional specifications of a project to install access control systems and presence and video surveillance and risk analysis identifying the information necessary to carry out its implementation.

CE1.1 Describe the characteristics and technical specifications of the proposed installation of access control and presence and video surveillance.

CE1.2 Explain the features, functions and elements of risk analysis to carry out the implementation and maintenance of a system of access control and video surveillance presence and taking into account the technical specifications of the project.

CE1.3 Describe the project planning techniques necessary to carry out the implementation of the system: human resources, deadlines, costs and justification set of variations among others.

CE1.4 In a practical course, properly characterized, identification and description of a system access control and presence and video surveillance from the technical documentation for installation and maintenance:

- Identify the location of equipment and devices of various subsystems, and the necessary means and tools to implement the process of implementation.

- Identify and describe the power distribution system, the protection elements and the uninterruptible power supply, and envelopes, boxes, cabinets and cabling elements.

- Recognize and detail the type of pipes and distribution in plants, horizontal and vertical distribution, and characteristics of the wiring and connection of the elements.

- Recognize and describe identification systems and signaling drivers and connecting elements of the equipment at the facility.

- Identify and list the computer equipment and peripherals used for system administration.

- Identify and describe the computer application configuration, management and monitoring subsystems and drivers (device drivers or 'drivers') duly updated.

C2: Identify infrastructure and verify the installation of systems access control and presence and video surveillance for its implementation, according to technical specifications.

CE2.1 Identify the equipment, devices and elements infrastructure systems access control and presence and video surveillance, and the connections between them.

CE2.2 Describe the interconnection between the wiring closet and / or between buildings where system equipment access control and presence and video surveillance are.

CE2.3 Explain techniques physical adjustment of equipment, devices and elements infrastructure systems access control and presence and video surveillance, as well as the connections between them.

CE2.4 Explain the need to integrate the access control system and presence, and video surveillance system.

CE2.5 In a practical course, properly characterized, installation verification systems access control and presence and video surveillance, and from technical specifications given:

- Identify computers and devices that make up the systems.

- Check electrical wiring and connections between computers and devices.

- Check the setting of the equipment and systems devices.

- Documenting the work carried out as specified formats.


C3: Put the equipment and system devices access control and presence as well as its applications and configurations in service, taking into account the associated technical specifications.

CE3.1 Describe the features and functionality of the devices and equipment that make up the system access control and presence, identifying their settings.

CE3.2 Identify the main functions performed by the computer system used for management and monitoring system access control and presence.

CE3.3 Explain the features and functionality of the software system applications access control and presence, both software that centralizes system and control software and user management, identifying its installation and configuration parameters.

CE3.4 Schedule and parameterize the terminal access control and presence, and biometrics, following technical requirements of the project.

CE3.5 Explain the processes of initial system load access control and presence.

CE3.6 Describe the functionality of the tools generating backups that are used in access control systems and presence, identifying the installation and configuration parameters.

CE3.7 Querying and reporting of information recorded in the system access control and presence, using specific tools specific to the system, taking into account the applicable rules on data protection.

CE3.8 In a practical course, properly characterized, commissioning system access control and presence:

- Configure the computer system.

- Install software applications system-wide access control and presence, having identified all devices and system equipment.

- Configure system parameters access control controllers and access control terminals.

- Configure system parameters access control servers and the Portillones.

- Test the functionality of the system, ensuring that conforms to the specifications received.

- Develop the plan documentation through engineering journal.

- Elaborate security document taking into account the applicable rules on data protection.

C4: Put equipment and video surveillance system devices and their applications and configurations in service, taking into account the associated technical specifications.

CE4.1 Describe the features and functionality of the devices and equipment that make up the video surveillance system, identifying its configuration parameters.

CE4.2 Identify the main functions performed by the computer system used for managing and monitoring video surveillance system.

CE4.3 Explain the features and functionality of control applications, management and mapping used in the video surveillance system, identifying the installation and configuration parameters.

CE4.4 Describe the functionality of the software application that centralizes control video surveillance system, identifying the installation and configuration parameters.

Quote CE4.5 legislation on data protection when processing information registered and recorded in the video surveillance system.

CE4.6 Describe the functionality of the tools generating backups that are used in video surveillance systems, identifying the installation and configuration parameters.

CE4.7 In a practical course adequately characterized and commissioning of a video surveillance system, according to project specifications:

- Configure the computer system.

- Install the software applications of all the video surveillance system, identifying all devices and system equipment involved.

- Configure system parameters CCTV controllers and servers recording.

- Test the functionality of the system.

- Develop the plan documentation through Engineering Journal.

- Elaborate security document taking into account the applicable rules on data protection.

C5: Describe maintenance procedures and resolve incidents systems access control and presence and video surveillance, to keep the system operational.

CE5.1 Describe the processes of maintenance of equipment and devices forming systems access control and presence detection and video surveillance parameters identifying optimal functionality.


CE5.2 Develop and update maintenance procedures establishing the number of revisions and preventive actions to be taken in each revision of the system.

CE5.3 Identify new features and improvements in hardware and software components of systems access control and presence detection and video surveillance in the market, to propose compatible updates.

