Advanced Search

Order Pre / 1636/2015 Of 23 July, Which Are Updated Eighteen Professional Qualifications Of The Professional Family Informatics And Communications, Included In The National Catalogue Of Professional Qualifications, Established By Royal De ...

Original Language Title: Orden PRE/1636/2015,de 23 de julio, por la que se actualizan dieciocho cualificaciones profesionales de la familia profesional Informática y Comunicaciones, recogidas en el Catálogo Nacional de Cualificaciones Profesionales, establecidas por Real De...

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

TEXT

The Organic Law of 19 June, of the Qualifications and Vocational Training, aims at the ordination of a comprehensive system of vocational training, qualifications and accreditation, which responds effectively and transparently to social and economic demands through the various forms of training. To this end, it creates the National System of Qualifications and Vocational Training, defining it in article 2.1 as the set of instruments and actions necessary to promote and develop the integration of the offers of vocational training, through the National Catalogue of Professional Qualifications, as well as the evaluation and accreditation of the corresponding professional skills, in order to promote the professional and social development of the people and to cover the needs of the productive system.

The National Catalogue of Professional Qualifications, as set out in Article 7.1, is designed to facilitate the integrated nature and adequacy of vocational training and the labour market, as well as training throughout life, the mobility of workers and the unity of the labour market. This catalogue consists of the qualifications identified in the production system and the training associated with them, which is organised in training modules.

Article 5.3 of the Organic Law of 19 June, gives the National Institute of Qualifications, the responsibility to define, develop and maintain the National Catalogue of Professional Qualifications, as a technical organ of support to the General Council of Vocational Training, whose regulatory development is included in Article 9.2 of Royal Decree 1128/2003 of 5 September, which regulates the National Catalogue of Professional Qualifications, established in Article 9.4, the obligation to maintain permanently updated by its periodic review which, in any event, must be carried out within a period of not more than five years from the date of inclusion of the qualification in the catalogue.

Thus, in this order they are updated, as a complete replacement of their annexes, eighteen professional qualifications of the Professional Family Informatics and Communications that have an age in the National Catalogue of Professional Qualifications equal to or greater than five years, to which the Royal Decree 817/2014, of 26 September. In addition, certain professional qualifications are partially modified by the replacement of certain cross-cutting competence units and their associated training modules, which are included in the updated professional qualifications set out in the annexes to this order.

In the process of drafting this order, the Autonomous Communities have been consulted and the General Council of Vocational Training and the State School Council have issued a report.

Under the joint proposal of the Minister for Education, Culture and Sport and the Minister for Employment and Social Security, I have:

Article 1. Object and scope of application.

This ministerial order aims to update 18 professional qualifications corresponding to the Professional Family and Communications, with the replacement of the corresponding annexes, and to partially modify certain professional qualifications by replacing certain units of competence and associated training modules, in application of Royal Decree 817/2014 of 26 September, laying down the specific aspects of professional qualifications for the modification, Article 7.3 of the Organic Law of 19 June on qualifications and vocational training is applicable to the procedure for approval and effect.

The professional qualifications updated and those partially modified by this procedure are valid and apply throughout the national territory, and do not constitute a regulation of professional practice.

Article 2. Updating of certain professional qualifications of the Professional Family and Communications established by Royal Decree 295/2004 of 20 February establishing certain professional qualifications which are included in the National Catalogue of Professional Qualifications, as well as their corresponding training modules which are incorporated into the Modular Catalogue of Vocational Training.

As set out in the unique additional provision of Royal Decree 295/2004 of 20 February 2004, the updating of professional qualifications, the specifications of which are contained in Annexes LXXVIII, LXXIX and LXXXI to the royal decree, is based on:

One. A new wording is given to Annex LXXVIII, Professional Qualification "Microcomputer Systems". Level 2. IFC078_2, which is listed as Annex I to this order.

Two. A new wording is given to Annex LXXIX, Professional Qualification "Database administration". Level 3. IFC079_3, which is listed as Annex II to this order.

Three. A new wording is given to Annex LXXXI, Professional Qualification "Administration and design of departmental networks". Level 3. IFC081_3, which is listed as Annex III to this order.

Article 3. Updating of certain professional qualifications of the Professional Family and Communications established by Royal Decree 1087/2005 of 16 September 2005 establishing new professional qualifications, which are included in the National Catalogue of Professional Qualifications, as well as their corresponding training modules, which are incorporated into the Modular Catalogue of Vocational Training, and update certain professional qualifications as established by Royal Decree 295/2004 of 20 February.

As set out in the unique additional provision of Royal Decree 1087/2005 of 16 September 2005, the updating of professional qualifications, the specifications of which are contained in the Annexes CLII, CLIA and CLIV of the Royal Decree, is based on:

One. A new wording is given to Annex CLII, Professional Qualification "Management of computer systems". Level 3. IFC152_3, which is listed as Annex IV to this order.

Two. A new wording is given to Annex CLIA, Professional Qualification "Computer Security". Level 3. IFC153_3, which is listed as Annex V to this order.

Three. A new wording is given to the Annex CLIV, Professional Qualification "Developing applications with web technologies". Level 3. IFC154_3, which is listed as Annex VI to this order.

Article 4. Update of certain professional qualifications established by Royal Decree 1201/2007 of 14 September, supplementing the National Catalogue of Professional Qualifications, by establishing eight new professional qualifications in the Professional Family and Communications.

As set out in the single additional provision of Royal Decree 1201/2007 of 14 September, the updating of professional qualifications, the specifications of which are contained in the Annexes CCXCVII, CCXCVIII, CCXCIX, CCC, CCIIC and CCCIII of the royal decree, is based on:

One. A new wording is given to Annex CCXCVII, Professional Qualification "Clothing and publication of web pages". Level 2. IFC297_2, which is listed as Annex VII to this order.

Two. A new wording is given to Annex CCXCVIII, Professional Qualification "Assembly and repair of microcomputer systems". Level 2. IFC298_2, which is listed as Annex VIII to this order.

Three. A new wording is given to Annex CCXCIX, Professional Qualification "Operation of Departmental Networks". Level 2. IFC299_2, which is listed as Annex IX to this order.

Four. A new wording is given to the Annex CCC, Professional Qualification 'Operation of computer systems'. Level 2. IFC300_2, which is listed as Annex X to this order.

Five. A new wording is given to the CCIIC Annex, Professional Qualification "Management of voice and data networks". Level 3. IFC302_3, which is listed as Annex XI to this order.

Six. A new wording is given to Annex CCIII, Professional Qualification "Programming of computer systems". Level 3. IFC303_3, which is listed as Annex XII to this order.

Article 5. Updating of certain professional qualifications established by Royal Decree 1701/2007 of 14 December 2007, which complements the National Catalogue of Professional Qualifications, by establishing six professional qualifications for the Professional Family and Communications.

As set out in Royal Decree 1701/2007's unique additional provision of 14 December 2007, the updating of professional qualifications, the specifications of which are contained in the Annexes CCCLXI, CCCLXII, CCCLXIII, CCCLXIV, CCCLXV and CCCLXVI of the said royal decree, is applicable:

One. A new wording is given to Annex CCCLXI, Professional Qualification "Auxiliary operations for the assembly and maintenance of microcomputer systems". Level 1. IFC361_1, which is listed as Annex XIII to this order.

Two. A new wording is given to Annex CCCLXII, Professional Qualification "First level maintenance in radio communications systems". Level 2. IFC362_2, which is listed as Annex XIV to this order.

Three. A new wording is given to Annex CCCLXIII, Professional Qualification "Administration and Programming in Business Resource Planning and Customer Relationship Management Systems". Level 3. IFC363_3, which is listed as Annex XV to this order.

Four. A new wording is given to Annex CCCLXIV, Professional Qualification "Management and monitoring of alarms in communications networks". Level 3. IFC364_3, which is listed as Annex XVI to this order.

Five. A new wording is given to the Annex OR CCCLXV, Professional Qualification "Implementation and management of computer elements in home/inmotic systems, access control and presence, and video surveillance". Level 3. IFC365_3, which is listed as Annex XVII to this order.

Six. A new wording is given to Annex CCCLXVI, Professional Qualification PROFESSIONAL "Second level maintenance in radio communications systems". Level 3. IFC366_3, which is listed as Annex XVIII to this order.

Article 6. Partial modification of a professional qualification of the Professional Family and Communications established by Royal Decree 295/2004 of 20 February, establishing certain professional qualifications which are included in the National Catalogue of Professional Qualifications, as well as their corresponding training modules which are incorporated into the Modular Catalogue of Vocational Training.

As set out in the unique additional provision of Royal Decree 295/2004 of 20 February 2004, the professional qualification whose specifications are contained in Annex LXXX of the Royal Decree 295/2004 is updated as follows:

The professional qualification established as " Annex LXXX: Programming with language oriented languages and relational databases is modified. Level 3. IFC080_3 "replacing the" UC0223_3: Configure and Exploit Computer Systems "competition unit and the associated training module" MF0223_3: Operating systems and computer applications (150 h) "by the competition unit" UC0223_3: Configure and exploit computer systems "and the associated training module" MF0223_3: Operating systems and computer applications (180 h) ", corresponding to Annex II" Database administration. Level 3. In this order, the total duration of the training associated with the qualification of 610 hours at 640 hours was also modified.

Article 7. Partial modification of certain professional qualifications of the Professional Family Informatics and Communications established by Royal Decree 1087/2005, of 16 September, establishing new professional qualifications, which are included in the National Catalogue of Professional Qualifications, as well as their corresponding training modules, which are incorporated into the Modular Catalogue of Vocational Training, and are updated certain professional qualifications of those established by Royal Decree 295/2004, of 20 February.

As set out in the unique additional provision of Royal Decree 1087/2005 of 16 September 2005, the updating of professional qualifications, the specifications of which are contained in Annex CLVI to the Royal Decree, is based on:

One. The professional qualification established as "Annex CLV: Programming in structured languages of management applications" is amended, respectively, the competition unit "UC0223_3: Set up and operate computer systems" and the associated training module "MF0223_3: Operating systems and computer applications (150 h)" by the competition unit "UC0223_3: Configure and exploit computer systems" and the associated training module "MF0223_3: Operating systems and computer applications (180 h)", corresponding to Annex II " Administration of databases. Level 3. IFC079_3 " of this order, also modifying the total duration of the training associated with the qualification from 600 hours to 630 hours.

Two. The professional qualification established as "Annex CLVI: Administration of Internet Services" is amended. Level 3. IFC156_3 ", respectively, the unit of competence" UC0490_3: Manage services in the computer system "and the associated training module" MF0490_3: Management of services in the computer system. (90 h) "for the unit of competence" UC0490_3: Manage services in the computer system "and the associated training module" MF0490_3: Management of services in the computer system. (90 h) ", corresponding to Annex V" Computer security. Level 3. IFC153_3 ' of this order.

Article 8. Partial modification of a professional qualification established by Royal Decree 1201/2007, of 14 September, which complements the National Catalogue of Professional Qualifications, by establishing eight new professional qualifications in the Professional Family Informatics and Communications.

As set out in the unique additional provision of Royal Decree 1201/2007 of 14 September, the updating of the professional qualification whose specifications are contained in the CCCI Annex to the Royal Decree 1201/2007 is applicable:

The professional qualification established as " Annex CCCI: Operation in voice and data communications systems is modified. Level 2. IFC301_2 "replacing, respectively, the competition unit" UC0956_2: Conducting the processes of connection between private networks and public networks "and the associated training module" MF0956_2: Interconnection of private networks and public networks. (150 h) "by the competition unit" UC0956_2: Perform the processes of connection between private networks and public networks "and the associated training module" MF0956_2: Interconnection of private networks and public networks. (150 h) ", corresponding to Annex IX" Operation of departmental networks. Level 2. IFC299_2 ' of this order.

Final disposition first. Competence title.

This order is dictated by the powers conferred on the State by Article 149.1.1. and the 30th of the Constitution, on the regulation of the basic conditions that guarantee the equality of all Spaniards in the exercise of rights and in the fulfilment of constitutional duties, and for the regulation of the conditions for obtaining, issuing and approval of academic and professional titles.

Final disposition second. Entry into force.

This ministerial order shall enter into force on the day following that of its publication in the Official Gazette of the State.

Madrid, July 23, 2015. -Vice President of the Government and Minister of the Presidency, Soraya Saenz of Santamaria Anton.

ANNEX I

Professional qualification: Microcomputer systems

Professional Family: Informatics and Communications

Level: 2

Code: IFC078_2

General Competition

Install, configure, and maintain microcomputer systems for use as well as support the user in managing applications on such systems as part of an organization's IT support service.

Competition Units

UC0219_2: Install and configure base software on microcomputer systems

UC0220_2: Install, configure, and verify local network elements according to established procedures

UC0221_2: Install, configure, and maintain general purpose computer packages and specific applications

UC0222_2: Facilitating the user to use general purpose computer packages and specific applications

Professional Environment

Professional Scope

Develops its professional activity in the area of computer support, both in-person and remote, dedicated to the microcomputer systems, in entities of public or private nature, small, medium, large or micro-sized enterprises, both self-employed and foreign, regardless of their legal form. It develops its activity depending on its case, functionally or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located in the service sector in the subsector of suppliers and distributors of computer and communications services, and in the marketing of microcomputer equipment and the provision of microcomputer technical assistance services as well as in any productive sector that uses microcomputer systems for its management.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Microcomputer equipment installers

Microcomputer Repairers

Teleassistance Operators

Teleassistance Administrators

Support personnel

Associated Training (600 hours)

Training Modules

MF0219_2: Installing and configuring operating systems (120 hours)

MF0220_2: Deployment of local network elements (210 hours)

MF0221_2: Installing and configuring computer applications (60 hours)

MF0222_2: Microcomputer applications (210 hours)

COMPETITION UNIT 1: INSTALL AND CONFIGURE BASE SOFTWARE ON MICROCOMPUTER SYSTEMS

Level: 2

Code: UC0219_2

Professional Realizations and Realization Criteria:

RP 1: Perform operating system installation processes for use in microcomputer systems, following specifications received.

CR 1.1 The characteristics of the operating systems and the templates are classified, to decide the version to be installed and the type of installation, depending on the technical specifications received.

CR 1.2 Operating system installation requirements and templates are checked, to verify that there is sufficient resources and compatibility on the installation's target team, following the established procedure.

CR 1.3 The installation's target team prepares to locate the operating system, enabling the infrastructure on the mass storage devices, as well as the necessary connections, according to the technical specifications received.

CR 1.4 The operating system is installed by applying the processes indicated in the installation manuals that accompany it, using an image, in its case, to obtain a computer equipment in a functional state, following the established procedure.

CR 1.5 The operating system is configured for operation, within the specified parameters, following the established procedures and as indicated in the technical documentation.

CR 1.6 The utilities included in the operating system are installed for use, according to the technical specifications received.

CR 1.7 Programs running on servers for later publishing are installed, according to the technical specifications received.

CR 1.8 Installation verification is performed to check the functionality of the operating system, by starting and stopping testing, and performance analysis, following established procedures.

CR 1.9 The documentation of the processes performed is made and archived for later use, following the internal models established by the organization.

RP 2: Update the operating system to ensure its operation, following technical specifications received and organization procedures.

CR 2.1 Base software versions, system add-ons, and device drivers are checked to ensure their suitability, following the established procedure.

CR 2.2 The outdated versions of the base software, system add-ons, and device drivers are identified to proceed to update and ensure their functionality, following established technical specifications and procedures.

CR 2.3 Add-ons and 'patches' for the operation of the base software are installed and configured, indicating the system administrator to maintain security on the system, in accordance with established procedures.

CR 2.4 Update verification is performed, to test the functionality of the operating system by starting and stopping tests, and performance analysis, according to established procedures.

CR 2.5 The documentation of the processes performed is elaborated and archived for later use, according to the rules established by the organization.

RP 3: Explain the functionality of the microcomputer system through the use of base software and standard applications, taking into account the needs of use.

CR 3.1 The functions and applications provided by the base software are identified for use, in accordance with the instructions in the technical documentation and usage needs.

CR 3.2 File system operations are performed using the interface provided by the operating system, following technical specifications and according to usage needs.

CR 3.3 The configuration tools provided by the operating system are run to select options from the workbench, according to received specifications and usage needs.

CR 3.4 Application execution processes are performed, to exploit the functions of each of them according to operational and functional needs.

CR 3.5 The messages provided by the base software are interpreted, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications given by the organization.

CR 3.6 The procedures for the use and management by users of the peripherals connected to the microcomputer system are performed to exploit their functionalities, following the technical documentation and procedures stipulated by the organization.

Professional Context:

Production media:

Computer equipment. Peripherals. Operating systems. Utilities and applications built into operating systems. Update versions of operating systems. Disk cloning tools. Technical documentation associated with the operating systems. Utilities not incorporated into the operating system. Mass storage devices.

Products and results:

Computer equipment with installed and configured operating systems. Operating systems configured and operating. Logically organized computer equipment. Updated operating systems. Published applications available.

Information used or generated:

Manuals and technical documentation of operating systems. Operating system upgrade manuals. Manuals for applications included in the operating system and those published. Operating system installation, configuration, and upgrade reports. Safety and quality plan of the organization. Incident management applications.

COMPETITION UNIT 2: INSTALL, CONFIGURE, AND VERIFY LOCAL NETWORK ELEMENTS ACCORDING TO ESTABLISHED PROCEDURES

Level: 2

Code: UC0220_2

Professional Realizations and Realization Criteria:

RP 1: Install and configure local network nodes and software to implement internal communications services, following established procedures.

CR 1.1 The modules of the network equipment are installed to provide the specified connectivity characteristics according to the physical configuration indicated and following the established procedures.

CR 1.2 The 'firmware' version of the network equipment is installed or updated according to its desired features and functionalities.

CR 1.3 The installation and configuration processes of the local network devices are documented for registration using the formats indicated by the organization according to the established procedure.

RP 2: Perform the minimum network node configuration for further management, following established procedures.

CR 2.1 The network connection is determined and configured for network equipment management, based on the network topology.

CR 2.2 The operation of the management protocols (SNMP, Telnet, SSH, CDP, among others) required for remote management of the communications equipment is enabled and checked against the specifications of the project or the rules and procedures of the organization.

CR 2.3 The configuration done is documented using the formats indicated by the organization.

CR 2.4 The network node is prepared/embedded for transport if the equipment is to be referred to another site, taking care not to deteriorate during the same.

RP 3: Install the network node at its definitive location, allowing subsequent access to it according to organization specifications.

CR 3.1 The equipment is installed in the final frame according to the manufacturer's instructions and taking into account the environmental conditions of temperature and humidity.

CR 3.2 Electrical connections are performed according to the procedure established by the organization, taking into account the connection to independent circuits in the case of equipment with redundant power supply and verifying the grounding.

CR 3.3 Network node data connections are made following the organization's specifications and the device is accessible for remote management.

CR 3.4 The installation performed is documented indicating the interconnections made, following the rules or procedures of the organization.

RP 4: Configure the device to ensure its functionality in the network according to the procedures established by the organization.

CR 4.1 The protocols associated with the installed network applications are configured on the servers to support the services implemented according to the installation manuals and following the specifications received.

CR 4.2 The routers and switches are configured to manage protocols and services according to received specifications and predefined work procedures.

CR 4.3 The encryption software is installed and configured on network nodes to be determined according to the specifications received and procedures set to create virtual private networks.

CR 4.4 Functional tests of the configuration of the communications devices are performed to ensure conformity of the same with respect to the requirements set forth in the operational specification of the organization.

CR 4.5 The network node is included in the network infrastructure monitoring systems, including the collection of its characteristic operating parameters (managed frames, used bandwidth, errors/collisions, among others).

CR 4.6 The configuration operations performed are documented, following the procedures set by the organization.

RP 5: Manage the detected incidents on the network devices to correct or report them, based on the established protocols and the predefined procedures.

CR 5.1 Incident notification systems are observed to address potential alarms according to the operational and security procedures of the organization.

CR 5.2 The location of the element in which the incident occurred is performed by the interpretation of the information received and the technical documentation, to isolate the physical and logical problem, according to the technical documentation and the protocols of action of the organization to contingencies.

CR 5.3 The symptoms reported by the user or the incident management systems are verified to obtain a diagnosis of the problem according to the technical documentation.

CR 5.4 The detected and isolated incidence is diagnosed and its solution is proposed to rehabilitate disrupted or impaired services, according to quality standards and contingency plans.

CR 5.5 The incidence that has not been isolated is reported to the level of responsibility for its management according to the protocols and procedures of the organization's actions.

CR 5.6 The repair of the incident is performed with the appropriate tools and respecting the safety standards established by the organization.

CR 5.7 The documentation of the detection, diagnosis and solution of the incident is made to perform the registration of the same according to the protocols of the organization.

CR 5.8 Incident status information is transmitted to the end user to complete the process of its management according to the organization's regulations.

Professional Context:

Production media:

Network Parsers. Cabling certifiers. Manual tools for electrical and mechanical work. Software tools for connectivity testing. Software tools for network item inventory control. Computers, printers and peripherals. Operating systems. Hubs, switches, routers. Network cards. Cables and connectors. Network client software. Network management software. Software that owns the network devices. Office tools. Map of the network.

Products and results:

Communication equipment connected to the data lines. Local network installed and configured according to specifications. Inventory and descriptive record of physical network communications devices and their configuration.

Information used or generated:

Map of the network. Inventory of the organization's hardware. Work orders. Network documentation. Installation manuals for the devices. Device configuration manuals. Operational specifications of the organisation. Quality manual. Standards and quality criteria of the organisation. Safety plan. Maintenance plan. Applicable environmental legislation. Applicable regulations on safety and hygiene at work. Reliable and up to date network documentation.

COMPETITION UNIT 3: INSTALL, CONFIGURE, AND MAINTAIN GENERAL PURPOSE COMPUTER PACKAGES AND SPECIFIC APPLICATIONS

Level: 2

Code: UC0221_2

Professional Realizations and Realization Criteria:

RP 1: Install, configure, and update general purpose computer packages, utilities, and specific applications for later exploitation by users and according to the guidelines received.

CR 1.1 The configuration of parameters and definitions in the equipment of the data network infrastructure is determined individually with the values set in the design, ensuring its compatibility with the characteristics of the machine and the operating system described in the technical documentation on which it will be installed and the specifications established.

CR 1.2 The application or utility is installed and configured by following the established procedure and using the tools of the application itself, remote communication tools, or the operating system.

CR 1.3 Software update is carried out by ensuring the integrity of the equipment and the availability of the information.

CR 1.4 The incidents that appear are resolved by consulting the technical documentation or by using the network administrator.

CR 1.5 Established tests are performed by checking that all packages have been installed and that the application works in all aspects such as peripheral access, network access, or server access, among others.

CR 1.6 Previously installed applications are tested by verifying that the installation of the application or utility has not impaired its operation.

CR 1.7 Installation and configuration are documented including the relevant details in the team documentation, the generated incidents and referencing media and records in the set formats.

CR 1.8 Software installation media are saved in a way that allows them to be used later.

RP 2: Solve the incidents that occur in the exploitation of the applications to assist the user, identifying their nature, in the time and the level of quality required in the internal rules of the organization.

CR 2.1 User assistance is performed taking into account established interpersonal communication techniques, identifying the required performance, meeting the needs and demands of the user and ensuring the outcome of the action.

CR 2.2 The affected software components are reinstalled, updated, or configured with the appropriate parameters according to the specifications set forth in the technical documentation and usage needs.

CR 2.3 Preventive safety measures and possible alternative operating procedures are activated to maintain the integrity of the information and the continuity in the operation during the resolution of the problem, following the established procedures.

CR 2.4 The original information is restored and updated, following the established protocol, so that the system is back in operation.

CR 2.5 The verification of system operation, once restored, is performed to check its correct functionality by testing, following the specifications received.

CR 2.6 The actions performed are documented in the formats established for this purpose to facilitate their monitoring, updating the incident repository and the technical documentation of the installation and configuration of the system.

Professional Context:

Production media:

Computer and peripheral equipment. Security and antivirus software, specific applications. Error detection, diagnosis, and repair tools (at local or remote). Installation and upgrade software tools. Updates and patches. Mobile devices. Collaborative management software. Installation elements (help programs, manuals, licenses). Backup and recovery software. Media for backups. Internet access.

Products and results:

Software packages, utilities, and specific applications installed or updated. Incidents of applications resolved.

Information used or generated:

Application or application software installation manuals. Application exploitation guide. Incident and historical parts of incidents. Documentation for the installation. Request for user assistance. Internal rules of the company on customer service and confidentiality of information. Applicable rules on data protection and intellectual property, among others. Incident management applications.

COMPETITION UNIT 4: MAKE IT EASIER FOR THE USER TO USE GENERAL PURPOSE COMPUTER PACKAGES AND SPECIFIC APPLICATIONS

Level: 2

Code: UC0222_2

Professional Realizations and Realization Criteria:

RP 1: Facilitate users to exploit the software packages through training for their use.

CR 1.1 New applications or installed versions are displayed to users, explaining the differences to ensure an effective transition.

CR 1.2 The operating instructions for the installed application or new version are made by making it easier for users to understand them.

CR 1.3 Utilities such as antivirus, compression programs, and others are explained to users so that there is no doubt in their handling.

CR 1.4 The application of security policies such as backup, folder protection, and shared folder usage among others are explained to users so that there is no doubt of use.

CR 1.5 Applications that allow you to navigate through web pages, communicate in a conference or download files among others are explained to users in a way that they understand their main advantages and can perform their work efficiently.

RP 2: Facilitate users to exploit the software packages by working directly.

CR 2.1 The document templates are prepared according to the instructions received, making it available to the users so that their access is known and easy and comfortable.

CR 2.2 The data import/export operations between applications are performed by ensuring their integrity.

CR 2.3 The images and graphics that are needed in the production of documents are elaborated by simple programs of creation and/or editing of images.

CR 2.4 The documents, spreadsheets and presentations made by the users are adapted, if necessary, to the corporate models.

CR 2.5 The documents produced following the corporate model are archived for further use or consultation, in the digital file repository following the established procedures.

Professional Context:

Production media:

Computer and peripheral equipment. Security and antivirus software, specific applications. Application template generation and diagnostic tools. Updates and patches. Mobile devices. Software for collaborative management and computer-assisted teaching. Internet access software.

Products and results:

Assist users in using applications. Instructions for using applications or versions. Templates and documents in the format of the organization. Input/output forms.

Information used or generated:

Application or application software installation manuals. Application exploitation guide. Incident and historical parts of incidents. Documentation for the installation. Request for user assistance. Internal rules for document normalization. Internal rules of the company on customer service and confidentiality of information. Applicable rules on data protection and intellectual property, among others.

TRAINING MODULE 1: INSTALLING AND CONFIGURING OPERATING SYSTEMS

Level: 2

Code: MF0219_2

Associated with UC: Install and configure base software on microcomputer systems

Duration: 120 hours

Assessment capabilities and criteria:

C1: Classify the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main architectures of microcomputer systems detailing the mission of each of its functional blocks.

CE1.2 Explain the concept of the operating system and identify the functions it performs in the microcomputer system.

CE1.3 Distinguished the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.

CE1.4 Classify operating systems and versions that are used in computer equipment detailing their main features and differences, according to technical specifications.

CE1.5 Identify the phases involved in the installation of the operating system by checking the requirements of the computer equipment to ensure the possibility of the installation.

C2: Apply installation and configuration processes for operating systems to activate the functionality of the computer equipment, according to specifications received.

CE2.1 In a practical, well-characterized scenario, installation of an operating system on a computer equipment for operation:

-Check that the computer equipment meets the requirements and has the necessary resources for the base software installation.

-Prepare the installation's target team by formatting and creating the indicated partitions.

-Install the operating system by following the steps in the technical documentation.

-Configure the system with the indicated parameters.

-Install the indicated utilities and verify the installation.

-Document the work done.

CE2.2 Identify the procedures that are used to automate the installation of operating systems on computer equipment of the same characteristics by using cloning software tools and other power-assisted installation tools.

CE2.3 In a practical, well-characterized scenario, installation of an operating system on computer equipment with the same characteristics:

-Prepare one of the computers to install the operating system and utilities.

-Install and configure the operating system and the indicated utilities.

-Select the software tool to perform the cloning of equipment and proceed to obtain the images of the installed system for later distribution.

-Implement, by means of disk image management tools, those obtained in multiple teams of equal characteristics to the original to enable them to activate their functional resources.

-Perform boot and stop tests to verify the installations.

-Document the work done.

C3: Update the operating system of a computer to include new features and solve security problems, based on technical specifications.

CE3.1 Identify the software components of an operating system capable of readjustment to perform your upgrade, taking into account your technical specifications.

CE3.2 Identify and classify the sources for obtaining update items to perform the operating system patch and update deployment processes.

CE3.3 Describe the procedures for updating the operating system taking into account the security and integrity of the information in the computer equipment.

CE3.4 In a practical, well-characterized scenario, updating an operating system for the incorporation of new features:

-Identify the components to be updated.

-Check software upgrade requirements.

-Update the specified components.

-Verify the processes performed and the absence of interferences with the other components of the system.

-Document the update processes.

C4: Use the applications that are provided by the operating systems, for the operation of the operating systems according to technical specifications.

CE4.1 Use the applications provided by the operating system describing its characteristics for the use and operation of the operating system, taking into account its technical specifications and functional needs.

CE4.2 Use the applications provided by the operating system for the disk organization and file system, according to the technical specifications received.

CE4.3 Use the accessibility options of the operating systems, to set up accessible environments for people with disabilities, according to technical and functional specifications.

CE4.4 Configure workbench options using the tools and applications provided by the operating system, following specifications received and usage needs.

CE4.5 Describe the applications provided by the operating system for the operation of the functionalities of the peripherals connected to the system, according to the needs of use.

CE4.6 Classify messages and warnings provided by the microcomputer system to discriminate its importance and criticality, and apply response procedures according to given instructions.

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.1 and CE2.3; C3 with respect to CE3.4.

Other capabilities:

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Maintain an assertive, empathetic and conciliatory attitude to others by demonstrating cordiality and kindness in the treatment.

Adapt to new situations or contexts.

Respect the organization's internal rules and procedures.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Computer architecture

Functional schema of a computer: subsystems.

The central processing unit and its elements: Internal memory, types and characteristics; input and output units; mass memory, types, and characteristics.

Buses: features and types.

Correspondence between the physical and logical subsystems of a computer.

2. Operating systems

Classification of operating systems.

Functions of an operating system.

Operating systems for microcomputer equipment: features and use.

Command Mode.

Graphic mode.

3. Installing operating systems

Procedures for installing operating systems.

Preparing the media: partitioned and formatted.

Installation types for an operating system: minimum, standard, and custom.

Device configurations.

Tools for disk cloning.

Upgrading of operating systems.

4. Operating system utilities

Features and functions.

Base software utilities: workbench configuration; file system administration and management; process and resource management; file management and editing.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation and configuration of the base software on microcomputer systems, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: DEPLOYING LOCAL NETWORK ELEMENTS

Level: 2

Code: MF0220_2

Associated with UC: Install, configure, and verify local network elements according to established procedures

Duration: 210 hours

Assessment capabilities and criteria:

C1: Classify the communications elements that make up a local network, to identify the components that make up the physical map.

CE1.1 Explain the topologies of a local network taking into account existing architectures and technologies.

CE1.2 List the elements that can be found on the physical map of a local network based on the scope and network infrastructures used.

CE1.3 Describe each of the elements of a local network, taking into account its associated features and functionalities.

CE1.4 In a scenario of classifying communications elements from a local network already installed:

-Develop your physical map according to received specifications.

-Develop your logical map according to received specifications.

CE1.5 Identify the applicable regulations and technical regulations affecting the implementation of local networks according to the procedures given.

C2: Apply the installation and configuration procedures for local network nodes, as well as protocol managers and other programs that support communications services.

CE2.1 List and explain the characteristics of the protocols that are configured in a local network taking into account the technology and standards used.

CE2.2 Explain the node routing system that is used in the local network based on the network technologies used.

CE2.3 In a scenario of installing and configuring the nodes in a network to implement internal communications services, according to received specifications:

-Identify the different network sockets of the nodes and their representation in the connection cabinet, interpreting the technical documentation.

-Select the appropriate tools to perform the installation.

-Install the network adapters along with their corresponding controllers.

-Install and configure the network protocols to use according to the specifications received.

-Install and configure the various network services according to the specifications received.

-Document the activities carried out, including all relevant aspects.

CE2.4 Apply the specified configuration to the active elements (switches and routers), making use of specified procedures.

CE2.5 Identify the applicable regulations and technical regulations affecting the implementation of local networks according to given specifications.

C3: Apply test and verification procedures for network connectivity elements and tools for these processes.

CE3.1 Explain the stages of a connectivity verification process on a local network.

CE3.2 List the tools used to verify connectivity in a local network, according to technologies implemented in local networks.

CE3.3 Explain the operational operation of network management tools to check the status of communications devices, taking into account the technical specifications of the tools.

CE3.4 In a convenient connection verification scenario on a local network already installed, and from given procedures:

-Verify the allowed and prohibited connection options.

-Verify access to shared resources, following given procedures.

-Document the test and verification processes performed, according to technical specifications.

C4: Set the configuration of the parameters of the communications protocols on the nodes of the network, for integration into the network itself, following given procedures.

CE4.1 Identify the parameters of the communications protocols to be configured, their function, and their range of allowed values.

CE4.2 Interpret the specifications of a particular communication protocol configuration, taking into account the needs of node integration in the network and the implementation of the corresponding services.

CE4.3 List the procedure to follow to apply a default configuration to a network node.

CE4.4 In a practical simulation, configure the different communication protocols according to given technical specifications.

CE4.5 Identify the configuration parameters of the protocols with transmission and encryption security features, for integration into secure networks taking into account the security criteria given.

CE4.6 Document the processes to be performed in the configuration of the protocols on the nodes of the local network according to given specifications.

C5: Understand the incidents of the communications elements of the local network, and proceed to your solution according to given specifications.

CE5.1 Describe the incidents that occur in the communications elements of the local networks, according to the communications technologies employed and the elements involved with them.

CE5.2 List the procedures and tools used for the detection of incidents of the communications elements of the local network, according to specifications of a defined contingency plan.

CE5.3 Describe the techniques and tools that are used to isolate and diagnose causes that have produced a reported incident on the network, as indicated in the contingency plan.

CE5.4 Explain the systematic incident resolution procedures of the communications elements of the local network, depending on the devices on which the incidents are detected.

CE5.5 In practical, properly characterized, simulated troubleshooting scenarios within a local network, according to specifications received and following a given procedure:

-Interpret the alarms generated by the incident detection system.

-Locate the element causing the incident.

-Resolve the incident by applying the preset procedures.

-Record the incident on the document set to the effect.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.3; C3 with respect to CE3.4; C5 with respect to CE5.5.

Other capabilities:

Take responsibility for the work you develop.

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Demonstrate some autonomy in the resolution of small contingencies related to its activity.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Local networks

Features.

Topologies.

Architectures.

Elements of a local network.

Physical and logical maps of a network.

Applicable regulations and technical regulations affecting the implementation of local networks.

2. Link-level protocols for a local network

Logical link control protocols.

Media access protocols: contention protocols, witness pass protocols, among others.

Physical addresses.

MAC Address.

3. Network-level protocols for a local network

IP network protocol.

Logical routing.

4. Verification and testing procedures for local network connectivity elements

Local network connectivity element verification tools.

Systematic verification and test procedures for local network connectivity elements.

5. Communications protocol configuration procedures on local network nodes

The characteristic parameters of the most common communications protocols.

Systematic procedures for configuring the most common communications protocols on local network nodes.

6. Detection and diagnosis of incidents in local networks

Diagnostic tools for communications devices in local networks.

Incident management processes in local networks.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation, configuration and verification of local network elements according to established procedures, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: INSTALLING AND CONFIGURING COMPUTER APPLICATIONS

Level: 2

Code: MF0221_2

Associated with UC: Install, configure, and maintain general purpose computer packages and specific applications

Duration: 60 hours

Assessment capabilities and criteria:

C1: Interpret information regarding the configuration of computer equipment to determine the proper installation of applications.

CE1.1 Describe the resources and components of a system that must be taken into account in the installation of an application.

CE1.2 Classify types of programs and applications according to the team's resource needs for optimal operation.

CE1.3 In a scenario of installing applications on computer equipment:

-Identify and locate the necessary elements for the application installation (media, keys, licenses, backpacks, procedures, and manuals).

-Interpret from the application installation documentation, the minimum and optimal requirements required based on the components that you want to install.

-Determine the characteristics of the computer equipment required by the application (CPU speed, amount of memory, available disk space, specific hardware, and others) using the operating system tools.

-Depending on the above conclusions, determine which type of installation can be performed, which parts cannot be installed and in which case, what modifications (hardware or software) should be performed to perform an optimal installation.

-Document the activities performed and the results obtained.

C2: Install, configure, and update office and office applications on a computer.

CE2.1 List the types of viruses, the way the infection is spread, and the effects they can cause on a computer.

CE2.2 Explain the operation of tools used for the prevention and repair of damage caused by computer viruses.

CE2.3 Describe the basic precautions to be taken by users in computer security and infection prevention issues.

CE2.4 Describe the activities to be performed in the process of installing or updating an application on a computer.

CE2.5 In a convenient, well-characterized, practical scenario of updating the available antivirus software:

-Check for antivirus and virus patterns.

-Download the latest version of virus patterns from the Internet.

-Update antivirus installation/update support with the latest pattern database available.

-conveniently document the pattern database configuration data.

-Document the activities performed and the results obtained.

CE2.6 In a practical, properly characterized, installation or update scenario of an antivirus program:

-Successfully install or update the antivirus program.

-Configure the program, as required.

-Update the antivirus version with the latest patterns available.

-Log the action taken on the team's record sheet.

-Document the activities performed and the results obtained.

CE2.7 In a properly characterized scenario, installing a certain application on a computer computer:

-Successfully install or update the established components of the application in accordance with the procedure established by the manufacturer and/or the specifications received.

-Configure the application based on the features and resources of the computer on which it is installed.

-Customize the application to address different user preferences.

-Configure the application to account for potential user disabilities, taking advantage of all the possibilities offered by the same application, operating system, and hardware installed for that purpose.

-Configure the directories that the application uses to make it easier to access pre-existing documentation, templates, or other relevant information.

-Check the operation of the application through systematic testing to ensure the proper functioning of the installed components and access to both the team's own resources and the network shares.

CE2.8 In a convenient, properly characterized, installation scenario that does not respond to the expected results:

-Consult the technical documentation to identify the problem and find your solution.

-Consult the Internet (technical service pages, forums) to identify the problem and find your solution.

-Document the incident and the solution found in a format set for this purpose.

C3: Facilitate the use of computer applications through technical assistance in the face of the program's malfunction.

CE3.1 Describe the process of managing an incident, indicating the steps from which a warning is received until it is fully resolved.

CE3.2 List the type of breakdowns most common in a microcomputer system and related symptoms, associating each possible solution and levels of urgency in the repair.

CE3.3 Elaborate incident reports from alleged errors described by a user.

CE3.4 In a practical, duly characterized, scenario of failure of a computer with a description of the error:

-Play the problem on the computer.

-Describe the incident associated with the equipment failure.

-Set the probable cause type (hardware, operating system, application, virus, mail, Internet access, others) and the level of urgency of the repair.

-Describe possible causes and solutions to the problem.

-List the items and activities planned for repair.

-Estimate the time required for the repair.

CE3.5 Retrieve, as far as possible, information damaged by the breakdown.

CE3.6 Apply established procedures for safeguarding information and recovering it after a repair.

CE3.7 In a software failure scenario (operating system or application):

-Identify the cause with the help of attendees, help programs, manuals, and Internet queries (FAQ, tutorials, forums).

-Identify and locate the items needed for repair (firmware, drivers, installation magnetic support, licenses, manuals and others) using the Internet in the event of not having them available.

-Perform the repair by following the required procedures.

-Check, after the repair is complete, that the malfunction does not occur again.

-Document the activities performed and the results obtained.

CE3.8 In a scenario of virus infection in a computer equipment:

-Check that computer equipment has an antivirus program and that it is up-to-date (checking if necessary Internet), and if not, and if possible, install the latest version.

-Locate the infected files using the antivirus program.

-Remove the virus by trying to save the most data.

-Document the activities performed and the results obtained.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.3; C2 with respect to CE2.5, CE2.6, CE2.7, CE2.8; C3 with respect to CE3.4, CE3.7 and CE3.8.

Other capabilities:

Adapt to the specific organization of the company, integrating in the system of technical-labor relations.

Interpret and execute the instructions you receive and take responsibility for the work you do, communicating effectively with the right person at any time.

Organize and execute operations according to the instructions received, with quality and safety criteria, applying the specific procedures of the organization.

Habit to the organization's work rate by meeting the daily performance goals defined in the organization.

Show at all times an attitude of respect towards colleagues, procedures and internal rules of the organization.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Configuring computer equipment

System requirements required by computer applications: procurement sources, hardware component requirements, operating system requirements, other requirements.

Operating system tools for obtaining information.

System Verification: Get hardware information and features, diagnostic and test utilities (CPU, memory, disks, graphical controller), device drivers.

2. Applications, programs and utilities. Installation and configuration

Types of licensing programs: free use, temporary use, in development (beta), corporate application usage agreements, code licenses, backpacks.

Components of an Application: Installation Manual, User Manual.

Installing and registering applications.

Configuring applications.

Diagnostic programs.

Methodology for troubleshooting.

3. Virus and antivirus

Computer virus: concept, means of propagation, evolution, effects.

Precautions to avoid infection.

Virus in mails, in programs, and in documents.

Anti-virus programs: concept and function.

Recovery discs.

Active components of antivirus: activation and deactivation of the protections.

Removing viruses and retrieving data.

Updating anti-virus patterns.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation, configuration and maintenance of general purpose computer packages and specific applications, in their own and foreign languages, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 4: MICROCOMPUTER APPLICATIONS

Level: 2

Code: MF0222_2

Associated with UC: Facilitate user the use of general purpose computing and specific applications

Duration: 210 hours

Assessment capabilities and criteria:

C1: Facilitate the use of computer applications by assisting the user during the period of use.

CE1.1 Apply personal communication techniques so that good communication with the user is achieved.

CE1.2 Develop a visual guide with the basics of using an application, describing the basic procedures and precautions.

CE1.3 Describe the various utilities such as file compression, antivirus, and backup, so that the user can understand its features and way of use.

CE1.4 In a convenient user assistance scenario, properly characterized:

-Properly interpret the user's need according to their explanations.

-Define the intervention procedure.

-Develop the appropriate textual or visual guide to the problem.

-Add the user to the solution application.

C2: Develop documents by using office processing applications.

CE2.1 Describe the fundamental characteristics of a document that can be performed by a word processor.

CE2.2 Describe how different documents are to be produced: letters, trades, certificates, complaints, faxes, minutes, and calls, among others.

CE2.3 Explain the fundamental features that word processors provide for commenting and reviewing documents by multiple users.

CE2.4 Perform document localization, retrieval, naming, and recording operations from a word processor.

CE2.5 Incorporate document elements from other applications (tables, charts, chunks of text).

CE2.6 Import documents from other word processors or earlier versions using the application tools.

CE2.7 Print documents from the word processor, using all the application and printer capabilities.

CE2.8 Develop templates, using the features provided by the word processor. Elaborate envelopes and labels by combining templates with fields in a database.

CE2.9 Develop simple macros by making them available to other users.

CE2.10 Describe the basic configuration options of the word processing application, indicating possible problems that may arise and providing solutions to them.

CE2.11 In a practical scenario, producing a document from several files:

-Develop a document from multiple files corresponding to parts of it.

-Homogenize formats between different parts.

-Use master documents and subdocuments.

C3: Develop documents by using spreadsheet office applications.

CE3.1 Explain the basic concepts of a function: input, function, output data.

CE3.2 Organize the folders and documents of the computer so that you have convenient and effective access from the spreadsheet.

CE3.3 Perform document localization, retrieval, naming, and recording operations from a spreadsheet.

CE3.4 In a scenario of producing and editing documents using the features provided by a spreadsheet:

-Incorporate the data in its different formats.

-Perform calculations with the data using formulas.

-Give the appropriate format for the correct presentation of the data and verify its validity by parallel calculations.

-Resolve circular reference problems and divisions by zero, among others, with the utilities provided by the application.

-Use references to other sheets in the document and to sheets of other documents.

-Include charts and maps of different types with spreadsheet data and incorporate elements from other applications (tables, charts, chunks of text) into the document.

CE3.5 Import documents from other programs or previous versions using the application tools.

CE3.6 Print documents from the spreadsheet, using all the application and printer capabilities.

CE3.7 In a scenario of working with spreadsheet:

-Use filters, schemas, and cell quiesce operations to properly present the data.

-Develop templates by following the instructions received, with special emphasis on cell protection and clear presentation for a user to use them comfortably and without the possibility of error.

-Develop user functions and simple macros, making them available to users.

C4: Develop documents by using office applications.

CE4.1 Explain the parts of a slide and the factors to be taken into account to achieve the correct transmission of the information in a presentation.

CE4.2 Organize folders and computer presentations so that they have convenient and effective access from the application.

CE4.3 Perform localization, recovery, naming, and recording of presentations from the application.

CE4.4 Develop presentation templates using the features provided by the application.

CE4.5 In a scenario of crafting and editing presentations using the features provided by the application:

-Use the template that is set.

-Locate in the available catalog the figures that are best suited to the requirements.

-Set the distribution of tables (texts, figures, tables and others) on the slides according to the required, using different colors, textures, effects and other features provided by the application and using the editing operations that allow the application to copy, move site and modify the dispositive.

-Incorporate elements of other office applications and comments.

-Use the different slide transition techniques provided by the application.

CE4.6 Print presentations from the application, on paper or transparencies, using all the possibilities of the application and the printer.

CE4.7 Connect the computer equipment to the projection computer to start a presentation, checking its operation or solving problems that may arise.

C5: Develop simple documents with office-based applications.

CE5.1 Describe how to import data from other office applications.

CE5.2 Create tables using the help of wizards, by inserting, modifying, and removing data in them.

CE5.3 Create basic queries using wizards.

CE5.4 Develop basic reports from tables and queries already made, using wizards.

CE5.5 Modify reports made from office-based applications, changing design options for them.

C6: Elaborate graphics using photo editing office applications.

CE6.1 Describe the forms of graph representation (bitmaps, vectorials) and the most common formats, indicating which are the most suitable for each situation.

CE6.2 Explain the concept of resolution in graphics, compression forms and possible quality losses, indicating their advantages and disadvantages.

CE6.3 Explain the concepts of obtaining photographs with digital cameras.

CE6.4 Explain the concepts of contrast, brightness, gamma, and filters associated with images, applying it to different contexts.

CE6.5 Organize a catalog of graphics that allows quick and efficient access to images, graphics and photos included in it.

CE6.6 Get images using digital photo cameras, scanners, Internet or other media, and incorporate them into the catalog.

CE6.7 In a scenario of charting and editing:

-Use the tools available to change the format of the images.

-Modify your resolution, adapting the size to the specified usage, and optimizing the size/quality ratio.

-Elaborate charts, editing the images, and making use of the features provided by the graphical editing application.

C7: Manage communication applications.

CE7.1 Describe the elements that make up an email, indicating its usefulness.

CE7.2 List and describe the basic needs of email management and electronic agendas.

CE7.3 List the similarities and differences between email, Internet e-mail, and subscriptions.

CE7.4 Connect and synchronize agendas in computer equipment with agendas on portable 'smartphone' devices, according to the requirements.

CE7.5 Describe the use of browsers, affecting the configuration characteristics of the browsers.

CE7.6 Describe the use of video conferencing applications, impacting on your configuration.

CE7.7 Describe the use of file transfer applications, explaining their basic configuration.

CE7.8 In an address book management scenario:

-Import and export contacts.

-Arrange contacts in folders and create distribution lists.

-Dispose the address book to other programs for letter submission or label creation.

-Insert new contacts to remove or modify existing contacts.

CE7.9 In an email management scenario:

-Import and export mail from/to other tools or other versions of the mail program.

-Create mail templates and corporate signatures.

-Organize mail in folders according to the criteria that are indicated.

-Perform old mail safeguards, recovery, and removal.

-Configure the application for automatic redirection of mail, avoid spam spam and other application functions.

CE7.10 In an agenda management scenario:

-Include entries in the calendar.

-Organize meetings.

-Include tasks.

-Include warnings.

CE7.11 In a scenario of using an email office application:

-Make subscriptions to news forums.

-Synchronize mails.

-Participate in the news forum to check how it works.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.11; C3 with respect to CE3.4 and CE3.7; C4 with respect to CE4.5; C6 with respect to CE6.7; C7 with respect to CE7.8, CE7.9, CE7.10 and CE7.11.

Other capabilities:

Take responsibility for the work you develop.

Demonstrate some autonomy in the resolution of small contingencies related to its activity.

Demonstrate interest and concern for meeting customer needs satisfactorily.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Learn new concepts or procedures and effectively leverage training using acquired knowledge.

Demonstrate communication and empathy with customers and end users of their jobs.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Instruction in the use of computer utilities

Compression of files.

Using antivirus.

Performing user backups.

2. Text processors

Document Files. Storage.

Character format, paragraphs, pages.

Document design: schemas, bullets, and numbered lists; columns; master documents and subdocuments; templates, styles; table of contents, indexes; page numbering.

Tables and associated functions.

Images and associated functions.

Spell check and synonyms.

Printing documents, and associated functions.

Protection of documents.

Combination of correspondence.

Short-key methods.

Macros.

Managing versions, changes, comments, and reviews.

Collaborative work with documents.

Configuring the word processing application.

3. Spreadsheets

Data Files. Storage. Import and export of documents.

Format of the spreadsheet, cells, and texts.

Data types and presentation associated with each.

Formulas and relationships between cells.

Derived ranges and operations.

Conditional Formats.

Cells: selection, leaf offset, data copying and pasting, searching, and superseded.

Quiescing and protecting cells.

Pool of cells and schemas.

Automatic and User Filters and Data Sorting.

Error tracing functions in the application.

Generation of charts and maps and inclusion of external images.

Using abbreviated key methods.

Managing versions, changes, comments, and reviews.

Generation of user functions.

Generation of templates.

Print: ranges, format, headers and feet, page breaks, among others.

Collaborative work with spreadsheets.

Configuring the spreadsheet application.

4. Applications for presentations

File presentations. Storage.

Elements of the presentation: slides and tables of texts, tables, organizational charts and graphs.

Presentation items: selection, scrolling, copying and pasting, searching, and superseded.

Templates and patterns.

Texts: types, shapes and colors; interlination, alignment, indentations, tabulations, justifications, and others.

Graphics and animations.

Styles, fill frames, borders, textures, gradients, shading, 3D effects, among others.

Transition between slides.

Connection to a projector and configuration.

Print of presentations.

Performing online presentations.

Configuring the presentation application.

5. Office databases

Using wizards for table creation, queries, and reports.

Insert, modify, and delete data.

Design and modification of reports with databases.

6. Applications for creating and editing charts

Chart rendering shapes (bit maps, vector maps).

Formats used for charting.

Resolution and graphics quality. Compressed formats. Quality losses in compression.

Digital cameras. Obtaining photos with digital cameras. Copy of the photos to the computer equipment.

Contrast brightness, gamma, and image-associated filters.

Organization of an image catalog.

Print of charts.

Graphics processing applications: Lines, simple geometric figures, images of bookshops and photos, text, connection and alignment of figures, turns, groupings, among others.

Image editing applications: cut from areas of interest or disposable; brightness, contrast and gamma; profiling, line smoothing, color retouches, blurring, and others.

Importing and exporting charts to different formats.

Use of charts in other office applications.

7. Communication applications

Using and configuring the browser.

The email: sender, recipient (with copy, hidden copy), subject, message text, and attachments.

Mail format, templates, and corporate signatures.

Post Encryption Programs (PGP). Installing and sending encrypted mails.

Installing and using electronic signature certificates.

Core components of an e-mail management application and electronic calendars.

News forums: configuration, use, and synchronization of messages.

Calendar programs in sync with 'smartphone' type portable devices. Installation, use, and synchronization.

Managing the address book: importing, exporting, adding contacts, creating distribution lists, making the list available to other office applications.

Mail management: organization in folders: import, export, delete old messages by saving backups, configuration of incoming mail, protection of spam 'spam'.

Calendar management: appointments, calendar, notices, tasks, notes, arrange meetings, view wizard availability.

Video conferencing and file transfer applications.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to making it easier for the user to use general purpose computer packages and specific applications, which will be credited using one of the following two ways:

-Level 1 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX II

Professional Qualification: Database Administration

Professional Family: Informatics and Communications

Level: 3

Code: IFC079_3

General Competition

Manage a database system in computer systems, interpreting its design and structure, and adapting the model to the requirements of the database manager system, and configuring it in order to ensure the integrity, availability and confidentiality of the information stored, complying with the applicable data protection regulations.