CE5.4 Sort the type and characteristics of the faults of physical and logical nature presented in systems access control and presence detection and video surveillance.

Ce5.5 Describe the general technical and specific technical means for troubleshooting physical and logical nature in systems access control and presence detection and video surveillance.

CE5.6 In a duly characterized, diagnosis, localization and troubleshooting systems access control and video surveillance presence and practical course:

- Interpret system documentation, identifying the various functional blocks and specific components that comprise it.

- Identify the symptoms of damage characterizing the effects it produces and perform an intervention plan in the system to determine its cause or causes.

- Locate the (physical or logical) element responsible for the failure and perform the replacement (using similar components or equivalent) or modification of the element configuration and / or program, applying the procedures required and in a timely manner .

- Perform the checks, modifications and adjustments to the system parameters, as specified in the technical documentation thereof, using appropriate tools that allow putting them in each case.

- Prepare a report-memory of the activities and results, structuring it in sections necessary for proper documentation (description of the process followed, means used, measurements, functional explanation and diagrams).

Capabilities whose acquisition should be completed in a real working environment:

C1 respect CE1.4; C2 respect to CE2.5; C3 respect CE3.8; C4 respect CE4.7; C5 respect CE5.6.
Other capabilities
:

Finish work according to criteria of suitability, speed, economy and efficiency.

Demonstrate a degree of autonomy in the resolution of contingencies related to their activity.

Adapt to the organization, its organizational and technological changes and new situations or contexts.

Interpret and execute instructions work.

Demonstrate flexibility to understand the changes.
Respect
procedures and internal rules of the organization.



Contents:





1. Risk analysis



The safety wheel.

The categorization of risk.

Risk levels.

Assets to protect: human resources, tangible goods and information protection.

Analyzing the risk of a company.

The importance of physical security in an enterprise and integration with other departments. The threat of intrusion: Intrusion risk mitigation.



2. Projects of physical security, access control systems and video surveillance and presence



Projects and specifications.

Technical documentation of a project report, plans, specifications and budget. Planning the characteristics of a comprehensive security project tasks.



3. The comprehensive security system and its components



Need to integrate a security system.

The comprehensive security system and its subsystems.

Examining the system access control and presence.

Examining the video surveillance system.

Integrating system access control and presence and video surveillance.



4. Legal Environment



Applicable regulations regarding data protection.

Applicable regulations on private security.



5. Interconnection of the elements of the integrated security system



Infrastructure physical security systems, access control systems and video surveillance and presence.

Devices and protocols for IP communications networks.

Type wiring and connections for system access control, presence and video surveillance. Types of technologies for system access control, presence and video surveillance.

Types of protocols for system access control, presence and video surveillance.




6. systems access control and presence



Function of a control system access and presence in the company.

Elements that make up a system access control and presence, hardware and software components: features, functionality, parameters, configuration tools.

Configuration and parameterization of system access control and presence.

Biometrics as an enhancer of access control.

Supports personal accreditation.

Beyond access control systems: support for logical security systems.



7. Video surveillance systems



Function of a video surveillance system in the company.

Elements that make up a system access control and presence, hardware and software components: features, functionality, parameters, configuration tools.

Configuration and parameterization of video surveillance system.

Connection CRA (Central Station Alarm).



8. Maintenance of access control systems and video surveillance and presence



Types and monitoring procedures and preventive maintenance of equipment.

Types of alarms and malfunctions of equipment systems access control and presence and video surveillance.

Techniques and diagnostic tools and troubleshooting systems access control and presence and video surveillance.

The contingency plan: analysis and interpretation.



Parameters context of training:





Spaces and facilities:



The spaces and facilities will answer in the form of classroom, classroom-workshop, practices, or unique space laboratory, the training needs in accordance with established professional context Competence Associated Unit, taking into account applicable regulations of the productive sector, risk prevention, occupational health, universal accessibility and environmental protection.



professional trainer or trainer profile:



1. Mastery of knowledge and techniques related to the implementation and maintenance of systems access control and presence and video surveillance, which is accredited by one of the following two ways:

- Academic Training Level 2 (Spanish Qualifications Framework for Higher Education), Technical Engineer, Diploma or other top-level related to the professional field.

- Professional experience of at least 2 years in the field of skills related to this training module

2. pedagogical competence accredited in accordance with established by the competent authorities.
ANNEX XVIII


Professional qualification: Second Level Maintenance Systems Radio



Professional Family: Computers and Communications





Level: 3





Code: IFC366_3





General competence



Organize and coordinate the implementation processes and preventive maintenance, and resolve incidents and complaints received directly or scaled by the lower level, local wireless networks and metropolitan area, and in systems of fixed and mobile radio, ensuring availability, safety, optimum performance and functionality of services.



Competence units



UC1221_3: Organize and manage commissioning and maintenance of wireless local area networks and metropolitan

UC1222_3: Coordinate commissioning of radio systems fixed and mobile networks

UC1223_3: Manage the maintenance of radio communications systems fixed and mobile networks



Professional environment





Professional field



Develops his professional activity in the maintenance area dedicated to communication networks, public entities and private, companies small, medium, large or micro, both self-employed and others, regardless of their legal form . Operates depending where applicable, functional and / or hierarchically, from a superior. You can have your staff sometimes seasonally or stably. In the development of professional activity universal accessibility principles apply in accordance with applicable regulations.



Productive Sectors




It is located primarily in the communications sector, in the subsectors of the installation, maintenance and technical assistance to communications networks in operation and service communications and in any productive sector in which they need to manage radio networks.



Occupations and relevant jobs



The terms of the following list of occupations and jobs are used with generic and all-encompassing nature of women and men.

Experts in maintenance and second level support in radio systems

Experts WLAN networks and systems

Supervisors wireless network operations

RF measurement experts in outside plant and inside



Associate Training

(600 hours)





Training modules



MF1221_3: Planning and maintenance of wireless LANs and metropolitan area (210 hours)

MF1222_3: Managing the commissioning of radio systems fixed and mobile networks (180 hours)

MF1223_3: Maintenance management of radio systems fixed and mobile networks (210 hours)



COMPETITION UNIT 1: MANAGE AND ORGANIZE THE COMMISSIONING AND MAINTENANCE OF WIRELESS LOCAL AREA NETWORKS AND METROPOLITAN





Level: 3





Code: UC1221_3





professional accomplishments and performance criteria:



RP 1: Schedule the project implementation to commissioning and configuration of wireless local and metropolitan area, adapting, if necessary, the project and optimizing the means and resources available.

CR 1.1 The technical information in the study phase prior to the installation of a wireless network is organized in order to participate in the development and installation project documentation, contrasting with usage needs and ensuring compliance of customer requirements.

CR 1.2 The technical specifications of the project are interpreted in order to identify the architecture, topology and elements to implement and service, following rules defined by the organization.

CR 1.3 The final location and number of access points and / or base stations in metropolitan networks is decided according to the technical specifications received, to ensure network functionality.

CR 1.4 The configuration parameters of devices and equipment, access points and base stations metropolitan networks, as well as the indoor unit subscriber of a fixed link is planned metropolitan area to ensure functionality of the entire network, following the specifications of the project.

CR 1.5 Test procedures of operation of the network are made according to the specifications of the project and the manufacturer's specifications.

CR 1.6 Expanding coverage of local wireless networks or large areas of complete buildings is planned, using appropriate network topologies, always guaranteeing the quality of service, following technical specifications received and according to usage needs.

CR 1.7 Local public access areas (Hotspot) are configured to authenticate users association, redirect to web portal system and monitor the beginning and end of each session, according to the technical specifications and requirements received use.

CR 1.8 The convergence between mobile devices and wireless network is set taking into account the multiple existing market technologies based on user location criteria, required application and service quality among others.
CR 1.9
activities and detected incidents are documented in a standardized format for later use, following the standards set by the organization.

RP 2: Coordinate the implementation of the project and work teams for commissioning and configuring wireless LANs and metropolitan area, from the programming done.

CR 2.1 Installation of access points and / or base stations in metropolitan networks coordinated received following the technical specifications to ensure network functionality.

CR 2.2 The configuration parameters of devices and equipment, access points, the base stations metropolitan networks, as well as the indoor unit subscriber of a fixed link is verified metropolitan area, for ensure the functionality of the entire network, following specifications in the project.


CR 2.3 The configuration of local public access areas (Hotspot) is checked to ensure user authentication, redirect to web portal system and monitor the beginning and end of each session, according to the technical specifications received and usage needs.

CR 2.4 The wireless network is configured to allow the association of different types of mobile devices according to many existing technologies in the market, according to criteria of user location, and application required quality of service among others.

CR 2.5 The execution of test procedures of operation of the network are coordinated to ensure quality of service, according to the specifications of the project.
CR 2.6
activities and detected incidents are documented in a standardized format for later use, following the standards set by the organization.

RP 3: Define and configure the security of wireless local and metropolitan area, depending on the environment and features thereof, to maintain the integrity and privacy of the network.
CR 3.1
physical security measures and access restrictions to comply, are planned and coordinated execution to avoid misuse of the resources provided by communications devices, according to the security plan of the organization.

CR 3.2 Safety data traffic between the wireless and wired network is configured by selecting the most appropriate services for each case, sub-addressing IP, VLAN segmentation, encryption keys and encryption keys, and ensuring interoperability existing standards, depending on the technical specifications received and usage needs.

CR 3.3 Safety parameters of mobile and fixed equipment associated to the wireless network, are configured to ensure safety with respect to other users and services own network, according to usage needs and following standards internal work.

CR 3.4 Security mechanisms available access points are activated and configured depending on the specific characteristics of each, following the instructions provided by the manufacturer, adapting to network services required in the project implementation and following the specifications.

CR 3.5 remote access tools are used for setting security parameters of the equipment and devices installed, taking into account technical specifications.

CR 3.6 The user authentication server that is associated with the wireless network is configured using techniques that require authentication user name and password as a prerequisite to the start of data tra