Competition Units

UC0223_3: Configure and exploit computer systems

UC0224_3: Configure and manage a database manager system

UC0225_3: Configure and manage the database

Professional Environment

Professional Scope

Develops its professional activity in the dedicated production area/or the administration of databases, in entities of public or private nature, medium-sized, large or micro-enterprises with information systems or companies of any size that manage information systems for other organizations, both self-employed and others, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located in the services sector, in the subsector of information systems management for other organizations, in the development of software, in the technical consultancy in information systems or in any productive sector with companies that have information systems for the management of their business processes.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Database Administrators

Technicians in Data Mining (data mining)

Associated Training (630 hours)

Training Modules

MF0223_3: Operating systems and computer applications (180 hours)

MF0224_3: Database manager system administration (210 hours)

MF0225_3: Database management (240 hours)

COMPETITION UNIT 1: CONFIGURING AND EXPLOITING COMPUTER SYSTEMS

Level: 3

Code: UC0223_3

Professional Realizations and Realization Criteria:

RP 1: Adapt the logical configuration of the system for operation, according to the needs of use and within the organization's directives.

CR 1.1 System parameters that affect memory, processor, and peripherals conform to the usage needs, optimizing the performance of the system.

CR 1.2 The required devices and their control files are added, removed, or repaired using operating system utilities.

CR 1.3 The team's logical connections are configured to access remote services within or outside the organization.

CR 1.4 System parameters that affect ergonomics or ease of use are adjusted to improve the user's working conditions, within the organization's directives.

RP 2: Organize information in the file systems of the operating system and maintain its properties to facilitate the use of resources and ensure compliance with the organization's directives.

CR 2.1 Computer applications are organized with a structure and configuration that allow their use in optimal conditions.

CR 2.2 Operating system user information is maintained in organized structures according to the capabilities of the system itself (files, directories, volumes, among others) to facilitate access to such information and maintain homogeneity in the various teams of the organization.

CR 2.3 The structure and configuration of the file system are kept available for use to avoid accidental failures and share information.

CR 2.4 The information storage space is kept free of useless or outdated information to improve system performance and increase its lifespan.

RP 3: Develop and transfer documents through the use of general purpose computing applications, to collaborate on job planning and documentation tasks, complying with applicable regulations.

CR 3.1 Ophimatic tools are used with the skill required to assist in the planning and documentation tasks of the works.

CR 3.2 The exchange of information with other people is done using e-mail or electronic messaging systems to facilitate the flow of information and reduce costs and times when the nature of such information exchange permits.

CR 3.3 The services available on the Internet or other networks are obtained by the correct use of the necessary tools (navigation, forums, ftp clients, among others) to facilitate access to information needed for the job.

RP 4: Protect the information from which you are responsible and stored in the file system to ensure the integrity, availability and confidentiality of the file system, complying with applicable regulations.

CR 4.1 Information (data and software) is stored in a way that allows to be returned to a state of use at any time by means of backups, among other means.

CR 4.2 Access to information is protected by the use of keys and other security measures set in the organization.

CR 4.3 The means of protection against disasters or improper access (antivirus, firewall, 'proxies', change management systems, among others) are implemented and used in the systems that you are responsible for.

CR 4.4 The system remains free of non-licensed software.

CR 4.5 The internal rules of the organization and the applicable data protection regulations are met in the systems for which you are responsible.

CR 4.6 Incidents are reported to the System Administrator to perform the appropriate tasks.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. File transfer and messaging services. Backup tools. Antivirus firewall and proxy servers. Change, incident, and configuration management tools.

Products and results:

Operating system with optimal performance and proper utilization of your resources. Network connected equipment. Operating system and configured and parameterized applications. Files with information according to the nature of the professional activity developed (programs, queries, text documents, spreadsheets, among others) stored. Backups of information according to criteria of integrity, confidentiality and availability.

Information used or generated:

Manuals for the use and operation of computer systems. Operating manuals for the associated software. Training course material. Systems for the help of computer applications Technical support supports (telephone, Internet, messaging, forums, among others).

COMPETITION UNIT 2: CONFIGURE AND MANAGE A DATABASE MANAGER SYSTEM

Level: 3

Code: UC0224_3

Professional Realizations and Realization Criteria:

RP 1: Initially install and parameterize the Database Manager System (SGBD) for startup, according to the technical specifications and characteristics of the downstream operation.

CR 1.1 The operating system is adapted to the requirements of the SGBD according to the manufacturer's technical specifications.

CR 1.2 The devices, processes, and physical space are configured according to the features of the SGBD, operating system, hardware, storage needs, and service requirements.

CR 1.3 The data dictionary is created according to the SGBD specifications.

CR 1.4 Cluster components, if applicable, are configured according to the SGBD, storage needs, and service availability policies.

CR 1.5 Additional support utilities (backup, load, and data transformation, among others) are integrated into the existing operating environment.

CR 1.6 The graphical administrative tools and the command-line interface are used both with dexterity, for installation and parameterization tasks.

CR 1.7 The responsibilities of local administrators are set individually in the case of multiple nodes.

CR 1.8 In the case of NoSQL databases distributed in which the SGBD is located on multiple nodes, the system structure is scheduled according to the BBDD that it is intended to contain.

CR 1.9 In the case of a NoSQL BD system, this system adapts to the specific requirements of the data and its mode of operation (transactionality, graph oriented, document oriented, key/value, connectivity of the nodes, data size, among others).

RP 2: Organize and perform administrative tasks of the Database Manager System to enable its optimal exploitation and according to established procedures.

CR 2.1 The start and stop of the SGBD is performed according to the needs of the organization's use and maintenance policies.

CR 2.2 Administrative tasks are organized according to usage needs.

CR 2.3 Administrative tasks are coded by statement scripts or using the SGBD's own tools.

CR 2.4 Statement scripts are tested in a controlled environment, verifying the results before they are implemented.

CR 2.5 Statement scripts are scheduled for execution according to the needs of the organization and interfering with the least possible on the operating system.

CR 2.6 The operating procedures are documented for use in production, using the established models.

CR 2.7 The data dictionary is used in those administrative tasks that require it, maintaining its integrity.

CR 2.8 The data dictionary is kept up to date after changes in the structure of the SGBD and its integrity is preserved.

RP 3: Monitor the indicators of the Database Manager System to evaluate the state of the system and the degree of performance of the performance criteria, making the necessary adjustments for its optimization.

CR 3.1 The database system performance criteria are set according to the general criteria of the organization and those set for each database.

CR 3.2 The system prepares for monitoring using trace tools, log files, performance statistics, alert programming, and other monitoring elements.

CR 3.3 System monitoring is performed during the most indicated time periods to obtain conclusions about its performance.

CR 3.4 The operating system and physical devices are adjusted to improve performance and to correct the operating failures detected in the database system.

CR 3.5 The SGBD is adapted to improve performance or to correct detected operating failures.

CR 3.6 The databases are adapted to improve performance or to correct the detected operating failures.

CR 3.7 Monitoring system information is used to analyze behavior trends and anticipate incidents and problems.

RP 4: Advise on the acquisition and upgrade of the logical and physical systems associated with the Database Manager System that provide improvements to the system's capabilities.

CR 4.1 The hardware and software are analyzed and valued for need and feasibility reports on potential improvements and upgrades to the SGBD.

CR 4.2 New versions, updates, tools, and alternatives are evaluated to determine the suitability of your system deployment.

CR 4.3 Release updates are scheduled and run in collaboration with affected areas and minimizing their effects on exploitation.

CR 4.4 The corrective maintenance of the SGBD and associated tools is performed by applying the patches provided by the manufacturer.

CR 4.5 Physical storage systems are configured and defined according to the needs and requirements of each SGBD.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Storage systems (RAID, SAN, and NAS). Cluster and backup centers. Database design tools. SGBD administration tools. Backup media. Office tools. Database manager systems. Data dictionaries (or catalog, or system tables). Data manipulation languages. Control languages and data definition. Log file management tools (log). Structured languages. Debugging tools. Change control tools. Task planners. Performance monitors.

Products and results:

Operating system and configured and parameterized applications. Backup copies of the information. Queries for database manipulation interactively. Applications that manipulate the database through embedded code. Logical connections available to allow access to clients. Transaction recovery mechanisms. Commissioning and operational maintenance of network SGBD. Programmes for the performance of administrative tasks. Activation of controls for proper management of the security of the SGBD. System performance traces available for analysis.

Information used or generated:

SGBD Administration And Operation Manuals. Operating system installation manuals. Operating system operation manual. Organization chart of the organization. Knowledge about data communications networks. Safety standards (safety plan) and quality of the organization. Rules applicable in the field of data protection and confidentiality of information. Administrative tools manuals. Online help manuals. Technical assistance online.

COMPETITION UNIT 3: CONFIGURE AND MANAGE THE DATABASE

Level: 3

Code: UC0225_3

Professional Realizations and Realization Criteria:

RP 1: Perform and/or modify the physical design of the databases from the previous logical design to fit the database's operating requirements.

CR 1.1 The logical design is valued and adapted, if appropriate, to the characteristics of the environment (number of users, volume of data, volatility, estimated data traffic, among others) and the quality standards of the organization.

CR 1.2 The tables, views, indexes, and other objects that are owned by a database manager are created using DDL statements or administrative tools from the Database Manager System (SGBD).

CR 1.3 Space allocation and physical constraints of the database are determined according to the defined logical characteristics and operating requirements.

CR 1.4 In the case of distributed NoSQL databases the information is kept available and in the appropriate version on each node according to the data requirements.

CR 1.5 In the case of distributed NoSQL databases, the necessary mechanisms are established to maintain the synchronization between them.

CR 1.6 In the case of distributed NoSQL databases, the distribution scheme of the nodes and fragments and in the case of being partitioned, of the fragments in the nodes, is performed taking into account the logical organization of the database, the location of the applications, their access characteristics.

CR 1.7 The data dictionary is updated in those database maintenance tasks that require it, preserving its integrity.

RP 2: Implement the access control policy in the database managers to ensure their security by following the rules of the organization and the applicable data protection regulations.

CR 2.1 Security profiles are defined and maintained in accordance with the security policy of the organization, using DCL statement scripts and/or administrative tools.

CR 2.2 The activity log is configured to track the activities performed by the users and detect deficiencies in the access control systems.

CR 2.3 Security policy implementation measures are documented in compliance with the organization's standards.

RP 3: Schedule and backup, as well as data recovery if necessary, to maintain the integrity of the database, meeting the organization's security rules.

CR 3.1 The disaster recovery and recovery policy is defined and applied in accordance with the organization's security rules and the requirements of each database.

CR 3.2 The information of the existing SGBDs in the backup center is kept up to date so that it can be recovered in disaster cases.

CR 3.3 The storage of the copies is monitored, checking that the organization's standards are met (fire-retardant cabinets, different physical location, among others).

CR 3.4 The backups are retrieved at the request of the data controller according to the rules of the organization.

RP 4: Enable access to databases based on confidentiality, integrity and availability criteria, complying with applicable regulations.

CR 4.1 The initial data load is performed on the database so that the result corresponds to the original information to ensure consistency.

CR 4.2 The connections required for access from clients are enabled according to the available networks and protocols.

CR 4.3 Transaction recovery mechanisms are enabled to ensure the integrity of the information when performing operations on the data.

CR 4.4 The mechanisms available in the SGBD to ensure the confidentiality and integrity of information that is obtained and stored in the database (cryptography, 'checksum', signature algorithms, among others) are enabled.

CR 4.5 The execution strategy and query optimization are set to minimize response times and data transfers over the network.

CR 4.6 Database usage restrictions are specified and documented to ensure optimal performance.

CR 4.7 Data is imported and exported with the available tools according to established procedures for the transfer of information between different databases or systems.

CR 4.8 In the case of distributed NoSQL databases, the information replication mechanisms are established.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Storage systems. Cluster and backup centers. Database design tools. SGBD administration tools. Backup media. Office tools. Database manager systems. Data dictionaries (or catalog, or system tables). Data manipulation languages. Control languages and data definition. Log file management tools. Structured languages. Change control tools. Task planners. Performance monitors. Debugging tools. Query optimizers.

Products and results:

Databases available for use. Access profiles that are in line with the schedule. Activity records in the database. Backup copies in accordance with the schedule. Copies of the database in backup center. Connections in clients to access the DB. Configuring the mechanisms for transaction recovery. Efficient query execution strategy that minimizes response times. Procedures for the import and export of data. System performance traces available for analysis. Queries for database manipulation interactively. Logical connections available to allow access to clients. Commissioning and operational maintenance of networked SGBD, either in isolation or in cluster. Programmes for the performance of administrative tasks.

Information used or generated:

SGBD Administration And Operation Manuals. Operating system installation manuals. Operating system operation manual. Organization chart of the organization. Safety standards (safety plan) and quality of the organization. Rules applicable in the field of data protection and confidentiality of information. Administrative tools manuals. Logical and physical designs of the Database. Log book of the backups. Measures for the implementation of the security policy. Data dictionary.

TRAINING MODULE 1: OPERATING SYSTEMS AND COMPUTER APPLICATIONS

Level: 3

Code: MF0223_3

Associated with UC: Configuring and exploiting computer systems

Duration: 180 hours

Assessment capabilities and criteria:

C1: Defer the main components of a computer by indicating its functions and technical characteristics.

CE1.1 Explain the main components of a general purpose computer or server on the basis of its function and utility.

CE1.2 List and describe the elements of the motherboard of a computer recognizing its main functions.

CE1.3 Classify the main processor types based on your technology family, historical evolution, and most relevant features.

CE1.4 Classify and explain the peripherals and main input/output components of a computer by pointing to the function they perform in the system assembly.

CE1.5 List and sort the main commands in the low-level instruction set of a processor based on the function they are running.

CE1.6 In a convenient, well-characterized scenario of configuring microcomputer systems from a connection diagram and technical documentation:

-Identify the motherboard.

-Recognize the processor and memory banks.

-Locate the disks and optical drives.

-Locate the input/output connectors and classify them by type.

C2: Analyze the core functions of a multi-user and multi-task operating system, recognizing and classifying the different types of existing operating systems.

CE2.1 Explain core concepts, virtual core and command interpreter of an operating system, indicating their characteristics.

CE2.2 Explain the different ways to route and store the files and file systems of an operating system and to structure the read and edit permissions, detailing the advantages of each mode.

CE2.3 Analyze the function of memory in the process of tasks of the computer, based on the characteristics associated with the concepts involved: central and expanded memory, virtual memory and paging and exchange.

CE2.4 List the different processor time-sharing policies implemented on the operating systems, identifying the impact of each of them on the process types.

CE2.5 Recognize and explain the functions of context changes, semaphores, job scheduler, and interrupt handlers in the operation of multi-user and multi-task operating systems.

CE2.6 Explain the different input/output mechanisms that an operating system handles based on resource management.

CE2.7 Classify operating systems and architectures by the different forms that have historically been used.

CE2.8 In a convenient, well-characterized scenario, of configuring a multi-user and multi-process computer system:

-Install different operating systems on the machine by identifying the important milestones in the process.

-Configure the paging and memory swap areas and recognize their impact on the system.

-Cause and interpret resource locks and their impact on system behavior.

-Create and organize files and file systems.

C3: Distinguished and analyze the configuration variables of an operating system, specifying its effect on system behavior.

CE3.1 List and explain the different types of logical devices used for the installation of services and applications.

CE3.2 Recognize and explain the core configuration parameters of the core of an operating system and its impact on system behavior.

CE3.3 Analyze the core services that run on an operating system and its influence and competence on resource management.

CE3.4 Describe the different ways to monitor and adjust the components of an operating system and analyze trends from the load state.

CE3.5 Map alarms sent by the previously implemented monitoring system and define events for resolution.

CE3.6 In a practical, properly characterized, identification and analysis of configuration variables of an operating system and from the technical documentation of the installation and configuration of the operating system:

-Confect the file structure and file systems with user permissions.

-Drill down the processes started on the machine.

-Drill down to disk occupancy load status, and memory usage.

-Identify the networks defined in the system.

-Install and compile different hardware component device handlers.

-Start system monitors.

-Analyze the data in real time and in aggregate mode.

C4: Recognize and describe encodings and nomenclatures of computer elements according to the most widespread standardization criteria.

CE4.1 Describe and apply the regulations concerning the classification and classification of files and their required containers to facilitate the safeguarding and administration of system data.

CE4.2 Describe and employ standardized nomenclature regulations for machines, services, and applications required to facilitate administration tasks.

CE4.3 Recognize and apply the file migration and archive policies to be used in system storage management based on your need for further processing and resource usage efficiency.

CE4.4 In a convenient, properly characterized, scenario of managing servers connected to different TCP/IP communications networks:

-Generate a map of network and server IP addresses.

-Define a name server (DNS).

-Implement a name server (DNS).

CE4.5 In an assumed, convenient, well-characterized, file system architecture analysis:

-Analyze and explain the implemented structure.

-Identify the creation, validity, and last modification dates of a typical set of files.

-Identify authorized users to open and modify a file set.

-Apply different data migration policies by analyzing their influence on space availability and process runtime.

C5: Distinguished the different types of storage used in multi-user operating systems indicating their structure, characteristics, and modes of operation.

CE5.1 List and classify different storage systems based on their capacity, performance characteristics, and compatibility with the most extended operating systems.

CE5.2 Describe and classify the mechanisms of protection and physical recovery of information according to its mode of operation and performance.

CE5.3 List and analyze the volume pools, logical volumes, and format types that are defined and implemented on each operating system and volume manager.

CE5.4 Choose and use the logical volume management tools that are used for storage management on the basis of their operating mode and compatibility with the different operating systems.

CE5.5 Explain how it works and what value it brings to the operating system in parallel to multiple physical volumes.

CE5.6 List the different storage systems and classify them by type of support, by manual or automatic management and by their use in operating systems and applications.

CE5.7 In a convenient, well-characterized scenario of managing systems with external and internal storage and libraries:

-Document a physical/logical map of capabilities that you define: physical volumes with their capacity, address and access mode, implemented parity protections, and number of accesses to each volume.

-Define logical volumes and file systems with different sizes and structure.

-Install and configure a fault-tolerant access balancing system.

-Define parallel access to file systems and analyze the impact on system performance using operating system monitoring tools.

-Implement software volume mirroring with the logical volume manager and analyze its utility for operating system recovery.

C6: Use the main types of office tools and services and applications associated with the Internet.

CE6.1 List and explain the main functions of the word processors, spreadsheets, and presentation editing.

CE6.2 Relate the main services associated with the Internet and classify them on the basis of their function and specificity.

CE6.3 Apply the functions of the office tools and Internet services to the elaboration of properly structured and standardized technical documentation to facilitate the understanding and control of versions.

CE6.4 Use file transfer services for information exchange with the support services that information technology manufacturers publish on the Internet.

CE6.5 In a practical, duly characterized, practical case with a microcomputer system with the possibility of Internet connection:

-Elaborate text documents, spreadsheets and presentations from a series of delivered models that require the use of different functionality of the tools in increasing difficulty.

-Configure the computer for your Internet access from the Service Provider specifications.

-Find and extract technical documentation and applications from different service providers on the Internet from a situation relationship.

C7: Apply techniques and procedures related to security of systems, communications networks, and data.

CE7.1 Explain the fundamental concepts of data protection and security policies and their relationship in the recovery and continuity of services and applications.

CE7.2 Explain the differences between physical and logical backups and their influence on operating systems, file systems, and databases.

CE7.3 Identify the main architectures of high availability of systems and components and analyze their advantages and weaknesses depending on each case.

CE7.4 Explain how firewalls, antivirus, and 'proxies' operate on communications network architectures.

CE7.5 Recognize the techniques and operational procedures used to ensure user access security to services and applications with special interest in Internet-related architectures.

CE7.6 In a convenient, properly characterized scenario of configuring computer systems connected to communications networks:

-Implement backups of files and databases.

-Retrieve applications that use databases from physical and incremental backups and continuity specifications.

-Install and configure firewalls on servers that only allow access from the specified clients and protocols.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6; C2 with respect to CE2.8; C3 with respect to CE3.6; C4 with respect to CE4.4 and CE4.5; C5 for CE5.7; C6 for CE6.5; C7 for CE7.6.

Other capabilities:

Take Responsibility for the work that you develop and the fulfillment of the objectives.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Demonstrate flexibility to understand changes.

Habit to the organization's work rate.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. General purpose server and computer concepts

The main structure and components: processor (Set of Instructions, Records, Counter, Arithmetic-Logic Unit, Interrupts); RAM and xPROM; input/salid; interfaces.

Processors: families and processor types; historical evolution.

Types of peripherals.

2. Operating systems

Features of an operating system.

Classification types.

Main functions: memory management: Virtual memory and paging; processing time-sharing policies; input/salid; interrupt and device handlers; resource locking; file systems; multiprocess and multiuser; User Organization.

Logical partitioning and virtual cores.

3. System configuration and tuning techniques

System Performance.

Resource consumption and competition.

Predictive models and trend analysis.

Pre-production test plans.

4. Organization and management of information

File systems: naming and coding; storage hierarchies; data migrations and archiving.

Logical and physical volumes: partitioning; NAS and SAN systems; logical volume management; parallel access; RAID protection.

Safeguard policies: Physical and logical safeguarding; High Availability concepts.

Cluster and load balancing.

Data integrity and service recovery.

Custody of security files.

Security Policies: Restricted access by user accounts, property of information; unique identifier of access; antivirus protection; security audits; firewall and proxy servers.

5. Microcomputing and Internet applications

Text processors, spreadsheets and presentations: user-level handling and knowledge; technical documentation processing techniques; document formats.

Structure of the information.

Internet use: knowledge of WWW; browsers; e-mail, chat and forums; file transfer.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the configuration and operation of computer systems, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: ADMINISTERING DATABASE MANAGER SYSTEMS

Level: 3

Code: MF0224_3

Associated with UC: Configure and manage a database manager system

Duration: 210 hours

Assessment capabilities and criteria:

C1: Describe the fundamental information storage systems and determine the environments in which their deployment is appropriate.

CE1.1 Describe the fundamental logical systems of information storage (flat files, indexed files, direct access files, XML files, JSON files, database management systems, among others).

CE1.2 Distinguished other advanced structured information storage mechanisms: Directories (LDAP), XML.

CE1.3 Distinguished the different types of existing SGBD: Jerarchic, in Red, Relational, Oriented to Object, Documentary.

CE1.4 Explain the main functions that a SGBD should perform.

CE1.5 Describe organizational levels in the standard architecture of an SGBD.

CE1.6 Describe the core functional components that are part of a SGBD, both at the process and data structures level.

CE1.7 Distinguished features that differentiate each of the commercial SGBD types that exist (centralized, client/server, parallel, distributed NoSQL).

CE1.8 Describe user types that may need access to the SGBD: (database administrator, data users, application users, network administrators).

C2: Install the database system, determining and applying the appropriate SGBD configuration to the performance requirements raised.

CE2.1 Describe the fundamental logical components and physical file structure of the SGBD by distinguishing the different components as well as their physical location on the machine object of the installation.

CE2.2 Describe the optional and/or auxiliary logical components as well as the existing dependencies between them and which condition their installation.

CE2.3 Describe the process to be followed to perform the installation of the SGBD, identifying the tools involved in that process.

CE2.4 List and describe the different support utilities that can be integrated into the SGBD environment.

CE2.5 Explain the configuration parameters involved in starting a SGBD.

CE2.6 Explain the particular configuration parameters of a distributed NoSQL SGBD (data distribution, replication scheme, local structure of each node, local administration of each node).

CE2.7 In a convenient, properly characterized, installation and configuration scenario of a SGBD, given performance requirements to meet:

-Identify all the parameters and features of the operating system that affect the operation of the SGBD and configure them appropriately (changing variables, recompiling, among others), consulting and interpreting the technical documentation provided by the SGBD manufacturer.

-Perform the installation of the SGBD and configure it so that performance is optimized and storage needs are met, adapting the requirements to the SGBD features.

-Integrate the support tools, depending on the requirements set.

-Create and initially configure the data dictionary, depending on the requirements set.

-Configure remote access to the database, both from clients and from other processes running on the same server.

-Document the installation process followed and the configuration parameters applied.

C3: Apply organizational techniques and perform administrative tasks, operating with the tools of the SGBD.

CE3.1 List and describe the common administrative tasks to perform in a SGBD: Safeguarding and recovery, database creation and maintenance, user management and access permissions, physical space management, cluster management, partitioning management, distributed database management, process management, manual and scheduled starts and stops, among others).

CE3.2 List and describe the available graphical tools, according to the SGBD, for performing administrative tasks.

CE3.3 List and describe available commands, according to the SGBD, for performing administrative tasks in text mode.

CE3.4 Describe task scheduling and queue management techniques.

CE3.5 Identify the tools available in the SGBD for task planning.

CE3.6 Explain existing commands in the SGBD for task scheduling.

CE3.7 In a convenient, properly characterized, database administration scenario to meet the most common needs and availability of the organization's security plan and rules:

-Set an administrative task execution plan that meets the needs of the organization.

-Start and stop the SGBD based on the organization's usage needs and maintenance policies.

-Perform administrative tasks, using available graphical tools or user commands, using the data dictionary, following the rules of the organization and attempting to interfere as little as possible in the operation of the system.

-Check the results obtained from the execution of the administrative tasks, prior to their definitive implementation, by means of tests in a controlled environment.

-Modify the administrative tasks established to meet new requirements or to correct possible operating failures, and document them.

-Document the administrative tasks established, the plan of execution of the same and the results they produce.

C4: Build statement scripts to automate administrative tasks.

CE4.1 Defend the script classes that can be developed in the database system.

CE4.2 List the programming resources available in the system for the encoding, debugging, and execution of statement scripts (available script languages, compilers, and/or interpreters, development environments).

CE4.3 Describe the syntax of different aspects of a hyphen language for statement script encoding.

CE4.4 Describe basic structured development design techniques.

CE4.5 Describe existing evidence types, characterizing each of them.

CE4.6 Describe existing tools for code testing as well as the functionality they provide: trace, debug, execution plan, among others.

CE4.7 In a convenient, well-characterized scenario, of database administration and from the organization's security plan and rules:

-Design the necessary modules and tests for each module, using the most suitable scripting language.

-Schedule the statement scripts needed to address the administrative tasks that require them, according to the plan established and following the corresponding programming techniques.

-Check the results obtained from the execution of the scripts, prior to their definitive implementation, by testing in a controlled environment.

-Modify the scripts to meet new requirements or to correct any malfunction.

-Include the scripts developed in the administrative task execution plan.

-Document the encoded scripts, indicating the administrative tasks they automate and the results they produce.

C5: Apply system performance optimization and monitoring techniques.

CE5.1 List and describe the different techniques for monitoring the system, indicating the advantages and disadvantages of each one.

CE5.2 List and describe the available tools, according to the SGBD, for system monitoring.

CE5.3 Describe the mechanisms available in the SGBD for automatic query optimization and identify its advantages and drawbacks (SQL optimizers available, configuration parameters to identify query or update databases, index creation, caches, among others).

CE5.4 List the usual parameters set as the goal of system optimization.

CE5.5 Describe the main techniques for query optimization in SGBD.

CE5.6 In a practical, well-characterized scenario of monitoring of an SGBD, in which a number of outstanding problems of detection and correction are artificially introduced, and the safety plan and rules of the organization are available:

-Set the database system performance criteria according to the general criteria of the organization and those set for each database.

-Prepare the system for monitoring, determining the most appropriate technique to use in each case.

-Evaluate the status of the system based on the results of the monitoring and the degree of performance of the performance criteria.

-Make adjustments to the SGBD, operating system, and physical devices involved to improve performance and/or correct operational failures detected during the monitoring of the SGBD.

-Discover behavior trends from information in monitoring systems, setting the administrative tasks necessary to anticipate incidents and problems.

-Document performance criteria and other monitored parameters, results obtained and system adaptations made (if required).

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.7; C3 with respect to CE3.7; C4 with respect to CE4.7; C5 for CE5.6.

Other capabilities

Take Responsibility for the work that you develop and the fulfillment of the objectives.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Demonstrate flexibility to understand changes.

Habit to the organization's work rate.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Storing information and system database managers

Storage in files: flat, indexed, direct access.

SGBD storage: in network/codasyl, hierarchical, relational, documentary, object oriented, NoSQL.

Other types of storage: XML, Directory Services (LDAP).

Database manager systems (SGBD).

Evolution of the SGBDs.

The functions of the SGBD.

SGBD types: centralized SGBD and client/server SGDB (multiprocess engines and 'multithreaded' engines); 2-layer model and 3-layer model; parallel SGBD; distributed SGBD.

General architecture of a SGBD (ANSI/SPARC architecture): internal schema/physico; conceptual schema; external schema/'subschema '.

2. SGBD functional structure

SGBD processes.

File Manager.

DML Preprocessor and Compiler.

DDL Compiler.

Database Manager (Authorization Control, File Manager, Integrity Control, Query Optimizer, Transaction Manager, Recovery Manager, 'Buffers' Manager, Shared Memory Manager, Scheduler, Data Dictionary Manager, Client Processes).

Connection and network access management ('listeners ', and others).

SGBD data structures.

Disk storage structures.

Shared memory areas.

Memory-disk exchange buffers.

Internal control structures.

Transaction management structures.

Log files.

Physical indexing structures.

3. Installing a particular SGBD

Physical implementation in a SGBD.

Data files, data dictionary, indexes, and other auxiliary files, statistical data stores.

Software Organization of a SGBD.

Dependent Features of the S.O.

Shared memory.

Traffic Lights.

Process and CPU management.

Disk I/O management.

privileges.

Other system environment parameters.

4. SGBD Communications

Configuring remote access to the database.

Client/Server Philosophy (sockets, RPC, CORB, among others).

Interoperability between Database Systems (RDA, ODBC, C/S, among others).

5. Administering SGBD

The functions of the SGBD administrator.

User types (roles) in a SGBD.

Common administrative tasks: creating a database; starting and stopping; managing process queues.

Strategies: security policies; resource policies.

SGBD administrative tools.

Planning for administrative tasks: task scheduling techniques; SGBD planning tools.

6. Building scripts

Script types: simple scripts, stored procedures and functions, and triggers.

Tools available for: encoding statement scripts, debugging scripts, and for testing statement scripts.

Structured design techniques.

Table structure diagram.

State transition diagram.

Programming Language (PL/SQL, Transact-SQL, among others): data types; control structures; functional structures: modules, procedures, functions.

Libraries or administrative commands available from the programming language.

7. Performance monitoring and tuning

Factors and parameters that influence performance.

Tools for monitoring: traces, log files, definition of alerts, other tools of the SGBD.

Optimization of in-memory storage.

Optimization of disk space.

Optimization of transfer and communications procedures.

Tuning the SGBD parameters for query execution optimization.

Preventive maintenance.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the configuration and management of a database manager system, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: DATABASE MANAGEMENT

Level: 3

Code: MF0225_3

Associated with UC: Configure and manage the database

Duration: 240 hours

Assessment capabilities and criteria:

C1: Dominate conceptual fundamentals and relational database techniques.

CE1.1 Describe the concepts of the relational model, indicating its characteristics.

CE1.2 Describe the basic operations of relational algebra, indicating its characteristics.

CE1.3 Identify the usual data modeling techniques, indicating their characteristics.

CE1.4 Identify correctly the elements that make up an Entity/Relationship model as well as those present in the model extensions.

CE1.5 Describe common normal ways.

CE1.6 Describe the possible degree of normalization for a database, specifying the normalization procedures and the advantages and disadvantages they entail.

CE1.7 Describe the main elements and objects in the physical schema of a relational database.

CE1.8 Describe the mechanisms present in the physical model to ensure the integrity of the database: referential integrity, assertions, triggers, unique keys, foreign, among others.

CE1.9 Describe the basic syntax of a data manipulation language (DML) and establish its relationship with relational algebra.

CE1.10 In a convenient, properly characterized, practice of identifying concepts of a relational model, from a given logical design:

-Identify entities that can be considered weak.

-Identify the degree of design normalization indicating which parts of the design are in the third normal way and which parts are not, as well as the specific degree of each part.

-Identify elements in the fourth and fifth normal forms or that are likely to be modified to achieve these normal shapes.

CE1.11 In a practical, duly characterized, scenario of normalizing a completely 'de-normalized' logical design with a sufficient description of the elements present:

-Perform normalization to the first normal way.

-Perform normalization to the second normal way.

-Perform normalization to the third normal way.

-Perform normalization to the fourth normal way.

-Perform normalization to the fifth normal way.

CE1.12 In a convenient, properly characterized scenario of using data manipulation language (DML) from a physical database with known information:

-Perform information extraction operations from a textual description of the information to be obtained and using the database query language and the known concepts of relational algebra.

-Perform information update operations from a textual description of the operation to be performed.

-Document the operations performed, indicating the results obtained, and the changes made to the database.

C2: Perform the physical design of the databases according to the specifications of the logical layout.

CE2.1 Explain the available elements, objects, and physical storage structures in a particular SGBD (volumes, files, table spaces, data files, blocks, segments, among others) to organize the information of the same into the storage resources of the operating system.

CE2.2 Explain the relationship of the elements cited in the previous point to the elements of the physical schema: tables, views, indexes.

CE2.3 Explain the practical consequences of establishing different organizations of physical storage structures.

CE2.4 Explain the different replication schemes of the information, its features and forms of implementation.

CE2.5 Detailed the different methods of information fragmentation (vertical, horizontal, or mixed) for distributed databases.

CE2.6 Describe the structure of the SGBD data dictionary that contains the database information.

CE2.7 In a practical, well-characterized, practical assumption of the physical design of a BBDD based on the logical design of the BBDD:

-Verify that the logical design conforms to the degree of normalization required by the set usage types, the quality standards of the organization, and the available resources, adapting it if necessary.

-Dimensions the system storage needs and physical constraints according to the specifications of the logical design (number and characteristics of the intended users, initial volume of data, growth forecasts, volatility and expected data traffic).

-Select and apply the most appropriate information replication system based on the needs of the organization in cases where it is needed.

-Choose and implement the most appropriate transaction synchronization and recovery methods according to the needs of the organization and the requirements of the logical design.

-Set the concurrency control mechanisms best suited to the needs of the organization and the requirements of the logical design.

-Create the tables, views, indexes, and other objects of the database using DDL statements and/or SGBD administrative tools.

C3: Maintain security of access to databases by ensuring confidentiality.

CE3.1 Explain the methods for defining access profiles, indicating the characteristics of each.

CE3.2 Explain the concepts available in the SGBD for the application of security policies (roles, 'login', users, groups, permissions, privileges, among others).

CE3.3 Describe the applicable data protection regulations and the mechanisms of the SGBD to ensure compliance with the same.

CE3.4 Describe the principles of data protection, indicating the characteristics of data protection.

CE3.5 Describe people's rights, emphasizing what most influences the security of databases.

CE3.6 Identify the tools to track user activity, and the utilities.

CE3.7 List possible information confidentiality mechanisms (cryptography, 'checksum', signature algorithms, among others) available in the SGBD: for both data in the database and for communications.

CE3.8 Describe the two large groups of cryptographic techniques: public key and private key (asymmetric or symmetric), indicating the respective characteristics.

CE3.9 List problems that can be solved using cryptographic techniques: authentication, confidentiality, integrity, non-repudiation.

CE3.10 In a practical, duly characterised, practical assumption of the obligations in relation to the applicable rules, based on a defined database scheme and a specification of its use:

-Recognize content type according to applicable regulations (public or private ownership, type of information).

-Determine if the information is adjusted for the purposes, detailing the mismatches found in your case.

-Determine what the obligations are to meet according to the information available.

CE3.11 In a convenient, properly characterized, practice of applying access control policies to a database, from a database in an organization's operation, security plan, and internal rules of work:

-Set the necessary database access profiles according to the usage characteristics given in the logical design, with the organization's security rules and respecting the applicable regulations.

-Create and maintain security profiles defined by DCL statements and/or administrative tools.

-Create the database users by adapting them to the established security profiles.

-Configure the activity log to track the activities performed by users, so that deficiencies can be detected in the access control systems.

-Document user-level security policy implementation measures.

C4: Ensure the safeguarding and recovery of information stored in databases according to the needs of each of them.

CE4.1 Describe the main possible failures in a database: failure of some physical media, logical failures: internal database failure, aborted processes, cancelled transactions, among others).

CE4.2 Describe the main means that the SGBD provides for the recovery of logical failures by indicating its usefulness in the context of a logical failure: available safeguards and types, transaction log files, rollback spaces, among others.

CE4.3 Detailed the main forms of access to secondary storage media, explaining their characteristics.

CE4.4 Describe the different backup techniques (incremental, cumulative and complete), indicating the advantages and disadvantages of each one.

CE4.5 Identify the regulations applicable to the planning of backup systems, relating to the different types of stored contents.

CE4.6 Explain the operation of connection mechanisms with remote backup servers for backup.

CE4.7 In a convenient, well-characterized, well-characterized, data-protection and recovery scenario stored in a database on a functioning database, based on the internal security plan and rules of work:

-Define the backup and recovery policy to a disaster in accordance with the organization's security rules, the requirements of each database, and the applicable regulations.

-Schedule the performance of backups, calculating their costs, based on the organization's standards (features, timing, storage, time windows for batch execution, among others).

-Calculate the resources required to run the schedule set against a given database.

-Dispose the appropriate procedures to implement the schedule of the copies by using scripts and/or administrative tools.

-In case of a BBDD backup center, perform the necessary operations to keep the information that contains updated: linked to the remote server, exporting and importing data, among others.

-Retrieve backups in integrity conditions.

C5: Apply data export and import techniques from the database ensuring its integrity.

CE5.1 Explain the mechanisms of import and export of possible data (direct export of physical resources, transportable table spaces, files, among others) that make up the database to another similar SGBD, (export and direct import by linking of databases, export and import of data through an intermediate structure).

CE5.2 Describe the available import and export tools in the specific SGBD by specifying the advantages and disadvantages of each of them, when their use is appropriate taking into account the performance considerations of each of them, the possibility of automation, the flexibility in terms of recognized data formats, and the power in the data transformation.

CE5.3 Describe the integrity verification tools of the structure of a database available in the SGBD.

CE5.4 Describe the possible consequences for the performance of imports and exports of data without a log record, taking into account the opposition between performance and recovery considerations.

CE5.5 Describe the character set and other system internationalization mechanisms, to avoid problems in loading character, numeric, and non-decimal and date-type fields.

CE5.6 In a convenient, properly characterized, practical scenario of importing or exporting data about a configured BBDD and a set of flat files and other databases with known structures:

-Determine the initial data load procedure in the BBDD for each data set and set the tools to use and the initial creation mechanisms of the indexes.

-Perform the initial data load by ensuring its integrity.

-Import data into the BBDD, if applicable (from another BBDD or other information source), by applying the most appropriate method according to the internal working needs and standards.

-Export data from the BBDD, if applicable (to another BBDD or other information destination), applying the most appropriate method and the data transformations required to perform it according to the internal working needs and standards.

-Perform data transfer (import/export) according to the selected method and ensuring the integrity of the information.

-Perform basic high, low modification, and manual query operations on a functioning database.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.10, CE1.11 and CE1.12; C2 with respect to CE2.7; C3 with respect to CE3.10 and CE3.11; C4 with respect to CE4.7; C5 with respect to CE5.6.

Other capabilities

Take Responsibility for the work that you develop and the fulfillment of the objectives.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Demonstrate flexibility to understand changes.

Habit to the organization's work rate.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Introduction to relational databases and the relational model

Fundamental theoretical concepts of relational databases.

Data Models.

Types of data models.

The relational model: relationships and properties of relationships; keys; relational algebra; relational calculation of 'tuples'; relational calculation of domains.

Normalization theory: functional dependencies; normal forms; reasons to justify de-normalization.

2. Logical data models

Model-relationship-relationship: entity-relationship; weak entities; layout of a database schema with the entity-relationship diagram.

Object-oriented model: concepts of object orientation (classes, objects, attributes, methods, inheritance, polymorphism, among others); class and object diagrams.

Distributed model: introduction, advantages and disadvantages; fragmentation techniques: vertical, horizontal, mixed; data distribution techniques; data allocation and replication schemes.

3. Definition, manipulation, and control languages

Basic structure, history, and standards.

The data definition language (DDL): element creation statements (tables, views, triggers, constraints, among others); item modification statements; item removal statements; referential integrity maintenance: assertions, triggers, and foreign keys.

Data manipulation language (DML): data query, data insertion, data modification, data deletion; joins; treatment of null values; nested subqueries; transactions.

Optionally: Specific features of the SGBD with which the training is performed, particularly those cited for its current importance: extensions for the storage of objects in relational databases; extensions for the storage and extraction of XML in relational databases.

Manipulation of the data dictionary; structure; permissions.

4. Strategies for controlling transactions and concurrency

Concept of integrity.

Transaction Concept.

Transaction properties: atomicity, consistency, isolation, and permanence.

Problems resulting from concurrent execution of transactions.

Concurrency control: optimistic and pessimistic techniques.

Recovery from failures.

Mechanisms to undo transactions.

5. Safeguarding and retrieving data

Media classes.

RAID.

Caches.

Planning for safeguarding processes.

Copy types: full copies, incremental copies, cumulative copies.

6. Data security

Data security concepts: confidentiality, integrity, and availability.

Applicable data protection regulations; personal data and the right to privacy; first, second and third generation laws; the Data Protection Agency; General Data Protection Registry.

Security threat types: accidental: human error, intentional software/hardware; failures: direct and indirect attacks.

BBDD-associated security policies: user profiles; user privileges; user views; data encryption.

The DCL data control language.

Tracking the activity of users.

Basic introduction to cryptography: private or symmetric key techniques; public or asymmetric key techniques; cryptography applied to: authentication, confidentiality, integrity and non-repudiation; cryptography mechanisms available in the SGBD for use in databases.

7. Data Transfer

Tools for importing and exporting data.

Migrating data between different SGBDs.

Interconnect with other databases.

Configuring remote access to the database.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the configuration and management of the database, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX III

Professional Qualification: Administration and Design of Departmental Networks

Professional Family: Informatics and Communications

Level: 3

Code: IFC081_3

General Competition

Design the communications architecture of a medium or low complexity environment, monitor your deployment by following the project, and administer the resulting system, providing the necessary technical assistance.

Competition Units

UC0228_3: Design the telematics network infrastructure

UC0229_3: Coordinate the implementation of the telematics network infrastructure

UC0230_3: Manage the telematics network infrastructure

Professional Environment

Professional Scope

Develops its professional activity in the communications department dedicated to the administration and maintenance of corporate networks in medium or large companies and in the area of design and installation of networks in small or medium-sized enterprises, in entities of public or private nature, both self-employed and independent, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located in the telecommunications sector, in the subsector of design and development of systems and facilities for communications, installation and maintenance of telematic networks and in any productive sector that uses a corporate network as support of the business process.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Telematics Systems Administrators

Network and communications administrators

Local and telematics network technicians

Network installation monitors

Telematics Network Design Technicians

Associated Training (600 hours)

Training Modules

MF0228_3: Telematic network design (210 hours)

MF0229_3: Network Deployment Management (150 hours)

MF0230_3: Telematic network administration (240 hours)

COMPETITION UNIT 1: DESIGN THE TELEMATICS NETWORK INFRASTRUCTURE

Level: 3

Code: UC0228_3

Professional Realizations and Realization Criteria:

RP 1: Determine the topology configuration of network networking that responds appropriately to the needs of the project.

CR 1.1 The specifications of the system are elaborated by collecting the functional, technical and cost requirements and performance.

CR 1.2 The system topology is determined by choosing a standard reference model that meets the requirements of the applications to be used, such as: response time, quality of service, routing scheme, data volume to transfer, distances, or access to other networks.

CR 1.3 Communication elements are valued taking into account the existing infrastructure and the state of the technology in the present as well as its possible short and medium term developments.

CR 1.4 The topology and elements of the network are chosen according to the requirements of accessibility, confidentiality and integrity required by the user and the current regulations.

RP 2: Analyze the connectivity capabilities of the market communications teams to integrate them into a telematics network infrastructure project.

CR 2.1 The characteristics and specifications of communications equipment are identified to determine their suitability for network design.

CR 2.2 The different physical means of transmission are differentiated by their technical characteristics and their suitability for use for different types of networks, interpreting the reference technical documentation.

CR 2.3 The environmental requirements of the communications equipment (occupied surface, electrical consumption, heat dissipation, etc.) are contrasted with the possibilities of the installation.

CR 2.4 The conditions for the hiring and service of the basic means of access to public networks offered by the telecommunications operators are included in the specifications of the network design, reviewing the content.

CR 2.5 The capabilities and features of communications hardware products and analog software products, such as: routers, hubs, switches, VPN servers-virtual private networks-, or firewalls, are compared for inclusion in the network design, interpreting the associated technical documentation.

CR 2.6 The implementation of communications software products is evaluated on different platforms and operating systems, taking into account all possible cases.

RP 3: Determine the physical configuration of network networking by selecting the equipment, devices, and software that meet the needs of the project.

CR 3.1 The location of the network equipment and devices is determined taking into account the conditions of ergonomics, safety and use of the available space.

CR 3.2 The software components of the network infrastructure are chosen in accordance with the system requirements and with the capabilities required by the applications and previously specified.

CR 3.3 The cabling system and the type of support used for the local network are determined according to the distances between the different nodes of the system, the speed required for the transmission of the data and the environmental conditions.

CR 3.4 Network devices and devices are selected according to the following criteria:

-The condition of approval of the same, both internally and externally, proposing for internal approval those elements whose use is essential.

-Compliance with prescribed technical and economic conditions.

-The security of supply and its availability within the agreed deadlines.

CR 3.5 The drawings and diagrams of the system blocks are elaborated reflecting the structure of the system and the different elements that make it up, identifying the user jobs in the plane and its connections in the plant rack, the interconnections with other racks the building, and the identification and location of the communications devices of each rack.

RP 4: Develop or monitor the preparation of the technical documentation to enable the installation of the data network and its subsequent maintenance.

CR 4.1 The description of the installation is elaborated detailing the characteristics and scope of the installation.

CR 4.2 The technical documentation is prepared by including the necessary set and detail plans, using the standardized symbology and presentation.

CR 4.3 The ratio of materials, equipment and devices is performed using standardized coding and ensuring its internal and/or external acquisition.

CR 4.4 The construction plans of the installation are elaborated by collecting the characteristics of the equipment for implantation, such as: physical dimensions, location of devices and cards, coded identification of I/O and cable, among others.

CR 4.5 The network software and the system communication programs are documented in a way that allows the implementation and subsequent maintenance of the functions of the same.

CR 4.6 The technical documentation is made in a way that conforms to the standards of the organization, contains the necessary chapters for the installation and maintenance of the system, and includes:

-Process to be followed in commissioning.

-Tests and adjustments to be made in the system start-up process.

-Parameters to be verified and adjusted.

-Stable Margenes of operation.

-Guidelines for performing preventive system maintenance.

Professional Context:

Production media:

Instruments for the realization of facility schemes (CAD/CAM/CAE programs, among others). Manufacturer's technical documentation. Project planning tools. Operator communications service configurators.

Products and results:

Network design: blocks and block diagrams. Component memory. Network infrastructure maintenance guidelines. Verification and testing guidelines for components and equipment.

Information used or generated:

Communications Infrastructure Security Policy. Installation manuals, reference and use of communications equipment. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software. Applicable regulations and standards of communications networks. Technical documentation of projects and communications facilities. Time and pricing manuals for communications facilities.

COMPETITION UNIT 2: COORDINATE THE IMPLEMENTATION OF THE TELEMATICS NETWORK INFRASTRUCTURE

Level: 3

Code: UC0229_3

Professional Realizations and Realization Criteria:

RP 1: Control the implementation and maintenance of data networks by verifying that the planning and conditions set out in the overall implementation plan are met, by developing a monitoring and control procedure.

CR 1.1 The testing and testing protocols of the systems are developed in a way that ensures the standardized identification of the drivers and the adjustment of the type, isolation and section of the conductors and the type and characteristics of the pipes to the specifications of the project.

CR 1.2 The implementation of the data network is carried out according to the specifications of the project and the applicable electrotechnical regulation.

CR 1.3 The testing and testing protocols of the systems are developed in such a way as to ensure that the electrical and signalling and control devices are approved, the resistance of the grounding is within the established margins, the voltage drops are the permissible and the firing of the protection against potential failures is the prescribed according to the applicable electrotechnical regulation.

CR 1.4 The various controls that are applied during the installation run are adjusted in time and shape to the overall execution plan.

CR 1.5 The procedure to be applied in the process of monitoring and control of the execution of the work is elaborated by making explicit all the steps to follow.

CR 1.6 The data to be collected on the state of assembly or maintenance of the system are determined in a way that allows to evaluate the progress of the work and its adequacy to the established planning.

CR 1.7 The incidences and deviations that emerged during the process are communicated with sufficient speed and the causes of the same are explained.

CR 1.8 The improvements and/or modifications to the implementation of the system are proposed to solve contingencies or increase their performance, attaching a technical and economic evaluation of the same ones that facilitates the decision making.

CR 1.9 The responses to incidents that may occur, on personnel or materials, are included in a contingency plan.

CR 1.10 Work items are collected daily, ensuring that they collect in form and content the data needed to track the schedule.

CR 1.11 The modifications to be made to the planning of the implementation or maintenance of the system are permanently reflected in the production graphs produced in this respect.

RP 2: Monitor the installation of the wiring and the certification of the wiring according to the installation project to meet the established quality criteria.

CR 2.1 The materials and tools used in the installation are in line with the project specifications, meeting the established quality criteria.

CR 2.2 The realization of wired, connected, and channelings is monitored by checking that they are in line with the plans and plans and resolving the contingencies that arise.

CR 2.3 The wired and connected are done according to the schemes and plans, solving the contingencies that arise.

CR 2.4 The cables and connectors are correctly labeled in their sources and type according to the project specifications.

CR 2.5 The respect of the personal security conditions and the means and materials used is monitored in a way that ensures their compliance at all times, taking the appropriate measures in case of incidents.

CR 2.6 The programme of amendments to be made shall be drawn up where necessary, reporting and taking appropriate measures in accordance with the standard or most appropriate procedure, optimising resources and minimising court and/or delay times.

CR 2.7 The modifications made during the assembly are recorded in the plans and schemes keeping the documentation of the installation up to date.

CR 2.8 Preventive maintenance operations are monitored, checking that they are performed in accordance with established procedures.

CR 2.9 System changes and/or improvements are intended for repetitive failures of the system to provide more secure and reliable operation.

CR 2.10 The periodic reports and the daily parts are monitored, verifying that they accurately collect the work carried out, the incidents that have arisen and the solutions adopted, and that allow the updating and monitoring of the information about the implementation of the system.

CR 2.11 The training and information of the staff in charge of the quality required in the execution of the work is carried out on an ongoing basis, giving the instructions and/or undertaking the necessary actions to this end.

RP 3: Monitor the installation of the network equipment and devices to meet the quality criteria established, verifying that the applicable regulations and/or the manufacturer's recommendations are met and that you comply with the installation project.

CR 3.1 The location of the equipment is reviewed by checking that it corresponds to the plans of the installation and respects the criteria of ergonomics, safety and use of space.

CR 3.2 The connection of the equipment to the electrical power is monitored by checking that the safety criteria and applicable regulations are followed.

CR 3.3 The installation of network equipment is monitored by checking that as far as possible, it is placed on racks, respecting the specifications of the manufacturers and maintaining adequate ventilation.

CR 3.4 The attachment and connection of the equipment cables is monitored by verifying that functional criteria are followed that maintain correct labeling and allow subsequent manipulation.

CR 3.5 The handling of the equipment in production takes place in the schedules and in the way that they minimize the impact on the service.

CR 3.6 The training and information of the staff in charge of the quality required in the execution of the work is carried out on an ongoing basis, giving the instructions and/or undertaking the necessary actions to this end.

CR 3.7 The selection of wireless communication channels and their emission power are performed according to the characteristics of the environment and the project performance requirements.

RP 4: Perform and/or monitor the tests necessary for the verification of the basic performance of the equipment and devices, in order to ensure compliance with the requirements set out in the implementation documentation.

CR 4.1 Testing is done following the manufacturer's recommendations and the organization's test plan.

CR 4.2 Failure or malfunction reports by part or all of the network equipment are elaborated by detailing the features and referred to the manufacturer.

CR 4.3 The repair or replacement of components or equipment with malfunction or malfunction is monitored in such a way as to ensure the proper functioning of the system.

CR 4.4 The characteristics of the materials used are verified in such a way as to ensure the adequacy of the materials to the project specifications.

CR 4.5 The related and functional tests (at rest and activity) are performed according to the established protocol, making the necessary adjustments to achieve the prescribed specifications.

CR 4.6 Test reports are prepared by evaluating the test results records and testing of equipment and materials, and are transmitted to the system controller according to the established procedure.

RP 5: Develop the technical project closure documentation and train the management team to take over management of the installed infrastructure.

CR 5.1 The verification and commissioning report of the communication system is developed in a way that accurately includes the overall results of the tests performed and the acceptance of the test by the client.

CR 5.2 The documentation is prepared to allow the management team to configure and operate the systems to obtain the expected and appropriate result.

CR 5.3 The closure documentation is made including installation diagrams and diagrams, component and equipment failure reports, detailed maintenance plan for each of the components, and equipment operating manual, among others.

CR 5.4 The training plan is developed with the aim of facilitating the administration of the network elements.

CR 5.5 The training actions are provided on the installation itself and with emphasis on the practical component.

Professional Context:

Production media:

Project management programs. Office tools. Graphical presentation of reports. Cabling certifiers. Network analyzers. Manual tools for the installation of communications infrastructures. Communications infrastructure equipment. Communications software support media. Copper and fiber optic cables. Parts of work. Communications racks. Tools for monitoring levels of coverage in wireless networks.

Products and results:

Data networks installed. Planning and control documents for the execution of communications facilities. Wiring installed and tagged. Technical documentation of closure. Training plan. Installed communications infrastructure equipment. Communications software installed. Individual tests executed.

Information used or generated:

Installation, reference, and use of communications equipment manuals. Information on local and extensive area networks and public and private communication systems. Applicable regulations, regulations and standards. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software. Technical documentation of projects and communications facilities. Time and pricing manuals for communications facilities. Rates and conditions of operator communications services. Execution Plan. Monitoring reports and proposals/modifications of the facilities. Completed parts of work.

COMPETITION UNIT 3: ADMINISTER THE TELEMATICS NETWORK INFRASTRUCTURE

Level: 3

Code: UC0230_3

Professional Realizations and Realization Criteria:

RP 1: Configure the data network infrastructure devices and devices from the design set for their operation.

CR 1.1 Data network infrastructure teams are configured by adjusting the parameters and definitions individually with the values set in the design and in the order and mode that the manufacturer determines.

CR 1.2 Network access identification means (users, profiles or others) are adjusted to ensure the security and traceability of configuration parameters and definitions.

CR 1.3 The parameters for which the stability and availability of the components and/or network equipment are dependent are configured with special attention to the available resources and always according to the established design.

CR 1.4 Network equipment user names and passwords are chosen according to the criteria set out in the security policy, stored using applications and/or procedures that ensure their confidentiality.

CR 1.5 Access to data network infrastructure teams is done through applications that ensure system security against improper access.

CR 1.6 Network equipment access control mechanisms are configured so that they can only be modified from authorized points.

CR 1.7 The configuration documentation is made up by including all implanted values and implicit topological definitions in graphical schema mode.

RP 2: Verify and test the elements of the data network infrastructure to check the integrated operation of the data network, using tools, verification techniques, tests and ensuring the correct operation of the same.

CR 2.1 End-to-end, load, and network infrastructure continuity testing of network infrastructure clients are performed, verifying that they fit the design stage.

CR 2.2 The signal coverage and quality tests are performed at different points in the coverage zone, taking into account the location of the access points and the architectural features of the building.

CR 2.3 Functional verifications are performed, as planned in the design stage, so as to ensure the operation of the network in extreme cases.

CR 2.4 The network software is verified in conjunction with the teams and using the techniques and tools that are best suited to the situation to be checked.

CR 2.5 The final verification and testing documentation is prepared including the activities performed and the results obtained.

RP 3: Define and implement monitoring procedures for data network infrastructure elements so that they can evaluate system capabilities, estimate their performance, and determine the elements that need to be extended or replaced before they degrade system performance.

CR 3.1 The processes and components to be monitored are selected with availability criteria and load status.

CR 3.2 The thresholds of the processes and components to be monitored are selected according to the required level of service and manufacturers ' specifications.

CR 3.3 Expected alarms are selected so that they are related to each other to facilitate the analysis of the operators.

CR 3.4 Different network element monitors that configure a particular service are logically grouped together to facilitate understanding by network operators.

CR 3.5 The system is configured to automatically generate events based on alarms or alarm groups.

CR 3.6 The alarms and events are recorded in a way that can be analyzed later, allowing you to predict which elements should be extended or replaced in order to maintain the system's performance.

RP 4: Monitor and/or perform the maintenance of the data network by adapting the preventive plans established to the particularities of the installation, applying the standard procedure and the periodicity established in the design stage to ensure the operation of the network.

CR 4.1 Physical transmission systems are kept minimizing signal loss levels.

CR 4.2 Maintenance actions are planned and performed by adjusting procedures and schedules to minimize the impact on production.

CR 4.3 The tests after each maintenance action are performed in a way that ensures the correct operation of the data network infrastructure.

CR 4.4 The record of maintenance actions is performed according to criteria that facilitate the consultation and traceability of incidents.

RP 5: Understand the incidences, diagnosing the causes of dysfunctionality of the system and adopting, at its level, the necessary measures for the rapid and reliable restoration of the operability of the system.

CR 5.1 The incidence is verified, reproducing the behavior indicated in the breakdown part and specifying the effect thereof.

CR 5.2 The diagnosis and location of the system failure is performed using the technical documentation of the network and the equipment, the necessary tools, specialized diagnostic software and the corresponding procedure.

CR 5.3 Replaced devices and/or equipment conform to the set design, with the required accuracy, following the documented procedures.

CR 5.4 Functional tests, final adjustments, reconfiguration of the parameters, loading of the software and, if necessary, the recommended reliability tests, are performed systematically, following the procedure specified in the system documentation.

CR 5.5 The breakdown or incident repair report is performed in the normalized format, allowing you to collect the information for the incident repository update.

Professional Context:

Production media:

Software configuration tools. Network routing plan. Fault diagnosis software. Corporate office applications. Graphical presentation of reports. Network analyzers. Communications infrastructure equipment. Communications software support media. Copper and fiber optic cables. Monitoring tools. Incident management/help-desk applications. Applications for secure storage and/or transmission of information. Random password generators. Programs for remote configuration of communications equipment. Wireless coverage monitoring tools.

Products and results:

Communications infrastructure configured according to customer specifications. Data networks installed. Planning and control documents for the execution of communications facilities. Installed communications infrastructure equipment. Communications software installed. Integrated tests executed. Monitored networks with alarm and event management.

Information used or generated:

Communication System Deployment Plan. Communications equipment installation manuals. Internal rules of work on customer service. Quality guide. Maintenance plan. Installation manuals, reference and use of communications equipment. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software. Technical documentation of projects and communications facilities. Applicable telecommunications regulations. Monitoring reports. Performance reports and improvement proposals. Monitoring reports and proposals/modifications of the facilities.

TRAINING MODULE 1: TELEMATIC NETWORK DESIGN

Level: 3

Code: MF0228_3

Associated with UC: Design the telematics network infrastructure

Duration: 210 hours

Assessment capabilities and criteria:

C1: Analyze the features and requirements of a telematics network project based on the client's needs.

CE1.1 Identify sources of information.

CE1.2 Apply interview and information collection techniques.

CE1.3 Explain the problem of the feasibility study of a project.

CE1.4 Develop a user requirements document.

CE1.5 Sink the collected information.

CE1.6 In a practical, properly characterized, information collection scenario:

-Simulate an interview with the client.

-Perform a requirements document.

-Perform a technical-economic feasibility study.

C2: To differentiate the characteristics of the existing media in the market.

CE2.1 Reasoned the ratio of bandwidth to transmission speed.

CE2.2 Identify the characteristics of a product from its specifications.

CE2.3 Describe the installation problem of a given means of transmission.

CE2.4 Classify the means of transmission according to the technical characteristics of their use in network facilities.

CE2.5 Detailed the influence of each transmission medium on the overall performance of the network.

CE2.6 Properly interpret the symbology and coding used commercially for the different means of transmission.

CE2.7 In a practical, duly characterized, practical scenario of telematic network design:

-To analyze the market for the communications products needed for the design, consulting documentation on the Internet, specialized journals, catalogues of manufacturers, among others.

-Make several proposals based on economics and performance criteria.

C3: Explain the existing levels in the TCP/IP protocol set.

CE3.1 Interpret the OSI reference model.

CE3.2 Describe the functions and services of each level of the OSI reference model.

CE3.3 Explain the TCP/IP architecture.

CE3.4 Establish mappings between the TCP/IP architecture and the OSI reference model.

CE3.5 Associate functions and services at each level of the TCP/IP architecture.

CE3.6 Describe the IP routing system.

CE3.7 Apply the IP routing system in the creation of subnets.

CE3.8 Describe the various routing protocols in IP networks: BGP, OSPF, RIP.

CE3.9 Describe the application-level protocols of the TCP/IP, FTP, HTTP, SMTP, Telnet, SNMP, and other architecture.

C4: Explain the technical characteristics and operating mode of the different network interconnection equipment.

CE4.1 Classify the operation of network equipment with respect to the OSI reference model.

CE4.2 Describe the functions of the different interconnection devices.

CE4.3 Detailed the technical characteristics of the interconnection equipment to determine their influence over the network performance.

CE4.4 Analyze the different software alternatives with respect to the equivalent communications hardware products.

CE4.5 Describe the interconnection architecture by using VPN (Virtual Private Network, virtual private networks).

CE4.6 Interpret information that appears in communications product catalogs.

C5: Select a particular pipeline team for a network infrastructure.

CE5.1 Justify the choice of interconnection equipment according to performance and economy criteria.

CE5.2 Describe the problem of the interconnection of local area networks.

CE5.3 Describe the problematic of the local area network network-wide area network.

CE5.4 Justify the choice between a hardware solution and other software according to performance criteria, economics, complexity and ease of administration.

CE5.5 Explain the influence of collision domains and IP domains on network performance.

C6: Design the network topology, including the transmission media and communications equipment best suited to the specifications received.

CE6.1 In a scenario of designing telematic networks from given specifications:

-Design the topology that meets the expected service quality, cost, and performance specifications.

-Choose the transmission means for the network design according to the quality and expected cost criteria.

-Locate the interconnection equipment in the design so that the established quality criteria are met.

CE6.2 In a scenario of interconnecting and logical configuration of equipment, from a given design:

-Set the routing mode and its configuration, including any subnets that are required and taking into account security.

-Select the interconnection system with the wide area network according to the chosen topology and meet the agreed cost and effectiveness criteria.

-Set backup lines if needed.

-Use simulation programs to verify the performance of the design.

C7: Develop the documentation required for project execution.

CE7.1 Identify in the quality standard in effect the sections that apply to the network design process.

CE7.2 In a scenario of describing or analyzing a process related to the design activity identify or set:

-Input data to the process.

-The function associated with the process.

-Data or documentation generated in the process.

-Records and evidence generated.

-Relation to other processes.

-Metrics that can be applied and possible points of improvement.

CE7.3 In a practical, well-characterized scenario, of technical documentation of an existing project:

-Identify the location of the equipment.

-Identify the broadcast media used.

-Identify the network addresses used.

-Interpret the encoding of the interconnect equipment used.

CE7.4 Describe and differentiate the sections that make up a project, according to the applicable regulations.

CE7.5 Confect, from the specifications formulated, a network plane that contains:

-The location of the equipment.

-The means of transmission.

-The network addresses used.

-Coding of interconnection equipment.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6; C2 with respect to CE2.7; C6 with respect to CE6.1 and CE6.2; C7 with respect to CE7.2 and CE7.3.

Other capabilities:

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Treat the customer with courtesy, respect and discretion.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Demonstrate flexibility to understand changes.

Contents:

1. Introduction to computer communications and networks

Data Communication.

Communication through networks.

WAN networks. LAN networks. Protocols and protocols architecture.

The OSI model.

The TCP/IP protocol architecture.

Regulations and Standards of Standardization. IETF. ISO. ITU ICT.

2. Data communication

Data Transmission Principles.

Encoding. Multiplexing. Switching.

Analog and digital data.

Analog and digital transmission.

Disturbances.

Means of transmission.

Guided media.

Wireless media.

Data Link Control.

3. Classification of Communications Networks

Switch networks.

Circuit Switching.

Packet switching.

ATM and Frame Relay.

Broadcast Networks.

Networks by bus.

Ring networks.

Star Networks.

Local Area Networks.

LAN Architecture.

LAN-LAN Pipeline.

LAN-WAN Pipeline.

4. Communications network design

Transmission medium.

Connection equipment.

Network cards.

5. Protocols

Networking protocols.

IP Protocol.

Transport Protocol.

TCP/UDP protocols.

Network security.

Application level.

Protocols: HTTP, SMTP, SNMP, FTP, among others.

6. Project Documentation

Information collection techniques.

Feasibility study.

Quality.

Regulations and certifications.

The Quality System of a company.

Processes and Procedures.

Quality Plans.

Records and Evidence.

Metrics.

Audits.

Improvement and prevention of problems.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the design of the telematics network infrastructure, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: MANAGING NETWORK DEPLOYMENT

Level: 3

Code: MF0229_3

Associated with UC: Coordinate the implementation of the telematics network infrastructure

Duration: 150 hours

Assessment capabilities and criteria:

C1: Analyze project technical documentation for network implementation and maintenance, identifying the information needed to plan the processes that are required.

CE1.1 Describe the technical documentation that is included in the network mount and maintenance projects, interpreting the information that it contains.

CE1.2 Indicate the different types of drawings or schemas that make up the graphical documentation of a project.

CE1.3 Identify and interpret the regulations and regulations to be used in the planning of network projects.

CE1.4 Explain the parts, equipment and elements that make up the networks (cabling network, wireless networks, telematics communication equipment, private telephone exchanges, terminals, and others).

CE1.5 In a practical scenario, analysis of technical documentation based on the definition of a project to implement and maintain a network, duly characterized:

-Identify the location of voice and data communications equipment.

-Determine the means and tools required to apply the processes.

-Identify the power distribution system, protection elements, wrappers, frames, cabinets, and wiring elements, and special power and forced ventilation systems.

-Determine the type of pipes and their distribution in plants, horizontal and vertical distribution as well as the characteristics of the wiring and connection of the elements.

-Determine the identification and signaling systems of drivers, connectors, user takes and equipment present in the installation.

C2: Apply planning, scheduling, and monitoring techniques in network implementation and maintenance processes.

CE2.1 Explain different project planning and programming techniques and tools (GANTT, PERT and CPM), the rules to be applied when applying them, and indicating the usefulness of each one.

CE2.2 Analyze the various components that make up the cost of the network implementation and maintenance processes.

CE2.3 In a practical, properly characterized, scenario of planning a network implementation or maintenance process, and from the technical documentation that sets the required specifications:

-Establish the phases of the implementation and/or maintenance process, in turn decomposing each of the phases in the different operations that compose it.

-Determine the equipment and facilities required to run the process.

-Calculate the times of each operation, identifying and describing the critical points of the process.

-Represent the sequence of tasks using GANTT diagrams and network diagrams.

-Determine human and material resources in a way that conforms to the specifications received.

-Perform the cost estimate, based on the determinations made.

CE2.4 Explain how a workload chart is set, analyzing resource allocation and timing.

CE2.5 List and describe the most relevant job scheduling techniques.

CE2.6 In a practical scenario of the implementation and/or maintenance of a network, duly characterized by technical documentation including, at least, the plans and schemes of the network, the start and end dates, the processes used, the human resources and the available means of production, as well as the work schedule, the timing of the maintenance and the supply of products and equipment:

-Determine milestones for each of the main phases of the job.

-Set the workload on the different jobs, balancing the loads.

-Identify, by name or standard code, the materials, products, components, tools and equipment required to undertake the various operations involving the implementation and/or maintenance of the system.

-Generate the information you define: the supplies, media, tools, and tools and intermediate 'stocks'.

C3: Develop/modify intervention protocols for service and network maintenance.

CE3.1 In a number of practical, well-characterized, practical scenarios for the development of service and network maintenance protocols, achieve that:

-The problems identified in the application of the procedure to be elaborated/amended are sufficiently justified and explained in the standard document.

-The definition of the solution of the new procedure is preceded by the tests and tests necessary to ensure the most suitable solution according to the procedure to be improved.

-The resulting procedure takes into account the optimization of the material and human resources required for your application.

-Proposals for changes to be made are clearly justified, specified and collected in the relevant document, in a satisfactory way to resolve the deficiencies of the procedure.

-The new procedure includes, in the standard format, the most relevant aspects for its application, such as the phases to be followed in the application of the procedure, the graphic and textual description necessary for the implementation, the tests and adjustments to be carried out, the means to be used, the parameters to be used, the safety standards of persons, equipment and materials to be applied, the expected and/or foreseeable results, the persons to be involved and the standard document to be completed.

C4: Perform, with precision and security, measures in the different elements that make up the networks, using the appropriate instruments and auxiliary elements and applying the most appropriate procedure in each case.

CE4.1 Explain the most relevant characteristics, the typology and procedures of use of the measuring instruments used in the field of the networks, depending on the nature of the magnitudes to be measured and the type of technology used.

CE4.2 Apply the most suitable procedures for the measurement of parameters (crosstalk, attenuation, loss of return, and others) required for the certification of structured copper and optical fiber in the different categories and standard classes.

CE4.3 Apply the most suitable procedures for the measurement of electrical measures required in the implementation and maintenance of networks (tensions and electrical intensities, impedance, ground resistance, and others).

CE4.4 In several practical scenarios of measures in simulated networks, where different elements of different types are involved and depending on the nature of the signals to be measured:

-Select the measuring instrument and the most appropriate auxiliary elements according to the type and nature of the magnitudes to be measured and the precision required.

-To properly handle the different measuring devices according to the characteristics of the magnitudes to be measured.

-Measure the signals and states of the equipment and devices used, properly operating the instruments and applying, with the required security, the standard procedures.

-Interpret the measures performed, relating the states and values of the measures measured with the corresponding reference, pointing out the differences obtained and justifying the results.

-Develop a report-memory of the activities developed and results obtained, structuring it in the necessary sections for an adequate documentation of the same (description of the process followed, means used, schemes and plans, functional explanation, measures, among others).

C5: Diagnose breakdowns in the networks, identifying the nature of the breakdown (physical and/or logical), applying the most appropriate procedures and techniques in each case.

CE5.1 Classify and explain the typology and characteristics of the physical breakdowns presented in the networks.

CE5.2 Classify and explain the typology and characteristics of the malfunctions of a logical nature that are presented in the networks.

CE5.3 Describe the general techniques and specific technical means necessary for the location of physical faults in the networks.

CE5.4 Describe the general techniques and specific technical means necessary for the location of faults of a logical nature in the networks.

CE5.5 Describe the general process used for the diagnosis and location of physical and/or logical failures in the networks.

CE5.6 In a number of practical, properly characterized, diagnostic and troubleshooting scenarios, a network where different problems are simulated:

-Interpret the system documentation, identifying the different functional blocks and specific components that compose it.

-Identify the symptoms of the breakdown by characterizing it by the effects it produces and perform at least one hypothesis of the possible cause that can produce the breakdown, relating it to the symptoms (physical and/or logical) that the system presents.

-Perform an intervention plan on the system to determine the cause or causes that cause the breakdown.

-Locate the element (physical or logical) responsible for the breakdown and perform the replacement (using similar or equivalent components) or modification of the element, configuration and/or program, applying the required procedures and in a time adjusted to the type of fault.

-Perform the checks, modifications and adjustments of the system parameters according to the specifications of the technical documentation of the system, using the appropriate tools, that allow for their application in each case.

-Develop a report-memory of the activities developed and results obtained, structuring it in the necessary sections for proper documentation of the same (description of the process followed, means used, measures, functional explanation and schemes).

C6: Apply techniques and procedures to ensure safety and quality in the process of network implementation and maintenance.

CE6.1 Identify the contents of a quality plan by relating it to the product or process and to the applicable quality standards and standards.

CE6.2 Describe the assessment criteria for control characteristics.

CE6.3 Explain the structure and contents of the guidelines and control reports.

CE6.4 In a practical scenario of implantation and/or maintenance of a network, defined by its technical specifications, process, technical means and human resources, timing:

-Analyze the system specifications to determine the quality characteristics that are controlled.

-Set the control phases of the system deployment.

-Apply control guidelines, determining the required procedures, devices and instruments.

-Develop the information and data collection tabs to be used.

-Compose reports of non-compliance in accordance with established procedures.

CE6.5 Identify the contents of a safety plan, relating them to the product or process and to the applicable safety regulations and regulations.

CE6.6 In several security and quality scenarios that describe different work environments related to network deployment and maintenance:

-Determine the specifications of security and protection media and equipment.

-Develop technical documentation showing the location of emergency equipment, signals, alarms and exit points in case of emergency, in accordance with applicable regulations.

-Develop procedures and guidelines to be followed to act with the security that is required in each type of action.

-Compose reports of non-compliance in accordance with established procedures.

C7: Develop and impart training plans on implementation, maintenance, and network management procedures.

CE7.1 Define precisely the elements that must contain a technical training plan for a work team.

CE7.2 List and explain different techniques for the diagnosis of training needs of technical contents of a group of people.

CE7.3 Explain precisely the differences that exist between the different types of content that must appear in a technical training plan: conceptual, procedural and actitudinal.

CE7.4 Describe different techniques and training methods for the technical training of groups of people.

CE7.5 In a properly characterized practice of training a group of people in a specific technique, procedure or team, prepare a multimedia presentation to support the presentation of the contents, including:

-Presentation Guion, duly structured.

-Quality graphic elements.

-Explanatory texts attached to the charts.

-aesthetic care of the contents.

-Multimedia elements supporting the presentation.

CE7.6 In a practical scenario, properly characterized for the training of a group of people in a specific technique, procedure or team, to elaborate and impart, in a simulated way in the learning environment, a training program, at least, with the following characteristics:

-Accurate elaboration of the goals to be achieved in the established time, depending on the learning needs diagnosed.

-Selection of contents and their typology according to the objectives and with the nature of the same.

-Preparing teaching-learning activities in the appropriate format, including the operational process, resources, and methodology to be used.

-Establishment of sequencing in the development of content and activities.

-Preparation of activities, procedures and instruments for the assessment of learning.

-Development of the simulated impartition in time and form, explaining carefully the actions that supposedly would be carried out in real situation.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.3 and CE2.6; C3 with respect to CE3.1; C4 with respect to CE4.4; C5 with respect to CE5.6; C6 with respect to CE6.4 and CE6.6; C7 with respect to CE7.5 and CE7.6.

Other capabilities:

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Adapt to new situations or contexts.

Contents:

1. Project development

Defining projects. Specifications.

The organization by projects.

Project groups.

Documentation that makes up a project: list of materials, schemes, plans, instructions for assembly and tuning, functional tests, quality and reliability, descriptive memory, specifications and programs. Documentation for the schedule. Documentation for the follow-up of the actions to be carried out.

Planning of times, scheduling of resources and estimating costs in the execution and maintenance of networks: relationship of phases and tasks; breakdown of tasks; determination of times.

Estimated forms: materials, characteristics of human resources, contingencies, costs. Subcontracting.

Units of work.

PERT and CPM techniques. Rules that define it. Its application.

Gantt Diagrams. Rules that define it. Its application.

Project completion and delivery: reports and documentation; formal project completion statement; documentation: product, designs; cost reports.

Correspondence.

Basic file management.

2. Application of quality and safety plans in the execution of projects for the implementation of networks

The quality of project execution for network deployment. The Quality Plan.

Criteria to be adopted to ensure quality in the implementation of projects for the implementation of networks.

Quality control. Phases and procedures. Resources and documentation.

Computer tools for the application and monitoring of a quality plan.

The Safety Plan in the implementation of projects for the implementation of networks.

Criteria to be adopted to ensure safety in the implementation of projects for the implementation of networks.

Security control. Phases and procedures. Resources and documentation.

Quality and Safety Regulations applicable.

3. Elaboration of intervention protocols in the implementation and maintenance of networks

Network Deployment Procedures. Typology and features.

Networking procedures. Tests, verifications and records.

Network maintenance procedures: preventive and corrective.

Phases and Tasks.

Log of procedures.

Cause and effect diagrams.

4. Local area network certification procedures

Structured Cabling Systems: Horizontal cabling and vertical cabling.

Measurement instruments; tester and certifiers.

The characteristic parameters of a transmission medium.

Cable certification regulations: Categories and classes.

Applicable regulation in the field of communications infrastructure.

5. Electrical supply systems. Features, measures, and measures

Electrical supply facilities: typology and characteristics.

Measures of electrical magnitudes: tension, intensity, impedance, ground resistance.

Electrical protection elements.

Uninterruptible power systems.

Electrotechnical regulation.

6. Development and delivery of training plans

Techniques and tools for the diagnosis of training needs.

Elaboration of didactic objectives.

Selection of contents: conceptual, procedural and actitudinal.

Elaboration of reports and operational manuals: structure of the information to be transmitted; drafting of technical texts; elaboration of textual and visual guides for operational manuals.

Content presentation and presentation techniques: multimedia presentation techniques; preparation of teaching-learning activities: format and content; preparation of evaluation activities: format and content; records of follow-up to the learning process.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the coordination of the implementation of the telematics network infrastructure, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: TELEMATICS NETWORK ADMINISTRATION

Level: 3

Code: MF0230_3

Associated with UC: Manage the telematics network infrastructure

Duration: 240 hours

Assessment capabilities and criteria:

C1: Successfully and effectively implement communications software products on different platforms.

CE1.1 Explain the function of DNS and DHCP services and their components.

CE1.2 Explain the functions of a proxy server and its usual business implementations, highlighting whether it offers firewall, NAT, or cache services.

CE1.3 In a scenario, installation and configuration of communications services:

-Install and configure a DNS service, including Dynamic DNS and the DHCP service for DNS.

-Install the DHCP service, creating a scope and configuring address and reservation ranges.

-Verify the operation of the installed services.

CE1.4 In a scenario of installing and configuring a proxy server:

-Install a proxy server.

-Configure the different options: NAT, cache, firewall.

CE1.5 In a scenario of installing and configuring a router:

-Install and configure a router using a computer.

-Verify the operation of the router equipment according to the routing requirements.

C2: Set the configuration of the interconnection equipment best suited to the needs of the installation.

CE2.1 Explain the different level 2 and 3 functions of the OSI model and what their characteristics are in terms of isolating network traffic.

CE2.2 Describe the problem of the occurrence of loops when interconnecting LANs using switches.

CE2.3 Describe the problem of the occurrence of loops when interconnecting switches with multiple redundant links.

CE2.4 Explain the operation of the 'Spanning Tree' algorithm.

CE2.5 In a VLAN configuration scenario:

-Configure multiple VLANs on a single switch.

-Configure multiple VLANs on two switches and join them with a trunk link.

-Verify the configuration and check the proper operation of the network.

CE2.6 In a scenario of routing, based on the following operating requirements:

-Configure a network topology with multiple routers by adding routes according to requirements.

-Verify if the route tables are correct for the required routing.

-Define access control lists to allow or block certain traffic.

C3: Implement monitoring and alarm procedures for the maintenance and improvement of network performance.

CE3.1 Explain the function of management message exchange protocols.

CE3.2 Associate parameters that define the operation of a network component to a monitoring procedure to measure its values.

CE3.3 To distinguish equipment that can be monitored according to its operational importance.

CE3.4 Schedule monitoring procedures to have the least impact on network operation.

CE3.5 Employ management and monitoring protocols (SNMP/RMON) to determine the operational status and load of each element in the network.

CE3.6 Employ programs to monitor active services on network elements.

CE3.7 Translate the values of the parameters of a component of the network into the level of capabilities that the component is offering.

CE3.8 In a scenario of practical, maintenance, and network improvement:

-Employ network traffic and utilization profiles to determine how network usage will evolve.

-Analyze the results obtained by the monitoring in order to propose modifications.

C4: Apply preventive maintenance procedures defined in the technical documentation.

CE4.1 Interpret an operation manual from a network component manufacturer to perform its proper maintenance.

CE4.2 In a preventive maintenance scenario, from a data network already in operation:

-Distinguished those teams that can update their firmware.

-Locate the appropriate firmware update, depending on the equipment to be updated.

-Perform the firmware update.

-Verify the operation of the updated equipment.

CE4.3 Chart a schedule of maintenance operations according to an established maintenance plan.

CE4.4 Apply the quality plan established for the performance of the quality audit.

CE4.5 In a scenario, of traffic analysis on a running data network:

-Perform a traffic capture using a traffic analyzer.

-Analyze the capture performed and determine the variations with respect to the normal operating parameters.

-Propose, if necessary, a solution justifying the response.

C5: Solve the incidents that occur with the diagnosis of the breakdowns and make their repair in the appropriate time at the type of failure and with the level of quality expected.

CE5.1 Define a sequence of operations to be performed to resolve a problem.

CE5.2 Identify the tools available in the protocol used according to their purpose (ping, 'traceroute', among others).

CE5.3 Choose the specific diagnostic tools based on the operation to be performed.

CE5.4 Use traffic probes to detect failures in the communications service.

CE5.5 Discover intermediate network nodes using specific applications.

CE5.6 Use the procedures set by the manufacturer to determine the cause of the incorrect operation of a computer.

CE5.7 Discriminate the faults that occur in the network infrastructure by differentiating those belonging to the local network or the extensive area network.

CE5.8 In a scenario resolution scenario from a data network with a detected problem:

-Interpret the technical documentation of the teams involved and the project.

-Choose the diagnostic tools based on the problem.

-Estimate the magnitude of the problem to define the performance.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.3, CE1.4 and CE1.5; C2 with respect to CE2.5y CE2.6; C3 with respect to CE3.8; C4 with respect to CE4.2 and CE4.5; C5 with respect to CE5.8.

Other capabilities:

Take Responsibility for the work that you develop and the fulfillment of the objectives.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Propose alternatives with the aim of improving results.

Demonstrate creativity in the development of the work you do.

Demonstrate stress resistance, mood stability and impulse control.

Adapt to new situations or contexts.

Contents:

1. Network interconnection at OSI Model Level 2

OSI Model Level 2 Core Functions.

Level 2 routing. MAC addresses.

Switches: MAC address table; 'Spanning Tree' algorithm; link aggregation ('Channel Bonding 'or' Multi-link trunking '); VLANs.

2. OSI Model Level 3 Networking: TCP/IP Architecture

IP network definition.

TCP/IP features: networks over which TCP/IP is implemented, multiplexing and demultiplexing, correspondence between the OSI and TCP/IP model.

3. OSI Model Level 3 Networking Pipeline: IP

IP routing: Address classes; address structure; netmask; public and private addresses; reserved and restricted addresses.

IP protocol: address resolution (ARP protocol); routers: static and dynamic routing; classic 'subnetting'; variable-length network masks (VLSM); network address translation (NAT).

4. OSI Model Level 3 Networking Pipeline: Other Protocols, Proxy Servers

ICMP, IGMP, BGP, OSPF, RIP Protocols.

Proxy Servers.

5. Network Management

Network Management Systems.

SNMP protocol.

SNMP items.

Traffic Probes.

6. Application-level services: DNS

Domain Name Service (DNS).

DNS files and name resolution.

Design of the DNS implementation.

Installing and configuring DNS.

7. Application-level services: DHCP

Dynamic Host Configuration Protocol (DHCP).

Installing DHCP.

Configuring DHCP.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the administration of the telematics network infrastructure, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX IV

Professional Qualification: Information Systems Management

Professional Family: Informatics and Communications

Level: 3

Code: IFC152_3

General Competition

Configure, administer, and maintain a hardware and software-level computing system, ensuring the availability, optimal performance, functionality, and integrity of the system's services and resources.

Competition Units

UC0484_3: Manage the hardware devices on the system

UC0485_3: Install, configure, and administer the base and application software of the system

UC0486_3: Secure Computer Equipment

Professional Environment

Professional Scope

Develops its professional activity in the IT department dedicated to the area systems and telematics, in entities of public or private nature, companies of any size, self-employed or foreign, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located in the services sector in the subsectors of the marketing of computer equipment and technical assistance, as well as in any productive sector that uses computer systems for its management.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

System Administrators

Computing Officers

Systems technicians

Network system administrators

Associated Training (420 hours)

Training Modules

MF0484_3: Hardware administration of a computer system (120 hours)

MF0485_3: Software administration of a computer system (210 hours)

MF0486_3: Computer Security (90 hours)

COMPETITION UNIT 1: ADMINISTER THE HARDWARE DEVICES ON THE SYSTEM

Level: 3

Code: UC0484_3

Professional Realizations and Realization Criteria:

RP 1: Inventor the physical components of the system, keeping them updated to ensure their location and availability according to the rules of the organization.

CR 1.1 The hardware and physical components of the system are correctly identified and exhaustively listed for current availability.

CR 1.2 The hardware inventory is described in detail to report the characteristics, current configuration, exact status, and status of each device according to the organization's rules.

CR 1.3 New acquisitions, changes in hardware, or in your configuration are modified in the inventory to keep you updated by interpreting the technical documentation.

CR 1.4 The hardware installation is detailed including the incidents and referenced in the documentation generated for later use.

RP 2: Analyze and parameterize hardware devices, monitor and evaluate their performance to optimize system operation and propose modifications or improvements according to existing functional needs.

CR 2.1 The monitoring techniques or tools to be used are selected according to the characteristics of the system to optimize its operation.

CR 2.2 The system is monitored so that performance statistics, alert schedules, and other elements can be obtained using the selected monitoring techniques or tools.

CR 2.3 The system performance criteria are set according to the general arrangements established by the manufacturer, and the individuals established by the organization to obtain adequate monitoring.

CR 2.4 The data obtained from the monitoring are collected and presented in a clear and concise way by the use of rendering techniques.

CR 2.5 The performance representation of the system generated by the monitoring is analyzed to locate possible losses or performance degradations and propose the necessary modifications.

CR 2.6 The parameters of the physical devices are adjusted so that the performance improves and the operating failures detected in the system are corrected.

RP 3: Implement and optimize high availability hardware solutions to ensure and ensure system protection and recovery against unforeseen situations under the planned contingency plan.

CR 3.1 Hardware installation and configuration incidents are resolved by consulting technical documentation and technical assistance services.

CR 3.2 The verification of the installation and configuration of physical devices and their drivers for mass storage and backups is performed so that it can be checked by the standards and quality and safety standards set by the organization.

CR 3.3 The management of repair or replacement of damaged hardware components is performed in accordance with the technical specifications of the system and following the installation procedure set out in the technical documentation provided by the manufacturer and the organisation's implementation plans.

CR 3.4 The verifications of the replaced components are performed to ensure their correct operation according to the standards and standards of quality and safety established by the organization.

CR 3.5 The problems or mismatches are resolved by ensuring the integrity of the information and the continuity in the operation of the system, taking the necessary preventive safety measures, activating the possible alternative operating procedures and complying with the applicable regulations.

CR 3.6 Original information and backups are restored so that the system returns to operation by following the established security protocol and complying with applicable data protection regulations.

CR 3.7 The storage of the copies is monitored, verifying that the safety standards set by the organization and the applicable data protection regulations are met.

CR 3.8 The redundant servers and other high availability systems are implemented according to manufacturer specifications and organization standards.

RP 4: Plan the extensions and growth of the system by proposing new configurations to assume future increases in the workload or users according to the operating needs.

CR 4.1 The hardware is analyzed and valued to report potential future needs, as well as the feasibility of possible upgrades and upgrades.

CR 4.2 The organization's reports about future increases in workload or number of users are analyzed appropriately using techniques adjusted to the situation.

CR 4.3 The system is represented by mathematical and analytical modeling tools to analyze performance with new loads added.

CR 4.4 Data obtained through modeling and simulation of the system are analyzed to determine whether the new charges are acceptable.

CR 4.5 The physical devices available on the market are evaluated to propose the most appropriate to the system and to ensure the absorption of the workload posed.

CR 4.6 The implementation of new devices is developed to minimize its effects on the operation of the system, optimizing the performance of the system and adapting the technology according to the evolution of the market.

CR 4.7 System configuration changes and extensions are detailed and referenced in the generated documentation and saved for later use according to the procedure set.

RP 5: Define appropriate environmental and security conditions to prevent disruptions to the delivery of system services as per manufacturer's specifications and the organization's security plan.

CR 5.1 The environmental requirements of the physical devices are set according to the technical specifications and safety plan of the organization.

CR 5.2 The electrical power conditions of the physical devices are set according to the technical specifications and safety plan of the organization.

CR 5.3 The environmental requirements and electrical power conditions of the physical devices are contrasted with the possibilities of the installation to avoid incidents and interruptions in the service.

CR 5.4 The conditions of ergonomics, safety and use of the available space are established for the correct location of the physical equipment and devices according to the technical specifications.

CR 5.5 Security conditions are set to prevent unwanted access and interruptions to the service according to the organization's security plan.

CR 5.6 Environmental and security conditions are detailed and referenced in the generated documentation and are stored for later use, according to the established procedure.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Software tools for inventory control. Diagnostic software tools. Physical devices for mass storage and backups (such as RAID, SAN, and NAS). Media for backups. Log file management tools (log). Diagnostic, security and restoration software. Technical documentation. Backup tools. Change, incident, and configuration management tools. Performance monitors. Uninterrupted power systems. Analytical modeling tools. System performance analysis tools. Mobile devices. 'Hosting'.

Products and results:

Inventory and descriptive record of the physical devices on the system and their configuration. Operating computer system with optimal performance and adequate utilization of its resources. Proper connection of the system to a network within an organization. System expansion and growth reports.

Information used or generated:

Hardware inventory. Technical specifications for the installation of the devices. Technical information of the equipment. Documentation or manuals for the use and operation of the system. Documentation on the security rules configuration for the installation. Manufacturers ' maintenance recommendations. Maintenance plan. Relationship of Incidents. Recommendations for the maintenance of manufacturers and support technical support. Product catalogs hardware, suppliers, prices, business rules on data confidentiality. Safety and hygiene regulations. Applicable rules on data protection and internal rules of work on data confidentiality and safety and hygiene.

COMPETITION UNIT 2: INSTALL, CONFIGURE, AND ADMINISTER THE BASE AND APPLICATION SOFTWARE

Level: 3

Code: UC0485_3

Professional Realizations and Realization Criteria:

RP 1: Install and configure the server operating system to ensure system functionality as required by your organization.

CR 1.1 The server operating system is installed by following the procedures and indicated in the technical documentation.

CR 1.2 The verification of operating system components and device drivers is performed by starting and stopping tests, and using verification and diagnostic software tools, so that you can verify that the components are recognized and enabled and no conflicts appear as provided by the organization.

CR 1.3 Operating system parameters are configured to ensure system integrity and reliability according to the organization's security plan.

CR 1.4 The configuration of the network parameters is set to connect the server according to the system network design and the organization's quality and safety standards and standards.

CR 1.5 The different groups and users are created to allow system utilization according to the needs of the organization and the system security plan.

CR 1.6 Required updates to the server operating system are effectively performed, ensuring the integrity of the system, the suitability of the system, and following the security rules of the organization.

CR 1.7 The relevant details of the installation, as well as the incidents during the process, are reflected in the documentation, according to the procedure established by the organization.

RP 2: Inventor the system software, updating the inventory to ensure its location and availability according to the rules of the organization.

CR 2.1 The software and its versions are listed exhaustively to maintain an inventory of the applications and operating systems available on the system.

CR 2.2 The current configuration of the base and application software is clearly and completely registered to facilitate recovery efforts in case of failures.

CR 2.3 Installed software information is listed in relation to each user to allow control of non-permitted application installations.

CR 2.4 The number of installations, their situation and identification are controlled by each software product to carry out comprehensive control of licenses in compliance with the applicable rules on intellectual property.

CR 2.5 System user access privileges to software resources are logged for access control, according to the system security plan and the data laws in place.

CR 2.6 Automatic inventory applications are used to keep information about the system software up to date, according to the organization's rules.

RP 3: Install and configure corporate applications to address user capabilities according to the organization's deployment plan.

CR 3.1 The installation of the corporate software is carried out effectively by ensuring the integrity of the system, fulfilling the requirements established by the organization and following the requirements of the technical documentation.

CR 3.2 The verification of the operation of the software in the system as a whole is performed according to the safety and quality procedures established by the organization and the manufacturer itself.

CR 3.3 Corporate software is configured with appropriate parameters according to the system security plan and the needs of the organization.

CR 3.4 The necessary updates to the corporate software are carried out effectively, ensuring the integrity of the system, the suitability of the system and following the safety standards of the organization.

CR 3.5 The relevant details of the installation, as well as the incidents during the process, are reflected in the documentation, according to the procedure established by the organization.

RP 4: Develop the user support plan, coordinating support and maintenance technical staff to ensure the use of the functions of the computer system.

CR 4.1 The guidelines for the installation, configuration and maintenance of base and application software in user positions are documented in a comprehensive manner.

CR 4.2 The resolution of common problems relating to hardware and network devices in user positions is thoroughly documented.

CR 4.3 User assistance is planned by applying the communication techniques, the action protocols established by the organization and following the policies of security and data protection in force and quality of service.

CR 4.4 The training of users in the different tools and equipment to be managed is planned to be performed in an assisted and gradual manner, ensuring their complete adaptation to the environment.

CR 4.5 Assistance procedures are organized to ensure their maximum availability to the requirement of advice and attention from users.

RP 5: Configure and administer system resources to optimize performance based on application exploitation parameters.

CR 5.1 The performance metrics to use are set to specify the performance attributes to consider.

CR 5.2 The performance analysis techniques to be used are set for obtaining system operating parameters.

CR 5.3 The check-to-use programs are set to obtain system performance parameters, based on the manufacturer's specifications, and the requirements set by the organization for proper performance.

CR 5.4 The models that represent the system are performed to obtain parameters of the performance of the system according to the manufacturer's specifications, and the requirements set by the organization for proper performance.

CR 5.5 The system simulation systems are configured to obtain parameters of the performance of the system, according to the manufacturer's specifications, and the requirements set by the organization for proper performance.

CR 5.6 The system performance parameters obtained are analyzed to locate potential conflicts and determine the hardware devices that can be reconfigured, removed, or added.

RP 6: Plan for backup and recovery of backups to maintain adequate levels of data security according to the needs of use and within the organization's directives.

CR 6.1 The backup copy system architecture is designed to take into account the requirements of the computer system.

CR 6.2 Back-up procedures and the levels of these copies are scheduled based on the needs of the server, the time of the copies, the recovery times, the required storage spaces, and the validity of the copy history.

CR 6.3 The verification tests of the backup copies are performed and their functionality is verified according to the quality specifications of the organization and the applicable data protection regulations.

CR 6.4 The planning of the media identification and storage system is performed according to the specifications of the organization's security plan and the applicable data protection regulations.

CR 6.5 The documentation of the procedures for obtaining and verifying backup copies as well as the contingency plans and the resolution of incidents is made according to the regulations of the organization and the applicable regulations of data protection.

RP 7: Audit system resource utilization to ensure optimal performance based on operating plan parameters.

CR 7.1 The audit plan with the required functional tests and completion periods is implemented so that they ensure optimal system performance.

CR 7.2 Incident checking is performed to verify, specify, and minimize negative effects on the system, depending on the needs of the organization and the system security plan.

CR 7.3 The diagnosis and location of unwanted functions is performed using the necessary equipment and tools, and the corresponding corrective procedure is applied in an appropriate time.

CR 7.4 The audit report is performed in the standardized format that allows the collection of the information required for the performance of the incident repository.

Professional Context:

Production media:

Computer and peripheral equipment. Server operating system software. Corporate application software. Base and application software updates and patches. Device drivers Security tools and antivirus. Performance monitors. Systems modeling and simulation tools. Automatic inventorying tools. Office tools. Tools for managing and performing backups.

Products and results:

Operating system and configured and parameterized applications according to needs. Software inventory and system application configuration. System base software incident record. Corporate application software incident record. User assistance and training plan. Backed up, archived, and documented backups. Backup copy realization, storage, and recovery plan. Audit plan for system resources. Audit report of system resources.

Information used or generated:

Operating system installation manuals. Operating system operation manual. Application installation manuals. Application operation manuals. Backup completion operation manuals. Safety standards (safety plan) and quality of the organization. Administrative tools manuals. Online help manuals. Technical assistance online. Plans for the operation and implementation of the organisation. Applicable rules on data protection and intellectual property, business rules on data confidentiality. Installation and configuration documentation. Specific identification and configuration sheets for equipment.

COMPETITION UNIT 3: SECURING COMPUTER EQUIPMENT

Level: 3

Code: UC0486_3

Professional Realizations and Realization Criteria:

RP 1: Apply security policies to improve the protection of servers and end-user equipment according to the needs of security use and conditions.

CR 1.1 The organization's IT system implementation plan is analyzed by checking that it incorporates:

-Information about procedures for installing and updating equipment, backing up and detecting intrusions, among others.

-References of the possibilities of use of the equipment and restrictions of the same.

-Protections against virus attacks and other unwanted elements, among others.

CR 1.2 Access permissions by users to the various system resources are allocated (interim) by means of the corresponding tools according to the Implementation Plan and the security of the computer system.

CR 1.3 The confidentiality and integrity of the connection in server access is guaranteed according to the organization's security rules.

CR 1.4 User policies are analyzed by verifying that circumstances such as uses and restrictions assigned to equipment and users, permitted and restricted network services, and areas of responsibility due to the use of computer equipment are reflected.

CR 1.5 The security policy is transmitted to users, ensuring their correct and complete understanding.

CR 1.6 The tasks performed are documented according to the procedures of the organization.

CR 1.7 The information affected by the applicable data protection regulations is intended to verify that the authorized users comply with the requirements indicated by the regulations and the channels of distribution of this information are documented and authorized according to the safety plan.

RP 2: Configure servers to protect them from unwanted access according to the needs of use and within the organization's directives.

CR 2.1 The server is located in the network in a protected and isolated zone according to the organization's security rules and implementation plan.

CR 2.2 The services offered by the server are activated and configured by disabling unnecessary according to the applicable security and implementation plan of the organization.

CR 2.3 The access and permissions to the server resources by the users are configured according to the purpose of the server itself and the security regulations of the organization.

CR 2.4 The system's activity and incident recording mechanisms are activated and the procedures for analysing such information are enabled, so that they can be drawn up ex post.

CR 2.5 The use of additional server modules is decided based on their security capabilities and risks, reaching a compromise solution.

CR 2.6 The authentication mechanisms are configured to provide security and integrity levels in the user connection in accordance with the organization's security regulations.

CR 2.7 User roles and privileges are defined and assigned by following the instructions in the organization's security rules and operating plan.

RP 3: Install and configure security elements (firewalls, trap teams, Intrusion Prevention Systems, or Firewalls, among others) on computers and servers to ensure security in the face of external attacks according to the needs of use and within the organization's directives.

CR 3.1 Firewall topology is selected based on the deployment environment.

CR 3.2 Firewall hardware and software elements are chosen taking into account economic and performance factors.

CR 3.3 Firewalls are installed and configured according to the level defined in the security policy.

CR 3.4 Filtering rules and logging and alarm levels are determined, configured, and managed according to needs dictated by the organization's security regulations.

CR 3.5 Firewalls are verified with test games, ensuring they exceed the specifications of the organization's security regulations.

CR 3.6 The firewall installation and upgrade and the performance procedures with it are documented according to the organization's specifications.

CR 3.7 Registration systems are defined and configured for the review and study of potential attacks, intrusions, and vulnerabilities.

Professional Context:

Production media:

Corporate office applications. Password strength checkers. Port probes. System log file parsers. Firewall. Specific and/or general purpose equipment. Personal or server firewall. Authentication systems: weak: user-based and password-based and robust: based on physical devices and biometric measurements. Communication programs with cryptographic capabilities. Secure remote administration tools. IDS Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), trap equipment ('Honeypots ').

Products and results:

Implementation plans reviewed according to organization directives. Network services audit reports for computer systems. Map and design of the corporate firewall topology. Firewall installation and configuration guide. Activity report detected in the firewall. Map and design of the backup copy system. Planning for backing up the backup copies. Backup copy realization report. Security operative made. Servers and equipment configured for security.

Information used or generated:

Telematics Infrastructure Security Policy. Installation, reference, and firewall usage manuals. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software. Applicable regulations, regulations and standards. Inventory record of the hardware. Check record with the security measures applied to each computer system. The topology of the computer system to protect.

TRAINING MODULE 1: HARDWARE ADMINISTRATION OF A COMPUTER SYSTEM

Level: 3

Code: MF0484_3

Associated with UC: Administer system hardware devices

Duration: 120 hours

Assessment capabilities and criteria:

C1: Identify the hardware components of the system by distinguishing its features and detailing installation parameters and procedures.

CE1.1 Analyze and explain the fundamentals of the physical architecture of a computer system by specifying the different parts that make it up.

CE1.2 List and define the functions performed by each of the hardware components of a computer system explaining its characteristics.

CE1.3 Classify according to its typology each of the hardware components of a computer system based on its characteristics, utility and purposes.

CE1.4 Detailed the technical characteristics and procedures for installing and configuring the hardware components of a computer system according to specifications of the given functionalities.

CE1.5 Distinguished and explain the types of physical devices and possible communication techniques among the different hardware components of a computer system, describing its main characteristics and typology.

CE1.6 Define and classify the different types of peripheral devices based on their purpose, describing the different techniques used to perform the communication with the same and the technologies available in input/output controllers.

CE1.7 Identify and classify the different physical devices available to connect the system through a communications network.

CE1.8 In a convenient hardware device identification and registration scenario:

-Classify a collection of hardware devices based on different criteria: purpose, suitability for a system and compatibility, among others.

-Operate with inventorying tools by comprehensively recording the features of the hardware devices under study.

-Document the installation of physical devices detailing the procedures, most frequent incidents, and parameters used.

C2: Select and apply device performance monitoring procedures and techniques to adjust configuration parameters and ensure the absence of conflicts.

CE2.1 List and define the performance metrics commonly used to measure the performance of a system.

CE2.2 Characterize and analyze the main monitoring procedures and techniques used to measure the performance of a system.

CE2.3 Apply the selected techniques and tools to achieve optimal performance and determine the status of the system by analyzing performance measurement results and indicating whether it is saturated, balanced, or underutilized.

CE2.4 Graphically perform system performance based on data obtained from monitoring.

CE2.5 Analyze the alarms obtained in monitoring and describe the main configuration problems related to known hardware devices explaining the most common solutions.

CE2.6 In a practical, well-characterized, systems-based and monitoring scenario:

-Select the performance metrics to use based on system needs.

-Get measurements of system performance using with dexterity the tools necessary to carry it out.

-Analyze the measurements obtained, documenting and presenting them to facilitate decision making about the system.

-Configure the required system parameters to meet performance requirements.

-Reconfigure the system depending on the alarms obtained by the measurements.

-Indicate and document the limitations that exist in attempting to improve the capabilities of a system.

C3: Integrate and implement hardware devices that ensure continuity in the provision of services and data security.

CE3.1 Identify the different hardware solutions available to ensure continuity of system operation, describing its main features and configurations.

CE3.2 Define the different hardware solutions available to ensure system recovery in the face of unforeseen situations, describing their main features and configurations.

CE3.3 Identify data protection and security policies and their relationship to the recovery and continuity of services and applications according to IT security regulations.

CE3.4 In a convenient, well-characterized, practical scenario of implementing and configuring solutions to ensure continuity of system operation:

-Analyze the system to determine the needs and disposition of uninterrupted power systems.

-To properly install the power units and voltage stabilizers, while respecting the technical characteristics of the appliances and complying with the safety standards in the workplace.

-Parameterize and monitor the installed devices, adapting them to the system to guarantee their total compatibility, optimal operation, control and management of the same.

-Perform an intervention and activation plan for alternative mechanisms.

-Document the installation of physical devices detailing the procedures, most frequent incidents, and parameters used.

CE3.5 In a practical, properly characterized, implementation and configuration scenario for system recovery solutions to unforeseen situations:

-Install and configure a backup local server that ensures immediate recovery of operation in cases of main server drop.

-Install and configure disk 'arrays' solutions to increase system failure tolerance and a 'clusters' system based on your typology to increase system reliability and productivity.

-Perform an intervention and activation plan for possible alternative mechanisms and locate the hardware devices responsible for a possible breakdown and establish the procedures necessary for their repair or replacement.

-Properly configure the replaced devices by following the steps set in the established intervention plan.

-Document the installation of physical devices detailing the procedures, the most frequent incidents, and parameters used and the steps to be taken for system recovery after an unexpected situation has occurred.

-Plan and test to verify the suitability of the implemented solutions, making the necessary improvements and adjustments to achieve optimal operation.

C4: Analyze and evaluate the devices available on the market to propose hardware implementations that improve the performance and capabilities of the computer system.

CE4.1 Identify, evaluate and classify existing hardware devices in the market, according to evolution and typology, using commercial catalogues, technical documentation, specialized journals or any other method and support.

CE4.2 Identify parts of a computer system, typically susceptible to causing bottlenecks and productivity degradations.

CE4.3 Explain the trends of technological evolution in the common physical devices of a computer system in order to propose improvements in it.

CE4.4 In a practical, properly characterized, scenario of system growth planning, given estimates of possible workload or user increases:

-Analyze expected and future workloads, characterizing them appropriately.

-Implement new workloads, integrating them into the system to observe possible effects on the system's performance.

-Analyze the performance parameters obtained after you submit the system to the new workloads.

-Plan and execute the deployment of new hardware devices needed to support new workloads and minimize their effects on the system.

-Document the results of the evaluation of the system submitted to new loads and propose, in a reasoned manner, changes in the current configuration or new hardware implementations.

C5: Apply security and environmental conditioning procedures to ensure the integrity of the system and the appropriate environment according to the specifications and requirements of the systems to be installed.

CE5.1 List and describe the main environmental and environmental factors to be taken into account in the proper installation of computer equipment, to establish precautions that can prevent or lessen its effect.

CE5.2 List and describe the main environmental and environmental factors that can degrade the functioning of a communications network, to establish precautions that can prevent or lessen its effect.

CE5.3 Interpret the technical specifications of the devices and the security plan to match your installation and physical location by achieving optimal performance of the devices.

CE5.4 Evaluate the installation of the electrical network by ensuring that its capacity and the available equipment are adequate to connect all hardware devices and that the performance of these devices is optimal.

CE5.5 In a convenient, well-characterized scenario of installing computer equipment:

-To locate the computer equipment respecting the environmental conditions of temperature and humidity recommended by the manufacturers.

-To locate computer equipment respecting the recommended ergonomic and occupational safety conditions.

-Check that the computer equipment installation environment is free of smoke, dust, or any other environmental disturbance.

-Document the location characteristics of the computer equipment, detailing the procedures, the most frequent incidents, and the parameters used.

CE5.6 In a convenient, properly characterized, practical scenario of checking the security of the computer system:

-Ensure user manipulation of equipment so that initial temperature and humidity conditions are not varied.

-Ensure the handling of equipment by users by checking that the security regulations are respected.

-Check the performance of backup copies, ensuring the suitability of the frequency, support and information safeguarded.

-Document the security incidents found for subsequent correction.

-Interpret the system security plan, extracting the security procedures to apply.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.8; C2 with respect to CE2.6; C3 with respect to CE3.4 and CE3.5; C4 with respect to CE4.4; C5 with respect to CE5.5 and CE5.6.

Other capabilities:

Adapt to the specific organization of the company integrating into the system of technical-labor relations.

Interpret and execute the instructions you receive and take responsibility for the work you do, communicating effectively with the right person at any time.

Organize and execute the intervention according to the instructions received, with criteria of quality and safety, applying the specific procedures of the company.

Habit to the business rate of the company meeting the daily performance goals defined in the organization.

Show at all times an attitude of respect towards colleagues, procedures and internal rules of the company.

Take into consideration the proposals received.

Contents:

1. Introduction to the computer architecture

Fundamentals of the Von-Neumann architecture: principles of operation, schema and structure, functional elements and subsystems.

Other processor architectures.

Peripherals.

Bus architectures.

Input and output control units.

Architectures of personal computers, departmental systems and large computers.

2. Components of a computer system

The central processing unit: functions; purpose and operating scheme; internal structure: control unit, arithmetic-logic unit, and records.

The memory system: functions, routing spaces, and memory maps, memory hierarchies.

The I/O system: I/O types and functions (programmed, interrupts, DMA), I/O controllers, bus system functions, bus architecture types, organization, and arbitration of a bus system, peripheral devices.

The storage subsystem: storage devices, interfaces.

Motherboards.

Power supplies and boxes.

Heat Sinks.

3. Hardware devices

Current trends and future trends in hardware devices. Multiple processors and distributed memory among others.

Classification and typology: central units, memories, storage devices, peripherals.

Installing and configuring devices: measurement tools and appliances, security rules, device assembly procedure, connection checking, system verification.

Connection devices and techniques: connection and communication techniques; communications between computer systems; connection to networks: network topologies, communication protocols, wiring and connection devices in local networks; diagnostic and measurement tools.

4. System Performance

Performance evaluation of computer systems: performance metrics, representation, and analysis of measurement results.

System configuration and tuning techniques: system performance, workload characterization (real loads, synthetic loads such as 'benchmarks', cores, synthetic programs, and instruction sets, among others).

System parameter measurement techniques: monitoring tools.

Consumption and competition of resources.

Predictive models and trend analysis.

Pre-production test plans.

Diagnostic and troubleshooting techniques: diagnostic using operating system utilities, diagnostic using specific software, diagnostic tools.

Action techniques: implementation of alternative mechanisms, established methods for problem solving, verification.

High availability: definition and objectives: uninterrupted operation, installation and configuration of solutions; file systems: nomenclature and encoding, storage hierarchies, migrations and data archiving; logical and physical volumes: partitioning, NAS and SAN systems, logical volume management, parallel access, RAID protection.

5. Security and safeguard policies

Access restricted by user accounts.

Property of the information.

Single access identifier.

The physical environment of a computer system: the equipment and the environment: adequacy of the physical space, external agents and their influence on the system, negative effects on the system, factors affecting the functioning of a communications network.

Creating the right environment: control of environmental conditions: humidity and temperature, industrial factors: dust, smoke, interference, noise and vibration, human factors: functionality, ergonomics and quality of the installation, other factors.

Assessment of risk factors: basic concepts in electrical safety, electrical installation requirements, electrical and electromagnetic disturbances, static electricity, other risk factors, introduction to measuring devices.

Physical and logical safeguard.

'Cluster' and load balancing.

Data integrity and service recovery.

Custody of security files.

Regulations on safety and hygiene at work.

Electrical and Electrotechnical Regulations.

Quality and Standardisation Regulations (ISO, AENOR).

Information protection regulations.

The legal protection of computer programs.

National and international standards organizations.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the administration of the hardware devices in the system, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: SOFTWARE ADMINISTRATION OF A COMPUTER SYSTEM

Level: 3

Code: MF0485_3

Associated with UC: Install, configure, and administer the base and application software of the system

Duration: 210 hours

Assessment capabilities and criteria:

C1: Specify and apply installation and configuration procedures for base and application software according to the operating needs of the computer system.

CE1.1 Analyze the suitability of different types of operating systems for different types of systems and purposes.

CE1.2 Identify and describe the different phases to be followed in the software installation in a computer system.

CE1.3 Identify and explain the main operating system configuration parameters for device, memory, process, and file system administration.

CE1.4 Recognize and describe the main application software configuration parameters for proper system resource utilization.

CE1.5 Automate and schedule tasks in the system by making 'scripts'.

CE1.6 In a practical, properly characterized, installation and configuration scenario of an operating system in a computer system:

-Install the operating system software by documenting the process, the incidents that occurred, and the parameters used.

-Configure the operating system parameters referred to the memory system, indicating the organization to follow and the use of advanced management techniques.

-Configure the operating system parameters for task execution: job scheduling, synchronization mechanisms, and resource allocation.

-Parameterize the input input system by checking the optimal operation of the peripheral devices.

-Organize the file systems by creating the necessary structures for the correct operation of the system.

-Configure operating system parameters so that the system security plan specifications are met.

CE1.7 In a convenient, well-characterized, practical scenario of verifying and configuring the installation of an operating system on a computer system:

-Verify the operation of the operating system and devices involved in the system, ensuring configuration of its controllers and the absence of conflicts, using the necessary diagnostic software.

-Set and configure the operating system network parameters to ensure and ensure the integrity of the data and system reliability by following the organization's security and quality plan at all times.

-Enable user organization and configuration according to the organization's security needs and plan.

-Update the server operating system by ensuring system integrity, data, and organization security plan.

-Document the operating system configuration detailing the parameters used.

-Interpret the organization's security plan to implement the measures specified in it according to computer security regulations.

CE1.8 In a convenient, properly characterized, convenient installation and configuration of application software on a computer system:

-Install the application software by documenting the process, the incidents that occurred, and the parameters used.

-Configure application software parameters that refer to using system resources so that the impact on their performance is minimized.

-Configure the application software parameters so that the system security plan specifications are met.

-Verify the operation of the application software and devices that make up the system, ensuring the configuration of its controllers and the absence of conflicts using the necessary diagnostic software.

-Update application software by ensuring system integrity, and data according to the organization's security plan.

-Document the configuration of the application software detailing the parameters used.

-Interpret the organization's security plan to implement the measures specified according to the IT security regulations.

C2: Identify the software components of the system by distinguishing their features and detailing parameters.

CE2.1 Analyze and enumerate the different types of operating systems, specifying their most important characteristics.

CE2.2 Classify and describe the different types of applications and software components explaining their main features, functions, and purpose.

CE2.3 Identify the functions performed by an operating system installed on a computer system.

CE2.4 Explain the legal requirements relating to intellectual property to be taken into account in the installation of software on the system.

CE2.5 In a convenient, properly characterized, software identification and registration scenario of a computer system:

-Classify a collection of installed software based on different criteria: purpose, suitability for a system and compatibility, among others.

-Operate with inventory tools by recording the features of installed software in a comprehensive manner.

-Check the number and location of installed licenses of applications protected by intellectual property laws for correct compliance.

-Check installed applications to check for non-existence of illegal software.

-Register and control access privileges to users ' applications according to the security plan and data protection laws in place.

-Document the installation of the software detailing the procedures, most frequent incidents and parameters used.

C3: Plan support for users by ensuring maximum availability and documentation of the corresponding tasks.

CE3.1 Define the objectives of a technical assistance and user support plan.

CE3.2 Explain the main advantages and features of remote assistance techniques to users through the services and tools available in the system.

CE3.3 List and describe the most common problems related to the implementation of software in user positions.

CE3.4 List and describe the most common problems relating to hardware and network devices in user positions.

CE3.5 Establish base and application software installation, configuration, and maintenance procedures in user positions.

CE3.6 In a convenient, properly characterized, practical scenario of supporting users in a computer system:

-Set assistance procedures based on the systematic logging of detected problems and consultation with support staff.

-exhaustively document the most common problems relating to system software resources.

-exhaustively document the most common problems relating to system hardware resources.

-Plan the training for the adaptation of the staff to the work tools.

-Set up and operate properly with remote user assistance tools.

C4: Analyze the system using simulation and modeling techniques to optimize performance.

CE4.1 Define the simulation concept by explaining the advantages of using this technique as well as its possible applications in different areas.

CE4.2 Explain the need for system representation through models for further study.

CE4.3 Identify and properly characterize the steps to be taken to simulate a system.

CE4.4 In a practical, properly characterized, simulation of a properly characterized computer system:

-List objectives to be achieved through system simulation.

-Analyze system features and build a model of the system using available modeling tools.

-Build a simulation model according to the defined objectives and the model obtained, using the available simulation tools.

-Run the simulation model by thoroughly documenting the data obtained.

-Analyze simulation results by identifying system malfunction or problem points.

-Adjust system configuration to solve detected problems and optimize performance and document simulation processes detailing the goals, models, and results obtained.

C5: Analyze and define backup and backup copy performance policies based on security specifications.

CE5.1 Classify the different types of backup copy systems, based on the support used, in the supported topology or architecture and systems (file, disk partition, and database, among others).

CE5.2 Describe backup copy levels by explaining the differences between them.

CE5.3 Associate the policy of making copies to the systems involved, justifying the decisions and complying with the current regulations regarding the protection of personal data.

CE5.4 In a scenario, information storage systems:

-Estimate the volume of information to be copied per unit of time.

-Identify storage areas of the media used for backup copies.

-Schedule authorized access to media.

-Keep track of information about the contents, versions, and location of the data files.

-Arrange the inventory of storage media and stored files.

-Verify that backup copies receive the same level of security as the original files.

C6: Apply audit procedures using appropriate techniques and tools to ensure the operating parameters of the computer system.

CE6.1 List and explain the objectives to be met by enabling system audits.

CE6.2 Classify, according to priority, system events and applications that can be audited for the maintenance of the optimal system operation.

CE6.3 Determine, for each event detected, the need to perform corrective actions, implanting them if so.

CE6.4 In a convenient, properly characterized, practice of applying audit procedures to a system:

-Set audit policies appropriately so as not to overload system operation and affect their performance.

-Select a list of events to audit that provide useful information: service start and stop, resource access, user connection and disconnection, application events, and system events.

-Set the required corrective actions associated with the detected events and apply and integrate the available tools into the system according to the established audit plan.

-Set alarms to highlight the detection of priority or critical events.

-Operate with the tools available for the planning, definition, and implementation of audits and analyze the records of the audits by extracting information about the operation and status of the system for performing the audit report.

-Interpret system technical documentation, applications, and audit tools.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6 and CE1.7; C2 with respect to CE2.5; C3 with respect to CE3.6; C4 with respect to CE4.4; C5 with respect to CE5.4; C6 with respect to CE6.4.

Other capabilities:

Take Responsibility for the work that you develop and the fulfillment of the objectives.

Prove a good professional.

Be able to propose improvements in work processes and procedures.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Interpret and execute work instructions.

Demonstrate stress resistance, mood stability and impulse control.

Contents:

1. Representation of the information

Need for representation of information.

Information rendering systems.

2. Classification of the software

Operating systems: concept of base software or operating system; evolution of the operating systems: generations and characteristics; concepts: monouser/multiuser, monotare/multitasking, monoprocessor/multiprocessor; functions of an operating system, structure of an operating system: features and functions; process management; memory management and organization; management and file systems; management of users and groups; management of devices, accessibility options for people with disabilities; common tools of the operating system; concepts of networked and distributed operating systems; concepts of real-time operating systems; operating system trends.

Programming languages: purpose of programming languages, classification according to the degree of machine independence, classification according to the form of its instructions, classification by generations.

Application programs: Language processors, general purpose applications, benefits and drawbacks of custom applications.

3. Software implementation procedures

The software deployment cycle: installation, configuration, verification, and tuning.

The need for planning in the installation processes.

System parameters to consider in a software installation process.

Procedures for installing operating systems: system requirements, device drivers, cloning software, user interface configuration, testing and configuration optimization, applicable rules on intellectual property, licenses, and license types.

4. Software maintenance procedures

The need for planning in the installation processes.

Planning and automating tasks using scripting.

Objectives of a maintenance plan.

Preventive maintenance as a strategy.

Common problems in software installations.

Common problems in hardware installations.

Remote Maintenance: Tools and Configuration.

Adequacy of systems: patches and updates.

5. Backup copies

Backup copy service architecture: centralized systems, distributed systems, local copies.

Backup copy service planning: backup levels, backup copy service sizing.

Backup media: Traditional media, storage hierarchies.

6. System audit procedures

Audit goals: standards.

Audit policies: audit scope, auditable aspects; classification of events: system, application, security; audit mechanisms: alarms and corrective actions; audit log information.

Techniques and audit tools.

Audit reports.

7. Introduction to modeling and simulation

Simulation concept: purpose and applications.

Rendering systems using models: main concepts.

The lifecycle of a simulation project.

Overview of computer system simulation tools.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation, configuration, and administration of the base and application software of the system, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: SECURITY IN COMPUTER EQUIPMENT

Level: 3

Code: MF0486_3

Associated with UC: Securing Computer Equipment

Duration: 90 hours

Assessment capabilities and criteria:

C1: Analyze the organization's deployment plans to identify the elements of the system involved and the levels of security to implement.

CE1.1 Identify the structure of an implementation plan, explaining the contents of each section.

CE1.2 Distinguished the systems that may appear in the implementation plan, describing the security features that they implement.

CE1.3 Describe the security levels listed in the implementation plan, associating them with the access permissions for their implementation.

CE1.4 In a practical scenario of analyzing a security deployment plan and its impact on the system:

-Determine the systems involved in the implementation plan.

-Analyze the security requirements for each system.

-Describe the security measures to be applied to each system.

-Meet the forms for the declaration of personal data files.

C2: Analyze and implement the physical and logical access mechanisms to the servers according to security specifications.

CE2.1 Describe the characteristics of the physical access control mechanisms, explaining their main functions.

CE2.2 Expose the trace mechanisms, associating them with the server operating system.

CE2.3 Identify the logical access control mechanisms, explaining their main features (passwords, IP port filtering among others).

CE2.4 In a scenario of implementing physical and logical access mechanisms in the implementation of a server according to given specifications:

-Determine the physical location of the server to ensure its functionality.

-Describe and justify physical security measures to be implemented to ensure system integrity.

-Identify additional modules or applications to implement the level of security required by the server.

-Determine the threats to which the server is exposed, assessing the risk they pose, given the context of the server.

-Determine the permissions assigned to users and user groups for system utilization.

C3: Evaluate the function and need for each running service on the server according to the security specifications.

CE3.1 Identify the usual services in an organization's computer system, describing its mission within the computer and communications infrastructure.

CE3.2 Identify and describe the services required for the operation of a server, depending on its mission within the organization's computer system.

CE3.3 Describe the threats of running services, applying the most restrictive permissions, which guarantee their execution and minimize the risk.

CE3.4 In a practical scenario of evaluating the function and need of running services, from a server in place with a set of services running with correspondences to a given operating plan:

-Indicate the relationships between that server and the rest of the organization's computer system.

-Extract the security requirements applicable to the server from the implementation plan.

-Determine the minimum services required for system operation.

C4: Install, configure, and administer a server firewall with the required features according to security specifications.

CE4.1 Classify the types of firewalls, network and local, hardware and software, packages, and application, describing their main features and features.

CE4.2 Describe the filtering rules of a server firewall, explaining the main parameters.

CE4.3 Explain the trace format of a server firewall, reflecting the relevant security information.

CE4.4 In a scenario of installing a server firewall in a local and remote access scenario:

-Determine the security requirements of the server.

-Set the server relationships to the other computers in the computer system.

-Develop the list of access rules to implement on the server.

-Compose a test plan for the implemented firewall.

-Run the test plan, writing the necessary corrections to correct the detected deficiencies.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.4; C3 with respect to CE3.4; C4 with respect to CE4.4.

Other capabilities:

Maintain the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Interpret and execute work instructions.

Demonstrate stress resistance, mood stability and impulse control.

Contents:

1. Security and risk management

Security: security objective; threats; external and internal attacker; types of attack; protection mechanisms.

Risks: Risk Management Process; Risk Identification and Analysis Methods; Risk Reduction.

2. Physical Security

Protection of the computer system.

Data protection.

3. System logical security

File systems.

File permissions.

Access Control Lists (ACLs) to files.

System activity logs.

User authentication: weak authentication systems; strong authentication systems; biometric authentication systems.

Introduction to Cryptography and the Establishment of Passwords Policies.

4. Remote access to the system

Operating System Mechanisms for Access Control.

Server firewall: packet filtering; application-level firewalls; firewall activity logs.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the assurance of computer equipment, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX V

Professional Qualification: Computer Security

Professional Family: Informatics and Communications

Level: 3

Code: IFC153_3

General Competition

Ensure the security of access and use of information recorded in computer equipment, as well as the system itself, protecting them from possible attacks, identifying vulnerabilities and applying encryption systems to communications that are made to the outside and inside the organization.

Competition Units

UC0486_3: Secure Computer Equipment

UC0487_3: Audit communication networks and computer systems

UC0488_3: Detect and respond to security incidents

UC0489_3: Design and implement secure data access and transmission systems

UC0490_3: Manage services on the computer system

Professional Environment

Professional Scope

Develops its professional activity in the area of systems of the IT department dedicated to computer security, in entities of public or private nature, small companies/medium/large or micro, both self-employed and independent, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located mainly in the services sector, in the subsector of the technical assistance services, and in any productive sector that has computer equipment in its management processes.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Computer security technicians

Computer Audit Technicians

Associated Training (420 hours)

Training Modules

MF0486_3: Computer Security (90 hours)

MF0487_3: Computer Security Audit (90 hours)

MF0488_3: Computer security incident management (90 hours)

MF0489_3: Secure data access and transmission systems (60 hours)

MF0490_3: Service management on computer system (90 hours)

COMPETITION UNIT 1: SECURING COMPUTER EQUIPMENT

Level: 3

Code: UC0486_3

Professional Realizations and Realization Criteria:

RP 1: Apply security policies to improve the protection of servers and end-user equipment according to the needs of security use and conditions.

CR 1.1 The organization's IT system implementation plan is analyzed by checking that it incorporates:

-Information about procedures for installing and updating equipment, backing up and detecting intrusions, among others.

-References of the possibilities of use of the equipment and restrictions of the same.

-Protections against virus attacks and other unwanted elements, among others.

CR 1.2 Access permissions by users to the various system resources are allocated (interim) by means of the corresponding tools according to the Implementation Plan and the security of the computer system.

CR 1.3 The confidentiality and integrity of the connection in server access is guaranteed according to the organization's security rules.

CR 1.4 User policies are analyzed by verifying that circumstances such as uses and restrictions assigned to equipment and users, permitted and restricted network services, and areas of responsibility due to the use of computer equipment are reflected.

CR 1.5 The security policy is transmitted to users, ensuring their correct and complete understanding.

CR 1.6 The tasks performed are documented according to the procedures of the organization.

CR 1.7 The information affected by the applicable data protection regulations is intended to verify that the authorized users comply with the requirements indicated by the regulations and the channels of distribution of this information are documented and authorized according to the safety plan.

RP 2: Configure servers to protect them from unwanted access according to the needs of use and within the organization's directives.

CR 2.1 The server is located in the network in a protected and isolated zone according to the organization's security rules and implementation plan.

CR 2.2 The services offered by the server are activated and configured by disabling unnecessary according to the applicable security and implementation plan of the organization.

CR 2.3 The access and permissions to the server resources by the users are configured according to the purpose of the server itself and the security regulations of the organization.

CR 2.4 The system's activity and incident recording mechanisms are activated and the procedures for analysing such information are enabled, so that they can be drawn up ex post.

CR 2.5 The use of additional server modules is decided based on their security capabilities and risks, reaching a compromise solution.

CR 2.6 The authentication mechanisms are configured to provide security and integrity levels in the user connection in accordance with the organization's security regulations.

CR 2.7 User roles and privileges are defined and assigned by following the instructions in the organization's security rules and operating plan.

RP 3: Install and configure security elements (firewalls, trap teams, Intrusion Prevention Systems, or Firewalls, among others) on computers and servers to ensure security in the face of external attacks according to the needs of use and within the organization's directives.

CR 3.1 Firewall topology is selected based on the deployment environment.

CR 3.2 Firewall hardware and software elements are chosen taking into account economic and performance factors.

CR 3.3 Firewalls are installed and configured according to the level defined in the security policy.

CR 3.4 Filtering rules and logging and alarm levels are determined, configured, and managed according to needs dictated by the organization's security regulations.

CR 3.5 Firewalls are verified with test games, ensuring they exceed the specifications of the organization's security regulations.

CR 3.6 The firewall installation and upgrade and the performance procedures with it are documented according to the organization's specifications.

CR 3.7 Registration systems are defined and configured for the review and study of potential attacks, intrusions, and vulnerabilities.

Professional Context:

Production media:

Corporate office applications. Password strength checkers. Port probes. System log file parsers. Firewall. Specific and/or general purpose equipment. Personal or server firewall. Authentication systems: weak: user-based and password-based and robust: based on physical devices and biometric measurements. Communication programs with cryptographic capabilities. Secure remote administration tools. IDS Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), trap equipment ('Honeypots ').

Products and results:

Implementation plans reviewed according to organization directives. Network services audit reports for computer systems. Map and design of the corporate firewall topology. Firewall installation and configuration guide. Activity report detected in the firewall. Map and design of the backup copy system. Planning for backing up the backup copies. Backup copy realization report. Security operative made. Servers and equipment configured for security.

Information used or generated:

Telematics Infrastructure Security Policy. Installation, reference, and firewall usage manuals. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software. Applicable regulations, regulations and standards. Inventory record of the hardware. Check record with the security measures applied to each computer system. The topology of the computer system to protect.

COMPETITION UNIT 2: AUDIT COMMUNICATION NETWORKS AND COMPUTER SYSTEMS

Level: 3

Code: UC0487_3

Professional Realizations and Realization Criteria:

RP 1: Perform vulnerability analysis, using specific programs to control possible system security failures according to your usage needs and within your organization's directives.

CR 1.1 The tools and types of vulnerability analysis tests are selected, adapting them to the environment to be verified according to the security specifications of the organization and the sector to which it belongs.

CR 1.2 Programs and tests are updated to perform tests consistent with the possible security failures of hardware and software versions installed on the computer system.

CR 1.3 Test results are analyzed, documenting them as indicated in the organization's rules.

CR 1.4 Password access systems are checked by specific tools according to the specifications of the security regulations.

CR 1.5 The vulnerability analysis is documented, including accurate references to the applications and services that have been detected operating on the system, the level of the installed patches, denial of service vulnerabilities, detected vulnerabilities, and network map.

RP 2: Verify compliance with applicable regulations, best practices, and legal requirements to ensure confidentiality according to the needs of use and within the organization's directives.

CR 2.1 The assignment of security officer to all files with personal data is checked according to the applicable regulations.

CR 2.2 The status of the list of persons authorized to access each file is verified, checking that it is updated according to the applicable regulations.

CR 2.3 The file access control is checked according to the procedure established in the organization's security regulations.

CR 2.4 The storage management of the files and their backups is audited, checking that it is done in accordance with applicable regulations and the rules of the organization.

CR 2.5 The telematic access to the files is audited, checking that it is done using mechanisms that guarantee confidentiality and integrity when required by the regulations.

CR 2.6 The audit report is prepared, including the relation of files with personal data, security measures applied and those pending application (non-conformities) as well as strengths and points of improvement.

RP 3: Check the compliance of the established security policy to assert the integrity of the system according to the needs of use and within the directives of the organization and taking into account applicable national and international regulations.

CR 3.1 Security incident detection and management procedures are developed and reviewed, checking that they are included in the organization's security regulations and that they include everything that is necessary to efficiently manage any incidents that may affect the organization.

CR 3.2 The entry and exit points of the network are tested by checking that their use is limited to what is described in the organization's security regulations.

CR 3.3 The activation and updating of security and system protection programs is checked, seeing that they correspond to the manufacturers ' specifications.

CR 3.4 Additional network entry and exit points are validated, verifying that they are authorized and controlled based on the organization's security specifications and implementation plan.

CR 3.5 The IT audit processes are reviewed, both internal ones, and those performed by personnel outside the organization, checking that they are activated, updated, and with the parameters specified in the organization's rules.

CR 3.6 The compliance with the procedures of the security policies by the users is verified in such a way that the correct application is detected and adapted to the needs of the organization in the field of safety.

Professional Context:

Production media:

Corporate office applications. Vulnerability analyzers. Tools to ensure the confidentiality of information. Programs that guarantee the confidentiality and integrity of communications. Applications for project management. Password analysis programs. Security analysis methodologies compliance control tools. Programme of audits.

Products and results:

Vulnerability analysis reports. Relationship of weak passwords. Registration of personal data files, according to applicable regulations. Audit report on services and access points to the computer system.

Information used or generated:

Applicable regulations on personal data protection. Company security policy.

Security Analysis Methodologies. Security bulletins and vulnerabilities notices available in electronic format. The topology of the computer system to protect.

COMPETITION UNIT 3: DETECT AND RESPOND TO SECURITY INCIDENTS

Level: 3

Code: UC0488_3

Professional Realizations and Realization Criteria:

RP 1: Implement procedures for incident response and intrusion detection mechanisms based on national and international incident response teams.

CR 1.1 Incident detection and response procedures are located, verifying that they are documented, indicating security roles and responsibilities, and implementing the requirements of the organization's security policy.

CR 1.2 The modelling of the systems is performed by selecting the recording mechanisms to activate, observing the defined alarms, characterizing the parameters of network utilization and inventorying the files to detect modifications and signs of suspicious behavior.

CR 1.3 The activation of the system's registration mechanisms is verified, contrasting with the organization's security specifications and/or a system of indicators and metrics.

CR 1.4 The planning of the records analysis mechanisms is verified, so that the detection of the non-standard behaviors is guaranteed by means of a system of indicators and metrics.

CR 1.5 Installation, configuration, and updating of intrusion detection systems is verified based on the organization's security specifications and/or a system of indicators and metrics.

CR 1.6 The procedures for the restoration of the computer system are verified for the recovery of the same in the event of a serious incident within the needs of the organization.

RP 2: Detect security incidents actively and preventively to minimize risk according to guidelines from national and international incident response teams.

CR 2.1 The tools used to detect intrusions are analyzed to determine that they have not been compromised or affected by malicious programs.

CR 2.2 The suspicious operating parameters are analyzed with specific tools according to the security regulations.

CR 2.3 The software components of the system are periodically verified in terms of their integrity using specific programs.

CR 2.4 The operation of the physical protection devices is verified by means of tests according to the rules of the applicable safety organization and/or regulations.

CR 2.5 Strange events and signs that might be considered an alert are collected in the report for further analysis based on the severity of the events and the policy of the organization.

RP 3: Coordinate the security incident response among the different areas involved to contain and resolve the incident according to the service requirements and within the organization's directives.

CR 3.1 The procedures that are collected in the organization's security regulations are activated when a security incident is detected.

CR 3.2 The information for forensic analysis of the broken system is collected once the system is isolated according to the procedures of the safety standards of the organization and/or applicable regulations.

CR 3.3 The targeted system is analyzed using intrusion detection tools according to the organization's security procedures.

CR 3.4 The intrusion is contained by applying the measures set out in the organization's security rules and those extraordinary necessary even if they are not previously planned.

CR 3.5 The incident documentation is performed for further analysis and implementation of measures to prevent the replication of the event.

CR 3.6 Possible actions to continue the normal service delivery of the broken system are planned based on the determination of the damage caused, meeting the quality of service criteria and the operating plan of the organization.

Professional Context:

Production media:

Corporate office applications. Vulnerability analyzers. Tools to ensure the confidentiality of information. Programs that guarantee the confidentiality and integrity of communications. Applications for project management. Password analysis programs. Network monitoring software. Workflow software for sending alarms and incidents to those responsible. IDS and their consoles. SNMP Console. Forensic analysis tools (creation of timelines, recovery of deleted files, clone of disks, among others).

Products and results:

Vulnerability analysis reports. Relationship of weak passwords. Audit report on services and access points to the computer system. Registration of activity. Security document. Alarm recording. Action plans. Security document. Alarm recording. Registration of incidents. Audit report. Audit report. Impact assessment. Communication of incidents of personal data.

Information used or generated:

Applicable regulations on personal data protection. Company security policy. Security analysis methodologies. Security bulletins and vulnerability notices, mostly written in English, and available in electronic format. Working document based on security policy. Internal rules for detecting intruders and preventing security threats.

COMPETITION UNIT 4: DESIGN AND IMPLEMENT SECURE DATA ACCESS AND TRANSMISSION SYSTEMS

Level: 3

Code: UC0489_3

Professional Realizations and Realization Criteria:

RP 1: Implement information security and encryption policies in data exchange operations to obtain secure connections according to the needs of use and within the organization's directives.

CR 1.1 Communications with other companies or through unsafe channels are made using virtual private networks to ensure the confidentiality and integrity of these connections during transit through public networks according to the specifications of the applicable security regulations and the network design of the organization.

CR 1.2 The requirements for implementing the virtual private network solution are selected and communicated to the telephony operator to achieve appropriate solutions to the security plan.

CR 1.3 Wireless connection protection techniques available on the market are assessed and selected for the most appropriate, taking into account the principle of proportionality and the safety standards of the organisation.

CR 1.4 The services accessible through the telematics network employing cryptographic techniques to ensure the integrity and confidentiality of communications are implemented according to the parameters of the organization's security regulations.

CR 1.5 Encapsulation, or end-to-end encryption is activated for those services accessible through the telematics network that do not incorporate cryptographic techniques to ensure communications security.

CR 1.6 The services that incorporate support for digital certificates for server identification are used to guarantee the user the identity of the server.

CR 1.7 The security and encryption policies for information in implanted data exchange operations are documented in the format set in the organization.

CR 1.8 Services that incorporate double or triple factor authentication, validation with user certificates, electronic DNI, 'token', biometric or other devices.

RP 2: Implement digital signature systems to ensure the authenticity, integrity and confidentiality of data involved in a transfer of information using cryptographic systems and protocols according to the needs of use and within the organization's directives.

CR 2.1 Access to services through the telematics network is implemented in a way that uses authentication based on digital certificates of personal identity.

CR 2.2 The process of obtaining and verifying signatures applies if necessary according to the requirements of the computer system and the business processes.

CR 2.3 Using digital certificates to sign and encrypt your content is ensured in the transmission of email messages.

CR 2.4 The digital signature profile of standard documents is used to ensure that it is the most appropriate for the use to be made.

CR 2.5 The digital sealing systems of time, to ensure the existence of a document on a given date, are implemented according to the safety standards of the organization.

CR 2.6 Web components are digitally signed so that the integrity of these components can be guaranteed.

CR 2.7 The implanted digital signature systems are documented in the format set in the organization.

RP 3: Implement public key infrastructures to ensure security by system standards and within the organization's directives.

CR 3.1 The certification hierarchy is designed according to the needs of the organization and the use to be given to the certificates.

CR 3.2 The certification practice statement and the certification policy are drafted in a way that defines the procedures and rights and obligations of the certification authority and the users.

CR 3.3 The certification authority system is installed following the manufacturer's instructions.

CR 3.4 The certification authority's digital certificate and its associated policy are made available to users in the form and manner necessary, following the guidelines contained in the certification practice statement.

CR 3.5 The private key of the certification authority remains secure and with the backup copies established in the certification practice statement.

CR 3.6 The issuance of digital certificates is carried out according to the uses that the certificate will receive and following the procedures indicated in the certification practice declaration.

CR 3.7 The certificate revocation service maintains accessible information on the validity of certificates issued by the certifying authority as indicated in the certification practice statement.

CR 3.8 The implemented public key infrastructures are documented in the format set in the organization.

Professional Context:

Production media:

Programs for secure connection. Systems for implementing digital certification authorities. Virtual private network (VPN) servers and clients. Secure media for digital certificates.

Web servers with SSL/TLS support. Traffic encapsulators with cryptographic support (HW and SW).

Secure connection programs to telematics services. Email interfaces with support for secure mail. Public Key Infrastructure (PKI) and secure signature creation devices (electronic DNI, PKCS and CSP modules).

Products and results:

Certification policy. Declaration of certification practices. Listing of certificates issued and certificates revoked. Guidelines and recommendations for the implementation of secure communication systems. Guidelines for the use of digital certificates.

Information used or generated:

Legal regulations on digital signatures. Standards and recommendations, generally written in English. Manual Public Key Infrastructure Installation (PKI), Certification Entities (CA), Electronic DNI, Digital Certificates, 'token'.

COMPETITION UNIT 5: MANAGE SERVICES ON THE COMPUTER SYSTEM

Level: 3

Code: UC0490_3

Professional Realizations and Realization Criteria:

RP 1: Manage system configuration to ensure process performance according to the needs of use and within the organization's directives.

CR 1.1 The processes involved in the system are identified in such a way as to allow the evaluation of performance parameters.

CR 1.2 The parameters that affect system components: memory, processor, and peripherals, among others, conform to usage needs.

CR 1.3 Process execution priorities are tailored to the specifications of the organization's operating plan.

CR 1.4 Monitoring tools are implemented and configured to determine alarm levels according to the organization's operating plan.

RP 2: Administer storage devices according to the needs of use and within the organization's directives.

CR 2.1 Storage devices are configured to be used in the various operating systems used in the computer system.

CR 2.2 The storage structure is defined and implemented based on the needs of the different file systems and the organization's usage specifications.

CR 2.3 The object naming requirements and usage restrictions for each storage device are properly documented.

CR 2.4 Storage devices are integrated to provide a functional system to the user according to the organization's specifications.

RP 3: Manage user tasks to ensure system access and resource availability according to the operating specifications of the computer system.

CR 3.1 User access to the computer system is configured to ensure system security and integrity according to the organization's specifications.

CR 3.2 User access to resources is administered by assigning permissions based on the needs of the organization.

CR 3.3 The resources available to users are limited to the appropriate tools based on what is specified in the organization's usage rules.

RP 4: Manage network services to ensure communication between computer systems according to operating needs.

CR 4.1 Communication services are established with a quality of service system in such a way as to ensure the communication of these services.

CR 4.2 The communications devices are verified as regards their configuration and performance according to the specifications of the organization.

CR 4.3 The resource consumption of the communications services is analyzed, verifying that they are within the scope of the specifications of the organization's operating plan.

CR 4.4 The incidences detected in the communications services are documented to inform those responsible for the operation of the system and the management of the system according to the protocols of the organization.

Professional Context:

Production media:

Operating systems. User administration tools and resource permission management. Performance control tools. Process monitoring tools. Memory usage monitoring tools. Storage device management monitoring tools. User management tools.

Products and results:

System operating correctly. System performance appropriate to the operating parameters.

Secure and integrated system for accessing and using resources. Communications services in operation.

Information used or generated:

Operating system and device operating manuals. Plan of operation of the organisation. Manuals of the monitoring tools used. Graphics and performance analysis. Access listings and user restrictions. Incident report. Protocol for action against incidents.

TRAINING MODULE 1: COMPUTER SECURITY

Level: 3

Code: MF0486_3

Associated with UC: Securing Computer Equipment

Duration: 90 hours

Assessment capabilities and criteria:

C1: Analyze the organization's deployment plans to identify the elements of the system involved and the levels of security to implement.

CE1.1 Identify the structure of an implementation plan, explaining the contents of each section.

CE1.2 Distinguished the systems that may appear in the implementation plan, describing the security features that they implement.

CE1.3 Describe the security levels listed in the implementation plan, associating them with the access permissions for their implementation.

CE1.4 In a practical scenario of analyzing a security deployment plan and its impact on the system:

-Determine the systems involved in the implementation plan.

-Analyze the security requirements for each system.

-Describe the security measures to be applied to each system.

-Meet the forms for the declaration of personal data files.

C2: Analyze and implement the physical and logical access mechanisms to the servers according to security specifications.

CE2.1 Describe the characteristics of the physical access control mechanisms, explaining their main functions.

CE2.2 Expose the trace mechanisms, associating them with the server operating system.

CE2.3 Identify the logical access control mechanisms, explaining their main features (passwords, IP port filtering among others).

CE2.4 In a scenario of implementing physical and logical access mechanisms in the implementation of a server according to given specifications:

-Determine the physical location of the server to ensure its functionality.

-Describe and justify physical security measures to be implemented to ensure system integrity.

-Identify additional modules or applications to implement the level of security required by the server.

-Determine the threats to which the server is exposed, assessing the risk they pose, given the context of the server.

-Determine the permissions assigned to users and user groups for system utilization.

C3: Evaluate the function and need for each running service on the server according to the security specifications.

CE3.1 Identify the usual services in an organization's computer system, describing its mission within the computer and communications infrastructure.

CE3.2 Identify and describe the services required for the operation of a server, depending on its mission within the organization's computer system.

CE3.3 Describe the threats of running services, applying the most restrictive permissions, which guarantee their execution and minimize the risk.

CE3.4 In a practical scenario of evaluating the function and need of running services, from a server in place with a set of services running with correspondences to a given operating plan:

-Indicate the relationships between that server and the rest of the organization's computer system.

-Extract the security requirements applicable to the server from the implementation plan.

-Determine the minimum services required for system operation.

C4: Install, configure, and administer a server firewall with the required features according to security specifications.

CE4.1 Classify the types of firewalls, network and local, hardware and software, packages, and application, describing their main features and features.

CE4.2 Describe the filtering rules of a server firewall, explaining the main parameters.

CE4.3 Explain the trace format of a server firewall, reflecting the relevant security information.

CE4.4 In a scenario of installing a server firewall in a local and remote access scenario:

-Determine the security requirements of the server.

-Set the server relationships to the other computers in the computer system.

-Develop the list of access rules to implement on the server.

-Compose a test plan for the implemented firewall.

-Run the test plan, writing the necessary corrections to correct the detected deficiencies.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.4; C3 with respect to CE3.4; C4 with respect to CE4.4.

Other capabilities:

Maintain the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Interpret and execute work instructions.

Demonstrate stress resistance, mood stability and impulse control.

Contents:

1. Security and risk management

Security: security objective; threats; external and internal attacker; types of attack; protection mechanisms.

Risks: Risk Management Process; Risk Identification and Analysis Methods; Risk Reduction.

2. Physical Security

Protection of the computer system.

Data protection.

3. System logical security

File systems.

File permissions.

Access Control Lists (ACLs) to files.

System activity logs.

User authentication: weak authentication systems; strong authentication systems; biometric authentication systems.

Introduction to Cryptography and the Establishment of Passwords Policies.

4. Remote access to the system

Operating System Mechanisms for Access Control.

Server firewall: packet filtering; application-level firewalls; firewall activity logs.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the assurance of computer equipment, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: COMPUTER SECURITY AUDITING

Level: 3

Code: MF0487_3

Associated with UC: Auditing Communication Networks and Computer Systems

Duration: 90 hours

Assessment capabilities and criteria:

C1: Analyze and select the IT system's vulnerability detection and auditing tools by implementing those that fit the IT security specifications.

CE1.1 Explain the differences between vulnerabilities and threats.

CE1.2 Enunciate the characteristics of the main types of vulnerabilities and existing malicious programs, describing their particularities.

CE1.3 Describe the operation of a vulnerability analysis tool, indicating the main techniques employed and the reliability of the same.

CE1.4 Select the most appropriate security auditing tool depending on the server or network and the security requirements.

CE1.5 In a practical scenario, analysis of vulnerabilities from a computer system under concrete implementation circumstances:

-Set the security requirements to be met by each system.

-Create a new test for the audit tool, based on the vulnerability specifications.

-Develop the test plan considering the type of server analyzed.

-Use multiple tools to detect potential vulnerabilities.

-Analyze the result of the audit tool, discarding false positives.

-Draft the audit report, reflecting the irregularities detected, and the suggestions for its regularization.

C2: Apply procedures regarding compliance with applicable regulations.

CE2.1 Explain the current legal (regional, national, European and international) regulations applicable to personal data.

CE2.2 Expose the legal procedures that files must comply with personal data, taking into account the quality of the files.

CE2.3 Describe the security levels set in the applicable regulations by associating them with the required requirements.

CE2.4 In a scenario, verification of compliance with the regulations in which an organization's information record structure is counted:

-Identify files with personal data, justifying the level of security that corresponds to it.

-Develop the regulatory compliance audit plan for personal data protection.

-Review the documentation associated with the files with personal data, identifying the existing deficiencies.

-Develop the report for personal files, indicating the deficiencies found and the relevant corrections.

C3: Plan and apply security measures to ensure the integrity of the computer system and the entry and exit points of the departmental network.

CE3.1 Identify the phases of the risk analysis, describing the objective of each of them.

CE3.2 Describe the terms associated with risk analysis (threat, vulnerability, impact and countermeasures), establishing the relationship between them.

CE3.3 Describe network analysis techniques, explaining the selection criteria.

CE3.4 Describe common network firewall topologies, indicating their main functionalities.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.4.

Other capabilities:

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Maintain an assertive, empathetic and conciliatory attitude to others by demonstrating cordiality and kindness in the treatment.

Adapt to new situations or contexts.

Respect the organization's internal rules and procedures.

Contents:

1. Vulnerabilities

Program Failures.

Malicious programs.

Secure programming.

2. Vulnerability analysis

Local Analysis.

Remote analysis: white box analysis; black box analysis.

Optimization of the audit process.

Vulnerability contrast and audit report.

3. Applicable regulations

European regulations.

National regulations: Criminal code; data protection regulations. Rules for Automated Data Processing.

Paperwork for the application of data protection regulations in the company.

4. Network Firewall

Components of a network firewall.

Network firewall types: packet filtering; application network firewall.

Network Firewall Architectures: Network firewall with two interfaces; demilitarized zone.

Other network firewall architectures.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the audit of communication networks and computer systems, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: MANAGING COMPUTER SECURITY INCIDENTS

Level: 3

Code: MF0488_3

Associated with UC: Detect and respond to security incidents

Duration: 90 hours

Assessment capabilities and criteria:

C1: Plan and implement intrusion detection systems according to security rules.

CE1.1 Describe intrusion detection and prevention techniques, exposing the main parameters that can be used as detection criteria.

CE1.2 Determine the number, type and location of intrusion detection systems, ensuring traffic monitoring indicated in the implementation plan.

CE1.3 Select the rules of the intrusion detection system, depending on the computer system to monitor.

CE1.4 Determine the system alarm thresholds, taking into account the system usage parameters.

CE1.5 Develop detection rules, based on the characterization of intrusion techniques.

CE1.6 From a properly characterized scenario of alarm installation where servers with local and remote access capability are located:

-Install and configure alarm collection software.

-Configure different levels of alarm collection.

CE1.7 In several scenarios for deploying detection systems in a controlled server environment in multiple areas of a departmental network with Internet connection:

-Decide areas to protect.

-Install an intrusion detection system.

-Define and apply detection rules.

-Verify system operation by attacking protected areas.

-Develop a report detailing conclusions.

C2: Apply the information analysis and attack containment procedures to a detected incident.

CE2.1 Analyze information from intrusion detection systems, extracting those security-relevant events.

CE2.2 Analyze the evidence of intrusion, indicating the conditions necessary for the threat to materialize.

CE2.3 Classify the elements of the intrusion detection system alerts by setting the possible correlations between them, distinguishing the alerts by security times and levels.

CE2.4 In a practical scenario, of application of analysis procedures, in which they make attempts to break into the computer system:

-Collect alerts from intrusion detection systems.

-Relate events collected by intrusion detection systems.

-Determine those significant alerts.

-Develop the corresponding report indicating the possible intrusions and associated risk for the security of the organization's computer system.

CE2.5 Set up intrusion detection tools update processes to ensure their functionality as per manufacturer specifications.

C3: Analyze the extent of damage and determine recovery processes against a detected incident.

CE3.1 Describe the phases of the action plan against security incidents, describing the objectives of each phase.

CE3.2 Indicate the phases of the forensic analysis of computer equipment, describing the objectives of each phase.

CE3.3 Classify the evidence types of the forensic analysis of systems, indicating their characteristics, methods of collection and analysis.

CE3.4 Describe the different techniques for malicious program analysis, indicating use cases.

CE3.5 In a scenario, of coordination of response to an intrusion into a computer system:

-Perform the collection of volatile evidence.

-Perform non-volatile evidence collection.

-Preliminary analysis of the evidence.

-Temporary analysis of file system activity.

-Develop the final report, collecting the evidence found, the possible vulnerabilities used for intrusion and the activity performed by the intruder that has been detected in the system.

CE3.6 Standardize methods of disaster recovery of computer equipment in the face of intrusion detection.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6 and CE1.7; C2 with respect to CE2.4; C3 with respect to CE3.5.

Other capabilities:

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Treat the customer with courtesy, respect and discretion.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Demonstrate flexibility to understand changes.

Contents:

1. Security incident management

Justification for the need to manage security incidents.

Identification and characterization of system performance data.

intrusion detection systems: computer-based systems (HIDS); network-based systems (NIDS); intrusion prevention systems (IPS); decoys.

2. Response to security incidents

Collection of information.

Analysis and correlation of events.

Verifying the intrusion.

Incident management bodies: national (IRIS-CERT, ESCERT); International (CERT, FIRST).

3. Computer forensic analysis

Objectives of forensic analysis.

Lockard principle.

Collection of evidence.

Indetermination principle: volatile evidence; non-volatile evidence; evidence labeling; chain of custody.

Evidence analysis: hidden files and directories; hidden information in the file system, Slack-space; recovery of deleted files; forensic analysis tools.

Analysis of malicious programs: disassemblers; controlled execution environments.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to detection and response to security incidents, in the own language and foreign language, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 4: SECURE DATA ACCESS AND TRANSMISSION SYSTEMS

Level: 3

Code: MF0489_3

Associated with UC: Design and implement secure data access and transmission systems

Duration: 60 hours

Assessment capabilities and criteria:

C1: Evaluate existing encryption techniques to choose the one required based on the required security requirements.

CE1.1 Describe the differences between private key and public key encryption algorithms, indicating their different uses.

CE1.2 Identify the different encryption modes, describing the main features.

CE1.3 Classify the different private key algorithms, describing their execution phases.

CE1.4 Classify the different public key algorithms, describing their execution phases.

CE1.5 Identify the different key exchange protocols, describing their operation.

C2: Implant cryptographic services and techniques on services that require it according to computer security specifications.

CE2.1 Justify the need to use cryptographic techniques in communications between computer systems based on the channels used.

CE2.2 Define encryption techniques to securely connect two networks by describing the necessary functionalities and requirements.

CE2.3 Define the techniques used to securely connect two computers (SSL and SSH tunnels), describing the necessary functionalities and requirements.

CE2.4 In a scenario, in which you want to establish secure communication between two computer systems:

-Analyze the security requirements of the proposed communications architecture.

-Indicate the most suitable solution, justifying the selection.

-Install VPN and IPSec services to connect networks.

-Install SSL or SSH tunnel services to connect distant computers.

C3: Use digital certificate systems in those communications that require integrity and confidentiality according to security specifications.

CE3.1 Identify the attributes used in digital certificates for server, describing their values and function.

CE3.2 Describe the modes of use of digital certificates, associating them with security specifications: confidentiality, integrity and accessibility.

CE3.3 Describe the structure of a digital sealing system, indicating the functions of the elements that integrate it.

C4: Design and implement digital certification services according to operating and security needs.

CE4.1 Describe the structure of the public key infrastructure, indicating the functions of the elements that integrate it.

CE4.2 Describe the services and obligations of the certification authority, relating them to the certificate policy and the certification practice statement.

CE4.3 Identify the mandatory and optional attributes of a digital certificate, describing the usual use of these attributes.

CE4.4 Describe the structure of a privilege management framework, indicating the functions of the elements that integrate it.

CE4.5 Determine the fields of the attribute certificates, describing their usual usage and the existing relationship with the digital certificates.

CE4.6 In a practical scenario, establishing a certification system for a computer system:

-Design a public key infrastructure, depending on the specifications.

-Justify the hierarchy of designed certification authorities.

-Issue the certificates following the procedures indicated in the Declaration of Certification Practices.

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.4; C4 with respect to CE4.6.

Other capabilities:

Demonstrate interest in the broad knowledge of the organization and its processes.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Demonstrate flexibility to understand changes.

Demonstrate stress resistance, mood stability and impulse control.

Habit to the organization's work rate.

Contents:

1. Cryptography

Security of information and cryptography.

Basic concepts.

symmetric key encryption.

Digital signature.

Public key encryption.

Summary functions.

Flow and Block Encryption.

Key exchange protocols.

2. Secure Communications

Virtual private networks.

IP Security Protocol.

Tunnels encrypted.

3. Certification Authorities

Public Key Infrastructure (PKI).

Certificate policy and certification practice statement.

Certification authority hierarchies.

Privilege Management Infrastructure (PMI).

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the design and implementation of secure data access and transmission systems, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 5: MANAGING SERVICES IN THE COMPUTER SYSTEM

Level: 3

Code: MF0490_3

Associated with UC: Manage Services in Computer System

Duration: 90 hours

Assessment capabilities and criteria:

C1: Analyze system processes in order to ensure proper performance for the parameters specified in the operating plan.

CE1.1 Identify system processes and parameters that characterize them (parent processes, process status, resource consumption, priorities, and affected users among others) to determine their influence on system performance.

CE1.2 Describe each of the tools provided by the system for process management to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a scenario of analyzing the performance of a computer system with a properly characterized process load:

-Use system tools to identify how many active processes exist and the particular characteristics of some of them.

-Perform priority activation, deactivation, and modification operations with a process using the system tools.

-Monitor system performance by using specific tools and setting alarms, which indicate risk situations.

C2: Apply administration procedures to storage devices to provide the user with a complete, secure and available information record system.

CE2.1 Identify the various usable file systems on a given storage device to optimize the logging and access processes.

CE2.2 Explain the features of file systems based on the storage devices and operating systems used.

CE2.3 Describe the overall storage structure in the computer system by associating the devices with the different existing file systems.

CE2.4 In a scenario of applying information storage management procedures with multiple devices:

-Perform partitioning, where necessary, and the generation of the infrastructure of the file systems to be installed on each device.

-Implement the overall storage structure by integrating all devices and their corresponding file systems.

-Document the requirements and constraints of each file system in place.

C3: Manage system access and resources to verify the proper and safe use of them.

CE3.1 Identify the system access capabilities by distinguishing remote access from local accesses.

CE3.2 Describe the tools that are used in the management of permissions to users for the use of system resources.

CE3.3 In a scenario of administering access to the system where you have the user administration right:

-Identify a user's possible access to the system.

-Modify the permissions of using a system resource to a user.

-Define limitations of using a system resource to users.

C4: Evaluate the usage and performance of communications services to keep them within specified parameters.

CE4.1 Explain the configuration and operation parameters of communications devices to ensure their functionality within the system.

CE4.2 Relate the active communications services on the system to the devices used by them to analyze and evaluate performance.

CE4.3 In a scenario of evaluating the use and performance of a computer system connected to the outside by means of several lines of communication:

-Identify communications devices and describe their characteristics.

-Verify the status of the communications services.

-Evaluate the performance of communications services.

-Detect and document the incidents produced in the system.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.4; C3 with respect to CE3.3; C4 with respect to CE4.3.

Other capabilities:

Maintain the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Interpret and execute work instructions.

Demonstrate stress resistance, mood stability and impulse control.

Contents:

1. Processes

States of a process.

Handling of signals between processes.

Process Administration.

Changing priorities.

Process Monitoring.

Managing resource consumption.

2. Storage Systems

Storage devices.

File systems.

General storage structure.

System tools for managing storage devices.

3. Managing users

Access to the system.

Permissions and access to resources.

Resource Usage Limitations.

4. Communications services

Communications devices.

Communications protocols.

Communications services.

Yields of communications services.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the management of services in the computer system, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX VI

Professional Qualification: Developing Applications with Web Technologies

Professional Family: Informatics and Communications

Level: 3

Code: IFC154_3

General Competition

Develop documents and software components that constitute computer applications in distributed environments using Web technologies, based on an already elaborated technical specification, in addition to the verification, documentation and implementation thereof.

Competition Units

UC0491_3: Develop software elements in the client environment

UC0492_3: Develop software elements in the server environment

UC0493_3: Implement, verify, and document web applications in internet, intranet, and extranet environments

Professional Environment

Professional Scope

Develops its professional activity in the IT department dedicated to the development of applications with Web technologies, in entities of public or private nature, small and medium-sized enterprises or micro-enterprises, both self-employed and others, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located in the services sector, in the sub-sector of the analysis, design and construction of computer applications with Web technologies, as well as in any other sector that uses computer systems for its management or that performs its business process through the Internet.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Web Programmers

Multimedia Programmers

Associated Training (510 hours)

Training Modules

MF0491_3: Web programming in the client environment (180 hours)

MF0492_3: Web programming in the server environment (240 hours)

MF0493_3: Web application deployment in Internet, intranet, and extranet environments (90 hours)

COMPETITION UNIT 1: DEVELOP SOFTWARE ELEMENTS IN THE CLIENT ENVIRONMENT

Level: 3

Code: UC0491_3

Professional Realizations and Realization Criteria:

RP 1: Develop static and dynamic documents with software programming tools to be processed in the client environment according to the specified design.

CR 1.1 The static and dynamic documents to be performed are developed according to the specifications received from the design and based on the security policy of the organization.

CR 1.2 The coding of the documents is done taking into account the different development techniques and the device of the client environment (desktop equipment, mobile devices, among others), with markup languages and software development standards.

CR 1.3 Software programming tools are used to achieve the encoding of documents without errors and documents to be processed in the client environment.

CR 1.4 The errors in the documents made are detected and corrected using the debugging tools.

CR 1.5 The developed documents are tested to verify that they meet the functionality specified in the design.

CR 1.6 The centralized or distributed version control tools are used to ensure the control of changes in the software, facilitating the development and testing of modifications related to new functionalities and error correction.

CR 1.7 The documentation is done following the patterns, rules and procedures set out in the design.

RP 2: Develop software components in the client environment that enable the design objectives to be met according to the given specifications.

CR 2.1 The development of the component is performed according to the specifications received from the design and taking into account the security policy of the organization.

CR 2.2 The application logic is interpreted correctly by identifying the elements required to encode the components.

CR 2.3 The coding of the components is done using the different structured programming techniques and software development standards.

CR 2.4 The software component code is developed by providing an interface in terms of usability, accessibility and ergonomics according to the design specifications and standards of the organization.

CR 2.5 Errors in the components made are detected and corrected using debugging tools.

CR 2.6 The developed components are tested to verify that they meet the objectives specified in the design.

CR 2.7 The centralized or distributed version control tools are used to ensure the control of changes in the software, facilitating the development and testing of modifications related to new functionalities and error correction.

CR 2.8 The documentation of the manufactured components is performed according to the patterns, standards and procedures established by the organization.

RP 3: Develop device-specific applications in the client environment to meet the design goals according to the given specifications.

CR 3.1 The development of the device-specific application is performed according to the specifications received from the design and based on the security policy of the organization.

CR 3.2 The application logic is interpreted correctly by identifying the components and documents that can be reused for encoding.

CR 3.3 The encoding of the device-specific application is performed using the various structured programming techniques, software development standards as well as specialized development tools for the client device.

CR 3.4 Device-specific application code is developed by providing an interface in terms of usability, accessibility, and ergonomics, according to the design specifications and rules of the organization.

CR 3.5 Errors in the device-specific application are detected and corrected using debugging tools.

CR 3.6 The device-specific application developed is tested to verify that it meets the objectives specified in the design.

CR 3.7 The centralized or distributed version control tools are used to ensure the control of changes in the software, facilitating the development and testing of modifications related to new functionality and error correction.

CR 3.8 The documentation for the device-specific application developed is done by following the patterns, rules, and procedures set by the organization.

RP 4: Develop multimedia components with specific tools and languages to increase the functionality of the client environment elements, according to design specifications.

CR 4.1 The audio and video components are arranged according to the environment in which they are to be inserted, adjusting the output to the standard digital formats and taking into account performance specifications.

CR 4.2 Graphic elements, illustrations or photographs are replayed and adjusted to obtain an output in a standard format using specific tools considering the device used in the client environment and addressing the specifications received and the security policy of the organization.

CR 4.3 Animations incorporating multimedia elements are configured using scripting languages and other specific tools to meet the given design specifications.

CR 4.4 The interactivity of the multimedia elements is developed with scripting languages and other specific tools according to instructions received.

CR 4.5 The developed component is adapted to the accessibility, usability and ergonomics criteria established by the rules and specifications of the organization and the applicable rules on intellectual property and copyright.

CR 4.6 The integration of the multimedia elements in the client environment is verified to ensure the quality parameters of the product according to the rules of the organization.

CR 4.7 The centralized or distributed version control tools are used to ensure the control of changes in the software, facilitating the development and testing of modifications related to new functionalities and error correction.

RP 5: Include specific functionality in development documents, using software components in the client environment already developed according to applicable regulations.

CR 5.1 The already elaborated components are used as integrative elements in the development of new components, according to the technical design and according to the security policy of the organization.

CR 5.2 Documents are constructed using software components already developed according to the design specified and in accordance with applicable rules on intellectual property.

CR 5.3 The software component is configured through its properties and methods to tailor its functionality to the needs of the user and the chosen client environment.

CR 5.4 The tests and documentation on software components already performed are performed taking into account the standards defined in the technical design.

CR 5.5 The use of already elaborated software components is done by ensuring the integrity of the system.

CR 5.6 System parameters that affect ergonomics or ease of use are adjusted to improve the user's working conditions, within the organization's directives.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. Tools: rapid development, layout, graphics and animation. Virtual machines. Browsers. Communication protocols. Integrated development environments-IDEs-multilanguage. Multimedia tools. Debugging and testing tools. Software components already developed and/or distributed by computer companies. Web Servers. Security systems. Database engines for use, in test environment. Development environments for local applications with Web-RIA technology. Design Framework-type Bootstrap-. Version control tools-GIT-.

Products and results:

Static and dynamic documents whose content is source code to be interpreted. Graphical user interfaces. Documentation associated with the developed components.

Information used or generated:

Application design and specifications. Global vision of the system to perform, deliver and exploit. Manuals for the use and operation of computer systems. Software operating manuals. Manuals of the development tools used. Documentation of training courses. Exploitation documentation for the client environment. Technical support supports. Applicable rules on intellectual property and copyright (Copyright). Documentation associated with the developed components. Usability manuals. Job templates. Specifications of the corporate graphic design.

COMPETITION UNIT 2: DEVELOP SOFTWARE ELEMENTS IN THE SERVER ENVIRONMENT

Level: 3

Code: UC0492_3

Professional Realizations and Realization Criteria:

RP 1: Develop software components in the server environment by meeting the design goals according to the specifications given to complete the Web application.

CR 1.1 The software component code is developed using languages that enable the functionality indicated in the development specifications to be achieved.

CR 1.2 The component is encoded by standard development techniques from design patterns to obtain, if possible, reusable elements by procuring the maximum portability according to the rules of the organization.

CR 1.3 The component is encoded with the tools, format and documentation of the code indicated in the programming rules.

CR 1.4 The component interface is clearly defined and documented, ensuring system integration.

CR 1.5 The developed component is subjected to the required test batteries in a standardized execution environment with the appropriate debugging tools to ensure proper operation according to the organization's safety and quality specifications.

CR 1.6 The creation and management of users, roles, and profiles is performed to address requests related to access to the software component on the server, following specifications received and according to the needs of the organization.

CR 1.7 The software components of the server accessed from the client environment are configured to ensure that they can access only those who must, following the established guidelines and procedures and taking care of the security policy of the organization.

RP 2: Manipulate access interfaces to information stored in databases or other structures to integrate content into the logic of the Web application according to the given specifications.

CR 2.1 The components are developed including database connection functionality or other structures according to the given specifications and using development patterns for possible reuse.

CR 2.2 Data is manipulated by means of the tools provided by the system according to design specifications.

CR 2.3 Data manipulation and query is performed using standard data manipulation and definition languages according to design stipulations.

CR 2.4 The connections to the database manager systems are configured by following the guidelines provided by the organization.

CR 2.5 The developed components are tested to verify the functionality described in the design specifications and to ensure the integration of the same with the system components and other installed applications according to the quality standards of the organization.

CR 2.6 The tests and documentation on software components already performed are carried out taking into account the standards defined in the technical design.

RP 3: Integrate development capabilities, using distributed services according to established market standards, to tune application to design specifications.

CR 3.1 The integration of other Web services into the Web application is used through the use of market-standard technologies that allow information to be exchanged quickly, easily and transparently with the Web application.

CR 3.2 The management of information exchange between the Web application in the server environment and another Web service is done through the appropriate access interfaces and depending on the technology used.

CR 3.3 Service searches are performed to obtain the appropriate functionality to the design specifications and integrate them into the Web application.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. Development and debugging tools. Third-party components. Protocol managers. Communications lines. Web Servers. Application servers. Database manager systems. File transfer tools (content synchronization). Virtual machines. Current browsers, and new technological design. Security systems. Change control tools. Version control tools. SOA tools.

Products and results:

Source code for software components. Software component executable code. Static and dynamic documents whose content is source code to be interpreted. Components of the server layer. Documentation of the development.

Information used or generated:

Global view of the system to be performed, delivered and exploited. Manuals for the use and operation of computer systems. Software operating manuals. Manuals for the programming languages used. Training course materials. Defined technical design. Technical support supports. Job templates. Development documents for the components made.

COMPETITION UNIT 3: IMPLEMENT, VERIFY, AND DOCUMENT WEB APPLICATIONS IN INTERNET, INTRANET, AND EXTRANET ENVIRONMENTS

Level: 3

Code: UC0493_3

Professional Realizations and Realization Criteria:

RP 1: Deliver and distribute the Web application developed to be used by users according to established implementation plans and quality standards.

CR 1.1 The development installation requirements for client and server environments are clearly expressed in terms of file system management and administration needs according to the application installation parameters of the organization.

CR 1.2 The security levels of the users of the application are configured for proper use of the same according to the source: Internet, intranet or extranet.

CR 1.3 Installation packages are created and configured to allow their distribution according to the organization's implementation rules.

CR 1.4 Application installation scripts and processes are created and configured according to the organization's implementation specifications.

CR 1.5 The documentation for the application installation scripts and packages is performed according to the parameters of the organization.

CR 1.6 Installation processes are verified, checking their operation according to the quality standards of the organization.

RP 2: Perform tests to verify the operation of developed software elements and ensure quality levels according to the design specifications that enable the server environment and the client environment to be integrated into the system.

CR 2.1 Test games and their scenarios are arranged and controlled for the performance of the test sets, following design specifications of the components and quality standards of the organisation.

CR 2.2 The structural and functional tests of the components are performed with the data sets and the scenarios arranged according to specifications of the design of the component and quality standards of the organization.

CR 2.3 The integration testing of the component and access to data and other services are performed according to functional specifications and the quality standards of the organization.

CR 2.4 The documentation of the tests, both in terms of the preparation, execution and outcome of the tests, is carried out according to the development specifications and quality standards of the organization.

CR 2.5 The tests are performed by taking into account the verification of the components in verification and of the tests themselves.

RP 3: Develop and maintain the documentation of the developed Web application using documentation tools, according to established quality standards.

CR 3.1 The documentation is drawn up in accordance with the standards and documentation tools and in accordance with the quality specifications established in the organization and assuming the appropriate ergonomics specifications.

CR 3.2 Documentation generation tools are used to obtain appropriate products according to the documentation and quality standards of the organization.

CR 3.3 The documentation is developed taking into account the version control and its subsequent update and maintenance according to the design specifications and development standards of the company guaranteeing their understanding.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Office tools. Content browsers. Structured languages. Object-oriented languages. Development tools. Web Servers. Debugging and testing tools. Software component distributed by computer companies. Documentation tools. Tools for continuous integration. Ftp tools for publishing content.

Products and results:

Test Programs. Test games. Evidence documents, certification, quality control, delivery and implementation among others. Application in production.

Information used or generated:

Global view of the system to be performed, delivered and exploited. Manuals for the use and operation of computer systems. Software operating manuals. Manuals of the development tools used. Documentation of training courses. Server environment exploitation documentation, and integration documentation. Technical support supports. Job templates.

TRAINING MODULE 1: WEB PROGRAMMING IN THE CLIENT ENVIRONMENT

Level: 3

Code: MF0491_3

Associated with UC: Develop software items in the client environment

Duration: 180 hours

Assessment capabilities and criteria:

C1: Develop documents using markup languages and software development standards.

CE1.1 Determine the different parts of a document created with markup language used for implementation.

CE1.2 Recognize the different software development techniques existing in the market to improve system integration and document processing according to the specified design.

CE1.3 Use appropriate marks to generate internal documentation in development according to design specifications.

CE1.4 In a practical, well-characterized case, document realization with a markup language that allows interaction with the user with specifications given:

-Write marks that allow the change of the attributes of the text used and the change of the color and image of the document background.

-Create marks for tables and lists and links to other documents.

-Integrate marks that allow the inclusion of static or dynamic images, sounds and videos, and references to frames to relate different documents.

-Integrate brands that allow program execution and client controls.

-Build forms to collect and validate user information and design interactive maps to facilitate accessibility.

-Plan special effects to be applied in the documents to be produced.

CE1.5 Describe general features concerning 'style sheets' to be applied in the documents to be produced according to the specified design.

CE1.6 Use marks to provide different styles to documents developed according to the specified layout.

CE1.7 Build documents using markup languages to allow the user to use mobile devices and specific media accessibility.

C2: Create software components using tools and scripting languages using structured development techniques.

CE2.1 Relate the functionality of the software component to develop with the standard structured development techniques to fulfill such functionality.

CE2.2 Formulate data structures and control flow using scripting languages according to the functionality of the software component to be developed.

CE2.3 Create appropriate procedures and functions for the functionality of the software component to be developed using scripting languages.

CE2.4 In a convenient, well-characterized, convenient scenario of creating and maintaining software components in your client environment using development tools and scripting languages, you have detailed design documentation:

-Create and archive software components.

-Modify and remove software components.

-Purge and verify the software components made.

-Document the software components developed according to design specifications.

C3: Create device-specific applications using specific tools and development environments.

CE3.1 Relate the functionality of the application to develop with the specific development techniques for that device.

CE3.2 Define data structures and control flow using structured languages according to the functionality of the software to be developed.

CE3.3 Create appropriate procedures, functions, and user interfaces to the functionality of the specific application to be developed using structured languages.

CE3.4 In a convenient, well-characterized, convenient scenario of creating and maintaining device-specific applications in the client environment using specific development tools and environments, with detailed design documentation available:

-Create and archive device-specific applications.

-Modify and remove device-specific applications.

-Debug and verify developed applications.

-Publish, if any, applications in public application repositories for that device type.

-Document developed applications according to design specifications.

C4: Create and manipulate multimedia components using scripting languages and specific tools.

CE4.1 Identify the standard formats of distribution and use of multimedia components, audio, video, illustrations, photographs, among others, for integration into documents of the client environment.

CE4.2 Develop animations and interactivity in multimedia components using specific scripting languages by following given parameters.

CE4.3 Create or manipulate multimedia components using specific tools to match the contents to the formats indicated in the specifications.

CE4.4 In a convenient, well-characterized scenario of integrating multimedia components into a Web document:

-Analyze the formats of the original multimedia components.

-Make the necessary adjustments to the media component formats to achieve the required performance.

-Develop the interactivity processes defined in the specifications.

-You will integrate the media components into the client environment document.

-Verify the integration and functionality of the components according to the design specifications.

C5: Apply usability and accessibility techniques in the development of user interfaces.

CE5.1 Distinguished and explain accessibility guidelines to the content in the documents produced to allow for better navigation and understanding by the users.

CE5.2 Distinguished and explain usability guidelines to content in the documents produced to enable better quality, effectiveness and user satisfaction.

CE5.3 In a practical, well-characterized scenario, application of accessibility and usability standards to software components and documents already elaborated to improve their use:

-Use accessibility rules to improve their use.

-Apply usability rules to optimize their use.

C6: Select software components already developed according to their functionality to integrate them into documents.

CE6.1 Analyze the requirements for using software components to be used by the document in the client environment.

CE6.2 Insert client application software components that will be used by the document in the client environment.

CE6.3 In a convenient, properly characterized, scenario of selecting already developed software components to integrate into documents, development tools, and scripting languages from detailed design documentation:

-Integrate software components oriented to file management techniques on the server.

-Integrate software components that allow for error handling.

-Integrate software components to store dictionary-type information.

-Integrate software components to control and validate user-entered information.

-Integrate software components to display information about the file system on the server.

-Integrate software components to enable dynamic effects related to the document or device used.

-Integrate software components to use other functionality in the developed document.

-Verify that the functionality provided by the component matches the expected features and that there are no conflicts with the rest of the system components.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.4; C3 with respect to CE3.4; C4 with respect to CE4.4; C5 for CE5.3; C6 for CE6.3.

Other capabilities:

Maintain the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Interpret and execute work instructions.

Demonstrate stress resistance, mood stability and impulse control.

Contents:

1. Developing Web software on the client

Technology platforms and development environments on the client.

Choosing a platform: criteria.

Browsers.

2. Markup languages

Characteristics of the markup languages.

Versions of markup languages.

Elements of the markup language.

Structure of a document created with markup language.

Specific marks for documenting documents.

Presentation style: text size; color, font, and other text features; text formatting.

Lists; list types.

Tables; table types.

Links: Hypertext documents.

Mark.

Integration of client applications.

Marquees.

Forms: Treatment of user information.

Interactive maps: operation; construction.

Dynamic effects on the document.

Other features of markup languages.

Mobile technology-oriented markup languages: features; specifications.

3. Style sheets

Concepts about style sheets.

Style sheet types.

Style sheets and scripting languages.

Style attributes for text, margins and alignment and background colors among others.

Grouping of styles.

Assignment of classes.

4. Multimedia Content

Storage Formats: graphics (illustrations and photographs); audio; video.

Multimedia tools: treatment and graphic retouching; audio; video treatment.

Integration of multimedia components: players; 'plugins'.

MIME types.

5. Structured programming techniques

Basic elements: constants, variables, operators, and expressions.

Control structures: sequential, conditional, and repeating.

Functions and procedures: Current and formal parameters; step of parameters; calls to functions and procedures.

Structured programming methodology.

6. Scripting languages

Characteristics of the scripting languages in the client environment.

Language data types.

Operators.

Language control structures.

Choice of language. Features.

Procedures and functions.

Function libraries and procedures.

Specific marks for internal documentation of developments.

Integration of applications on client.

Managing files on the server (copy, delete, modify, write, among others).

Managing errors.

Information storage and data dictionaries.

Managing the file system attributes on the server.

Special effects on texts, messages, funds, forms, navigation, menus, images, mouse, keyboard, among others.

Complementary functionalities implemented with components developed with scripting languages.

Animation and interactivity processes.

Script language development tools.

Development tools types: integrated development environments; authoring tools.

Functionality of development tools.

Debug and verification.

7. Accessibility and usability techniques

Web accessibility concepts; problematic; accessibility advantages; accessibility guidelines and techniques.

Usability web: concepts; importance of usability; usability failures.

Combination of usability and accessibility.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the development of software elements in the client environment, which will be credited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: WEB PROGRAMMING IN THE SERVER ENVIRONMENT

Level: 3

Code: MF0492_3

Associated with UC: Develop software items in the server environment

Duration: 240 hours

Assessment capabilities and criteria:

C1: Create software components with object-oriented development technologies.

CE1.1 In a scenario of managing software components in the server environment using development tools and programming languages from detailed design documentation:

-Create and archive software components.

-Modify and remove software components.

-Purge and verify the software components made.

CE1.2 Create objects, classes, and methods appropriate to the functionality of the software component to be developed using object-oriented programming languages.

CE1.3 Formulate data structures and control flow using object-oriented programming languages according to the functionality of the software component to be developed.

CE1.4 Document the developed software component.

CE1.5 In a convenient, well-characterized scenario of creating software components using development tools and object-oriented programming languages from detailed design documentation:

-Integrate software content control components from documents located on the server to be used in the 'servlet' client environment.

-Integrate file and error management into the software component to be developed.

-Use server variables in the software component to develop to provide access to server properties.

-Integrate user session tracking and Web application properties to develop in the software component to build.

-Create software components with the client application functionality to be used in the 'applet' type client environment.

-Create software components that can offer their functionality to other software components on the same server or other servers in the network.

C2: Develop components that allow access to and manipulation of supported information in databases and other structures.

CE2.1 Create software components using specific objects or connectivity components to access information stored in databases and other structures.

CE2.2 Integrate SQL statements into software components to access and manipulate information located in databases.

CE2.3 In a scenario of developing software components that access supported data in databases or other storage structures:

-Identify the elements and structures contained in a database.

-Use the necessary objects, connectors, and middleware in building the component to perform access to the supported data in the database or other structures as specified.

-Perform database-supported information manipulation and definition operations using the SQL language.

CE2.4 Determine the main features of an extended standard markup language for sharing information between software components and databases or other structures.

CE2.5 Integrate features of a standard markup language extended into the development of software components to share supported information in databases or other structures.

C3: Select and use distributed services for integration into the Web application.

CE3.1 Identify the capabilities offered by distributed Web services for integration in the application to be developed.

CE3.2 Specify the characteristics of the standard market protocols in order to use Web services in the application to be developed.

CE3.3 Select and use the most appropriate Web services to be used in the Web application based on the specified design.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.1 and CE1.5; C2 with respect to CE2.3.

Other capabilities:

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Maintain an assertive, empathetic and conciliatory attitude to others by demonstrating cordiality and kindness in the treatment.

Adapt to new situations or contexts.

Respect the organization's internal rules and procedures.

Contents:

1. The software development process

The software development process: lifecycle; methodologies and techniques.

Managing software development projects.

Software development tools and standards.

Software quality: criteria; quality metrics and standards.

2. Object-oriented programming (POO) features

Basic POO fundamentals: classes, subclasses, and objects; messages; methods.

Features of the POO.

Abstraction: inheritance; encapsulation; polymorphism.

Features of object-oriented languages.

3. Database manager systems and other information storage structures

Data structures: definition and basic elements; types of data structures: simple and structured; static and dynamic.

Data files: concepts; terminology; types of data files; organization of data files; access to data files.

Databases: concepts; terminology; database models; relational model.

Transactions.

4. Structured query language (SQL) features

The main structure of an SQL statement.

SQL data query statements.

SQL Data Maintenance Statements.

Advanced SQL database management statements.

5. Technology platforms and server programming language development tools

Development technology platforms in the server environment.

Types of development tools.

Functionality of development tools.

Debug.

6. Server programming languages

Choice of language. Features. Criteria.

Language data types.

Operators.

Language control structures.

How to document the software component.

Automatic generation of documentation.

Development of business logic-oriented software components.

Managing errors.

File Management.

Event Management.

Using server variables.

Session tracking.

Developing client applications to be used in the client browser.

Access to databases and other structures using different technologies from sources or data sources.

Integrating SQL statements into software components.

Additional features of the server programming language.

7. Extended markup standards (XML)

History of the standard extended markup languages.

Structure of an extended markup language: well-formed documents; validated documents.

Specifications for an extended markup language: document type definition (DTD); style extensible language (XSL); extensible link language (XLL); extended markup standard language user agent (XUA); hypertext extensible markup language (XHTML).

XML Schemas.

XML Parsers.

Entities.

Exchange of information between software components using XML.

Additional specifications of the XML language.

8. Distributed services

Concept of distributed services.

Distributed services client and distributed service server features.

Distributed services and extended markup language (XML).

Technologies used in distributed services.

Interoperability techniques using the HTTP protocol.

Technologies used in publishing distributed services.

Access to distributed services publishing directories.

9. Accessing distributed services using a server programming language

Features of client software components on the server to access other distributed software components.

Features of server software components to be accessible by other distributed software components.

Client or server software component features using a server programming language that uses the techniques and methods described in a distributed services publishing directory.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to web programming in server environment, which will be credited using one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: DEPLOYING WEB APPLICATIONS IN INTERNET, INTRANET, AND EXTRANET ENVIRONMENTS

Level: 3

Code: MF0493_3

Associated with UC: Implement, verify, and document web applications in Internet, intranet, and extranet environments

Duration: 90 hours

Assessment capabilities and criteria:

C1: Establish the application installation and distribution processes in different deployment scopes.

CE1.1 Determine the different phases, processes and IT technologies involved in the installation and distribution of the Web application.

CE1.2 In a practical, properly characterized, installation and distribution scenario of a Web application in the Internet, intranet, and extranet scopes:

-Set the application installation and distribution requirements.

-Define the directory structure in the server environment to locate the documents and software components developed in the Web application, identifying the resources affected by the development.

-Indicate the required services in the server environment in order to run the web application.

-Specify the configuration and security parameters in the server and client environment for the Web application.

-Create and configure the installation packages in a way.

-Verify the smooth operation of the installation and distribution process.

C2: Develop and maintain the Web application documentation using documentation generation tools and control the versions.

CE2.1 Identify the different documentation generation tools and control of existing versions.

CE2.2 In a practical, well-characterized, well-characterized, working-out and maintenance of Web application documentation:

-Evaluate whether documents and software components have been documented according to the organization's documentation and quality standards.

-Check that the documentation is developed and updated taking into account version control.

-Evaluate whether the documentation is made using the existing documentation tools in the business organization.

C3: Select and use test methods and games to verify the functionality and performance specifications of the Web application.

CE3.1 Classify the different methods to use to verify the proper functioning of the developed Web application.

CE3.2 In a convenient, well-characterized scenario, verification of the functionality and performance specifications of the Web application using test games:

-Verify in the client environment: documents developed using markup languages, software components developed using scripting languages, usability and accessibility in the development of user interfaces and integration of software components already developed in the Web application.

-Verify software components developed in the server environment using object-oriented programming languages.

-The software components for access to databases or other structures.

-Web services use of the Web application.

-The performance of the server based on the developed Web application and the number of users that are currently using that application.

-The optimization of the Web application based on the parameters obtained in the validation of the tests.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.2; C2 with respect to CE2.2; C3 with respect to CE3.2.

Other capabilities:

Treat the customer with courtesy, respect and discretion.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Demonstrate flexibility to understand changes.

Contents:

1. Web application architecture

The dimensions of the network: Internet, intranet, and extranet.

Introduction to network services.

Web Principles and Components.

Servers and clients on the Web: features; hardware and software for servers and clients; browsers: features.

Web applications: Web application evolution; Web application development technologies; Web application types.

Architecture of a Web application: the multilayer architecture.

Hypertext Transfer Protocols (HTTP).

Server features and functions: database servers; Web servers; LDAP servers; application servers.

Additional services existing in the computer system: features.

2. Implementing Web applications

Directory structure.

Resource allocation.

Services used in the computer system by a Web application.

Web application configuration files.

Web application security levels.

Verifying the process of installing a Web application.

3. Verifying Web applications

The test process.

Planning of the tests.

Test strategies.

Defect tests; black box test; structural tests; interface tests; stress tests.

Static Web application verifications. Testing of user interfaces. Inspections of the elements of the Web application.

Performance statistics.

4. Web application documentation

Documentation: features; types; technical documentation for the technical user; Web application usage guide.

Automatic generation of documentation.

Documentation tools.

Version control: versioning; controlling changes; version control group; change confirmation, change prevention; change reduction.

Tools for version control.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the implementation, verification and documentation of web applications in Internet, intranet and extranet environments, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX VII

Professional Qualification: Making and Publishing Web Pages

Professional Family: Informatics and Communications

Level: 2

Code: IFC297_2

General Competition

Create Web pages that integrate text, images, and other elements, using appropriate markup languages and editors, according to given 'usability' specifications and conditions, and publish them to the appropriate server.

Competition Units

UC0950_2: Build web pages

UC0951_2: Integrating software components into web pages

UC0952_2: Publish web pages

Professional Environment

Professional Scope

Develops its professional activity in the IT department dedicated to the development of software with Web technologies, in entities of public or private nature, small companies/medium/large or micro, both self-employed and independent, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located mainly in the services sector, in the subsector of the development of software with Web technologies or in the marketing of services of analysis, design and construction of computer applications for infrastructures of networks intranet, internet and extranet, as well as in any productive sector that uses computer systems for its management.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Web Page Developers

Web Page Editors

Client Web Page Programmers

Associated Training (510 hours)

Training Modules

MF0950_2: Web Page Construction (210 hours)

MF0951_2: Software component integration on web pages (210 hours)

MF0952_2: Web page publishing (90 hours)

COMPETITION UNIT 1: BUILD WEB PAGES

Level: 2

Code: UC0950_2

Professional Realizations and Realization Criteria:

RP 1: Prepare the environment for the creation and verification of Web pages, in accordance with the quality regulations of the organization.

CR 1.1 The editing tool is installed and configured in order to use it in the elaboration of the Web pages, following the specifications received.

CR 1.2 The wizards provided by the editing tools are identified and used to facilitate the creation of the pages, according to the technical specifications of the tool.

CR 1.3 The elements provided by the editing tool are inserted and configured, using the options (menus, toolbars, controls) that you provide, according to the design specifications received.

CR 1.4 The Web pages publishing tool is installed and configured for the publication of the developed pages, following the quality regulations of the organization and the technical specification of the same.

CR 1.5 Software verification tools are installed and configured to perform the tests and debug the developed pages, following the quality regulations of the organization and the specifications of the techniques.

RP 2: Create Web pages and retouch those already done using markup languages, according to the design specifications received.

CR 2.1 The elements provided by the markup language are used to present information on the Web pages according to the design specifications received.

CR 2.2 The type of content to be exposed (texts, images, tables, multimedia elements, links, among others) on the page is identified and the corresponding tags provided by the language are used, following the design specifications received.

CR 2.3 The attributes and values of the elements are identified and adjusted to improve the layout, functionality, and layout of the page, according to the design specifications received.

CR 2.4 Style sheets are created to homogenize the appearance of pages and make them more attractive, according to design and development specifications received.

CR 2.5 Layers are created to add behaviors within the Web page, using the elements provided by the tool according to design and development specifications received.

CR 2.6 The modifications to be made on the Web page are developed to adapt the page to the new changes, according to the design specifications received.

CR 2.7 The page developed is documented for later use and modification following the patterns, regulations and procedures established in the design, and the quality regulations of the organization.

RP 3: Add functionality to Web pages by creating interactive interfaces and other reusable elements, following the design specifications received.

CR 3.1 Templates are created by defining the elements that compose them as well as the editable and uneditable regions and apply to the pages to adapt them to a predefined layout, following the design and development specifications received.

CR 3.2 Form objects (text fields, list boxes, check boxes, and option buttons, among others) are identified and inserted into the pages, to interact with the data following design and development specifications received.

CR 3.3 The components and Web pages already developed are integrated into the Web site as a whole to ensure the integrity and functionality of the system, according to the design specifications received.

CR 3.4 The new component to be integrated is configured through its properties and methods to adapt its functionality to the needs of the user and the design specifications received.

CR 3.5 The content type and format to dynamically create on the page is identified and configured using the content management system tools and following the design specifications received.

CR 3.6 The content access system is configured to prevent unwanted access, according to the design specifications received, the security rules of the organization and the applicable regulations.

CR 3.7 The new functionalities developed are documented for later use and modification following the patterns, applicable regulations and procedures established in the design, and the quality regulations of the organization.

RP 4: Perform tests to verify the proper functioning of the developed Web pages and ensure quality levels according to the design specifications received.

CR 4.1 The pages made are tested in the web browsers to verify that they meet the functionalities specified in the design, as well as criteria of 'usability' and accessibility defined by the organization, according to established procedures.

CR 4.2 The modified pages are tested in Web browsers to verify their integration on the Web site and that they comply with the functionalities specified in the design, as well as criteria of 'usability' and accessibility defined by the organization, according to established procedures.

CR 4.3 The errors in the pages made are detected and corrected using the editing tool itself, to ensure compliance with the design specifications, according to quality criteria and test procedures of the organization.

CR 4.4 The integration tests of software components already developed are carried out according to functional specifications and the quality standards of the organization.

CR 4.5 Data access tests and other services are performed to verify the security level of the Web site, based on functional specifications and the quality standards of the organization.

CR 4.6 The result of the tests is documented for registration and subsequent use in accordance with applicable regulations and procedures established in the design, and the quality regulations of the organization.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems. Office tools. Web editing tools. Current browsers, and new technological design. Markup languages. 'Script' languages. Multimedia tools. Communication protocols. Web Servers. Standards of 'usability' and accessibility. Applications for Web site accessibility verification. Content Management Systems (CMS).

Products and results:

Web pages made and tested. Interactive interfaces and reusable elements on Web pages.

Information used or generated:

Layout and specifications of the pages to be made. Web editing tools operating manuals. Job templates. Specifications of the corporate graphic design. Applicable rules on intellectual property and copyright. Documentation associated with the developed pages. 'usability' manuals. Standards of quality and criteria of 'usability' and accessibility defined by the organization. Technical documentation of the CMS. Specification and format of the contents. Rules of access to the Web page. Documentation of the developed pages. Documentation of the operating tests of the developed pages.

COMPETITION UNIT 2: INTEGRATE SOFTWARE COMPONENTS INTO WEB PAGES

Level: 2

Code: UC0951_2

Professional Realizations and Realization Criteria:

RP 1: Run and interpret software components developed in client 'script' languages, following specifications received.

CR 1.1 The operating logic of the scripts is interpreted correctly by identifying the elements needed to encode them to determine the necessary structures to be developed, according to the design and development specifications received.

CR 1.2 The data types that are used in the scripts are identified to describe the values they store, taking into account the technical specifications of the language and the design and development specifications received.

CR 1.3 The input, output, and calculation operations performed in the scripts are developed to obtain the required functionality, following the design and development specifications received.

CR 1.4 The scripts are developed using the elements, objects, and event handlers provided by the 'script' language to obtain the required functionality, following the design and development specifications received.

RP 2: Adjust software components already developed on Web pages to add functionality to them, following specifications received.

CR 2.1 The already developed components are searched and selected in collections of the organization or on the Internet, in order to integrate them in the pages according to the established procedure.

CR 2.2 The functional specifications of the already developed components are interpreted, to be placed and configured within the page to be performed according to the established procedures.

CR 2.3 The already developed components are adjusted and integrated into the pages, to include specific functionalities according to the established procedure.

CR 2.4 The attributes and properties of the elements that form the already developed components are identified and modified, to be adjusted to the functionality of the page where it is to be integrated according to the specifications received.

CR 2.5 The documentation regarding the modifications made on the web page in development, is done for its subsequent registration in accordance with the regulations of the organization.

RP 3: Verify the integration of the software components on the Web pages to ensure the fulfillment of the expected functionalities, according to the quality criteria of the organization.

CR 3.1 Component integration tests are performed to verify the functionality of the page, based on functional specifications and the quality standards of the organization.

CR 3.2 Pages with software components already developed are tested using a browser, to verify that it responds to the given specifications according to established procedures.

CR 3.3 Integration errors are detected and corrected using the specified tools to ensure compliance with the functionality of the component within the page.

CR 3.4 The documentation of the integration tests is performed for subsequent registration, according to the quality specifications and standards of the organization.

CR 3.5 The use of already developed software components is performed, ensuring the integrity of the system and the distribution and standardization criteria of the organization.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems. Office tools. Rapid development tools. Web editing tools. Current browsers, and new technological design. Internet search engines. Markup languages. 'Script' languages. Content management systems. Software components already developed and/or distributed by computer companies. Web Servers. Security systems. Communication protocols. Debugging and testing tools.

Products and results:

Web pages with integrated components in operation.

Information used or generated:

Application design and specifications. Software operating manuals. Manuals of the development tools used. Documentation of training courses. Exploitation documentation for the client environment. Technical support supports. Rules applicable in the field of intellectual property and copyright. 'usability' manuals. Specifications of the corporate graphic design. Documentation associated with the developed pages. Test plan. Record of the integration tests. Documentation of the modifications made to the components. Documentation of integration and development of components.

COMPETITION UNIT 3: PUBLISH WEB PAGES

Level: 2

Code: UC0952_2

Professional Realizations and Realization Criteria:

RP 1: Manage the Web site, using transfer tools, to locate the pages according to the system administrator's specifications.

CR 1.1 The storage space of the Web site is managed, to locate the folders and files that form it according to the specifications received.

CR 1.2 The transfer tool is configured to create the connection to the Web server, following the established procedure.

CR 1.3 Files and folders are transferred and the links are redirected to their destinations, from the locale to the production system, to make the page operational on the Web site using a process (manual or automatic) of redirection of hyperlinks, according to the specifications received.

CR 1.4 The commands and commands provided by the tool are used to add, delete, modify, and update the folders and files on the Web site according to the specifications received.

CR 1.5 The transferred folders and files are verified with the original files in the locale, to ensure the transfer according to the established procedure.

CR 1.6 The process of transferring and updating information on the website is documented, for subsequent registration according to the procedures and regulations of the organization.

RP 2: Test the functionality of the developed pages to ensure their operability and final appearance, according to the design and quality specifications of the organization.

CR 2.1 The links, both between the developed and the external links, are checked to ensure that they go to the defined destination in each of the cases, according to established procedures.

CR 2.2 The aesthetic aspect is checked to ensure that it is consistent with the format developed in the local environment, according to the design criteria set by the organization.

CR 2.3 The 'usability' aspects of the developed pages are checked, to ensure that they have not changed with respect to the pages developed in the local environment, according to the quality and 'usability' criteria set by the organization.

CR 2.4 The transferred pages are checked, to ensure that the set still complies with the design and quality specifications after the transfer according to the established procedures.

CR 2.5 The transferred pages are tested on different operating systems and with different browsers, to ensure their compatibility and functionality according to the specifications of the organization.

RP 3: Transfer to the server the pages developed to be used by the users, following the quality standards established by the organization.

CR 3.1 The developed pages are uploaded to the server to host the website, according to the specifications received and the quality regulations of the organization.

CR 3.2 The new pages or developed Web components are integrated into the existing Web site for which they have been developed, according to the specifications received and the quality regulations of the organization.

CR 3.3 The home page, 'home page', and all that are defined as externally linked, are linked by hyperlinks from the source system, to verify the relationships of all the pages that make up the site according to the specifications received.

CR 3.4 Developed pages are published to expose your information, using manual or automatic procedures, in search engines and directories, according to pre-set availability criteria.

Professional Context:

Production media:

Computer and peripheral equipment. Operating systems and configuration parameters. Page publishing tools. Transfer tools. Browsers. Internet search engines. Communication protocols. Debugging and testing tools. Web Servers.

Products and results:

Web pages, published and verified.

Information used or generated:

Application design and specifications. Manuals for the use and operation of computer systems. Software operating manuals. Manuals for the publishing tools used. Documentation of training courses. Exploitation documentation for the client environment. Management documentation for the server environment. Standards of quality and criteria of 'usability' and accessibility defined by the organization. Test plan.

TRAINING MODULE 1: BUILDING WEB PAGES

Level: 2

Code: MF0950_2

Associated with UC: Build Web Pages

Duration: 210 hours

Assessment capabilities and criteria:

C1: Identify the elements provided by the markup languages and make Web pages using these languages, taking into account their technical specifications.

CE1.1 Describe the structure of a written Web page using markup languages, as well as the header and body sections of the document, to identify the parts that make it according to a specified layout.

CE1.2 Describe the labels and attributes that are used to format the document, as well as to present information in the form of a table and lists.

CE1.3 Describe the tags and attributes that are used to insert links and routing, both within the Web page and in other documents and pages located at any destination.

CE1.4 Identify the types of formats of multimedia files, both audio and video, that are integrated into Web pages.

CE1.5 Citate the tags and attributes that are needed to insert images and multimedia elements, as well as to create image maps based on the specifications received.

CE1.6 Explain the criteria of 'usability' and accessibility to the contents of web pages, to allow a better quality of navigation and understanding of the users, taking into account defined criteria and standards of accessibility and 'usability'.

CE1.7 Create a Web page that includes multiple frames for the presentation of other pages, following the design specifications received.

CE1.8 In a convenient, well-characterized, practical assumption of Web pages to present information with a markup language according to a specified design:

-Choose the labels to format the document, presenting the information in the form of lists and tables, applying 'usability' and accessibility criteria.

-Mapping an image by creating multiple hotspots.

-Insert tags, applying 'usability' and accessibility criteria, for:

-Offset within the same page.

-Link to other documents and Web addresses

-Present images, sounds, and videos.

-Allow program execution.

-Specify labels to create frames and relate multiple pages.

-Create layers to present information in different areas of the page.

-Identify multiple browsers and test the functionality of the page and document the page done.

C2: Identify the features and functionality of the Web editing tools, and use them in the creation of Web pages, taking into account their development environments.

CE2.1 Identify the functions and features of the tools used for the editing of Web pages, taking into account the technical specifications of the web pages.

CE2.2 Interpret the technical documentation provided by the editing tool for use of help in making Web pages, according to the technical specifications of the web pages.

CE2.3 In a convenient, properly characterized, installation and configuration scenario of a Web page editing tool, according to received specifications:

-Install the editing tool by following the technical specifications.

-Configure the tool for use.

CE2.4 In practical, properly characterized, scenarios for a Web page with Web editing tools, according to a specified design:

-Identify the components that the tool provides to insert elements into the page.

-Configure the attributes and properties of the inserted elements.

-Test the page made using multiple Web browsers.

-Correct any errors that arise in the processing of the page.

-Document the page made.

C3: Confect templates for Web pages based on the design specifications received.

CE3.1 Describe the features that Web templates offer in making pages with identical design.

CE3.2 Describe the utilities that Web page editing tools offer to create templates, taking into account the technical specifications of the tool.

CE3.3 In a convenient, properly characterized, scenario of creating Web templates with editing tools, according to a specified design:

-Identify the editable and non-editable regions that make up the template.

-Insert the elements and assign the specified attributes.

-Apply 'usability' and accessibility criteria.

-Apply a created template to a Web page.

-Test the Web page with the associated template using multiple Web browsers.

-Document the template made.

C4: Create forms and integrate them into Web pages to include interactivity in them, following functional specifications received.

CE4.1 Identify the labels and attributes that are used in the creation of the forms, taking into account the specifications of the markup language.

CE4.2 Describe the labels and attributes that are used to define the controls that make up the forms based on the interactions to be handled.

CE4.3 In a convenient, properly characterized, practice of making pages that incorporate forms to interact with the user, according to a specified design:

-Identify the controls to be created and placed inside the form.

-Assign the specified properties to the inserted controls.

-Assign the properties to the form (action, method, and encoding type).

-Apply 'usability' and accessibility criteria.

-Test the page and form using multiple Web browsers.

-Correct any errors that arise in the processing of the page and the form.

-Document the page made.

C5: Describe the features of style sheets to format Web pages, and create style files according to a specified layout.

CE5.1 Identify the features and benefits provided by the style sheets to define the layout of the Web pages according to the specified layout.

CE5.2 Describe the labels and attributes that are used to define styles for a page and for parts of it, taking into account design specifications.

CE5.3 Describe the syntax and attributes that are used to create styles, in order to create files with style declarations.

CE5.4 Link the pages of a Web site with a style file, to homogenize the appearance of the Web site according to received specifications.

CE5.5 In a convenient, properly characterized, practice of a file with style declarations to homogenize the format of a Web site, according to a specified design:

-Identify the syntax to use to assign the style to the labels.

-Link the Web pages to the style file.

-Test pages using multiple Web browsers.

-Apply 'usability' and accessibility criteria.

-Document the created file.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.8; C2 with respect to CE2.3 and CE2.4; C3 with respect to CE3.3; C4 with respect to CE4.3; C5 for CE5.5.

Other capabilities:

Demonstrate creativity in the development of the work you do.

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Adapt to new situations or contexts.

Contents:

1. Markup languages

Characteristics of the markup languages.

Structure of a document created with markup language.

Web Browsers.

Marked to format the document.

Creating tables and lists.

Links and routing.

Mark and Layers.

2. Images and multimedia elements

Insert images: formats and attributes.

Map of images.

Processing of images.

Treatment of videos.

Inserting multimedia elements: audio, video, and programs.

Audio and video formats.

Marquees.

3. Accessibility and usability techniques

Web accessibility, accessibility benefits.

Web Usability, importance of usability.

Applications to verify Web site accessibility (standards).

Design of usable Web sites.

Adaptation of usable Web sites.

4. Web editing tools

Functions and features.

5. Forms in building Web pages

Features.

Form elements and attributes.

Form Controls.

Forms and Events.

Accessibility and usability criteria in the form design.

6. Templates in building Web pages

Functions and features.

editable and uneditable fields.

Apply templates to Web pages.

7. Style sheets in building Web pages

Functions and features.

Style sheets and accessibility.

Style types: embedded, linked, imported, online.

Selectmen and style rules.

Style attributes for fonts, color and background, text, and blocks (paragraphs).

Creating style files.

8. Verifying and validating Web pages

Validation tests.

Verification tests.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the construction of Web pages, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: INTEGRATING SOFTWARE COMPONENTS INTO WEB PAGES

Level: 2

Code: MF0951_2

Associated with UC: Integrating software components into web pages

Duration: 210 hours

Assessment capabilities and criteria:

C1: Identify the programming structures and data types that are used in scripting, according to received specifications.

CE1.1 Describe the sequential, conditional, and iteration structures that are used to group and organize the actions of a program.

CE1.2 Recognize the syntax of the 'script' language that describes programming structures in scripting, according to the technical specifications of the language.

CE1.3 Explain the data types that are used to represent and store the values of the variables in the scripting, according to the technical specifications of the language.

CE1.4 Identify the operators that are used to make calculations and operations within a script.

CE1.5 Citar the instructions provided by the 'script' language to perform data input and output operations, according to the technical specifications of the language.

CE1.6 Distinguished methods for running a script using multiple Web browsers.

CE1.7 In a convenient, properly characterized, scenario of script interpretation that resolves a previously specified problem:

-Identify and describe the type and use of the data declared within the 'script', as well as the programming structures used to organize the actions of the program.

-Recognize the instructions provided by the scripting language used in the data manipulation, input, and output operations.

-Insert the script within the Web page using the appropriate tags.

-Test script functionality using a browser.

-Detect and correct syntax and execution errors.

-Document the changes made to the 'script'.

C2: Distinguished the properties and methods of the objects provided by the 'script' language, depending on the technical specifications of the language.

CE2.1 Explain browser objects, as well as their properties and methods, which are used to add functionality to Web pages, taking into account the technical specifications of the language.

CE2.2 Identify the predefined objects by the 'script' language to handle new structures and utilities that will add new functionality to the pages, according to the technical specifications of the language.

CE2.3 Describe and identify document objects that allow interactivity to be added between the user and the 'script', as well as their properties and methods.

CE2.4 Describe the events that the 'script' language provides: mouse, keyboard, focus, form, and load, among others, to interact with the user and relate them to the objects in the language.

CE2.5 In a practical, well-characterized scenario, of interpreting scripts that add aesthetic effects to the presentation of the pages:

-Identify the objects on which the aesthetic effects apply and the properties and methods used to add the effects.

-Recognize the events used for performing the actions.

-Describe the function or effects functions by identifying the parameters of the function.

-Make changes to the script according to received specifications.

-Detect and correct syntax and execution errors.

-Document the changes made.

CE2.6 In a convenient, properly characterized, scenario of interpreting scripts in which data entries are validated for fields in a form:

-Identify the form objects that are validated within the 'script' and the properties and methods used to validate each entry.

-Recognize the functions provided by the 'script' language used for data validation.

-Describe the events that are used in performing the actions and the function or validation functions by identifying the parameters of the actions.

-Make changes to the script according to received specifications.

-Detect and correct syntax and execution errors.

-Document the 'script' done.

C3: Identify already developed scripts that adapt to the specified functionalities and integrate them into the Web pages according to received specifications.

CE3.1 Locate and download the already developed component either from the Internet or from the collections indicated following the specifications received.

CE3.2 Identify the objects, their properties and their methods and their functionality within the script already developed in order to adjust them to the page where they are to be integrated.

CE3.3 Identify the events included in the script to distinguish interactions with the user.

CE3.4 Describe the operating logic of the script by identifying the programming structures and the data with which it operates.

CE3.5 In a convenient, well-characterized scenario of integration of scripts already developed on a Web page, to add specific functionalities according to the specifications received:

-Download the already developed component.

-Modify the properties and attributes of the objects that make up the 'script' to fit the received specifications, using a 'script' editing tool.

-Check the availability of use of the script taking into account the copyright and applicable regulations.

-Integrate the script to the previously indicated Web page.

-Test the functionality of the resulting page using a browser.

-Correct the detected errors.

-Document the processes performed.

C4: Apply test and component integration verification techniques on the Web page to check functionality and usability parameters, according to received specifications.

CE4.1 Identify the phases involved in verifying component integration on pages.

CE4.2 Classify the different types of files to be integrated into the page, verifying the installation of the corresponding 'plug-in' in the Web browser.

CE4.3 In a practical, well-characterized case of verifying the integration of scripts already developed on Web pages to test their functionality:

-Select multiple browsers.

-Define test environments.

-Identify the parameters to be verified.

-Document the processes performed.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.7; C2 with respect to CE2.5 and CE2.6; C3 with respect to CE3.5; C4 with respect to CE4.3.

Other capabilities:

Maintain the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Interpret and execute work instructions.

Demonstrate stress resistance, mood stability and impulse control.

Contents:

1. 'script' language

Language features.

Script language relationship and markup language.

Script language syntax.

Script types: immediate, deferred, and hybrid.

Running a 'script'.

Development Tools, Utilization.

Debugging errors: syntax and execution errors.

Error messages.

2. Basic elements of the 'script' language

Variables and identifiers.

Data types.

Operators and expressions.

Control structures.

Functions.

Input/Output instructions.

3. Managing 'script' language objects

Object Hierarchy.

Properties and methods of the browser objects.

Properties and methods of the objects in the document.

Properties and methods of the form objects.

Properties and methods of language objects.

4. The 'script' language events

Using events.

Events on form items.

Mouse events.

Keyboard events.

Focus events.

Form Events.

Window events.

Other events.

5. Searching and parsing 'script'

Search for specialized sites.

Boolean operators.

Search techniques.

Search refinement techniques.

Reuse of scripts.

6. Data validations on Web pages

Validation functions.

Alphabetic, numeric, and date validations.

Verify forms.

7. Special effects on Web pages

Work with images: replacement images and multiple images.

Work with texts: aesthetic and movement effects.

Work with frames.

Work with Windows.

Other effects.

8. Testing and verifying on Web pages

Verification techniques.

Debug tools for different browsers.

Verifying script compatibility.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the integration of software components into Web pages, which will be credited using one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: PUBLISHING WEB PAGES

Level: 2

Code: MF0952_2

Associated with UC: Publish Web Pages

Duration: 90 hours

Assessment capabilities and criteria:

C1: Identify the resources available on the Web site and create the storage structure for publishing pages and their components.

CE1.1 Distinguished the security features and parameters of the file system of the Web site where the pages are to be published.

CE1.2 Classify possible commands and commands, to perform the generation or modification of the storage structure on the Web site according to instructions received.

CE1.3 In a practical scenario, creating the storage infrastructure of a Web server with access to a directory in which you have permission to create, modify, and remove items, and follow received specifications:

-Verify the directory access permissions.

-Create the elements of the storage structure according to the specifications received.

-Use the creation, modification, and removal commands of containers in the storage structure.

-Identify errors in creating and modifying elements in the storage system.

-Document the processes performed.

C2: Transfer the files to the publishing site, using the tools set according to specifications received.

CE2.1 Identify the functions and features of the tools used for file transfer, taking into account the functional specifications of the files.

CE2.2 Identify the commands and commands provided by the tool, to perform the transfer operations according to the specifications received.

CE2.3 Specify the possible settings of the transfer tool, to create the connection to the Web site according to received specifications.

CE2.4 In practical, properly characterized, scenarios for updating a Web site, using a transfer tool, according to received specifications:

-Add new pages and components to the Web site.

-Clear pages and components of the Web site.

-Update pages and components on the Web site.

-Document the tasks performed.

C3: Verify the transferred pages, taking into account quality criteria and 'usability' to ensure their functionality.

CE3.1 Identify the test environments to be used for verification based on the specifications received.

CE3.2 Verify the browser runtime components ('plug-ins ') for the reproduction of special contents on the Web page, according to the specifications received.

CE3.3 Classify the characteristics to be verified in the browsers used in the market, to ensure the compatibility of the pages with the same, according to established specifications.

CE3.4 In practical, properly characterized, practical assumptions for verifying the transferred pages, to ensure the functionality of the pages:

-Check that the aesthetic appearance of the pages meets the design and quality specifications set.

-Redirect the necessary links on the transferred pages.

-Identify potential hotspots in developed pages.

-Check that the links included in the pages meet the specifications.

-Document the processes performed.

C4: Expose pages developed in search engines and directories according to the prefixed availability criteria.

CE4.1 Identify and locate search engines and directories on the Internet to publish developed pages.

CE4.2 Identify and describe the descriptors that synthesize the content of the pages in order to be found by the search engines.

CE4.3 In practical scenarios, duly characterized, high the pages published in search engines to expose the information contained in them:

-Select the search engines.

-Include descriptors on pages made using the appropriate labels.

-Use an automatic publishing application to publish the pages made.

-Manually publish pages that cannot be published with an automatic procedure.

-periodically verify the functionality of the published page.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.3; C2 with respect to CE2.4; C3 with respect to CE3.4; C4 with respect to CE4.3.

Other capabilities:

Take Responsibility for the work that you develop and the fulfillment of the objectives.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Use time and effort to extend knowledge and supplemental information for use in your work.

Demonstrate creativity in the development of the work you do.

Demonstrate stress resistance, mood stability and impulse control.

Adapt to new situations or contexts.

Contents:

1. Security features in Web page publishing

Security on different file systems.

Access permissions.

Create, modify, and erase orders.

2. File Transfer Tools

Configuration parameters.

Connecting to remote systems.

Operations and Commands/Orders to transfer files.

Operations and Commands/Orders to update and remove files.

3. Publishing Web pages

Generic search engines.

Specialized search engines.

Descriptors: keywords and standardized 'metadata' systems.

Automated publishing applications.

Publishing procedures.

4. Testing and verifying Web pages in browsers

Verification techniques.

Debug tools for different browsers.

Browsers: Types and 'Plug-ins'.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the publication of web pages, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX VIII

Professional Qualification: Microcomputer Systems Assembly and Repair

Professional Family: Informatics and Communications

Level: 2

Code: IFC298_2

General Competition

Mount, repair and expand, equipment and components that form a microcomputer system, ensuring the quality of its operation and repairing detected hardware and software breakdowns.

Competition Units

UC0219_2: Install and configure base software on microcomputer systems

UC0953_2: Mount Microcomputer Equipment

UC0954_2: Repair and expand microcomputing equipment

Professional Environment

Professional Scope

Develops its professional activity in the area of computer support dedicated to the assembly and repair of microcomputer systems in entities of public or private nature, companies of any size, both self-employed or foreign, regardless of their legal form. It develops its activity depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located mainly in the services sector, in the subsector concerning the marketing, assembly and repair of equipment and services of technical assistance microinformatics or in any other productive sector that use computer systems for their management as part of the computer support.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Microcomputer equipment installers

Microcomputer Equipment Repairers

Microcomputer System Peripheral Repairers

Associated Training (450 hours)

Training Modules

MF0219_2: Installing and configuring operating systems (120 hours)

MF0953_2: Microcomputer equipment assembly (150 hours)

MF0954_2: Microcomputer equipment repair (180 hours)

COMPETITION UNIT 1: INSTALL AND CONFIGURE BASE SOFTWARE ON MICROCOMPUTER SYSTEMS

Level: 2

Code: UC0219_2

Professional Realizations and Realization Criteria:

RP 1: Perform operating system installation processes for use in microcomputer systems, following specifications received.

CR 1.1 The characteristics of the operating systems and the templates are classified, to decide the version to be installed and the type of installation, depending on the technical specifications received.

CR 1.2 Operating system installation requirements and templates are checked, to verify that there is sufficient resources and compatibility on the installation's target team, following the established procedure.

CR 1.3 The installation's target team prepares to locate the operating system, enabling the infrastructure on the mass storage devices, as well as the necessary connections, according to the technical specifications received.

CR 1.4 The operating system is installed by applying the processes indicated in the installation manuals that accompany it, using an image, in its case, to obtain a computer equipment in a functional state, following the established procedure.

CR 1.5 The operating system is configured for operation, within the specified parameters, following the established procedures and as indicated in the technical documentation.

CR 1.6 The utilities included in the operating system are installed for use, according to the technical specifications received.

CR 1.7 Programs running on servers for later publishing are installed, according to the technical specifications received.

CR 1.8 Installation verification is performed to check the functionality of the operating system, by starting and stopping testing, and performance analysis, following established procedures.

CR 1.9 The documentation of the processes performed is made and archived for later use, following the internal models established by the organization.

RP 2: Update the operating system to ensure its operation, following technical specifications received and organization procedures.

CR 2.1 Base software versions, system add-ons, and device drivers are checked to ensure their suitability, following the established procedure.

CR 2.2 The outdated versions of the base software, system add-ons, and device drivers are identified to proceed to update and ensure their functionality, following established technical specifications and procedures.

CR 2.3 Add-ons and 'patches' for the operation of the base software are installed and configured, indicating the system administrator to maintain security on the system, in accordance with established procedures.

CR 2.4 Update verification is performed, to test the functionality of the operating system by starting and stopping tests, and performance analysis, according to established procedures.

CR 2.5 The documentation of the processes performed is elaborated and archived for later use, according to the rules established by the organization.

RP 3: Explain the functionality of the microcomputer system through the use of base software and standard applications, taking into account the needs of use.

CR 3.1 The functions and applications provided by the base software are identified for use, in accordance with the instructions in the technical documentation and usage needs.

CR 3.2 File system operations are performed using the interface provided by the operating system, following technical specifications and according to usage needs.

CR 3.3 The configuration tools provided by the operating system are run to select options from the workbench, according to received specifications and usage needs.

CR 3.4 Application execution processes are performed, to exploit the functions of each of them according to operational and functional needs.

CR 3.5 The messages provided by the base software are interpreted, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications given by the organization.

CR 3.6 The procedures for the use and management by users of the peripherals connected to the microcomputer system are performed to exploit their functionalities, following the technical documentation and procedures stipulated by the organization.

Professional Context:

Production media:

Computer equipment. Peripherals. Operating systems. Utilities and applications built into operating systems. Update versions of operating systems. Disk cloning tools. Technical documentation associated with the operating systems. Utilities not incorporated into the operating system. Mass storage devices.

Products and results:

Computer equipment with installed and configured operating systems. Operating systems configured and operating. Logically organized computer equipment. Updated operating systems. Published applications available.

Information used or generated:

Manuals and technical documentation of operating systems. Operating system upgrade manuals. Manuals for applications included in the operating system and those published. Operating system installation, configuration, and upgrade reports. Safety and quality plan of the organization. Incident management applications.

COMPETITION UNIT 2: MOUNT MICROCOMPUTER EQUIPMENT

Level: 2

Code: UC0953_2

Professional Realizations and Realization Criteria:

RP 1: Mount the hardware components that make up a microcomputer team according to established specifications, according to needs for use and in security conditions.

CR 1.1 The capabilities and characteristics of the hardware components are identified in the face of their inclusion in the microcomputer equipment assembly.

CR 1.2 The mounting specifications received are interpreted, in order to identify the components to be assembled, in consultation with the specific technical documentation.

CR 1.3 The reception of equipment and components is carried out through the procedures of documentation, labeling, recording, storage and handling established, ensuring their locations in the appropriate environmental and safety conditions according to the established standards.

CR 1.4 The components are assembled using the appropriate tools and tools, ensuring connections between them and verifying the attachment, following the procedures established by the organization, the manufacturer's installation recommendations, and the measures and elements for the prevention of occupational risks.

CR 1.5 Disposable packaging, waste and components are treated in accordance with applicable environmental regulations, thus ensuring safety and hygiene at work.

CR 1.6 The identification and labeling of each of the components that make up the assembled equipment, and of the entire assembly, is made using the established external and internal documentation systems.

CR 1.7 The result of the assembly and assembly procedures of the equipment, as well as the detected incidents, are documented, for later use, following the internal models established by the organization.

RP 2: Verify the assembly of components, to ensure the functionality of the microcomputer system, according to the specifications established and according to the security conditions.

CR 2.1 The process of verification of the assembled components is carried out in accordance with the guidelines established by the organization, standard standards and regulations applicable to both electrotechnical and safety aspects and the prevention of occupational risks.

CR 2.2 The integration of the assembled components into the computer equipment is performed in the BIOS (Basic Input-Output System, basic input-output system) to obtain the maximum performance of the equipment, according to the established procedure.

CR 2.3 The operating system is configured according to the specifications received, to verify that the components that use drivers are recognized and do not cause conflicts.

CR 2.4 The assembly of the equipment is verified to ensure that the components are recognized and enabled by checking the messages of the POST (Power-On Self Test, automatic ignition test) and the operating system according to technical specifications and following the established procedure.

CR 2.5 The components, both firmware and hardware, are adjusted to ensure the operation of the equipment, according to the specifications received.

CR 2.6 The stability and safety tests of the equipment are performed to verify their functionality according to the recommendations of the manufacturers, own company, industrial standards and applicable regulations.

CR 2.7 The measurement software is used to perform performance tests and evaluate and compare the characteristics of the equipment according to the established procedures.

CR 2.8 The work done as well as the incidents detected during the verification are documented for later use, following the internal models established by the organization deriving the incidences to the corresponding service.

RP 3: Install and configure the peripherals of the microcomputer equipment, for operation, according to established specifications, according to the needs of use and in conditions of safety.

CR 3.1 The reception and verification of the peripheral devices, their storage and handling, are carried out in the appropriate environmental and safety conditions, following the established procedure.

CR 3.2 The peripheral devices, device drivers and wiring wiring to be installed are verified, to ensure compatibility and agreement with the specifications received, following established procedures.

CR 3.3 The peripheral devices are installed using the specific tools, ensuring their connection with the computer equipment, electrical supply, stability, ergonomics and labelling among others, and applying safety, quality and efficiency criteria, according to established procedures.

CR 3.4 The configuration of each peripheral for the operation is performed according to the instructions of the associated technical documentation and the specifications of the installation.

CR 3.5 The device drivers and software utilities associated with the peripheral, if necessary, are installed and configured to ensure their operation as a component of the system, following technical specifications.

CR 3.6 Comprehensive tests to verify the functioning of the installed peripherals are performed according to established procedures.

CR 3.7 The work done, as well as the incidents detected during installation and configuration are documented, for later use, following internal models established by the organization.

Professional Context:

Production media:

Personal protection and safety features (insulating glasses and gloves, among others). Equipment protection elements (extinguishers, emergency ventilation, among others). Tools and tools for common use in electrical/electronic maintenance. Specific measurement and diagnostic tools for assembly. Computer components: chassis, plates, power supplies, cards, media and memory, among others. Peripherals: monitors, printers, scanners, reader and backup tapes, among others. Interconnection elements. Seats with special equipment for assembly. Computer equipment. Installation and diagnostic software. Operating systems installed on removable media ready for execution. Documentation software tools. Cloning tools. Installation tools for unattended and networked operating systems.

Products and results:

Computer equipment assembled and verified. Documented equipment. Recording and storing of the elements used for the assembly.

Information used or generated:

Albaranes and equipment reception documentation. Calibration documentation for measuring equipment. Rules on guarantees (coverages as per cases). Testing and control of samples according to sampling rules. Specifications for the assembly of computer equipment and peripheral devices. Rules on the labelling and serialisation of components. Installation manuals and technical information of the equipment and/or components. Base software manuals. Specific software manuals. Product catalogues, suppliers, prices. Manufacturer's assembly recommendations. Manufacturer's technical support. Parts of work. Incident and historical parts of mount incidents. Technical and performance documentation of the equipment. Installation and commissioning guide for the equipment. Safety and hygiene regulations. Applicable national electrotechnical regulations. Applicable international standards and standards (ISO, EIA, IEEE, among others). Internal regulations of the organization. Standards for the protection against electrostatic discharges (ESD). Performance reports. Reports of mounting incidents, cataloged and controlled. Mounting documentation (processes, schemas, component memory, among others) cataloged, stored, and controlled. Documentation of the installation and commissioning of the equipment for the clients. Applicable legislation on safety and hygiene, data protection, intellectual property and environmental protection. Internal rules of the company.

COMPETITION UNIT 3: REPAIR AND EXTEND MICROCOMPUTER EQUIPMENT

Level: 2

Code: UC0954_2

Professional Realizations and Realization Criteria:

RP 1: Solving breakdowns in microcomputer equipment, repairing or replacing broken hardware components, following the procedures established by the organization.

CR 1.1 The cause of the anomalous behavior is established by performing functional tests and describes in the incidence part the characteristics of the same (physical or logical nature), valuing the possibility of repair or replacement depending on the economic costs of the same.

CR 1.2 The diagnostic hardware tools are used to detect faults in the components of the microcomputer system when the equipment is not powered on, according to established technical specifications.

CR 1.3 The diagnostic software tools are used to determine intermittent failures or problems in the operation of the system, according to established procedure.

CR 1.4 The performance of safeguard copies is performed prior to the repair or replacement of the components to ensure the integrity of the system, according to the specifications received.

CR 1.5 The affected software components are configured with the indicated parameters, for operation, according to the technical specifications received.

CR 1.6 The broken hardware components are repaired using specific tools and devices, ensuring connections and fastening, making the cables necessary to make the connections, following the procedures established by the organization and applying criteria of functionality, quality, safety and efficiency.

CR 1.7 The breakdowns that have not been diagnosed, are reported at the level of responsibility for their management, following the protocols and procedures of the organization.

CR 1.8 Disposable packaging, waste and components are treated in accordance with applicable environmental regulations, thus ensuring safety and hygiene at work.

CR 1.9 System start and stop tests are performed, to verify and ensure the operation of repaired or replaced equipment and components, following established procedures.

CR 1.10 The documentation on the management of the incidents produced is recorded for later use, following the internal models established by the organization.

RP 2: Expand microcomputer equipment to add new functionalities to the system, according to the specifications.

CR 2.1 The operations of updating components in microcomputer equipment for the extension of the same, are carried out by checking the possibilities of expansion and valuing the economic costs, following the established procedure.

CR 2.2 The performance of safeguard copies is performed prior to the installation of the components to ensure the integrity of the system, according to the specifications received.

CR 2.3 The compatibility of the new components is verified, to ensure the integrity of the equipment and data, by checking the operation of the updated equipment, following established technical specifications.

CR 2.4 The components are assembled using the specific tools and tools to ensure connections between them and verify the attachment, following the physical security regulations, the procedures established by the organization and the technical specifications of the manufacturer.

CR 2.5 The software associated with the update is configured to verify that the added components are recognized and do not cause conflicts, verifying and ensuring system operation by starting and stopping tests.

CR 2.6 The documentation on the extension and the incidents that may have occurred is recorded, for later use, following the internal models established by the organization.

RP 3: Repair software in microcomputer equipment, using specific software tools and following established procedures.

CR 3.1 The cause of the anomalous behavior is established by performing initial functional tests, to verify the symptoms in the breakdown part and to specify the characteristics of the problem, establishing the logical nature of the problem, following established procedures.

CR 3.2 Running processes are checked for excessive consumption of resources due to possible virus and malicious program attacks, following established technical specifications.

CR 3.3 The security and detection software (antivirus and antispies) is used, to diagnose and repair possible damage and loss of information produced by viruses and malicious programs, following the established procedure.

CR 3.4 The file system is verified using specific software tools, in order to maintain the integrity of the file, according to the technical specifications received.

CR 3.5 Files accidentally deleted or affected by any breakdown or incident are restored using recovery tools and following established procedures.

CR 3.6 The system is restored from images if necessary.

CR 3.7 The performance of backups is done prior to the repair of logical failures to ensure the integrity of the system, according to the specifications received.

CR 3.8 The affected applications are reconfigured for operation, following technical specifications received and in accordance with the established procedure.

CR 3.9 The documentation on the repair that has been performed as well as the detected incidents, are recorded for later use, following the internal models established by the organization.

CR 3.10 The breakdowns that have not been achieved are reported at the highest level of responsibility for their management, following the protocols and procedures of action established by the organization.

RP 4: Fix faults in printers and other peripheral devices using software and tuning tools, following the recommendations set by the manufacturers.

CR 4.1 The reception of the damaged peripherals is performed by the description of the breakdown produced, using standard documentation in order to establish the best possible procedure of action, in accordance with the regulations of the organization.

CR 4.2 The cause of the anomalous behavior is established by performing initial functional tests, and the characteristics and nature of the malfunction are described in the breakdown part, advising the possibility of repair with its own means or in other more specialized facilities, as indicated in the organization's performance protocols.

CR 4.3 The process of repairing and adjusting the components of the printers and other peripheral equipment is performed, in order to guarantee the operation of the device, following the guidelines established by the organization, standard standards and applicable legal regulations, both in electrotechnical aspects, as well as safety and prevention of occupational risks.

CR 4.4 The damaged components are replaced using specific tools, in order to enable all the functionalities of the device, taking into account the recommendations of the manufacturer, following the procedures established by the organization and applying criteria of functionality, ergonomics, quality, safety and efficiency.

CR 4.5 The functional tests of the repaired peripheral are performed to verify and ensure the operation thereof, following established procedures.

CR 4.6 The breakdowns that have not been achieved are reported to the level of responsibility for their management, following the protocols and procedures of the organization.

CR 4.7 The documentation of the repair performed, as well as of the incidents produced, is recorded for later use, following the protocols and procedures of action established by the organization.

Professional Context:

Production media:

Computer equipment. Protective elements (insulating footwear, goggles, gloves, static discharge, etc.). Tools and tools for common use in electrical/electronic maintenance. Computer components. Peripheral devices. Printers. Operating systems, drivers, utilities. Anti-virus and anti-spy software. Diagnostic hardware tools. Diagnostic software tools. Software maintenance software, under the appropriate or free license. Backup and cloning tools.

Products and results:

Computer equipment repaired. Extended computing equipment. Repaired and replaced printers and peripherals.

Information used or generated:

Specifications for mounting peripheral devices. Technical documentation associated with the elimination of viruses and malicious software. Technical documentation and performance of peripheral devices. Technical manuals for printers. Rules on the labelling and serialisation of components. Installation manuals and technical information of the peripheral devices. Base software manuals. Specific software manuals. Product catalogues, suppliers, prices.

Manufacturer assembly recommendations. Manufacturer's technical support associated with the devices. Parts of work. National electrotechnical regulations. Documentation associated with the extensions and repairs made. International standards and standards. Applicable legislation on safety and hygiene, data protection, intellectual property and environmental protection. Internal rules of the company.

TRAINING MODULE 1: INSTALLING AND CONFIGURING OPERATING SYSTEMS

Level: 2

Code: MF0219_2

Associated with UC: Install and configure base software on microcomputer systems

Duration: 120 hours

Assessment capabilities and criteria:

C1: Classify the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main architectures of microcomputer systems detailing the mission of each of its functional blocks.

CE1.2 Explain the concept of the operating system and identify the functions it performs in the microcomputer system.

CE1.3 Distinguished the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.

CE1.4 Classify operating systems and versions that are used in computer equipment detailing their main features and differences, according to technical specifications.

CE1.5 Identify the phases involved in the installation of the operating system by checking the requirements of the computer equipment to ensure the possibility of the installation.

C2: Apply installation and configuration processes for operating systems to activate the functionality of the computer equipment, according to specifications received.

CE2.1 In a practical, well-characterized scenario, installation of an operating system on a computer equipment for operation:

-Check that the computer equipment meets the requirements and has the necessary resources for the base software installation.

-Prepare the installation's target team by formatting and creating the indicated partitions.

-Install the operating system by following the steps in the technical documentation.

-Configure the system with the indicated parameters.

-Install the indicated utilities and verify the installation.

-Document the work done.

CE2.2 Identify the procedures that are used to automate the installation of operating systems on computer equipment of the same characteristics by using cloning software tools and other power-assisted installation tools.

CE2.3 In a practical, well-characterized scenario, installation of an operating system on computer equipment with the same characteristics:

-Prepare one of the computers to install the operating system and utilities.

-Install and configure the operating system and the indicated utilities.

-Select the software tool to perform the cloning of equipment and proceed to obtain the images of the installed system for later distribution.

-Implement, by means of disk image management tools, those obtained in multiple teams of equal characteristics to the original to enable them to activate their functional resources.

-Perform boot and stop tests to verify the installations.

-Document the work done.

C3: Update the operating system of a computer to include new features and solve security problems, based on technical specifications.

CE3.1 Identify the software components of an operating system capable of readjustment to perform your upgrade, taking into account your technical specifications.

CE3.2 Identify and classify the sources for obtaining update items to perform the operating system patch and update deployment processes.

CE3.3 Describe the procedures for updating the operating system taking into account the security and integrity of the information in the computer equipment.

CE3.4 In a practical, well-characterized scenario, updating an operating system for the incorporation of new features:

-Identify the components to be updated.

-Check software upgrade requirements.

-Update the specified components.

-Verify the processes performed and the absence of interferences with the other components of the system.

-Document the update processes.

C4: Use the applications that are provided by the operating systems, for the operation of the operating systems according to technical specifications.

CE4.1 Use the applications provided by the operating system describing its characteristics for the use and operation of the operating system, taking into account its technical specifications and functional needs.

CE4.2 Use the applications provided by the operating system for the disk organization and file system, according to the technical specifications received.

CE4.3 Use the accessibility options of the operating systems, to set up accessible environments for people with disabilities, according to technical and functional specifications.

CE4.4 Configure workbench options using the tools and applications provided by the operating system, following specifications received and usage needs.

CE4.5 Describe the applications provided by the operating system for the operation of the functionalities of the peripherals connected to the system, according to the needs of use.

CE4.6 Classify messages and warnings provided by the microcomputer system to discriminate its importance and criticality, and apply response procedures according to given instructions.

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.1 and CE2.3; C3 with respect to CE3.4.

Other capabilities:

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Maintain an assertive, empathetic and conciliatory attitude to others by demonstrating cordiality and kindness in the treatment.

Adapt to new situations or contexts.

Respect the organization's internal rules and procedures.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Computer architecture

Functional schema of a computer: subsystems.

The central processing unit and its elements: Internal memory, types and characteristics; input and output units; mass memory, types, and characteristics.

Buses: features and types.

Correspondence between the physical and logical subsystems of a computer.

2. Operating systems

Classification of operating systems.

Functions of an operating system.

Operating systems for microcomputer equipment: features and use.

Command Mode.

Graphic mode.

3. Installing operating systems

Procedures for installing operating systems.

Preparing the media: partitioned and formatted.

Installation types for an operating system: minimum, standard, and custom.

Device configurations.

Tools for disk cloning.

Upgrading of operating systems.

4. Operating system utilities

Features and functions.

Base software utilities: workbench configuration; file system administration and management; process and resource management; file management and editing.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation and configuration of the base software on microcomputer systems, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: MICROCOMPUTER EQUIPMENT ASSEMBLY

Level: 2

Code: MF0953_2

Associated with UC: Mounting Microcomputer Equipment

Duration: 150 hours

Assessment capabilities and criteria:

C1: Classify the components used in the assembly of the microcomputer equipment, identifying their functional parameters and characteristics, taking into account their technical specifications.

CE1.1 Identify the chassis formats that are used in the installation of computer equipment, indicating their features and functionality.

CE1.2 Describe the types of power supplies that are used for installation in microcomputer equipment, identifying their functional parameters and utilization, taking into account their technical specifications.

CE1.3 Classify motherboard types by identifying their features, connectivity, and usage recommendations, taking into account their technical specifications.

CE1.4 Describe the current processor types by detailing their functional parameters, usage recommendations, and their influence on the overall performance of the equipment.

CE1.5 Identify RAM types of memory, their features, technology, functional parameters, and usage recommendations to assess their influence on overall team performance.

CE1.6 Define mass storage systems, indicating their technology, connection mode, functional parameters, usage recommendations and their influence on the overall performance of the equipment, for use in the assembly of microcomputer equipment.

CE1.7 Describe the characteristics, functional parameters and influence, in the overall performance of the equipment, of the adapters that are used in the installation of microcomputer equipment for connection with other devices or with communications networks.

CE1.8 Define the characteristics of peripherals that connect to a microcomputer system detailing its particularities and more significant parameters.

CE1.9 In a practical, well-characterized case, of preparing the assembly of a microcomputer equipment:

-Find the features of components in distributors and manufacturers catalogs.

-Classify and select the components according to the characteristics established in the application, the established budget and the approval and guarantee thereof.

-Check the compatibility of the components.

-Prepare the assembly of the components to ensure the quality of the result.

C2: Install the elements that make up the microcomputer equipment, applying quality, efficiency and safety criteria, according to the technical specifications received.

CE2.1 Describe the characteristics of a microcomputer equipment assembly position and the tools and instruments needed to perform assembly and component installation processes.

CE2.2 Describe the procedures for the installation of microcomputer equipment according to its own technology and characteristics, taking into account the quality and safety criteria defined.

CE2.3 In a practical, well-characterized scenario, the assembly of a microcomputer equipment for use is performed:

-Identify each of the functional blocks that make up the computer and associate them with the components to assemble in the computer.

-Choose the components that will form the computer.

-Apply the established security measures.

-Interpret the technical documentation of the components to be assembled.

-Perform assembly and adjustment of components using necessary tools and tools.

-Perform documentation for all aspects of the mount phase by using established documents and templates.

C3: Verify the mounted microcomputer equipment and ensure its functionality, stability, security and performance, according to the given specifications.

CE3.1 Describe the specified test procedures to verify the functionality of the mount.

CE3.2 Identify and apply the initial configuration ('setup ') of the equipment to optimize its performance, according to the manufacturer's recommendations, technical characteristics and established requirements.

CE3.3 Identify the BIOS configuration parameters ('Basic Input/Output System ') associated with each of the components to be recognized by the assembled team.

CE3.4 Classify the BIOS messages to locate possible mismatches in the assembly of the components, taking into account the technical specifications of the components.

CE3.5 Describe and apply the types of software tests that are performed to verify the functionality of equipment using specific software and measurement to evaluate the capabilities.

CE3.6 In a practical, well-characterized case, verification of the installation of a microcomputer equipment to check its functionality, stability, security and performance:

-Run an operating system from a removable storage device.

-Check the POST and operating system messages and that the adapter and peripheral devices are recognized and enabled by the system, and do not present conflicts.

-Perform stop-start tests to ensure the operation of the equipment.

-Make the diagnosis of possible conflicts using software verification and diagnostic tools.

-Perform stability, security, and performance tests using the specific software tools.

-Perform installation and configuration documentation performed and results obtained using given formats and templates.

C4: Install peripherals, for operation, in the microcomputer equipment, according to given specifications.

CE4.1 Classify the types of peripheral devices, identifying their technical and functional characteristics, configuration parameters and usage recommendations, taking into account their technical specifications.

CE4.2 Identify requirements for performing installation procedures in terms of electrical power, wiring, physical connections, and environmental circumstances, as indicated in the technical documentation provided by the manufacturer.

CE4.3 Describe the procedures for installing the device drivers ('drivers ') and utilities necessary to exploit the functionalities of the peripheral, taking into account technical specifications of the device itself.

CE4.4 Classify the functional and operational tests that will be performed with the peripheral to ensure its operation, according to technical specifications.

CE4.5 In a practical, properly characterized, installation and connection of peripherals to the microcomputer system:

-Check that the required elements are available for installation: cabling and other physical elements, storage devices with the device drivers ('drivers '), and software utilities.

-Verify that in the microcomputer system resources are available to make the connection to the device, both as regards ports, connectors or bays, as well as in the availability of power plugs and other environmental requirements.

-Perform the installation of the device by applying the security and protection media specified by the regulations and using specific tools for each case.

-Configure the device driver ('driver ') on the operating system.

-Apply the functional and operational test procedures to the installed device.

-Document the processes performed and their results.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.9; C2 with respect to CE2.3; C3 with respect to CE3.6; C4 with respect to CE4.5.

Other capabilities:

Propose alternatives with the aim of improving results.

Interpret and execute the instructions you receive and take responsibility for the work you do, communicating effectively with the right person at any time.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Act quickly in problematic situations and not just wait.

Show at all times an attitude of respect towards colleagues, procedures and internal rules of the organization.

Contents:

1. Components of a microcomputer equipment

Components. OEM and RETAIL components.

Standard symbology of the components. Symbology of national and international approvals.

Components of computer equipment, types, features, and technologies: the chassis, power supply, motherboard, processor, memory, hard drives, devices, magnetic devices, permanent memories (flash), adapters, and peripherals-the keyboard, mouse, monitor, printers, document digitizers, and optical readers, among others.

2. Security regulations and recommendations in the assembly of computer equipment

Rules and regulations on ergonomics.

Regulations on the handling and storage of polluting, toxic and combustible products.

Rules for protection against electrostatic discharges.

3. Procedures for the assembly of microcomputer equipment

The assembly post: use, devices, tools, security.

The assembly outside of the chassis: checking for new devices and components.

A computer boot process: power-level startup, BIOS POST error signals.

The process of assembling a microcomputer equipment.

4. Verifying computer equipment

The equipment verification process.

Integrity and stability tests in extreme conditions.

Performance tests.

POST and operating system messages.

Setting up the BIOS.

Testing with diagnostic software.

Tests with operating systems on removable storage.

Hardware diagnostic tools.

Diagnostic and/or verification tools: diagnostic tools for operating systems.

5. Peripheral mounting

Procedures for mounting. Setting up peripherals.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the assembly of microcomputer equipment, which shall be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: MICROCOMPUTER EQUIPMENT REPAIR

Level: 2

Code: MF0954_2

Associated with UC: Repair and expand microcomputing equipment

Duration: 180 hours

Assessment capabilities and criteria:

C1: Describe the electrical, electronic and electromechanical components contained within the devices of microcomputer equipment capable of adjustment, calibration and production of faults to discriminate causes of production of incidents.

CE1.1 Identify the components of analog and digital electronics and their most characteristic applications, to associate the metrics and equipment of measurement necessary, to estimate the functionality of a device, according to its technical specifications.

CE1.2 Interpret the functional schemas of the circuits and components, and the symbology used, relating them to the actual elements for applying diagnostic and verification procedures to teams with functional incidences.

CE1.3 Identify the electrical, electronic, optical and electromechanical elements contained within the devices of a computer equipment capable of adjusting, calibration and/or repair, in order to perform the actions of repair or replacement, according to the information obtained by means of diagnostic processes and specifications received.

C2: Establish the cause of the breakdown of equipment and components of the microcomputer system, identifying its nature by using specified techniques and tools.

CE2.1 Describe the characteristics of a repair post of microcomputer equipment and tools and instruments to perform the tasks of detecting breakdowns with the required quality, efficiency and safety.

CE2.2 Describe the power, control and data signals of the connectors, buses and interfaces of the components of a computer equipment, indicating the procedure and the devices for the evaluation and estimation of its functional parameters, according to technical specifications of the device to be monitored.

CE2.3 Describe the process of disassembly of components, microcomputer equipment and peripherals to be able to perform the actions on the same.

CE2.4 Explain the typology and characteristics of the breakdowns in microcomputer equipment describing the general techniques and the specific means for their location in order to optimize the repair procedures.

CE2.5 Describe the characteristics of the hardware and software tools used for the diagnosis of faults in the microcomputer system, taking into account its technical specifications.

CE2.6 In a convenient, properly characterized, scenario of locating a fault to isolate the cause that produces and characterise it:

-Establish a first hypothesis based on the documentation provided and detect the critical points of the equipment and/or component by consulting the historical breakdowns and the maintenance statistics produced in this respect.

-Identify the symptoms and nature of the breakdown, characterizing it for the effects it produces and effect measurements on the test points established by the manufacturers or defined by the specified procedure.

-Locate the functional block or component responsible for the same fault and identify the security elements that need to be taken into account.

-Use diagnostic software tools if intermittent system and diagnostic hardware failures occur if the computer does not power on.

-Connect an emulator and perform comparative tests with multiple motherboards.

-Perform the documentation of the activities performed and the results obtained using the formats and templates indicated.

C3: Apply the procedures to perform the adjustment, repair and verification of the damaged elements, ensuring the operation of the equipment or component.

CE3.1 Describe the tools and equipment for the repair of faults of a microcomputer equipment according to the types of devices to be repaired, according to the technical specifications of the equipment.

CE3.2 Describe the components of devices of a microcomputer system capable of adjustment, repair and replacement for troubleshooting, depending on the types of devices to be repaired.

CE3.3 In a practical, duly characterized, case of repair of a fault produced in an element of the microcomputer system:

-Identify the component causing the breakdown and apply the specified security measures.

-Evaluate the replacement of the broken down component or the possibility of its repair, and set a budget, valuing repair costs, both parts and labor.

-Activate the mechanisms to ensure the integrity of the information and replace or repair the element (physical or logical) responsible for the breakdown.

-Replace or repair the element (physical or logical) responsible for the failure and perform the checks and adjustments specified in the software and configuration.

-Perform boot and stop tests to check the operation of the repaired item.

-Report the breakdown to a higher level if necessary and document the activities performed and the results obtained.

CE3.4 Make the confection of diverse computer wiring by pressing, 'crimping' or welding, of adapters, wrappers, connectors and latiguillos to cover specific needs of connection difficult to obtain commercially, making use of the appropriate tools and checking that the connectivity obtained corresponds to the theoretical schemes of the same.

C4: Apply the procedures for the extension of computer equipment, guaranteeing the operation of the equipment or component, according to specifications received.

CE4.1 Identify the characteristics of the components without documentation or lack of associated or updated software in order to perform the operations for the expansion of the equipment by interpreting the information of the manufacturer's labeling (codes, symbology) and the search and obtaining of information through the Internet taking into account the technical specifications of available.

CE4.2 In a practical, well-characterized scenario, evaluating the feasibility of an extension to add new functionality to the team:

-Identify prerequisites and requirements.

-Detect possible interactions with other team components.

-Evaluate the difficulty of obtaining the components.

-Estimate the increase in overall performance you get.

-Perform the necessary procedures to prevent loss of information.

-Estimate and document the economic cost of the upgrade.

CE4.3 In a practical, well-characterized scenario of expanding a computer team to increase its functional capabilities:

-Back up the hard disk data to ensure the integrity of the information.

-Identify the components to be updated.

-Apply the established security measures.

-Perform the extension, replacement, or upgrade of the specified components and install and configure the associated software.

-Perform both hardware and software checks and adjustments to verify the extension.

-Perform the documentation of the activities performed indicating the initial configuration of the equipment and configuration after the extension.

C5: Retrieve the functionality of the computer equipment by identifying and applying the logical breakdown repair procedures according to the specifications received.

CE5.1 Distinguished procedures that are used for resolution of logical breakdowns according to received specifications.

CE5.2 Identify processes that run on a computer to detect possible excessive memory and processor consumption.

CE5.3 Recognize the symptoms caused by the attack of viruses and malicious programs that can affect the computer equipment to proceed to its elimination using anti-virus and 'anti-spy' software according to established specifications.

CE5.4 Use data recovery tools to recover deleted files following received specifications.

CE5.5 In a convenient, properly characterized, practical scenario of repairing a computer with simulated logical breakdowns:

-Check the file system and the running processes.

-Check and remove the presence of virus and spyware using the software tools indicated.

-Reinstall and configure the affected software.

-Perform boot and stop tests to check the operation of the system.

-Report the breakdown to a higher level of responsibility, if necessary.

-Document the activities performed and the results obtained using the given formats and templates.

C6: Apply repair procedures for printers and other peripheral devices using specific tools, to put them into operation, following given specifications.

CE6.1 Identify the most widely used types of printers and peripherals on the market by distinguishing features between them, according to technical specifications.

CE6.2 Describe the functional blocks of each type of printer, as well as the operation of its components, according to technical specifications.

CE6.3 Recognize the malfunction of each type of printer to replace the failure causing parts, taking into account the characteristics of the fault and following the established procedure.

CE6.4 Identify consumables, their replacement types and procedures to detect and solve possible printer breakdowns, taking into account the technical characteristics of the printers.

CE6.5 Distinguished procedures that are used for troubleshooting on printers and other peripheral devices, depending on their technical specifications.

CE6.6 In a practical, duly characterized, practical case of repair of a printer or other peripheral device for operation, following technical specifications and given procedures:

-Perform the established tests to identify the cause of the failure.

-Identify the components causing the failure.

-Perform component repair or replacement, or report the breakdown to a higher level of responsibility, if necessary.

-Perform operational tests to verify its functionality.

-Document the activities performed and the results obtained using the formats and templates established.

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.6; C3 with respect to CE3.3; C4 with respect to CE4.2 and CE4.3; C5 with respect to CE5.5; C6 with respect to CE6.6.

Other capabilities:

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Treat the customer with courtesy, respect and discretion.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Demonstrate flexibility to understand changes.

Contents:

1. Electricity-Electronics applied to the repair of microcomputer equipment

Notions of electronics: concepts of voltage, current, strength and power; measurements of each magnitude; use of basic instrumentation: polymeter, oscilloscope and low frequency generator; analog and digital signals; analog components; logical functions and logical doors; printed circuits.

2. Operating the devices of a microcomputer system

Functional schemas of devices and peripherals in computer equipment. Electrical, electronic and electromechanical components that make up the devices, functions of each of them. Magnetic storage media: features, components, and functional schemas.

3. Computer equipment failures

Types of breakdowns in computer equipment: classification and characteristics; typical breakdowns of both logical and physical computer equipment.

Diagnosis and location of breakdowns in computer equipment: diagnostic techniques, measurement software, diagnosis and detection. Diagnostic software tools: types and features. Diagnostic hardware tools: types and features. Connectivity of computer equipment: a measure of signals from the interfaces, buses and connectors of the various components of a microcomputer system: power, control and data. The external and internal connection of the computer equipment: types of cables, types of connectors, meaning of the pins of the various interfaces and connectors of a computer equipment, techniques of making different wiring.

The repair of computer equipment: the repair station; the repair budget: cost of components, charging criteria: time, type of repair and type of component; the procedure of the repair.

4. Virus and computer antivirus

Computer virus: concept, means of propagation, evolution, effects. Precautions to avoid infection. Virus in post, in programs and in documents. Antivirus programs: concept and function. Active components of the antivirus. Activation and deactivation of the protections. Virus removal and data recovery. Updating the anti-virus patterns.

5. Extending a computing team

Updateable components in a computer hardware: logical and physical. The enlargement procedure: assessment of the need, compatibility of components, budget for the extension and assurance of information, among others. Typical extensions of logical and physical computing equipment.

6. Repairing printers and other peripheral devices

Printer types: more common brands and models, features, and differences. Operation and technical details of printers and other peripheral devices. Troubleshooting. Detection and solution of incidents in consumables. Preventive and corrective maintenance of printers.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the repair and extension of microcomputer equipment, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX IX

Professional Qualification: Departmental Network Operation

Professional Family: Informatics and Communications

Level: 2

Code: IFC299_2

General Competition

Perform procedures to ensure the connectivity offered by a departmental network, as well as access to the resources of the same, through the configuration and monitoring of the connection elements, the installation of the network software, the maintenance operation, the resolution of the detected problems or incidents, following established specifications.

Competition Units

UC0220_2: Install, configure, and verify local network elements according to established procedures

UC0955_2: Monitor local network communications processes

UC0956_2: Perform connection processes between private networks and public networks

Professional Environment

Professional Scope

Develops its professional activity in the IT department dedicated to the operation of networks, in entities of public or private nature, companies of medium or large size, both self-employed and foreign, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located mainly in the services sector, in the subsector of installation and maintenance of computer networks and in any other productive sector that for its size and organization need to have departmental networks.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Local network operators

Telematics Network Operations Technicians

Support personnel

Computer Teleassistance Operators

Associated Training (540 hours)

Training Modules

MF0220_2: Deployment of local network elements (210 hours)

MF0955_2: Local network monitoring (180 hours)

MF0956_2: Interconnection of private networks and public networks (150 hours)

COMPETITION UNIT 1: INSTALL, CONFIGURE, AND VERIFY LOCAL NETWORK ELEMENTS ACCORDING TO ESTABLISHED PROCEDURES

Level: 2

Code: UC0220_2

Professional Realizations and Realization Criteria:

RP 1: Install and configure local network nodes and software to implement internal communications services, following established procedures.

CR 1.1 The modules of the network equipment are installed to provide the specified connectivity characteristics according to the physical configuration indicated and following the established procedures.

CR 1.2 The 'firmware' version of the network equipment is installed or updated according to its desired features and functionalities.

CR 1.3 The installation and configuration processes of the local network devices are documented for registration using the formats indicated by the organization according to the established procedure.

RP 2: Perform the minimum network node configuration for further management, following established procedures.

CR 2.1 The network connection is determined and configured for network equipment management, based on the network topology.

CR 2.2 The operation of the management protocols (SNMP, Telnet, SSH, CDP, among others) required for remote management of the communications equipment is enabled and checked against the specifications of the project or the rules and procedures of the organization.

CR 2.3 The configuration done is documented using the formats indicated by the organization.

CR 2.4 The network node is prepared/embedded for transport if the equipment is to be referred to another site, taking care not to deteriorate during the same.

RP 3: Install the network node at its definitive location, allowing subsequent access to it according to organization specifications.

CR 3.1 The equipment is installed in the final frame according to the manufacturer's instructions and taking into account the environmental conditions of temperature and humidity.

CR 3.2 Electrical connections are performed according to the procedure established by the organization, taking into account the connection to independent circuits in the case of equipment with redundant power supply and verifying the grounding.

CR 3.3 Network node data connections are made following the organization's specifications and the device is accessible for remote management.

CR 3.4 The installation performed is documented indicating the interconnections made, following the rules or procedures of the organization.

RP 4: Configure the device to ensure its functionality in the network according to the procedures established by the organization.

CR 4.1 The protocols associated with the installed network applications are configured on the servers to support the services implemented according to the installation manuals and following the specifications received.

CR 4.2 The routers and switches are configured to manage protocols and services according to received specifications and predefined work procedures.

CR 4.3 The encryption software is installed and configured on network nodes to be determined according to the specifications received and procedures set to create virtual private networks.

CR 4.4 Functional tests of the configuration of the communications devices are performed to ensure conformity of the same with respect to the requirements set forth in the operational specification of the organization.

CR 4.5 The network node is included in the network infrastructure monitoring systems, including the collection of its characteristic operating parameters (managed frames, used bandwidth, errors/collisions, among others).

CR 4.6 The configuration operations performed are documented, following the procedures set by the organization.

RP 5: Manage the detected incidents on the network devices to correct or report them, based on the established protocols and the predefined procedures.

CR 5.1 Incident notification systems are observed to address potential alarms according to the operational and security procedures of the organization.

CR 5.2 The location of the element in which the incident occurred is performed by the interpretation of the information received and the technical documentation, to isolate the physical and logical problem, according to the technical documentation and the protocols of action of the organization to contingencies.

CR 5.3 The symptoms reported by the user or the incident management systems are verified to obtain a diagnosis of the problem according to the technical documentation.

CR 5.4 The detected and isolated incidence is diagnosed and its solution is proposed to rehabilitate disrupted or impaired services, according to quality standards and contingency plans.

CR 5.5 The incidence that has not been isolated is reported to the level of responsibility for its management according to the protocols and procedures of the organization's actions.

CR 5.6 The repair of the incident is performed with the appropriate tools and respecting the safety standards established by the organization.

CR 5.7 The documentation of the detection, diagnosis and solution of the incident is made to perform the registration of the same according to the protocols of the organization.

CR 5.8 Incident status information is transmitted to the end user to complete the process of its management according to the organization's regulations.

Professional Context:

Production media:

Network Parsers. Cabling certifiers. Manual tools for electrical and mechanical work. Software tools for connectivity testing. Software tools for network item inventory control. Computers, printers and peripherals. Operating systems. Hubs, switches, routers. Network cards. Cables and connectors. Network client software. Network management software. Software that owns the network devices. Office tools. Map of the network.

Products and results:

Communication equipment connected to the data lines. Local network installed and configured according to specifications. Inventory and descriptive record of physical network communications devices and their configuration.

Information used or generated:

Map of the network. Inventory of the organization's hardware. Work orders. Network documentation. Installation manuals for the devices. Device configuration manuals. Operational specifications of the organisation. Quality manual. Standards and quality criteria of the organisation. Safety plan. Maintenance plan. Applicable environmental legislation. Applicable regulations on safety and hygiene at work. Reliable and up to date network documentation.

COMPETITION UNIT 2: MONITORING LOCAL NETWORK COMMUNICATIONS PROCESSES

Level: 2

Code: UC0955_2

Professional Realizations and Realization Criteria:

RP 1: Monitor the local network in a way that allows the verification of the communications parameters within the established functional limits, to ensure the absence of network traffic congestion, according to network management procedures and quality control of the organization.

CR 1.1 Remote monitoring probes are installed and configured at the indicated network points to provide information to a centralized management platform, according to established procedures.

CR 1.2 Network software agents are installed on the nodes to be managed to provide information to a centralized management platform, according to established procedures.

CR 1.3 The activity log files of the different services are collected in order to maintain the storage and management resources under appropriate processing conditions, according to the organization's specifications.

CR 1.4 The network management tool interface and alarm and alert selection filters are configured to optimize the notification and incident management processes, according to the security procedures established in the organization.

RP 2: Apply the periodic and preventive maintenance processes of local network devices, in order to ensure communications services within the parameters collected in the organization's communications requirements.

CR 2.1 The network map is updated by launching team discovery tasks from the management platform, to provide a real image of the network, according to the specifications received.

CR 2.2 The devices of the network, both active and passive, are checked to observe possible deterioration or alterations according to established procedures.

CR 2.3 The detected deficiencies, located through inspection processes, are remedied by putting in place the necessary measures for their solution according to the established procedures and the quality and service standards of the organization.

CR 2.4 The causes of the anomalous behavior of the devices of the network are identified to proceed to their solution applying the established diagnostic methodology, using the hardware and software tools indicated and consulting the technical documentation according to the established procedures.

CR 2.5 The adequacy of network security and configuration to established policies and standards is verified by performing certain tests and using the tools indicated.

CR 2.6 Test results are collected and documented for registration, using the formats indicated by the organization according to the established procedure.

RP 3: Update the hardware and software components of the local network communications devices, to match your functionality to changes in technologies according to your organization's plans.

CR 3.1 The hardware of the communications equipment is partially or totally updated in order to adapt it to new functionalities, according to specifications received and following the established procedure.

CR 3.2 The communications equipment software is updated to adapt to new functionalities, according to specifications received and following the established procedure.

CR 3.3 Communication equipment configurations are modified to change functionality or adapt them to new equipment introduced, following the procedures set by the organization's plans.

CR 3.4 Updated hardware and software components are verified by testing, to ensure their functionality by following the procedures set by the organization's plans.

CR 3.5 The actions performed on the devices are documented to facilitate their monitoring using the formats indicated by the organization, according to the established procedure.

RP 4: Apply physical and logical security procedures concerning local network communications devices to ensure access to services to authorized users according to the organization's security rules.

CR 4.1 The notifications for security alerts are served to detect the occurrence of security incidents according to the specifications received.

CR 4.2 The communications devices are reviewed to ensure that their physical and logical access is controlled according to the given security specifications.

CR 4.3 The audit files of the communications devices are collected to detect any improper access following the indications of the security procedures.

CR 4.4 The 'network analysis' or any of its sections is carried out periodically or in the event of an incident to observe the network traffic using specialized equipment and tools, according to established security procedures.

CR 4.5 The actions performed are documented to facilitate their monitoring using the formats indicated by the organization, according to the established procedure.

Professional Context:

Production media:

Network Probes (sniffers). Cabling certifiers. Manual tools for electrical and mechanical work. Diagnostic tools. Software tools for connectivity testing. Network equipment inventory software tools. Computers, printers and peripherals. Operating systems. Hubs, switches and routers. Network cards. Cables and connectors. Network client software. Network management software. Network monitoring software. Remote monitoring probes (RMON). Software that owns the network devices. Office tools. Audit tools. Map of the network. Coverage monitoring tools in wireless networks.

Products and results:

Local monitored network. Map of the updated network. Updated inventory and descriptive record of physical network communications devices, their configuration, and the tests performed.

Information used or generated:

Map of the network. Hardware and network configuration inventory. Work orders. Network documentation. Installation manuals for the devices. Device configuration manuals. Operational specifications of the organisation. Quality manual. Maintenance plan. Safety plan. Regulations applicable in the field of environmental and safety and hygiene at work. Reliable and up to date network documentation.

COMPETITION UNIT 3: PERFORM THE CONNECTION PROCESSES BETWEEN PRIVATE NETWORKS AND PUBLIC NETWORKS

Level: 2

Code: UC0956_2

Professional Realizations and Realization Criteria:

RP 1: Install the public and private network interconnect nodes to enable communication between the two, according to the organization's indications.

CR 1.1 The requirements for the implementation of the device, as well as the lines of communication with its corresponding interfaces, are checked for compliance with the conditions of compatibility according to the technical documentation of the same.

CR 1.2 The interfaces and adaptation modules of the communication lines are installed and verified to proceed to their subsequent connection according to the requirements of the implementation of the communications device.

CR 1.3 The device is installed and checked for the parameters corresponding to electrical power, mechanical fastening and other, to ensure the delivery of the communications service, according to the specifications received.

CR 1.4 The connections between the communications lines and the device are made to ensure communication between the public and private network, according to the technical specifications and the indications that are related in the work order.

CR 1.5 The installation work done is documented to address the technical and administrative needs of the organization according to the protocols specified.

RP 2: Configure communications protocols on network interconnect devices to ensure connectivity between the public and private network, according to the organization's specifications.

CR 2.1 The configuration of the active communications equipment is created and modified to enable the coexistence and/or interconnection of virtual local networks through public networks.

CR 2.2 The physical and logical configuration of external network connection routers is checked, using the appropriate tools to find out whether they are ready for connection or are missing some hardware or software components, according to established procedures.

CR 2.3 The external interfaces of the routers are configured to provide connectivity with the exterior as directed by the communications operator.

CR 2.4 The interconnection devices are verified by testing the services to ensure their functionality, according to the quality criteria and the organization's communications plan.

CR 2.5 The tasks performed are documented to cover the registration needs, according to the protocols of the organization.

RP 3: Maintain network interconnect devices to ensure service continuity, according to the organization's communications plan.

CR 3.1 Communications services are periodically checked to verify their continuity and performance, using network management tools according to technical specifications and quality criteria of the organization.

CR 3.2 Alert and alarm systems are periodically checked to ensure the delivery of communications services, according to the organization's communications plan.

CR 3.3 The connectivity of devices with other networks is checked by performing functional tests to verify the functionality of the devices, according to the procedures set out in the organization's operational specification.

CR 3.4 The tasks performed on the interconnect devices are documented to cover the registration needs according to the protocols of the organization.

RP 4: Understand and manage incidents and alerts on the connectivity elements of the private network, to maintain the connection to the public network according to the organization's specifications.

CR 4.1 Request for resolution of detected incidents and alerts is collected or redirected to the User Care Center, according to established procedures, to be aware of them and to be able to carry out their monitoring, study and analysis.

CR 4.2 The symptoms listed in the incident and alert part are checked by performing initial tests to diagnose and locate the nature of the same by using the appropriate troubleshooting guide according to the established procedure.

CR 4.3 The diagnosis and localization of the incident and alert and its resolution is performed to maintain the connection using the corresponding troubleshooting guide.

CR 4.4 The addressed incidents and alerts are completed and closed in the incident management applications, so that the resolution flow continues and the user is notified in accordance with the established procedures.

CR 4.5 The end of incident or alert report is performed in the normalized format, collecting enough information to update the incident history.

Professional Context:

Production media:

Active network assets. Wiring analyzers. Network management tools. Communications public line control tools. 'Sniffers'. Manual tools for electrical and mechanical work. Software tools for connectivity testing. Office tools. Diagnostic tools. 'firmware' updates. Incident management applications. Map of the private network.

Products and results:

routers, switches, and bridges installed correctly according to specifications. Incidents solved. Alerts generated by managed and managed network monitoring systems. Elements of interconnection of public and private networks maintained and operational.

Information used or generated:

Work Orders. Parts of Incidents. Troubleshooting guides. Historical incident reports. Quality standards and criteria defined by the organisation. Technical reports on putting into service.

TRAINING MODULE 1: DEPLOYING LOCAL NETWORK ELEMENTS

Level: 2

Code: MF0220_2

Associated with UC: Install, configure, and verify local network elements according to established procedures

Duration: 210 hours

Assessment capabilities and criteria:

C1: Classify the communications elements that make up a local network, to identify the components that make up the physical map.

CE1.1 Explain the topologies of a local network taking into account existing architectures and technologies.

CE1.2 List the elements that can be found on the physical map of a local network based on the scope and network infrastructures used.

CE1.3 Describe each of the elements of a local network, taking into account its associated features and functionalities.

CE1.4 In a scenario of classifying communications elements from a local network already installed:

-Develop your physical map according to received specifications.

-Develop your logical map according to received specifications.

CE1.5 Identify the applicable regulations and technical regulations affecting the implementation of local networks according to the procedures given.

C2: Apply the installation and configuration procedures for local network nodes, as well as protocol managers and other programs that support communications services.

CE2.1 List and explain the characteristics of the protocols that are configured in a local network taking into account the technology and standards used.

CE2.2 Explain the node routing system that is used in the local network based on the network technologies used.

CE2.3 In a scenario of installing and configuring the nodes in a network to implement internal communications services, according to received specifications:

-Identify the different network sockets of the nodes and their representation in the connection cabinet, interpreting the technical documentation.

-Select the appropriate tools to perform the installation.

-Install the network adapters along with their corresponding controllers.

-Install and configure the network protocols to use according to the specifications received.

-Install and configure the various network services according to the specifications received.

-Document the activities carried out, including all relevant aspects.

CE2.4 Apply the specified configuration to the active elements (switches and routers), making use of specified procedures.

CE2.5 Identify the applicable regulations and technical regulations affecting the implementation of local networks according to given specifications.

C3: Apply test and verification procedures for network connectivity elements and tools for these processes.

CE3.1 Explain the stages of a connectivity verification process on a local network.

CE3.2 List the tools used to verify connectivity in a local network, according to technologies implemented in local networks.

CE3.3 Explain the operational operation of network management tools to check the status of communications devices, taking into account the technical specifications of the tools.

CE3.4 In a convenient connection verification scenario on a local network already installed, and from given procedures:

-Verify the allowed and prohibited connection options.

-Verify access to shared resources, following given procedures.

-Document the test and verification processes performed, according to technical specifications.

C4: Set the configuration of the parameters of the communications protocols on the nodes of the network, for integration into the network itself, following given procedures.

CE4.1 Identify the parameters of the communications protocols to be configured, their function, and their range of allowed values.

CE4.2 Interpret the specifications of a particular communication protocol configuration, taking into account the needs of node integration in the network and the implementation of the corresponding services.

CE4.3 List the procedure to follow to apply a default configuration to a network node.

CE4.4 In a practical simulation, configure the different communication protocols according to given technical specifications.

CE4.5 Identify the configuration parameters of the protocols with transmission and encryption security features, for integration into secure networks taking into account the security criteria given.

CE4.6 Document the processes to be performed in the configuration of the protocols on the nodes of the local network according to given specifications.

C5: Understand the incidents of the communications elements of the local network, and proceed to your solution according to given specifications.

CE5.1 Describe the incidents that occur in the communications elements of the local networks, according to the communications technologies employed and the elements involved with them.

CE5.2 List the procedures and tools used for the detection of incidents of the communications elements of the local network, according to specifications of a defined contingency plan.

CE5.3 Describe the techniques and tools that are used to isolate and diagnose causes that have produced a reported incident on the network, as indicated in the contingency plan.

CE5.4 Explain the systematic incident resolution procedures of the communications elements of the local network, depending on the devices on which the incidents are detected.

CE5.5 In practical, properly characterized, simulated troubleshooting scenarios within a local network, according to specifications received and following a given procedure:

-Interpret the alarms generated by the incident detection system.

-Locate the element causing the incident.

-Resolve the incident by applying the preset procedures.

-Record the incident on the document set to the effect.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.3; C3 with respect to CE3.4; C5 with respect to CE5.5.

Other capabilities:

Take responsibility for the work you develop.

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Demonstrate some autonomy in the resolution of small contingencies related to its activity.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Local networks

Features.

Topologies.

Architectures.

Elements of a local network.

Physical and logical maps of a network.

Applicable regulations and technical regulations affecting the implementation of local networks.

2. Link-level protocols for a local network

Logical link control protocols.

Media access protocols: contention protocols, witness pass protocols, among others.

Physical addresses.

MAC Address.

3. Network-level protocols for a local network

IP network protocol.

Logical routing.

4. Verification and testing procedures for local network connectivity elements

Local network connectivity element verification tools.

Systematic verification and test procedures for local network connectivity elements.

5. Communications protocol configuration procedures on local network nodes

The characteristic parameters of the most common communications protocols.

Systematic procedures for configuring the most common communications protocols on local network nodes.

6. Detection and diagnosis of incidents in local networks

Diagnostic tools for communications devices in local networks.

Incident management processes in local networks.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation, configuration and verification of local network elements according to established procedures, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: MONITORING THE LOCAL NETWORK

Level: 2

Code: MF0955_2

Associated with UC: Monitor local network communications processes

Duration: 180 hours

Assessment capabilities and criteria:

C1: Describe local network monitoring techniques and procedures according to given specifications.

CE1.1 Identify the parameters that detect the performance of a local network, taking into account its architecture and support network technology.

CE1.2 List the hardware and software tools used in monitoring a local network taking into account its technical specifications.

CE1.3 Explain the operation of network management tools to obtain information about the traffic and performance of local network communications, according to technical specifications of the tools themselves.

CE1.4 Explain the process to be followed to monitor the traffic of a local network based on the topologies and network protocols implemented.

CE1.5 In a scenario of applying monitoring procedures from a local network already installed:

-Check network traffic using available hardware and software tools.

-Check the performance of local network communications, using the available tools.

-Configure the network management tool to select alarms and alerts to allow the monitored network.

C2: Identify anomalous behaviors of local network devices, and proceed to your attention and resolution by following given procedures.

CE2.1 Identify alarm notifications that report abnormal incidents and behaviors according to given preventive maintenance plans.

CE2.2 Describe the functions and properties of diagnostic and monitoring tools, used to isolate the cause of the incident according to the specifications of the tools themselves.

CE2.3 Describe the incident resolution procedures according to the preventive and periodic maintenance plan.

CE2.4 Describe the documentation procedures for corrective actions performed according to received specifications.

CE2.5 In a scenario of incident resolution, in a local network where simulated breakdowns have been characterized in the devices of the network, according to given procedures:

-Identify the symptoms of the failing operation.

-Characterize it according to the effects produced.

-Formulate a hypothesis of the possible cause of the dysfunction.

-Describe the intervention plan to resolve the failure.

-Apply the described plan and correct the detected malfunction.

-Document the activities performed.

C3: Describe and perform the hardware and software upgrade processes for communications devices to ensure their integrity and reliability.

CE3.1 List the upgradeable components of communications devices by describing their features.

CE3.2 Identify the compatibility parameters of the components to be updated to ensure effectiveness in processes according to technical specifications of these components.

CE3.3 Describe the steps to be followed for updating communications device software, detailing the actions taken at each step and the software tools used.

CE3.4 In a convenient, properly characterized, scenario of updating components from a given configuration:

-Perform component replacement on communications devices, adjusting the configuration to the specified.

-Perform the software upgrade of the communications devices, adjusting the configuration to the specified.

-Test the changes made, verifying their operation.

-Document the actions performed, justifying the adopted configuration.

C4: Identify security alerts collected using management tools or inspect installations.

CE4.1 Describe the functions of a network management tool according to the specifications, the tool itself, and the network architectures and technologies implemented.

CE4.2 List security alerts that may appear on a local network, describing their manifestations.

CE4.3 Describe the characteristics of the alerts given high in management tools and the limits set, to be displayed in those tools according to technical specifications of the tool.

CE4.4 Locate the component and cause that triggered a security alert in a management tool, observing that tool and the affected teams following defined procedures.

CE4.5 Describe the types of alarms and their severity that can be detected with a management tool, taking into account the information provided by the tool and contingency plans given.

CE4.6 In a practical, properly characterized, scenario of analysis of a network with some case of a simulated alert and based on an established security protocol:

-Describe the steps to follow according to the established protocol.

-Check that the communications devices are controlled.

-Atend to the possible security alerts according to the established protocol.

-Document the actions performed, using the given format.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.5; C3 with respect to CE3.4; C4 with respect to CE4.6.

Other capabilities:

Take responsibility for the work you develop.

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Demonstrate some autonomy in the resolution of small contingencies related to its activity.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Contents:

1. Management and control in communications protocols

Factors that determine the performance of a local network.

Metrics.

Measurement Tools.

Management protocols.

2. Local network communication protocol analysis procedures

Protocol probes.

Application of filters for traffic capture.

Network-level traffic analysis.

Remote monitoring and intrusion detection probes.

3. Diagnostic procedures on local networks

Diagnostic tools, included in the operating system.

Specialized diagnostic tools: Logical probes and cabling analyzers. Network management tools.

4. Graphical design and documentation tools for networks

Types and functions of graphical design tools and documentation for local networks.

5. Managing local network security

Local network security factors.

Security procedures in local networks.

Remote monitoring and intrusion detection probes.

Alert and alarm notification tools in local networks.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the monitoring of the local network communications processes, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: INTERCONNECTING PRIVATE NETWORKS AND PUBLIC NETWORKS

Level: 2

Code: MF0956_2

Associated with UC: Perform connection processes between private networks and public networks

Duration: 150 hours

Assessment capabilities and criteria:

C1: Identify the characteristics of public and private network interconnection devices by standards of communications technologies.

CE1.1 Explain the characteristics of the devices of interconnection of private networks with public networks to identify their functionalities according to the technologies and communications architectures used.

CE1.2 List the technologies used in networking, describing their characteristics to identify the characteristics of the integration of communications technologies according to their technical specifications.

CE1.3 Identify connection services, as well as their interrelationship and how to implement them in local network equipment for the provision of communications services, according to the technologies used.

CE1.4 Identify the interconnection services supported by the communications service providers to which the private network connects, describing the profiles of the services offered to assess the adequacy of these services, taking into account the functional specifications to be addressed.

C2: Apply procedures for the installation and verification of the devices for the interconnection of private and public networks according to given specifications.

CE2.1 Identify the parameters that make up the interconnection services with the public network according to the technical characteristics of the service itself and the interconnection device.

CE2.2 Identify, in the quality standard in force, the requirements corresponding to the interconnection with the public network.

CE2.3 Describe the interfaces that are used in the connection of private networks to public networks according to the typology of the networks used (connection devices and communications lines, among others).

CE2.4 Explain the safety regulations applicable to the installation of a device for the interconnection of private and public networks according to the technical characteristics of the devices to be installed and the environmental conditions of the installation itself.

CE2.5 In a practical, well-characterized scenario, installation of a device for the interconnection of private and public networks to support communications services, following specifications given:

-Interpret the team's technical documentation to verify compliance with pre-installation requirements.

-Install and connect the required adaptation modules using tools and follow the instructions given in the relevant technical documentation.

-Perform tests to verify the functionality of the installed devices.

-Record the activities performed in the team documentation.

C3: Configure the protocols and interconnection parameters of the link devices between private and public networks, following specified instructions.

CE3.1 Identify the configuration and pipeline management parameters of virtual private networks, on the link devices according to given configuration specifications.

CE3.2 Classify, according to their functions, the protocols used in the interconnection devices between private and public networks and identify the services that will be supported by them.

CE3.3 Describe the procedures and tools used to implement configurations in private network interconnection devices with public networks, so that communications services can be supported.

CE3.4 Explain the function and values of each of the parameters involved in the configuration of a link device according to the technical specifications of the device.

CE3.5 In a scenario of setting up a configuration on a pipeline device to support communications services, following specifications received:

-Interpret the work order by selecting the configuration to be implemented.

-Load the selected configuration using the specified media.

-Verify that communication services between interconnected networks are enabled.

-Document the activities performed.

C4: Monitor and verify the operation of interconnection equipment with external networks using specific software tools.

CE4.1 Identify the functionalities and field of use of monitoring and monitoring tools and applications, depending on the characteristics of the interconnection equipment.

CE4.2 Explain the operating procedures of the monitoring tools according to the interconnection equipment to be monitored.

CE4.3 Select the monitoring tool based on the test to be performed and explain how to connect it according to given specifications.

CE4.4 Describe the monitoring procedures established to ensure the provision of services according to the operational specifications received.

CE4.5 In a scenario of monitoring interconnection equipment, according to specifications received and following instructions given:

-Select the monitoring tool.

-Connect the tool to the computer and configure it.

-Monitor equipment for traffic congestion and service failures.

-Compose a report with the activities performed and the results obtained.

C5: Resolve the detected incidents on the private and public network interconnection devices, following a given instructions.

CE5.1 Describe the incidents that occur in the devices for the interconnection of private networks with public communications networks, according to information received from notification tools or other means.

CE5.2 Identify the procedures and tools used for the detection of incidents, depending on the devices for the interconnection of private and public networks.

CE5.3 Describe the techniques and tools used to isolate and diagnose the causes that produce incidents, in devices for the interconnection of private and public networks according to given procedures and specifications.

CE5.4 Explain the systematic incident resolution procedures based on the specifications of given contingency plans.

CE5.5 In practical, properly characterized, case-resolution scenarios for interconnecting devices with simulated dysfunctions, according to specifications received and following instructions given:

-Interpret the alarms generated by the incident detection system.

-Locate the element causing the incident.

-Resolve the incident by applying the specified procedures.

-Record the incident on the specified documentation.

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.6; C3 for CE3.5; C4 for CE4.5; C5 for CE5.5.

Other capabilities:

Take responsibility for the work you develop.

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Demonstrate some autonomy in the resolution of small contingencies related to its activity.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Contents:

1. Networking

Architecture of a networking device.

Routing concepts: network segmentation, routing algorithms.

2. Network interconnect devices

The most common interfaces for networking.

Features of networking services.

3. Network interconnect protocols

TCP/IP protocol stack.

Virtual networks.

Security Mechanisms: masking and redirection of addresses.

Packet filtering.

Encryption.

Private networks.

4. Network interconnect device installation and testing procedures

Physical and electrical safety regulations applicable to network interconnect devices. Configuration load procedures on network interconnect devices.

5. Monitoring procedures on network interconnect devices

Monitoring tools on networking devices.

Systematic monitoring procedures for network interconnection equipment.

6. Diagnostic procedures for breakdowns in network interconnect devices

Types of incidents in the pipeline of public and private networks.

Diagnostic and incident notification tools on network interconnect devices.

Incident Management Procedures.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the realization of the processes of connection between private networks and public networks, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX X

Professional Qualification: Computer Systems Operation

Professional Family: Informatics and Communications

Level: 2

Code: IFC300_2

General Competition

Apply procedures for the administration and configuration of the software and hardware of the computer system, guaranteeing its security, as well as solving the incidents that can occur in the normal operation of the same and monitoring its performances and consumption, following specifications received.

Competition Units

UC0219_2: Install and configure base software on microcomputer systems

UC0957_2: Maintain and regulate the physical subsystem on computer systems

UC0958_2: Run administration and maintenance procedures on the base and client application software

UC0959_2: Maintaining the security of physical and logical subsystems on computer systems

Professional Environment

Professional Scope

Develops its professional activity in the area of support and CAU (Center for User Care) dedicated to computer science in entities of public or private nature, companies of any size, both self-employed and foreign, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located mainly in the services sector, in the productive subsectors dedicated to the commercialization of computer equipment and services, to the technical assistance of computer science, in telecentres networks and in all those productive sectors that use computer systems for their management.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Computer support technicians

System operators (machine oriented)

Associated Training (540 hours)

Training Modules

MF0219_2: Installing and configuring operating systems (120 hours)

MF0957_2: Computer system physical subsystem maintenance (150 hours)

MF0958_2: Software system logical subsystem maintenance (150 hours)

MF0959_2: Security maintenance on computer systems (120 hours)

COMPETITION UNIT 1: INSTALL AND CONFIGURE BASE SOFTWARE ON MICROCOMPUTER SYSTEMS

Level: 2

Code: UC0219_2

Professional Realizations and Realization Criteria:

RP 1: Perform operating system installation processes for use in microcomputer systems, following specifications received.

CR 1.1 The characteristics of the operating systems and the templates are classified, to decide the version to be installed and the type of installation, depending on the technical specifications received.

CR 1.2 Operating system installation requirements and templates are checked, to verify that there is sufficient resources and compatibility on the installation's target team, following the established procedure.

CR 1.3 The installation's target team prepares to locate the operating system, enabling the infrastructure on the mass storage devices, as well as the necessary connections, according to the technical specifications received.

CR 1.4 The operating system is installed by applying the processes indicated in the installation manuals that accompany it, using an image, in its case, to obtain a computer equipment in a functional state, following the established procedure.

CR 1.5 The operating system is configured for operation, within the specified parameters, following the established procedures and as indicated in the technical documentation.

CR 1.6 The utilities included in the operating system are installed for use, according to the technical specifications received.

CR 1.7 Programs running on servers for later publishing are installed, according to the technical specifications received.

CR 1.8 Installation verification is performed to check the functionality of the operating system, by starting and stopping testing, and performance analysis, following established procedures.

CR 1.9 The documentation of the processes performed is made and archived for later use, following the internal models established by the organization.

RP 2: Update the operating system to ensure its operation, following technical specifications received and organization procedures.

CR 2.1 Base software versions, system add-ons, and device drivers are checked to ensure their suitability, following the established procedure.

CR 2.2 The outdated versions of the base software, system add-ons, and device drivers are identified to proceed to update and ensure their functionality, following established technical specifications and procedures.

CR 2.3 Add-ons and 'patches' for the operation of the base software are installed and configured, indicating the system administrator to maintain security on the system, in accordance with established procedures.

CR 2.4 Update verification is performed, to test the functionality of the operating system by starting and stopping tests, and performance analysis, according to established procedures.

CR 2.5 The documentation of the processes performed is elaborated and archived for later use, according to the rules established by the organization.

RP 3: Explain the functionality of the microcomputer system through the use of base software and standard applications, taking into account the needs of use.

CR 3.1 The functions and applications provided by the base software are identified for use, in accordance with the instructions in the technical documentation and usage needs.

CR 3.2 File system operations are performed using the interface provided by the operating system, following technical specifications and according to usage needs.

CR 3.3 The configuration tools provided by the operating system are run to select options from the workbench, according to received specifications and usage needs.

CR 3.4 Application execution processes are performed, to exploit the functions of each of them according to operational and functional needs.

CR 3.5 The messages provided by the base software are interpreted, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications given by the organization.

CR 3.6 The procedures for the use and management by users of the peripherals connected to the microcomputer system are performed to exploit their functionalities, following the technical documentation and procedures stipulated by the organization.

Professional Context:

Production media:

Computer equipment. Peripherals. Operating systems. Utilities and applications built into operating systems. Update versions of operating systems. Disk cloning tools. Technical documentation associated with the operating systems. Utilities not incorporated into the operating system. Mass storage devices.

Products and results:

Computer equipment with installed and configured operating systems. Operating systems configured and operating. Logically organized computer equipment. Updated operating systems. Published applications available.

Information used or generated:

Manuals and technical documentation of operating systems. Operating system upgrade manuals. Manuals for applications included in the operating system and those published. Operating system installation, configuration, and upgrade reports. Safety and quality plan of the organization. Incident management applications.

COMPETITION UNIT 2: MAINTAIN AND REGULATE THE PHYSICAL SUBSYSTEM ON COMPUTER SYSTEMS

Level: 2

Code: UC0957_2

Professional Realizations and Realization Criteria:

RP 1: Check status and maintain physical device connections for use, following established procedures.

CR 1.1 The verification and verification tasks to ensure the connection of physical devices and the network are performed according to established procedures or according to the system administrator and always under security conditions.

CR 1.2 The physical devices that are damaged, malfunction or underperforming are updated or replaced by the same or similar components that perform the same function and ensure their compatibility in the system to maintain the same function, according to established procedures.

CR 1.3 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

RP 2: Review and secure the fungible elements for the operation of the computer system according to established specifications and usage needs.

CR 2.1 The fungible elements are checked, to ensure their compatibility and functionality using tools and techniques, according to established procedures and under sufficient security conditions.

CR 2.2 Depleted, deteriorated or unserviceable fungible elements are replaced by other identical or similar elements that perform their same function and ensure compatibility with the system devices according to the established procedure, manufacturer's standards and under conditions of safety in the handling of the consumable material.

CR 2.3 The operation of the computer system, with the fungible elements installed, is checked to ensure its operability, according to the established procedure.

CR 2.4 The procedures for recycling and reuse of consumable materials are applied, in order to achieve environmental and economic objectives, according to environmental organization and specifications.

CR 2.5 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

RP 3: Monitor the performance of the physical subsystem by reporting detected incidents according to established specifications.

CR 3.1 The monitoring tools are checked, to verify their operation, according to the procedures established by the organization.

CR 3.2 The operation of the physical devices of the system is checked for possible anomalies, using the monitoring tools and following the procedures established by the organization.

CR 3.3 Measurement programs are run, to check the performance of physical devices, according to established procedures and usage needs.

CR 3.4 The monitored alarms and events are documented and their registration is archived, for later use, according to established procedures.

CR 3.5 The corrective actions established to respond to certain alarms and incidents are carried out according to established procedures.

CR 3.6 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

RP 4: Control and review physical subsystem inventories to ensure their validity according to established procedures.

CR 4.1 The inventories of the physical components of the system are checked, to ensure their validity, according to the rules of the organization.

CR 4.2 The changes detected in the characteristics, configuration, or situation of physical components are documented according to established procedures, to maintain the updated inventory.

CR 4.3 Incidents detected on broken components, unauthorized configuration changes, unauthorized installation of components, or improper uses thereof are documented and archived for later use according to established procedures.

Professional Context:

Production media:

Computer equipment: components, peripherals, wiring and equipment for portable equipment, among others. Mid-range ('minis ') and large ('mainframes') teams. Assembly and measurement equipment: assembly and disassembly tools, voltage meters, wiring tools. Fungible material for the operation of the system. Operating systems. Automatic inventorying software. Office tools. Monitoring software. Diagnostic software. Administration tools. Connection to the network.

Products and results:

Revised and updated inventories of the physical subsystem. Physical subsystem connections checked. Proven fungible elements. Performance of the controlled system. A computer system configured to have connection to the network and in optimal physical performance.

Information used or generated:

Inventory of the computer system. Technical documentation of the physical devices of the system. Technical documentation of the system-based software. Operation manuals of the monitoring software. Operating manuals of the inventory software. Technical documentation of manufacturers of consumables. Technical documentation for the diagnosis of the system and peripheral devices. Network connection guides. Safety environmental standards and recommendations. Applicable regulations on safety and hygiene at work. Reports of physical device maintenance incidents. Reports of maintenance incidents of fungible elements. Performance reports for the performance of the physical subsystem.

COMPETITION UNIT 3: RUN ADMINISTRATION AND MAINTENANCE PROCEDURES ON THE BASE AND CLIENT APPLICATION SOFTWARE

Level: 2

Code: UC0958_2

Professional Realizations and Realization Criteria:

RP 1: Keep user applications up to date to ensure their operation, according to technical specifications and organization procedures.

CR 1.1 Application software is installed to support the functional needs of users at the system administrator's indication and according to established procedures.

CR 1.2 Application software updates are made to maintain and refresh system functionality, according to technical specifications of the organization's manufacturer and standards.

CR 1.3 Unused application software is uninstalled to prevent misuse of storage space, according to established procedures.

CR 1.4 The detected incidents are documented and recorded, if they are not, according to established procedures.

CR 1.5 The application software published in the central services is updated according to the established periodicity, user management and permissions are maintained and it is uninstalled when the organization decides to do without it.

CR 1.6 Diagnostic processes are performed on equipment where incidents have been detected using specific and remote management tools to solve or scale them in accordance with established procedures.

RP 2: Perform base software administration tasks to keep the computer system running, according to established procedures.

CR 2.1 The physical and logical maintenance and cleaning of information supports are carried out periodically, with the specific tools, to ensure their integrity and operation, according to established procedures.

CR 2.2 Administration tasks for the maintenance of the base and application software configuration on client computers are performed according to established procedures and usage needs.

CR 2.3 The peripherals connected to the client equipment are logically configured in the application software, for their exploitation, according to established procedures and technical specifications.

CR 2.4 The execution of administration tasks is performed using specific software tools that facilitate their execution, according to technical specifications and usage needs.

CR 2.5 The execution of scheduled administration tasks is checked, to ensure its functioning and periodicity, according to established procedures and needs of use.

CR 2.6 The execution of programs or scripts is performed, indicating the administrator, and according to established procedures, to carry out administrative tasks, documenting the result obtained.

CR 2.7 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

CR 2.8 The detected incidents are resolved or scaled, to proceed with their solution, according to established procedures.

RP 3: Monitor the performance of the base and application software, reporting the results obtained, according to established procedures.

CR 3.1 The monitoring tools are checked, to verify their operation, according to the procedures established by the organization.

CR 3.2 The monitoring tools are used to detect possible failures in the operation of the base and application software of the system, as well as the source system for the published applications, following procedures established by the organization.

CR 3.3 Software measurement programs are run on both the positions and the servers where the published applications are run, to check the performance of the processes, according to established procedures.

CR 3.4 The monitored alarms and events are documented and their registration is archived for later use, according to established procedures.

CR 3.5 The corrective actions established, to respond to certain alarms and incidents are carried out, according to established procedures.

CR 3.6 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

RP 4: Control and review software inventories to ensure their validity and update, as per specifications received.

CR 4.1 The inventories of the system's logical components are checked, to ensure their validity, according to the rules of the organization.

CR 4.2 The changes detected in the version, configuration, or situation of logical components are documented to keep the inventory up to date, according to established procedures.

CR 4.3 The identifiers of the logical components subject to copyright are checked, in order to maintain control over the installed licenses, according to the applicable regulations.

CR 4.4 The detected incidents about software malfunctions, unauthorized configuration changes, unauthorized installation of components, or improper uses thereof are documented for later use, according to established procedures.

Professional Context:

Production media:

Computer and peripheral equipment. Information media. Base software. Office-based applications. Application software. Monitoring software. Patches and updates. File compression software. Disk managers. Boot Managers. Administrative tools. Automatic inventorying software. Remote management tools. Workflow tools for the collaborative management of follow-ups and documentation. Internet connection (activations and updates) and/or the departmental network.

Products and results:

Revised and updated inventories of the logical subsystem. User applications up and running. A computer system with a functioning logical subsystem. Performance of the monitored base software.

Information used or generated:

Technical documentation for the physical devices on the system. Technical documentation of the system-based software. Logical subsystem inventories. Operation manuals of the monitoring software. Operating manuals of the inventory software. Organization chart of the organization. Safety and quality plan of the organization. Safety environmental standards and recommendations. Rules applicable in the field of data protection and confidentiality of information. Administrative tools manuals. Base and application software maintenance incident reports. Performance reports for the performance of the logical subsystem.

COMPETITION UNIT 4: KEEP PHYSICAL AND LOGICAL SUBSYSTEMS SECURE ON COMPUTER SYSTEMS

Level: 2

Code: UC0959_2

Professional Realizations and Realization Criteria:

RP 1: Back up, to ensure data integrity, according to established procedures and security plan.

CR 1.1 Backup is performed to protect system data, based on the periodicity, support, and procedure set forth in the system security plan.

CR 1.2 The backups are verified, to ensure the use of the same, according to the procedures set out in the system security plan.

CR 1.3 The storage of backups, to avoid information loss, is performed under the conditions and according to the procedure indicated in the system security plan and the recommendations of the manufacturer of the support.

CR 1.4 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

RP 2: Review the access to the computer system, to ensure the application of the established procedures and the security plan, reporting the detected anomalies.

CR 2.1 The monitoring tools, to plot the accesses and the system activity are checked to ensure their operation, according to the system security plan.

CR 2.2 User connection trace files and system activity files are collected to locate the existence of unwanted access or activities.

CR 2.3 The detected system access incidents are documented and recorded, in case they are not already registered, according to established procedures.

CR 2.4 The changes detected in the user access configuration to the system are documented, to keep the inventory up to date, according to established procedures.

RP 3: Check the operation of established security mechanisms by reporting detected anomalies to persons of higher liability.

CR 3.1 The access permissions of users to the system are checked, to ensure their validity, according to the system security plan.

CR 3.2 User security policies are checked, to ensure their validity, according to the system security plan.

CR 3.3 Anti-virus protection and malicious program systems are reviewed, in terms of their updating and functional configuration, to ensure the safety of the equipment, according to the procedures established by the organization.

CR 3.4 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

CR 3.5 Diagnostic processes are performed on equipment where incidents have been detected using specific and remote management tools to solve or scale them in accordance with established procedures.

RP 4: Verify that environmental and safety conditions are maintained according to established plans, reporting possible anomalies.

CR 4.1 The technical specifications of the devices are checked to ensure that manufacturers ' recommendations regarding environmental and safety conditions are met.

CR 4.2 The location of physical equipment and devices is reviewed to ensure that the safety, space, and ergonomics requirements set by the organization are met.

CR 4.3 The detected incidents are documented and recorded, in case they are not already registered, according to established procedures.

CR 4.4 The corrective actions established to solve certain detected incidents are performed according to established procedures.

Professional Context:

Production media:

Computer and peripheral equipment. Information media. Base software. Office-based applications. Monitoring software. Software for the realization of backups. Antivirus software. Patches and updates. File compression software. Disk managers. Boot Managers. Administrative tools. Security tools and devices.

Products and results:

System backups to prevent information loss. A computer system with a functioning logical subsystem. Computer system secured against access and unwanted actions. Computer system organized in environmental security conditions.

Information used or generated:

Technical documentation for the physical devices on the system. Technical documentation of the system-based software. Operation manuals of the monitoring software. Operation manuals for security devices and tools. Organization chart of the organization. Safety and quality plan of the organization. Safety environmental standards and recommendations. Rules applicable in the field of data protection and confidentiality of information. Administrative tools manuals. Incident reports for system accesses. Incident reports of system security mechanisms. Reports of backup incidents.

TRAINING MODULE 1: INSTALLING AND CONFIGURING OPERATING SYSTEMS

Level: 2

Code: MF0219_2

Associated with UC: Install and configure base software on microcomputer systems

Duration: 120 hours

Assessment capabilities and criteria:

C1: Classify the functions and features of the base software for the operation of a microcomputer system.

CE1.1 Describe the main architectures of microcomputer systems detailing the mission of each of its functional blocks.

CE1.2 Explain the concept of the operating system and identify the functions it performs in the microcomputer system.

CE1.3 Distinguished the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.

CE1.4 Classify operating systems and versions that are used in computer equipment detailing their main features and differences, according to technical specifications.

CE1.5 Identify the phases involved in the installation of the operating system by checking the requirements of the computer equipment to ensure the possibility of the installation.

C2: Apply installation and configuration processes for operating systems to activate the functionality of the computer equipment, according to specifications received.

CE2.1 In a practical, well-characterized scenario, installation of an operating system on a computer equipment for operation:

-Check that the computer equipment meets the requirements and has the necessary resources for the base software installation.

-Prepare the installation's target team by formatting and creating the indicated partitions.

-Install the operating system by following the steps in the technical documentation.

-Configure the system with the indicated parameters.

-Install the indicated utilities and verify the installation.

-Document the work done.

CE2.2 Identify the procedures that are used to automate the installation of operating systems on computer equipment of the same characteristics by using cloning software tools and other power-assisted installation tools.

CE2.3 In a practical, well-characterized scenario, installation of an operating system on computer equipment with the same characteristics:

-Prepare one of the computers to install the operating system and utilities.

-Install and configure the operating system and the indicated utilities.

-Select the software tool to perform the cloning of equipment and proceed to obtain the images of the installed system for later distribution.

-Implement, by means of disk image management tools, those obtained in multiple teams of equal characteristics to the original to enable them to activate their functional resources.

-Perform boot and stop tests to verify the installations.

-Document the work done.

C3: Update the operating system of a computer to include new features and solve security problems, based on technical specifications.

CE3.1 Identify the software components of an operating system capable of readjustment to perform your upgrade, taking into account your technical specifications.

CE3.2 Identify and classify the sources for obtaining update items to perform the operating system patch and update deployment processes.

CE3.3 Describe the procedures for updating the operating system taking into account the security and integrity of the information in the computer equipment.

CE3.4 In a practical, well-characterized scenario, updating an operating system for the incorporation of new features:

-Identify the components to be updated.

-Check software upgrade requirements.

-Update the specified components.

-Verify the processes performed and the absence of interferences with the other components of the system.

-Document the update processes.

C4: Use the applications that are provided by the operating systems, for the operation of the operating systems according to technical specifications.

CE4.1 Use the applications provided by the operating system describing its characteristics for the use and operation of the operating system, taking into account its technical specifications and functional needs.

CE4.2 Use the applications provided by the operating system for the disk organization and file system, according to the technical specifications received.

CE4.3 Use the accessibility options of the operating systems, to set up accessible environments for people with disabilities, according to technical and functional specifications.

CE4.4 Configure workbench options using the tools and applications provided by the operating system, following specifications received and usage needs.

CE4.5 Describe the applications provided by the operating system for the operation of the functionalities of the peripherals connected to the system, according to the needs of use.

CE4.6 Classify messages and warnings provided by the microcomputer system to discriminate its importance and criticality, and apply response procedures according to given instructions.

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.1 and CE2.3; C3 with respect to CE3.4.

Other capabilities:

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Maintain an assertive, empathetic and conciliatory attitude to others by demonstrating cordiality and kindness in the treatment.

Adapt to new situations or contexts.

Respect the organization's internal rules and procedures.

Adopt appropriate postural attitudes in the workbench.

Contents:

1. Computer architecture

Functional schema of a computer: subsystems.

The central processing unit and its elements: Internal memory, types and characteristics; input and output units; mass memory, types, and characteristics.

Buses: features and types.

Correspondence between the physical and logical subsystems of a computer.

2. Operating systems

Classification of operating systems.

Functions of an operating system.

Operating systems for microcomputer equipment: features and use.

Command Mode.

Graphic mode.

3. Installing operating systems

Procedures for installing operating systems.

Preparing the media: partitioned and formatted.

Installation types for an operating system: minimum, standard, and custom.

Device configurations.

Tools for disk cloning.

Upgrading of operating systems.

4. Operating system utilities

Features and functions.

Base software utilities: workbench configuration; file system administration and management; process and resource management; file management and editing.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation and configuration of the base software on microcomputer systems, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: MAINTAINING THE PHYSICAL SUBSYSTEM OF COMPUTER SYSTEMS

Level: 2

Code: MF0957_2

Associated with UC: Maintain and regulate the physical subsystem on computer systems

Duration: 150 hours

Assessment capabilities and criteria:

C1: Identify the physical components of the computer system detailing its connections and main performance and status indicators to obtain suitable operating parameters, according to established specifications.

CE1.1 Identify the types of physical components of the system by classifying them according to different criteria: functions and device types, among others.

CE1.2 Describe device connection technologies, expansion slots, and ports detailing the basic features to identify the capabilities of component interconnect with the system, according to technical specifications.

CE1.3 Describe the techniques and inventory tools used in the system to record physical components as well as changes in them according to the specified technical indications.

CE1.4 In a practical, well-characterized case of identification of the physical devices that form the system, to classify them and describe their functionality:

-Classify devices according to their typology and functionality.

-Recognize the indicators and the state of operation of the devices as indicated in the technical manual.

-Check the record of the devices in the inventory and record the detected changes.

-Relate physical devices to their respective connectors.

C2: Manipulate the types of consumable material by associating the same to the physical devices, to ensure their functionality, according to technical specifications.

CE2.1 Describe the types of devices that use fungible material as part of their operating operation to apply control and replacement procedures according to technical specifications.

CE2.2 Classifying the types of consumable material based on criteria of manufacturer, function, duration, material, degree of reuse and possibility of recycling among others to identify the characteristics of the same.

CE2.3 Identify tasks and maintenance issues for each type of consumable material according to technical specifications of the associated documentation.

CE2.4 Explain how to manipulate the types of consumable materials to ensure safety and hygiene at work according to the specifications indicated in the technical documentation.

CE2.5 Describe the procedures for recycling and waste treatment of consumable materials to comply with environmental regulations.

CE2.6 In a practical, duly characterized, practical case of handling fungible material to replace or replace it:

-Relate the consumable material to the corresponding physical devices, according to their technical specifications.

-Choose the consumable material for the device based on functionality and economics criteria.

-Interpret the device signals about the fungible material.

-Install the fungible material on the device and test the device.

-Apply the procedures for handling the established fungible material: insertion, extraction, handling for recycling and handling for the recharge of a fungible unit, among others.

-Document the processes performed.

C3: Regular performance of physical devices using monitoring tools, following given specifications.

CE3.1 Detailed critical components that affect the performance of the computer system, to identify the causes of possible deficiencies in the operation of the equipment, according to technical specifications.

CE3.2 Explain the types of metrics used for testing and determining the performance of physical devices, according to technical specifications of the devices themselves.

CE3.3 Identify the configuration and performance parameters of the physical devices of the system to optimize the functionality and quality of the services performed by the computer equipment taking into account quality and performance parameters.

CE3.4 Describe the measurement tools of the physical performance and monitoring of the system, classifying the metrics available in each case, to apply the evaluation procedures in the elements of the computer system, according to the technical specifications received.

CE3.5 Apply physical performance measurement procedures using the tools indicated to verify that the functionality of the computer system is within preset parameters, according to given technical specifications.

CE3.6 Apply verification and failure detection procedures in event logs and performance alarms on physical devices for notification to the system administrator, following given technical specifications.

CE3.7 In a convenient, properly characterized, performance evaluation of the physical devices of the system to check its functionality and operability, according to given performance specifications:

-Select the measurement tool according to given specifications or administrator indications.

-Run measurement procedures using the selected tool.

-Review the results obtained to verify that the measurements are within the normal parameters, and act according to established procedures in case of anomalous situations.

-Make configuration changes to the physical devices indicated according to received specifications.

-Record the configuration changes made to the inventory.

-Document the work done detailing the detected failed situations.

C4: Interpret the detected incidents and alarms in the physical subsystem and perform corrective actions for your solution according to given specifications.

CE4.1 Identify operational incidents produced by the physical devices that form the subsystem to classify the corrective actions to be applied according to the specifications received.

CE4.2 Explain strategies for detecting anomalous situations in subsystem operation.

CE4.3 Apply procedures for incident detection by using specific tools and controlling the activity indicators of the physical devices of the system taking into account the technical specifications of operation.

CE4.4 Apply established response procedures for resolution of detected incidents in the performance and performance of physical devices according to given specifications.

CE4.5 In a practical, well-characterized scenario, of execution of corrective actions to solve the malfunction of physical devices of the system, given the procedures to be applied:

-Perform measurement procedures using the selected tool.

-Check the connections of the devices.

-Compare the results of the measures with the expected results to check whether or not an incident occurred.

-Replace or update the component or device causing the breakdown by ensuring compatibility with the system.

-Run established response procedures against the incidents produced.

-Record the corrective actions and document the work done detailing the incident situations produced.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.3 and CE2.6; C3 with respect to CE3.7; C4 with respect to CE4.5.

Other capabilities:

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Demonstrate flexibility to understand changes.

Respect the organization's internal rules and procedures.

Contents:

1. Components of a computer system

The central processing unit: functions and types, purpose and operation scheme and internal structure.

The memory system: functions and types, routing spaces, and memory maps, and memory hierarchies.

The I/O system: functions and types, I/O controllers, peripheral devices, storage devices, and print devices, among others.

Connection between components.

Ports and connectors.

2. Inventory techniques in computer systems

Physical device inventory records.

Computer System Inventory Software Tools.

3. Consumable physical device material on a computer system

Devices with fungible material.

Classification of the fungible material.

Maintenance of consumable material.

Recycling and reuse.

4. Physical device performance monitoring and measurement techniques

Performance metrics.

Representation and analysis of the results of the measurements.

Performance of physical devices.

Configuration and Performance Parameters.

Physical device monitoring tools.

5. Physical subsystem incident and alarm diagnostic techniques

Classification of incidents and alarms for physical devices.

Incident and alarm diagnostic tools for physical devices.

Methods set for solution incidents.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the maintenance and regulation of the physical subsystem in computer systems, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: MAINTAINING THE LOGICAL SUBSYSTEM OF COMPUTER SYSTEMS

Level: 2

Code: MF0958_2

Associated with UC: Run administration and maintenance procedures on the base and client application software

Duration: 150 hours

Assessment capabilities and criteria:

C1: Identify the software components of a computer system detailing its characteristics and configuration parameters, according to given functional specifications.

CE1.1 Citar software types to perform their classification according to purpose, functions and modes of execution among others, according to technical specifications of software manufacturers.

CE1.2 Describe the characteristics of the software components of the system, distinguishing its functionalities, taking into account the technical specifications.

CE1.3 Explain and describe the types of user interfaces by discriminating against the main features of each user interface, according to the technical specifications of the systems used.

CE1.4 Identify the configuration elements of the software components to ensure the operation of the system, according to specifications received.

CE1.5 In a practical, well-characterized case of identifying software components of the system for use, according to given specifications:

-Operate with the software component user interface using the usual mechanisms for each type.

-Operate with the functional options of each software component according to the technical documentation.

-Identify the configuration of a software component according to established procedures.

-Check the record of a software component in the inventory and record the detected changes.

-Check software usage licenses taking into account copyright and applicable regulations.

C2: Install and update application software programs to provide functionality to users, following given specifications.

CE2.1 In a convenient scenario, properly characterized, perform the installation of application software components to add functionality to the system:

-Check the software installation requirements to be implemented on your system.

-Verify that the software component usage licenses comply with applicable regulations.

-Perform component installation procedures.

-Configure the installed software components to use the peripherals and devices of the computer system.

-Perform software component uninstallation procedures, if necessary.

-Verify the processes performed and the absence of interferences with the other components of the system.

-Document the installation and uninstallation processes performed detailing the activities performed.

-Maintain the updated software inventory by recording the changes made.

CE2.2 List the main procedures for keeping the software up to date, according to the technical specifications of the software type and the manufacturer.

CE2.3 Describe the procedures, to apply an update, detailing the security issues in installing and updating software to maintain the functional parameters of the computer.

CE2.4 In a convenient, properly characterized, application software update on a system to reset to new needs:

-Identify the version of the software component to be updated and the compatibility conditions to be considered for the upgrade.

-Locate the updates, made available by the manufacturer, not yet implemented and identify the "patches" and other code modules available to increase the functionality of the component or to correct inappropriate behavior, checking that the licenses for using the software components comply with the applicable regulations.

-Uninstall the components involved before applying any updates, as indicated in the technical documentation, established procedures, and administrator indications.

-Apply previously identified updates to the software component based on indications of the technical documentation, established procedures and administrator indications, configuring the software component according to the specifications given after the upgrade.

-Verify that the software component has the desired functionality by performing operational tests.

-Document the update process detailing the incidents produced and keep the updated software inventory recording the changes.

C3: Apply administration procedures and maintain system operation within specified parameters, according to given technical specifications and usage needs.

CE3.1 Identify the administrative tools available in the system detailing their characteristics and uses, to perform the administration procedures.

CE3.2 Explain the types of physical media for information storage detailing the tasks for maintaining your data structures.

CE3.3 Describe the types of computer system administration tasks detailing their characteristics, execution modes and available mechanisms, for automatic execution taking into account the technical specifications.

CE3.4 Citar the maintenance techniques of the base and application software configuration that are needed to maintain system operability.

CE3.5 In a practical, well-characterized case, maintenance of system components, following specifications given:

-Select the appropriate administrative tool.

-Apply established procedures for the maintenance of the information media and for the maintenance of the base and application software configuration.

-Configure and verify the operation of devices installed from the application software.

-Run and check the scheduling of automatic administrative tasks.

-Run administrative scripts and programs as instructed by the administrator.

-Document all applied procedures detailing the detected incidents and keep the updated software inventory recording the changes.

C4: Identify the performance parameters of the base and application software using specific monitoring and measurement techniques and tools to verify the quality and functionality of the services provided by the computer system.

CE4.1 Explain the fundamentals of the software performance measure by detailing the techniques used to evaluate the functionality of the system.

CE4.2 Identify the configuration and performance parameters of the base and application software elements to monitor the system.

CE4.3 Describe the software performance measurement tools, classifying the metrics available in each case, taking into account the associated technical specifications.

CE4.4 Explain the monitoring and measurement techniques performed by the tools, to improve the performance of the base and application software, taking into account the associated technical specifications.

CE4.5 Apply verification and failure detection procedures in the event logs and performance alarms in the software, for notification to the system administrator, following given specifications.

CE4.6 In a convenient, properly characterized, performance measurement of base and application software performance to detect anomalous situations:

-Select the measurement tool as instructed by the administrator.

-Run measurement procedures using the selected tool.

-Review the results obtained to verify that the measurements are within the normal parameters.

-Document the work done.

C5: Identify the detected incidents and alarms in the logical subsystem to perform corrective actions according to given specifications.

CE5.1 Classify the incidents and alarms of operation and access produced in the software elements of the system to detect operating problems in the software.

CE5.2 Classify diagnostic tools to be used to isolate the cause that produces the alert or incident, taking into account the incident resolution procedures given.

CE5.3 Apply specified response procedures to address incidents detected in the operation of the base software and application, following the given instructions.

CE5.4 In a convenient, properly characterized, practical application of corrective actions to solve the malfunction of the base software and application:

-Identify incidents detected in the operation of the base or application software.

-Use diagnostic tools in case of software malfunction.

-Run established response procedures against the incidents produced.

-Use local or remote system management tools to resolve the incident.

-Document the work done detailing the incident situations produced.

-Maintain the updated software inventory by recording the incidents and changes made.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.1 and CE2.4; C3 with respect to CE3.5; C4 with respect to CE4.6; C5 for CE5.4.

Other capabilities:

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Maintain a proactive approach to process improvement.

Demonstrate stress resistance, mood stability and impulse control.

Act quickly in problematic situations and not just wait.

Contents:

1. The software on the computer system

Software types.

System software and user software.

Functions and features.

2. Procedures for installing software components

System requirements.

Software ownership, use, and distribution licenses.

The software inventory.

Parameters and system configuration in the installation process.

Software logs and databases installed.

Configuring applications for peripheral access.

3. Software maintenance procedures

Objectives of a maintenance plan.

Updating application software, verifying requirements, and updating processes.

4. Administration procedures

Types of administrative tasks.

Administrative tools.

File system maintenance and information media.

Scheduled Tasks.

5. Software item performance monitoring and measurement techniques

Configuration and performance parameters for software components.

Software monitoring tools.

Performance measurement procedures.

6. Computer system software incidents and alarms

Classification of software incidents and alarms.

Incident diagnostic tools and software alarms.

Methods set for solution of software problems.

Remote Maintenance: Tools and Configuration.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the execution of administration and maintenance procedures in the base and client application software, which will be credited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 4: MAINTAINING SECURITY ON COMPUTER SYSTEMS

Level: 2

Code: MF0959_2

Associated with UC: Maintaining the security of physical and logical subsystems on computer systems

Duration: 120 hours

Assessment capabilities and criteria:

C1: Apply backup and restore procedures, verify their performance, and manipulate the storage media to ensure the integrity of the information in the computer system, according to given specifications.

CE1.1 Classify the different storage and data security means of the computer system for use in the copy processes according to established technical specifications.

CE1.2 Explain the procedures and tools for performing, restoring, and verifying backups and data storage of the computer system to ensure the integrity of the system information, according to given specifications.

CE1.3 In a practical, well-characterized scenario, where a data storage system with multiple devices is available, backup to ensure data integrity, given procedures to follow:

-Select the storage device and the tool to make the copy.

-Perform the backup according to the periodicity and procedure specified, or to the administrator's indication.

-Verify that the copy is being performed.

-Label the copy made and proceed to storage according to the specified environmental, location and security conditions.

-Check and record detected incidents.

-Document the processes performed.

CE1.4 In a convenient, well-characterized scenario of restoring backups to retrieve stored information, given procedures to follow:

-Select the tool to perform the restore according to the type and backup media performed.

-Perform the restore process according to the received indications.

-Verify the restore process by checking its target.

-Check and record detected incidents.

-Document the processes performed.

C2: Identify the types of access to the computer system, as well as the security mechanisms of it, describing its main features and common associated tools to ensure the use of system resources.

CE2.1 Describe the mechanisms of the access control system detailing the organization of users and groups to ensure the security of the information and functionalities supported by the computer equipment, according to the technical specifications.

CE2.2 Explain the procedures of systems for setting permissions and user rights, detailing your organization and associated administrative tools to organize security policies, according to the procedures established in the base software.

CE2.3 Classify common security mechanisms in systems detailing their objectives, characteristics, and associated tools to ensure the security of information and functionalities supported by computer equipment.

CE2.4 Identify system protection mechanisms against viruses and malicious programs to ensure your upgrade.

CE2.5 In a practical, properly characterized, case of identification of system security mechanisms to maintain the protection of the system:

-Identify the users and groups defined in the system using the administrative tools indicated in the given procedures.

-Locate, for each user, access permissions and associated security policies, operating with the administrative tools indicated in the given procedures.

-Verify that antivirus and protection applications against malicious programs are up-to-date.

-Check the registry of users and groups in the inventory, recording the detected changes.

C3: Interpret the monitoring traces of system access and activity by identifying anomalous situations, following given specifications.

CE3.1 List the mechanisms of the access and activity trace system for monitoring by detailing its scope of action, main features and associated tools.

CE3.2 Describe the incidents that occur in user and system activity access by classifying them by security levels to detect anomalous situations in those processes.

CE3.3 Identify the tools to extract the user connection trace files and the system activity files to facilitate your query and manipulation, according to your technical specifications.

CE3.4 Interpret the content of user connection trace files and system activity files to locate unwanted accesses and activities following the procedure indicated by the administrator.

CE3.5 In a practical, duly characterized, analysis and evaluation of user connection trace files and system activity files to detect potential unwanted access and activities, according to given specifications:

-Identify the characteristics of a set of user registries.

-Locate a record of a given user and explain its characteristics.

-Extract and record failed situations relative to a user.

-Document the actions performed.

CE3.6 Distinguished the tools used for the diagnosis and detection of incidents both in local and remote application, for their management, solution or scaling of the same, according to given specifications.

C4: Describe the environmental and safety conditions for the operation of physical equipment and devices that guarantee the operating parameters given.

CE4.1 Describe environmental factors that influence the location and conditioning of physical device spaces, fungible material, and information supports to fulfill device installation requirements, according to the technical specifications of the devices.

CE4.2 Identify the safety and ergonomics factors to be taken into account in the location of physical equipment and devices to ensure their implementation conditions, according to their technical specifications.

CE4.3 In a practical, well-characterized, practical case for checking environmental conditions to ensure the situation of physical equipment and devices:

-Check that the location of physical devices, fungible material and information media comply with established standards and technical specifications.

-Check the location record for physical devices and fungible material in the inventory, recording the detected changes.

-Identify appropriate and inappropriate security and environmental conditions.

-Propose corrective actions to ensure safety and environmental conditions requirements.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.3 and CE1.4; C2 with respect to CE2.5; C3 with respect to CE3.5; C4 with respect to CE4.3.

Other capabilities:

Act quickly in problematic situations and not just wait.

Prove a good professional.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Maintain an assertive, empathetic and conciliatory attitude to others by demonstrating cordiality and kindness in the treatment.

Adapt to new situations or contexts.

Respect the organization's internal rules and procedures.

Maintain a proactive approach to process improvement.

Contents:

1. Managing IT security

Security objective.

Security Management Processes.

Threat identification methods: external and internal attacker.

2. System logical security

File systems and access control.

Permissions and user rights.

User registries: weak authentication systems; strong authentication systems; biometric authentication systems and other systems.

Tools for user management.

Virus detection software and malicious programs, data recovery and disinfection techniques affected.

Remote incident management tools.

3. Backups

Types of copies.

Backup Copy Service Architecture.

Storage media for backups.

Tools for backing up.

Restoring copies and verifying the integrity of the information.

4. Access monitoring procedures and system activity

Monitoring goals.

Traces monitoring procedures: monitorizable or auditable aspects; classification of events and incidents: system, application, security; trace monitoring mechanisms: alarms and corrective actions; trace records information.

Techniques and monitoring tools.

Monitoring reports.

5. Physical environment of a computer system

The teams and the environment: Fitness of the physical space.

Applicable regulations and regulations.

External agents and their influence on the system.

Negative effects on the system.

Creation of the right environment: control of environmental conditions: humidity and temperature; industrial factors: dust, smoke, interference, noise and vibration; human factors: functionality, ergonomics and quality of the installation; other factors.

Risk factors: electrical safety concepts; electrical installation requirements; electrical and electromagnetic disturbances; static electricity; other risk factors.

The measuring devices.

Corrective actions to ensure safety and environmental requirements.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the maintenance of physical and logical subsystem security on computer systems, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX XI

Professional Qualification: Voice and Data Network Management

Professional Family: Informatics and Communications

Level: 3

Code: IFC302_3

General Competition

Define and monitor the procedures for installing, configuring, and maintaining the resources of a communications network to provide voice, data, and multimedia services to users and to integrate the resources offered by the transmission and switching systems.

Competition Units

UC0228_3: Design the telematics network infrastructure

UC0962_3: Integrating voice, data, and multimedia services

UC0963_3: Manage and provide communications services to users

Professional Environment

Professional Scope

Develops its professional activity in the department of networks and dedicated communications to the area of communications in companies or public or private entities of any size, both self-employed and foreign, regardless of its legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located in the telecommunications sector, in the sub-sector of the marketing of voice and data communications services as well as in any sector that has a communications network infrastructure with integrated voice and data services.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Communications Services Administrators

Support technicians on transmission and switching systems

Associated Training (540 hours)

Training Modules

MF0228_3: Telematic network design (210 hours)

MF0962_3: Integration of voice, data, and multimedia communications services (180 hours)

MF0963_3: Administration of communications services for users (150 hours)

COMPETITION UNIT 1: DESIGN THE TELEMATICS NETWORK INFRASTRUCTURE

Level: 3

Code: UC0228_3

Professional Realizations and Realization Criteria:

RP 1: Determine the topology configuration of network networking that responds appropriately to the needs of the project.

CR 1.1 The specifications of the system are elaborated by collecting the functional, technical and cost requirements and performance.

CR 1.2 The system topology is determined by choosing a standard reference model that meets the requirements of the applications to be used, such as: response time, quality of service, routing scheme, data volume to transfer, distances, or access to other networks.

CR 1.3 Communication elements are valued taking into account the existing infrastructure and the state of the technology in the present as well as its possible short and medium term developments.

CR 1.4 The topology and elements of the network are chosen according to the requirements of accessibility, confidentiality and integrity required by the user and the current regulations.

RP 2: Analyze the connectivity capabilities of the market communications teams to integrate them into a telematics network infrastructure project.

CR 2.1 The characteristics and specifications of communications equipment are identified to determine their suitability for network design.

CR 2.2 The different physical means of transmission are differentiated by their technical characteristics and their suitability for use for different types of networks, interpreting the reference technical documentation.

CR 2.3 The environmental requirements of the communications equipment (occupied surface, electrical consumption, heat dissipation, etc.) are contrasted with the possibilities of the installation.

CR 2.4 The conditions for the hiring and service of the basic means of access to public networks offered by the telecommunications operators are included in the specifications of the network design, reviewing the content.

CR 2.5 The capabilities and features of communications hardware products and analog software products, such as: routers, hubs, switches, VPN servers-virtual private networks-, or firewalls, are compared for inclusion in the network design, interpreting the associated technical documentation.

CR 2.6 The implementation of communications software products is evaluated on different platforms and operating systems, taking into account all possible cases.

RP 3: Determine the physical configuration of network networking by selecting the equipment, devices, and software that meet the needs of the project.

CR 3.1 The location of the network equipment and devices is determined taking into account the conditions of ergonomics, safety and use of the available space.

CR 3.2 The software components of the network infrastructure are chosen in accordance with the system requirements and with the capabilities required by the applications and previously specified.

CR 3.3 The cabling system and the type of support used for the local network are determined according to the distances between the different nodes of the system, the speed required for the transmission of the data and the environmental conditions.

CR 3.4 Network devices and devices are selected according to the following criteria:

-The condition of approval of the same, both internally and externally, proposing for internal approval those elements whose use is essential.

-Compliance with prescribed technical and economic conditions.

-The security of supply and its availability within the agreed deadlines.

CR 3.5 The drawings and diagrams of the system blocks are elaborated reflecting the structure of the system and the different elements that make it up, identifying the user jobs in the plane and its connections in the plant rack, the interconnections with other racks the building, and the identification and location of the communications devices of each rack.

RP 4: Develop or monitor the preparation of the technical documentation to enable the installation of the data network and its subsequent maintenance.

CR 4.1 The description of the installation is elaborated detailing the characteristics and scope of the installation.

CR 4.2 The technical documentation is prepared by including the necessary set and detail plans, using the standardized symbology and presentation.

CR 4.3 The ratio of materials, equipment and devices is performed using standardized coding and ensuring its internal and/or external acquisition.

CR 4.4 The construction plans of the installation are elaborated by collecting the characteristics of the equipment for implantation, such as: physical dimensions, location of devices and cards, coded identification of I/O and cable, among others.

CR 4.5 The network software and the system communication programs are documented in a way that allows the implementation and subsequent maintenance of the functions of the same.

CR 4.6 The technical documentation is made in a way that conforms to the standards of the organization, contains the necessary chapters for the installation and maintenance of the system, and includes:

-Process to be followed in commissioning.

-Tests and adjustments to be made in the system start-up process.

-Parameters to be verified and adjusted.

-Stable Margenes of operation.

-Guidelines for performing preventive system maintenance.

Professional Context:

Production media:

Instruments for the realization of facility schemes (CAD/CAM/CAE programs, among others). Manufacturer's technical documentation. Project planning tools. Operator communications service configurators.

Products and results:

Network design: blocks and block diagrams. Component memory. Network infrastructure maintenance guidelines. Verification and testing guidelines for components and equipment.

Information used or generated:

Communications Infrastructure Security Policy. Installation manuals, reference and use of communications equipment. Information on local and extensive area networks and public and private communication systems. Information about communications equipment and software. Applicable regulations and standards of communications networks. Technical documentation of projects and communications facilities. Time and pricing manuals for communications facilities.

COMPETITION UNIT 2: INTEGRATE VOICE, DATA, AND MULTIMEDIA SERVICES

Level: 3

Code: UC0962_3

Professional Realizations and Realization Criteria:

RP 1: Define and apply the procedures for the implementation of gateways, which allow the integration of services to support functionalities according to specifications thereof.

CR 1.1 The analysis of IP address maps and voice transmission lines and nodes is performed to verify the installation conditions of the gateway according to technical specifications of the system and description of the services to be integrated.

CR 1.2 The characteristics of the communication lines, the environmental and power supply requirements are determined to ensure the operation of the system according to standards of signaling and digitalization, technical specifications of the devices and applicable environmental regulations.

CR 1.3 The installation procedures for the hardware and software that will conform to the gateway are defined and documented for subsequent execution according to functional and technical specifications and criteria.

CR 1.4 The gateway is configured to ensure the delivery of the services that will be supported by it, according to specific needs of the services and indications of the organization.

CR 1.5 Functional and structural tests are performed on the gateway, to verify the delivery of the specified services according to the needs of the organization.

CR 1.6 The security parameters of the gateway are set to verify the access to the resources of the gateway and is performed by the default users, depending on the needs of the organization.

CR 1.7 The documentation of the tasks that have been carried out, is performed according to the protocols of the organization to fulfill the needs of the registry.

RP 2: Manage the incidences produced in the integration of voice and data services, to obtain continuity in the delivery of the same, according to specifications of quality and conditions of criticality of the service.

CR 2.1 The incidence detection channels are determined and the means for the detection and communication of the same to those responsible for their care and management are enabled, in order to proceed to their solution according to the protocols established by the organization.

CR 2.2 The procedures for isolating and detecting incident-producing causes are set out in the contingency plan, in order to provide references to persons in charge of problem management on the gateway according to the organization's protocols.

CR 2.3 Incident management is organized by indicating the tools to be used and the procedures to be followed, as well as the incident escalation system, to ensure assistance team intervention with speed and quality criteria according to the internal rules of the organization.

CR 2.4 Incident bulletins and associated documentation are tailored to control and manage intervention and solution processes according to the organization's protocols.

RP 3: Define and apply procedures for the implementation and maintenance of communications systems for multimedia services, according to the quality specifications of the organization and the multimedia service itself.

CR 3.1 The elements that make up the communications system for multimedia services are identified according to the needs specified for the establishment of the services.

CR 3.2 The parameters of the communication lines are identified according to the needs specified for the establishment of the multimedia services.

CR 3.3 The configuration of the specific protocols for the transmission of multimedia content is planned for implementation in the communications devices according to technical specifications and needs of the organization.

CR 3.4 The procedures for installing and maintaining the hardware and software that will conform to the communications system for multimedia services are defined and documented for subsequent execution according to functional and technical specifications and criteria.

CR 3.5 The functional parameters of the equipment that form the communications system for multimedia services are defined and configured to ensure the quality of the services according to specific needs of the same and indications of the organization.

CR 3.6 Functional and structural tests are performed on communications system equipment for multimedia services to verify the delivery of the specified services according to the needs of the organization.

Professional Context:

Production media:

Technical documentation of manufacturers, in printed or electronic support. Configuration and parameterization tools of the manufacturer's services. Tools for internal management, registration and administration of incidents. Computer and peripheral equipment. Communications equipment. Office tools. Monitoring and testing tools. Instruments of measures. Monitoring and management tools/applications. Lines of communication. Test terminals, telephones and computer equipment to test the service. Telephone switching equipment. 'Call Managers'.

Products and results:

Network with voice, data, and multimedia communication services configured and running. Procedures for the implementation of defined gateways and multimedia services. Verification guidelines and periodic tests defined. Parameters configured on the communications lines. Managed and resolved incidents.

Information used or generated:

IP address maps of the voice transmission lines and nodes. Specification of services that will support gateways. Quality parameters contracted by the customer. Quality standards of the organization. Technical specifications of the devices and recommendations of the manufacturers. Applicable regulations on environmental safety and standards for signalling and digitisation. Manuals for the use and operation of gateways. Manuals for the associated software. Technical documentation of manufacturers, in printed or electronic support. Information about the network configuration of the operator to which the gateway connects. IP information. Installation manuals, reference and use of communications equipment. Test Plan. Internal scaling procedure. Escalation procedure agreed with the client. The result report of the installation. Performance reports. Act of acceptance by the client. Bulletins. Result report of the functional and structural tests. Listing of the parameters configured on the communications lines. Listing and interpretation of the configured alarms. Security report with default users by the organization. Plan of action against contingencies and levels of scaling.

COMPETITION UNIT 3: ADMINISTER AND PROVIDE COMMUNICATIONS SERVICES TO USERS

Level: 3

Code: UC0963_3

Professional Realizations and Realization Criteria:

RP 1: Apply maintenance and update procedures on the network to provide and "provision" new communications services, taking into account the specifications received.

CR 1.1 The map of the communications network is interpreted and the nodes are identified in it, to assess the state of the existing infrastructure and its resources according to the procedures of the organization.

CR 1.2 Hardware and software updates are performed to keep the communications infrastructure up to date, following established procedures.

CR 1.3 The updates made are verified and functional tests are carried out on the updated components to ensure the delivery of the services according to the organization's specifications.

CR 1.4 The modifications and updates made are documented and reported, in order to fulfill the registration needs according to the established procedures.

RP 2: Provide and manage communications services to meet the needs of users, according to specifications received and quality criteria of the organization.

CR 2.1 The communications services and the resources for their delivery are located to meet the requests made according to the procedures established in the organization.

CR 2.2 The communications resources are assigned to the users, for the implementation of the requested services according to technical specifications and procedures stipulated in the organization.

CR 2.3 Resources are allocated using specific software tools for the management and delivery of services, according to the organization's specifications.

CR 2.4 Communication services monitoring processes are defined and executed to verify the quality level of the communication services according to the specifications of the organization.

CR 2.5 The operational tests of the resources allocated to the services are carried out to ensure the quality of the services according to the regulations of the organization.

CR 2.6 The documentation of the executed processes is prepared to fill the registration needs using the tools and procedures established by the organization.

RP 3: Manage voice and data communications resources to ensure functionality according to quality specifications.

CR 3.1 Performance management systems are configured to analyze the performance and continuity of the services provided, depending on the service parameters contracted by the customer and the quality criteria of the organization.

CR 3.2 The monitoring tools are configured to reproduce the alerts and alarms indicating failures or deterioration in the execution of the gateway services, depending on the customer's contracted capabilities and the quality specifications of the organization.

CR 3.3 Device firmware and software updates are made to improve performance and fix performance problems, according to technical specifications of the devices and manufacturers ' indications.

CR 3.4 Periodic verification processes are defined and performed, to ensure functionality and security in the delivery of services according to the organization's specifications.

CR 3.5 Information on the use of the communications system's resources is recorded and analyzed to detect future deficiencies and management problems in quality or quantity according to the quality regulations of the organization.

CR 3.6 The documentation of the tasks performed for the maintenance of the gateway is performed according to the protocols of the organization.

RP 4: Understand and manage incidents and user complaints for the provided communications services, in order to ensure their performance.

CR 4.1 The incidents and complaints received by the use of the communications resources are checked to proceed to their solution according to the procedures of the organization.

CR 4.2 The incidents whose identification or solution cannot be performed, are communicated to the higher levels of responsibility for their resolution according to the procedures of the organization.

CR 4.3 The documentation of the incidents, their verification and the corrective actions taken, are reflected in the corresponding bulletin for their registration and subsequent treatment according to regulations of the organization.

RP 5: Install and configure applications on client terminal equipment to provide specific communications services, according to received specifications and quality criteria of the organization.

CR 5.1 The features of the application to be installed are analyzed to ensure the functionality of the services that will be supported by it, according to technical specifications of the application, the terminal and quality criteria of the organization.

CR 5.2 The client application is installed and tested to verify its functionality, following the documentation of the application provider and the terminal manufacturer.

CR 5.3 The installed application is tested to ensure service delivery, as per the service provider's specifications.

CR 5.4 The tests are documented and reported with installation errors or mismatches with respect to the specifications, in order to fulfill the registration needs according to procedures established by the organization.

CR 5.5 The installation process is documented and the installation errors are reported, in order to fulfill the registration needs, according to procedures established by the organization.

CR 5.6 The application user's guide is written for later distribution, following the service provider's style guide.

Professional Context:

Production media:

Tools specific software for the management and delivery of services. Internal use tools for the documentation of the processes performed. Terminal with corresponding operating system. Voice and data line. Software tools for network management and services. Incident management software tools. Office tools. Communications equipment.

Products and results:

Network, services, and resources maintained and updated. Incidents and complaints handled and addressed. Applications on installed and configured terminals.

Information used or generated:

Map of the communications network. Specifications of the service provider. Organization procedures for recording modifications and updates. Quality standards of the organization. Guidelines of the organization regarding procedures and tools to be used. Incident management and incident management procedures. Specifications and installation requirements for the application. Terminal user guide and application installation guides. Service profiles and subscribers. Work orders. Network documentation. Service provision and configuration manuals. Hardware/software inventory of the communications network. Operational procedures of the organisation. Applicable regulations for telecommunications and standards. Incident bulletins. Performance reports. Installation and verification reports. Test reports and errors. Application User's Guide. Update result reports. Inventory of available services and assigned profiles. Record of the updates.

TRAINING MODULE 1: TELEMATIC NETWORK DESIGN

Level: 3

Code: MF0228_3

Associated with UC: Design the telematics network infrastructure

Duration: 210 hours

Assessment capabilities and criteria:

C1: Analyze the features and requirements of a telematics network project based on the client's needs.

CE1.1 Identify sources of information.

CE1.2 Apply interview and information collection techniques.

CE1.3 Explain the problem of the feasibility study of a project.

CE1.4 Develop a user requirements document.

CE1.5 Sink the collected information.

CE1.6 In a practical, properly characterized, information collection scenario:

-Simulate an interview with the client.

-Perform a requirements document.

-Perform a technical-economic feasibility study.

C2: To differentiate the characteristics of the existing media in the market.

CE2.1 Reasoned the ratio of bandwidth to transmission speed.

CE2.2 Identify the characteristics of a product from its specifications.

CE2.3 Describe the installation problem of a given means of transmission.

CE2.4 Classify the means of transmission according to the technical characteristics of their use in network facilities.

CE2.5 Detailed the influence of each transmission medium on the overall performance of the network.

CE2.6 Properly interpret the symbology and coding used commercially for the different means of transmission.

CE2.7 In a practical, duly characterized, practical scenario of telematic network design:

-To analyze the market for the communications products needed for the design, consulting documentation on the Internet, specialized journals, catalogues of manufacturers, among others.

-Make several proposals based on economics and performance criteria.

C3: Explain the existing levels in the TCP/IP protocol set.

CE3.1 Interpret the OSI reference model.

CE3.2 Describe the functions and services of each level of the OSI reference model.

CE3.3 Explain the TCP/IP architecture.

CE3.4 Establish mappings between the TCP/IP architecture and the OSI reference model.

CE3.5 Associate functions and services at each level of the TCP/IP architecture.

CE3.6 Describe the IP routing system.

CE3.7 Apply the IP routing system in the creation of subnets.

CE3.8 Describe the various routing protocols in IP networks: BGP, OSPF, RIP.

CE3.9 Describe the application-level protocols of the TCP/IP, FTP, HTTP, SMTP, Telnet, SNMP, and other architecture.

C4: Explain the technical characteristics and operating mode of the different network interconnection equipment.

CE4.1 Classify the operation of network equipment with respect to the OSI reference model.

CE4.2 Describe the functions of the different interconnection devices.

CE4.3 Detailed the technical characteristics of the interconnection equipment to determine their influence over the network performance.

CE4.4 Analyze the different software alternatives with respect to the equivalent communications hardware products.

CE4.5 Describe the interconnection architecture by using VPN (Virtual Private Network, virtual private networks).

CE4.6 Interpret information that appears in communications product catalogs.

C5: Select a particular pipeline team for a network infrastructure.

CE5.1 Justify the choice of interconnection equipment according to performance and economy criteria.

CE5.2 Describe the problem of the interconnection of local area networks.

CE5.3 Describe the problematic of the local area network network-wide area network.

CE5.4 Justify the choice between a hardware solution and other software according to performance criteria, economics, complexity and ease of administration.

CE5.5 Explain the influence of collision domains and IP domains on network performance.

C6: Design the network topology, including the transmission media and communications equipment best suited to the specifications received.

CE6.1 In a scenario of designing telematic networks from given specifications:

-Design the topology that meets the expected service quality, cost, and performance specifications.

-Choose the transmission means for the network design according to the quality and expected cost criteria.

-Locate the interconnection equipment in the design so that the established quality criteria are met.

CE6.2 In a scenario of interconnecting and logical configuration of equipment, from a given design:

-Set the routing mode and its configuration, including any subnets that are required and taking into account security.

-Select the interconnection system with the wide area network according to the chosen topology and meet the agreed cost and effectiveness criteria.

-Set backup lines if needed.

-Use simulation programs to verify the performance of the design.

C7: Develop the documentation required for project execution.

CE7.1 Identify in the quality standard in effect the sections that apply to the network design process.

CE7.2 In a scenario of describing or analyzing a process related to the design activity identify or set:

-Input data to the process.

-The function associated with the process.

-Data or documentation generated in the process.

-Records and evidence generated.

-Relation to other processes.

-Metrics that can be applied and possible points of improvement.

CE7.3 In a practical, well-characterized scenario, of technical documentation of an existing project:

-Identify the location of the equipment.

-Identify the broadcast media used.

-Identify the network addresses used.

-Interpret the encoding of the interconnect equipment used.

CE7.4 Describe and differentiate the sections that make up a project, according to the applicable regulations.

CE7.5 Confect, from the specifications formulated, a network plane that contains:

-The location of the equipment.

-The means of transmission.

-The network addresses used.

-Coding of interconnection equipment.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6; C2 with respect to CE2.7; C6 with respect to CE6.1 and CE6.2; C7 with respect to CE7.2 and CE7.3.

Other capabilities:

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Treat the customer with courtesy, respect and discretion.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Demonstrate flexibility to understand changes.

Contents:

1. Introduction to computer communications and networks

Data Communication.

Communication through networks.

WAN networks. LAN networks. Protocols and protocols architecture.

The OSI model.

The TCP/IP protocol architecture.

Regulations and Standards of Standardization. IETF. ISO. ITU ICT.

2. Data communication

Data Transmission Principles.

Encoding. Multiplexing. Switching.

Analog and digital data.

Analog and digital transmission.

Disturbances.

Means of transmission.

Guided media.

Wireless media.

Data Link Control.

3. Classification of Communications Networks

Switch networks.

Circuit Switching.

Packet switching.

ATM and Frame Relay.

Broadcast Networks.

Networks by bus.

Ring networks.

Star Networks.

Local Area Networks.

LAN Architecture.

LAN-LAN Pipeline.

LAN-WAN Pipeline.

4. Communications network design

Transmission medium.

Connection equipment.

Network cards.

5. Protocols

Networking protocols.

IP Protocol.

Transport Protocol.

TCP/UDP protocols.

Network security.

Application level.

Protocols: HTTP, SMTP, SNMP, FTP, among others.

6. Project Documentation

Information collection techniques.

Feasibility study.

Quality.

Regulations and certifications.

The Quality System of a company.

Processes and Procedures.

Quality Plans.

Records and Evidence.

Metrics.

Audits.

Improvement and prevention of problems.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the design of the telematics network infrastructure, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: INTEGRATION OF VOICE, DATA, AND MULTIMEDIA COMMUNICATIONS SERVICES

Level: 3

Code: MF0962_3

Associated with UC: Integrating voice, data, and multimedia services

Duration: 180 hours

Assessment capabilities and criteria:

C1: Analyze the infrastructure of the communications network by identifying the elements that compose it for the provision of voice and data services, according to functional and technical specifications.

CE1.1 Identify and describe existing voice and data network architectures, to select communications elements to deliver voice and data services, according to specifications of the architectures themselves and of standardization and standardization of communications services.

CE1.2 Classify the techniques of transmission and multiplexing of voice and data channels in high speed links for the provision of communications services, according to specifications of communications operators and standardization and standardization bodies of communications services.

CE1.3 Explain the signaling and digitalization technologies of voice and data services, to identify the functionalities of the communications systems according to technical specifications of these services.

CE1.4 Describe the processes and elements of the communications network that are subject to legal regulations, and the requirements to be applied according to this regulation.

CE1.5 In a practical, duly characterized, scenario of analysis of a communications infrastructure, with technical and functional specifications of the voice and data communications needs of an organization and infrastructure of interconnection lines and devices for the provision of services:

-Identify the elements of the network: equipment and lines of communication.

-Identify access to public networks.

-Perform a network map schema and synthesize the information.

-Apply the legal communications regulations to the processes and elements.

C2: Configure communications gateways to implement voice and data transmission and transmission services, addressing functional technical specifications and service requirements.

CE2.1 Distinguished voice and data transmission and transport services, identifying their configuration parameters according to given functional specifications.

CE2.2 Identify and describe the types and functions of communications gateways, to implement the integration of voice and data services according to technical specifications of the services themselves and the communications infrastructure.

CE2.3 Classify voice and data service integration technologies in order to identify their specific functions according to given functional specifications.

CE2.4 Identify the encryption and encryption mechanisms of the information, to implement the security system in the transmission and transport of data according to certain criteria and safety regulations.

CE2.5 Configure gateways using specific tools (terminal emulators, remote desktops, specific configuration programs, among others) according to given technical specifications.

CE2.6 In a practical, properly characterized, gateway deployment scenario that supports the integration of voice and data transmission and transmission services for the provision of such services:

-Distinguished the services to be implemented according to the needs reported.

-Configure the protocols to provide the service.

-Perform tests to ensure the operation of the implemented services.

-Document the processes performed according to specifications.

CE2.7 Identify the actors involved in the provision of communications services, for the allocation of functional and legal responsibilities of each of them, taking into account the structure and functioning of the telecommunications market.

CE2.8 Classify the enterprise-wide communications services offered in the telecommunications market, assessing their functional characteristics according to given technical specifications.

C3: Define incident detection and management procedures in voice, data, and multimedia communications services according to quality specifications.

CE3.1 Describe features and functionalities of the tools used for incident detection and management, taking into account the specifications of service delivery.

CE3.2 Classify the incidences and establish the levels of severity, depending on the results obtained in the diagnostic procedures performed by specific tools, for the establishment of a contingency response plan in the communications services, according to specifications for the provision of services given.

CE3.3 Develop the action plans in the event of anticipated incidents, in order to provide a systematic process of solution to the personnel responsible for it according to specifications of the provision of services given.

CE3.4 In a practical, duly characterized, practical scenario of defining the procedures for action in relation to different types of incidents in the communications equipment of voice, data and multimedia services, in order to perform the tasks of detection and notification of the same:

-Use the specific tools for incident detection.

-Isolate and diagnose incidents by using previously defined tools and processes.

-Proceed to the solution or escalation of the incident based on the results of the diagnostics performed.

-Identify the actors involved in the provision of services and the responsibility of each of them.

-Document the processes performed.

C4: Implement and maintain multimedia communications services based on the functional specifications received.

CE4.1 Distinguished the elements and functions that integrate the architecture for the implementation of multimedia communications services, before a given service implementation design.

CE4.2 Evaluate the technical characteristics of the equipment and communications lines that configure the multimedia system, to determine the degree of compliance of the given communication needs specifications, taking into account the multimedia data communications technologies.

CE4.3 Identify the configuration parameters of the protocols for their implementation in multimedia content communication equipment, according to functional and quality specifications of the services to be provided.

CE4.4 In a practical, well-characterized, practical scenario of implementing a communications system to support multimedia services:

-Evaluate the devices, lines, and protocols that are used for system implementation as required.

-Define the configuration parameters and hardware and software installation processes of the devices and system protocols to ensure the functionality of the system.

-Describe system testing procedures to verify the functionality of the services provided.

-Document the processes performed according to specifications.

CE4.5 Elaborate hardware and software maintenance procedures for communications systems for multimedia services, taking into account the technical and functional specifications of the devices, lines and services to maintain.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.6; C3 with respect to CE3.4; C4 with respect to CE4.4.

Other capabilities:

Adapt to the specific organization of the company integrating into the system of technical-labor relations.

Interpret and execute the instructions you receive and take responsibility for the work you do, communicating effectively with the right person at any time.

Organize and execute the intervention according to the instructions received, with criteria of quality and safety, applying the specific procedures of the company.

Show at all times an attitude of respect towards colleagues, procedures and internal rules of the company.

Contents:

1. Voice and data communications networks

Elements of a communications network.

multiplexing techniques.

Switching, transport, and signaling functions.

2. Voice and data network architecture

Access networks: guided unguided.

Trunk Networks: MTA (Asynchronous Transfer Mode-ATM). JDS (Synchronous Digital Hierarchy-SDH). JDP (Plesiocrone Digital Hierarchy-PDH).

Encryption and encryption mechanisms of the Information.

Data transport security systems.

3. Communications services

Voice services.

Corporate and intelligent network services.

Data services, IP services. IP telephony.

Telematic and interactive services. Other value-added services.

Quality of Service (QoS) criteria.

Control of delays and congestion.

Tools for Incident Detection and Management: Types and Features.

4. Multimedia communications services

Structure of a multimedia system.

Multimedia Standards.

Architecture and elements of a multimedia services system: server applications and client applications.

5. Gateway implementation and configuration

Gateway types and functions.

Configuration parameters.

Configuration Tools.

Management protocols.

Quality parameters in the service.

Commands for maintenance and troubleshooting.

6. Telecommunications market

Telecommunications situation. Legal framework and standards bodies.

Major services in the market.

Agents in the telecommunications market: manufacturers and suppliers, service providers, operators, operator profiles, users.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the integration of voice, data and multimedia services, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: ADMINISTERING COMMUNICATIONS SERVICES FOR USERS

Level: 3

Code: MF0963_3

Associated with UC: Manage and provide communications services to users

Duration: 150 hours

Assessment capabilities and criteria:

C1: Maintain the infrastructure of the communications network, both hardware and software, taking into account the technical and functional specifications of the elements that form the network.

CE1.1 Describe the properties and characteristics of the switching and transmission elements of the communications network, to identify maintenance needs according to technical specifications.

CE1.2 Distinguished functions and characteristics of the hardware elements that form the network, to proceed to its update according to specified needs.

CE1.3 To distinguish the functions and features of the software from the network equipment, to proceed to its update.

CE1.4 Describe the access tools to the elements of the communications infrastructure, to perform software update operations and configuration of functional parameters according to the technical specifications of the equipment and the geographical possibility of access.

CE1.5 Classify the methods, techniques and tools used for performing corrective and preventive maintenance procedures in the communications network, according to technical details of the elements and lines of communication.

CE1.6 In a practical, well-characterized, well-characterized, user communications service administration, properly characterized, updated, and configured elements of the network switching and transmission infrastructure to ensure the delivery of system services, following technical specifications given:

-Locate the switching and transmission elements in the communications network map to identify their characteristics.

-Identify the hardware items on which the upgrade procedures are to be performed.

-Perform software update and configuration tasks using remote control and management tools for communications network elements.

-Discriminate the test procedures to be applied based on the update and configuration operations performed on the communications network elements to verify the compatibility of the components and the reliability in the delivery of the services.

-Document the processes performed.

C2: Specify the procedures for maintaining and managing voice and data communications services, according to given technical and functional specifications.

CE2.1 Distinguished the performance parameters of voice and data services, to ensure the continuity and quality of the service provided, according to technical specifications of the communications infrastructure.

CE2.2 Identify the capabilities of communications network management tools, for monitoring voice and data services in terms of configuration, utilization and performance, security and fault management as required in the management of voice and data services.

CE2.3 Describe the functionalities of network management protocols for use in the configuration and monitoring of communications equipment, according to quality and continuity criteria in the provision of voice and data services.

CE2.4 Analyze the use and integration of communications resources by voice and data services, to make proposals to resize them according to the quantity and quality of communications services provided.

CE2.5 In a practical scenario, properly characterized, perform the tasks of maintaining the voice and data communications resources to ensure its functionality and service delivery:

-Identify the management tools to calibrate the effectiveness and performance parameters of the services according to criteria of quality and continuity of delivery of the services.

-Perform remote management tasks on communications teams using the corresponding network management tools.

-Perform hardware and software upgrade tasks for communications equipment according to technical specifications of network elements.

-Check the compatibility and absence of conflicts between updated devices and components to ensure service delivery in optimal quality and continuity conditions.

-Document the processes performed.

-Develop the periodic maintenance plan for communications equipment according to given functional specifications.

C3: Plan processes for monitoring the performance of resources and communications services, according to given technical specifications.

CE3.1 Classify the measurement systems of consumption and performance of the resources and services of the communications system, according to existing standards and standards of standardization.

CE3.2 Identify the performance parameters of the services offered in the communications network, to ensure the pre-fixed quality levels in the provision of the services in given functional specifications.

CE3.3 Distinguished and use the specific tools and monitors that will allow the evaluation of the performance of the communications services, according to levels of quality and continuity of the delivery of the given service.

CE3.4 In a practical, well-characterized, well-characterized case of administration of communications services for users, duly characterized, plan the monitoring of the returns of the resources and communications services to evaluate the criteria of quality and continuity in the delivery of the same:

-Determine the metrics to use in the collection of information.

-Define the consumption and performance analysis parameters.

-Use the monitoring tools to verify that the consumption and yields are within the preset limits.

-Document the processes performed.

C4: Assign the communications resources to the users, to serve the requested services according to given specifications.

CE4.1 Classify the services that the communications network can provide to identify the functionalities that can be offered to users, taking into account the typology and architecture of the network.

CE4.2 Identify the relationship between the communications resources and the availability of a service, to ensure the provision of the service according to technical specifications of the elements and lines of the communications network and the functional details of the configuration of the service to be provided.

CE4.3 Evaluate the availability of sufficient resources to provide service to users, according to quality and continuity criteria in service delivery.

CE4.4 Assign resources and enable services to users using specific tools and differentiating their functionalities, according to the technical information of the tools themselves.

CE4.5 Document the allocation of resources and the enabling of services to users made according to given specifications.

C5: Understand the incidences produced in the allocation and use of communications services and resources, according to given specifications.

CE5.1 Identify the meaning of the alarms and alerts of the elements that form the infrastructure of the communications network, to ensure the delivery of the services according to quality specifications in the same.

CE5.2 Identify and isolate the incidence from the symptoms detected in the communications network and the information reported by the users, to proceed to make the diagnosis using specific tools and techniques of detection of incidences in communications systems.

CE5.3 Apply the diagnostic and repair procedures for the incident on the communications network, following instructions given.

CE5.4 Distinguished the types of incidents in order to identify the causes that produce them, be the responsibility of the operator, the user or the service provider, taking into account the characteristics of the services and resources provided.

CE5.5 In a convenient, properly characterized, attention-and-resolution scenario in a system in which different types of incidents are simulated in the communications network to completely or partially interrupt a communications service:

-Interpret the alarms produced by the communications elements.

-Isolate the causes that produce the incident and diagnose the possible solutions.

-Perform the solution or escalation of the incident according to the given procedure.

-Document the processes performed.

C6: Define communications application installation procedures on terminal equipment according to technical and functional specifications.

CE6.1 Identify the specific communications services for terminals offered by the communications operators, depending on the infrastructure used.

CE6.2 Classify the types of terminals in order to evaluate their performance, taking into account their functionalities, services that support and technical characteristics of the same taking into account the needs, requirements and specifications of the services to be implemented in them.

CE6.3 Implement and configure applications on terminals to enable specific services according to given functional specifications.

CE6.4 Verify that the functionality in the delivery of the communications service is given in the client terminal, to guarantee the quality levels.

CE6.5 In a practical, properly characterized, application installation and service enablement scenario for communication terminals for the definition of the corresponding procedures:

-Use client terminal simulators to perform pre-deployment and configuration tests for applications and services.

-Define application deployment processes as well as service configuration instructions.

-Test applications and services on different communications client terminals to determine compatibility parameters and ensure quality levels in service delivery.

-Document the processes performed.

Capabilities whose acquisition must be completed in a real workbench:

C1 from CE1.6; C2 from CE2.5; C3 from CE3.4; C5 from CE5.5; C6 from CE6.5.

Other capabilities:

Adapt to the specific organization of the company integrating into the system of technical-labor relations.

Interpret and execute the instructions you receive and take responsibility for the work you do, communicating effectively with the right person at any time.

Organize and execute the intervention according to the instructions received, with criteria of quality and safety, applying the specific procedures of the company.

Habit to the business rate of the company meeting the daily performance goals defined in the organization.

Show at all times an attitude of respect towards colleagues, procedures and internal rules of the company.

Contents:

1. Maintenance and updating of communications network switching and transmission elements

Functions and features.

Remote access and control tools, features.

Corrective and preventive maintenance.

2. Managing communications network resources and services

Map of the communications network.

Quality of Service.

Network Management Center: design and resources involved.

Relationship between resources and services.

Tools for resource allocation: types and features.

Monitoring and performance of services and resources.

3. Management of communications networks

Functional aspects of network management.

Network management protocols.

Tools for network management.

Monitoring a communications network: types of incidents in service delivery, alert notification tools, and alarms.

Centralized and distributed management.

Management systems in telecommunication operators.

The detection and diagnosis of incidents: specific tools.

Software updates.

Contingency plans.

4. Communications terminals

Types and features.

Operating systems and specific programming languages for terminals.

Terminal-specific services.

Client, management, and configuration applications.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the administration and provision of communication services to users, which will be accredited by one of the following ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX XII

Professional Qualification: Computer Systems Programming

Professional Family: Informatics and Communications

Level: 3

Code: IFC303_3

General Competition

Develop software components from specific specifications, providing operating system administration and monitoring functions, managing the resources of a computing system, and interacting with other systems using object-oriented development technologies and components.

Competition Units

UC0490_3: Manage services on the computer system

UC0964_3: Create software elements for system and resource management

UC0965_3: Develop software elements with component-based programming technologies

Professional Environment

Professional Scope

Develops its professional activity in the area of systems or development dedicated to the programming and maintenance of computer systems, in entities of public or private nature, small and medium-sized enterprises or micro-enterprises, both self-employed and others, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located mainly in the services sector, and mainly in the productive sub-sector of the marketing of services of analysis, design and construction of computer applications or in any other productive sector that uses computer systems for its management as part of the equipment of programming and maintenance.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

System Programmers

Component Programmers

Associated Training (510 hours)

Training Modules

MF0490_3: Service management on computer system (90 hours)

MF0964_3: Developing software items for systems management (210 hours)

MF0965_3: Software development based on component-oriented technologies (210 hours)

COMPETITION UNIT 1: MANAGE SERVICES ON THE COMPUTER SYSTEM

Level: 3

Code: UC0490_3

Professional Realizations and Realization Criteria:

RP 1: Manage system configuration to ensure process performance according to the needs of use and within the organization's directives.

CR 1.1 The processes involved in the system are identified in such a way as to allow the evaluation of performance parameters.

CR 1.2 The parameters that affect system components: memory, processor, and peripherals, among others, conform to usage needs.

CR 1.3 Process execution priorities are tailored to the specifications of the organization's operating plan.

CR 1.4 Monitoring tools are implemented and configured to determine alarm levels according to the organization's operating plan.

RP 2: Administer storage devices according to the needs of use and within the organization's directives.

CR 2.1 Storage devices are configured to be used in the various operating systems used in the computer system.

CR 2.2 The storage structure is defined and implemented based on the needs of the different file systems and the organization's usage specifications.

CR 2.3 The object naming requirements and usage restrictions for each storage device are properly documented.

CR 2.4 Storage devices are integrated to provide a functional system to the user according to the organization's specifications.

RP 3: Manage user tasks to ensure system access and resource availability according to the operating specifications of the computer system.

CR 3.1 User access to the computer system is configured to ensure system security and integrity according to the organization's specifications.

CR 3.2 User access to resources is administered by assigning permissions based on the needs of the organization.

CR 3.3 The resources available to users are limited to the appropriate tools based on what is specified in the organization's usage rules.

RP 4: Manage network services to ensure communication between computer systems according to operating needs.

CR 4.1 Communication services are established with a quality of service system in such a way as to ensure the communication of these services.

CR 4.2 The communications devices are verified as regards their configuration and performance according to the specifications of the organization.

CR 4.3 The resource consumption of the communications services is analyzed, verifying that they are within the scope of the specifications of the organization's operating plan.

CR 4.4 The incidences detected in the communications services are documented to inform those responsible for the operation of the system and the management of the system according to the protocols of the organization.

Professional Context:

Production media:

Operating systems. User administration tools and resource permission management. Performance control tools. Process monitoring tools. Memory usage monitoring tools. Storage device management monitoring tools. User management tools.

Products and results:

System operating correctly. System performance appropriate to the operating parameters.

Secure and integrated system for accessing and using resources. Communications services in operation.

Information used or generated:

Operating system and device operating manuals. Plan of operation of the organisation. Manuals of the monitoring tools used. Graphics and performance analysis. Access listings and user restrictions. Incident report. Protocol for action against incidents.

COMPETITION UNIT 2: CREATE SOFTWARE ITEMS FOR SYSTEM AND RESOURCE MANAGEMENT

Level: 3

Code: UC0964_3

Professional Realizations and Realization Criteria:

RP 1: Develop software components that implement operating system management tools and services, using systems-oriented languages, to support administrative tasks according to given functional needs.

CR 1.1 The resources to be used in the development of the software components or management tools to implement are defined, analyzing the technical specifications and the functional needs detected.

CR 1.2 The diagramming and documentation prior to the development of the component is elaborated by specifying the necessary requirements for its inclusion in libraries in order to facilitate its reuse.

CR 1.3 Software components are encoded according to the technical specifications of the supplied design, making use of programming and debugging tools and reusing system library functions.

CR 1.4 The test plan is developed in a way that ensures the functionality of the developed components, according to established specifications and quality criteria.

CR 1.5 The services and tools software components developed are tested and debugged, to correct the errors using the programming environment debugging tools according to the quality criteria set.

CR 1.6 The documentation of the software components of management services and tools is elaborated, following the patterns, regulations and procedures specified by the organization.

RP 2: Encode the functions of the system libraries for use in the development of software components and optimization of developments according to technical and functional specifications.

CR 2.1 The documented functions of the system libraries are identified and cataloged, to make it easier to locate the information for them according to development needs.

CR 2.2 The functions of the system libraries are used in the development of new software components, to improve the performance of the developments through the reuse of the written and tested code, according to the technical specifications of each function and the requirements of invocation of the same.

CR 2.3 Software components are developed with the specified requirements, to be included in libraries for later use and distribution, according to technical needs and specifications.

CR 2.4 The functional and structural tests of the completed component are planned and performed, in order to verify and ensure the development objectives according to the technical and quality specifications of the organization.

CR 2.5 The documentation of the libraries of the developed operating system is done, to fulfill the needs of the registry according to the patterns, regulations and procedures specified in the design.

RP 3: Develop software components using system programming-oriented languages, according to specifications set to handle hardware devices.

CR 3.1 The characteristics and parameters of the software components to be developed are defined according to the specifications of the hardware devices to be handled and the operating system to be used, detailing the requirements necessary for their inclusion in libraries in order to facilitate their reuse.

CR 3.2 Device handlers are encoded using programming and debugging tools and using existing system library functions.

CR 3.3 The test plan is designed to ensure the functionality of the component and the absence of conflicts with other components of the system.

CR 3.4 Device handlers are tested, following the plan developed and in the possible scenarios in which it can be implemented.

CR 3.5 The technical and user documentation of the developed handler is made according to the parameters and regulations of the organization.

RP 4: Develop software components that implement communications services, to link different systems according to development standards.

CR 4.1 The characteristics of the software components to be developed (communications ports between systems, standard protocols, among others) are defined according to the specifications of the communications service to be implemented and the operating system to be used, detailing the requirements necessary for their inclusion in libraries in order to facilitate their reuse.

CR 4.2 The communication software components between systems are encoded using programming and debugging tools, and using existing system library functions.

CR 4.3 The component is subjected to test batteries in replicas of the possible scenarios of its subsequent implantation, to ensure the functionality and integrity according to quality and safety criteria of the organization.

CR 4.4 The documentation of the development and tests carried out is made following the patterns, regulations and procedures specified in the design.

Professional Context:

Production media:

Anti-virus firewall and proxy servers. Integrated development environments. Computer equipment, peripherals, and hardware devices. Version control tools. Test tools. Debugging tools. Development tools or integrated environments (IDE). Application distribution tools. Programming element documentation tools. Office tools. Modeling languages. Structured languages. Object-oriented languages. Concurrent programming languages.

Products and results:

Services software components and operating system tools. Hardware device management software components. Communications services software components.

Information used or generated:

Documentation on cases and test data developed. Technical documentation of the design of the software to be developed. Technical and user documentation of the software developed. Software operating manuals. Operating system programming interface (API) manuals. Manuals of the programming tool used. Operating system usage manuals. Programming Environment (IDE) manuals. Manual of the programming language used. Technical manuals of the hardware to program. Corporate standards for software development, testing, quality control. Systems for the support of computer applications. Technical support for assistance (telephone, Internet, messaging and forums, among others).

COMPETITION UNIT 3: DEVELOP SOFTWARE ELEMENTS WITH COMPONENT-BASED PROGRAMMING TECHNOLOGIES

Level: 3

Code: UC0965_3

Professional Realizations and Realization Criteria:

RP 1: Design the software component, to ensure its development according to the specifications received.

CR 1.1 The design and documentation prior to the development of the component is elaborated according to technical specifications of the architecture of components and the functional needs.

CR 1.2 The interfaces of the software component to be developed are defined for intercommunication with the other components of the system according to technical specifications of the component architecture and functional needs.

CR 1.3 The component structure is designed using component building standards to facilitate and ensure integration into architecture and development procedures, according to technical specifications of the architecture used and functional needs.

CR 1.4 The documentation of the design is made, following the patterns, rules and procedures specified by the organization.

RP 2: Develop the software component for integration into a defined architecture, based on the design and specifications received.

CR 2.1 The component is encoded using the languages supported by the architecture used, according to the design specifications, using programming and debugging tools.

CR 2.2 The component interface is performed with specific tools and languages, to implement the communications path with the rest of the components according to the architecture interface definition standards.

CR 2.3 The component is subjected to test batteries to verify its functionality according to quality and safety criteria of the organization.

CR 2.4 The development and testing documentation is prepared by following the patterns, rules, and procedures specified by the organization.

CR 2.5 The centralized or distributed version control tools are used to ensure the proper control of changes in the software by facilitating the development and testing of modifications related to new functionality and error correction.

RP 3: Perform the deployment and deployment of the developed components for integration into the system, according to technical specifications of the architecture.

CR 3.1 The structure of the component is tested by verifying that it communicates with the other components and does not produce conflicts, according to the quality and safety criteria of the organization.

CR 3.2 The deployment procedures are defined according to the requirements of the developed component and according to criteria of quality, safety of the organization and specifications of the architecture, to ensure the implementation of the same with the provision of its functionalities and the absence of conflicts.

CR 3.3 The performance of the developed components is monitored to ensure their integration into the system according to the quality and safety criteria of the organization.

CR 3.4 The deployment and deployment documentation is prepared, following the patterns, rules and procedures specified by the organization.

Professional Context:

Production media:

Integrated development environments. Computer equipment and communications peripherals. Version control tools. Debugging tools. Development tools or integrated environments (IDE). Application distribution tools. Programming element documentation tools. Change, incident, and configuration management tools. Test tools. Office tools. Modeling languages. Data manipulation languages. Structured languages. Object-oriented languages. File transfer and messaging services. Operating systems and configuration parameters.

Products and results:

Design and development of software components to integrate into defined architecture. Software component integrated into the system and running.

Information used or generated:

Documentation on cases and test data developed. Technical documentation of the design of the software to be developed. Technical and user documentation of the software developed. Operating system programming interface (API) manuals. Operating system usage manuals. Manuals for the use and operation of computer systems. Programming Environment (IDE) manuals. Programming language manuals. Manual of the programming language used. Technical manuals for the communications devices on which to be scheduled. Corporate standards for software development, testing, quality control. Technical support supports (telephone, Internet, messaging and forums, among others).

TRAINING MODULE 1: MANAGING SERVICES IN THE COMPUTER SYSTEM

Level: 3

Code: MF0490_3

Associated with UC: Manage Services in Computer System

Duration: 90 hours

Assessment capabilities and criteria:

C1: Analyze system processes in order to ensure proper performance for the parameters specified in the operating plan.

CE1.1 Identify system processes and parameters that characterize them (parent processes, process status, resource consumption, priorities, and affected users among others) to determine their influence on system performance.

CE1.2 Describe each of the tools provided by the system for process management to allow intervention in the overall system performance.

CE1.3 Explain monitoring techniques and tools to evaluate system performance.

CE1.4 In a scenario of analyzing the performance of a computer system with a properly characterized process load:

-Use system tools to identify how many active processes exist and the particular characteristics of some of them.

-Perform priority activation, deactivation, and modification operations with a process using the system tools.

-Monitor system performance by using specific tools and setting alarms, which indicate risk situations.

C2: Apply administration procedures to storage devices to provide the user with a complete, secure and available information record system.

CE2.1 Identify the various usable file systems on a given storage device to optimize the logging and access processes.

CE2.2 Explain the features of file systems based on the storage devices and operating systems used.

CE2.3 Describe the overall storage structure in the computer system by associating the devices with the different existing file systems.

CE2.4 In a scenario of applying information storage management procedures with multiple devices:

-Perform partitioning, where necessary, and the generation of the infrastructure of the file systems to be installed on each device.

-Implement the overall storage structure by integrating all devices and their corresponding file systems.

-Document the requirements and constraints of each file system in place.

C3: Manage system access and resources to verify the proper and safe use of them.

CE3.1 Identify the system access capabilities by distinguishing remote access from local accesses.

CE3.2 Describe the tools that are used in the management of permissions to users for the use of system resources.

CE3.3 In a scenario of administering access to the system where you have the user administration right:

-Identify a user's possible access to the system.

-Modify the permissions of using a system resource to a user.

-Define limitations of using a system resource to users.

C4: Evaluate the usage and performance of communications services to keep them within specified parameters.

CE4.1 Explain the configuration and operation parameters of communications devices to ensure their functionality within the system.

CE4.2 Relate the active communications services on the system to the devices used by them to analyze and evaluate performance.

CE4.3 In a scenario of evaluating the use and performance of a computer system connected to the outside by means of several lines of communication:

-Identify communications devices and describe their characteristics.

-Verify the status of the communications services.

-Evaluate the performance of communications services.

-Detect and document the incidents produced in the system.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.4; C3 with respect to CE3.3; C4 with respect to CE4.3.

Other capabilities:

Maintain the work area with the appropriate degree of order and cleanliness.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Interpret and execute work instructions.

Demonstrate stress resistance, mood stability and impulse control.

Contents:

1. Processes

States of a process.

Handling of signals between processes.

Process Administration.

Changing priorities.

Process Monitoring.

Managing resource consumption.

2. Storage Systems

Storage devices.

File systems.

General storage structure.

System tools for managing storage devices.

3. Managing users

Access to the system.

Permissions and access to resources.

Resource Usage Limitations.

4. Communications services

Communications devices.

Communications protocols.

Communications services.

Yields of communications services.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the management of services in the computer system, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: DEVELOPING SOFTWARE ELEMENTS FOR SYSTEMS MANAGEMENT

Level: 3

Code: MF0964_3

Associated with UC: Create software items for system management and your resources

Duration: 210 hours

Assessment capabilities and criteria:

C1: Analyze the technical specifications provided for the development to be performed, checking its validity and optimization.

CE1.1 Classify the main operating system architectures (monolithic, modular, 'microkernel', distributed systems) and their characteristics, to identify the management and management needs of these systems according to technical specifications.

CE1.2 Explain the sections of a requirement analysis, detailing the basic diagrams used for functional and data specification according to methodologies and design standards.

CE1.3 Analyze the technical specifications of the service or management tool that you want to implement, to identify the required resources of the component according to the given functional specifications.

CE1.4 Perform the diagrams prior to the development phase by following the specified technical specifications and quality criteria.

CE1.5 In a practical scenario, interpretation of a given requirements analysis for the development of a software element, taking into account the needs of managing the resources of the computer system:

-Define the software modules to be made from the technical specifications and the requirements catalog.

-Set the relationships between modules by determining inputs, outputs, and data flows according to the functional design and system specifications.

-Determine the structures required to represent the information specified in the requirements.

-Create the necessary structures to track requirements during the encoding of the software item according to specified quality criteria.

C2: Develop software items for system resource management, using systems programming languages and tools.

CE2.1 List structured tools and languages, oriented to program development for system resource management, detailing their characteristics.

CE2.2 Describe the operating techniques and principles of memory systems, detailing their organization in hierarchies, to develop software elements that use them according to the functional specifications provided.

CE2.3 Classify the input/output architectures, buses and microprocessors in systems, explaining the techniques and functional processes used for the development of the software elements, according to given functional specifications.

CE2.4 Distinguished the functions of the system libraries for the development of new software components, reusing the code already developed.

CE2.5 Describe how to incorporate new elements into system libraries, based on specified optimization and quality criteria.

CE2.6 Describe the types of tests, both functional and structural, and the debugging processes to which a developed component and the tools used, to verify its functionality and integration with the other components of the system, according to specified quality criteria.

CE2.7 Classify the tools used in the development phases: code generation, creation of the executable modules, version control, debugging and testing, documentation and packaging for distribution to optimize the generation and ensure the quality of the products of the development, according to specified safety and quality criteria.

CE2.8 In several practical scenarios for designing and coding software elements for system resource management, given technical specifications:

-Design the algorithms associated with the software element using structured development techniques.

-Encode software modules from algorithms designed using tools and structured languages.

-Encode data structures using the functionality provided by the structured language and using the resources and libraries available in the development tools to perform the encoding of the algorithms.

-Design and code the necessary error handlers to ensure the optimal operation of the software module.

-Design and code components that allow concurrent access to system resources.

-Document the modules developed to facilitate their review and future modifications and extensions.

CE2.9 In several practical scenarios for testing and modifying software elements for managing system resources, given a coded element, documentation of the system, and technical specifications:

-Purge the developed modules using the available tools.

-Design and apply test batteries on the developed modules to test their correct operation and document the results obtained.

-Develop the necessary changes in the encoding of the element to fix the possible operating errors encountered.

-Document the changes made in the modules developed to facilitate their review and future modifications and extensions.

-Perform the implementation of the modules documenting the process and the detected incidents.

C3: Use the techniques and standards used in the development, distribution and deployment of device handlers (drivers), for the integration of peripherals into the computer system according to given technical and functional specifications.

CE3.1 Use the techniques, standards, and programming tools to develop the device handler and debug possible errors in the developed code, according to technical specifications of the tools and functional needs given.

CE3.2 Perform the test of the device handler elaborated in the possible scenarios in which it can be implanted, to ensure its functionality and the absence of conflicts with the rest of the elements of the system according to technical specifications and quality regulations given.

CE3.3 Confect the technical and user documentation of the developed handler according to given parameters and regulations.

CE3.4 In a scenario of modifying a device handler in which a change is to be made to its design, according to given functional specifications:

-Modify the code to incorporate the necessary changes following the specified quality criteria.

-Check, by performing tests, that the modification has been successfully incorporated and that it has not altered the functionality of the other handlers, in particular, and the system in general.

-Perform the update of all documentation that is affected by the proposed change.

CE3.5 In a convenient, properly characterized scenario of developing a device handler from a given functional specification:

-Design the device handler using structured development techniques and the appropriate standards for the device type.

-Encode the device handler using the selected tool, applying the previously obtained layout and using structured languages.

-Implement the device handler by documenting the generated code, the results obtained, and the detected incidents.

C4: Implement communications services between systems by applying the techniques and standards of software element development, according to given technical and functional specifications.

CE4.1 Classify communications service architectures to distinguish services delivered in client/server environments from peer to peer (point-to-point) environments.

CE4.2 Describe the protocols and ports used for intersystem communication, taking into account the support they offer to communications services.

CE4.3 Identify major APIs (Aplication Program Interface) and libraries and their use for development through structured programming.

CE4.4 Code the component using appropriate programming and debugging tools to optimize the development phase according to given technical specifications.

CE4.5 Submit to the component a battery of tests in replicas of possible scenarios of its subsequent implantation, to verify the absence of conflicts and their integration with the rest of the components of the system, according to criteria of quality and safety given.

CE4.6 Classifying defined standards for the development of communications services between systems according to different criteria: standardization organizations, service types, and supported protocols, among others.

CE4.7 List the main security issues in the field of communications and describe the strategies to be applied, for the development of components that implement secure services according to standards and specifications given.

CE4.8 In a number of scenarios for the development of components for the establishment of inter-system communications services, given technical specifications:

-Design the component using structured development techniques and defined standards.

-Encode the software element using the appropriate tool, applying the design previously obtained and using structured languages.

-Purge and test the component by ensuring its optimal operation.

-Design batteries for possible attacks against the service and test them for possible vulnerabilities.

-Implement the components to verify the communications service by documenting the detected results and incidents.

-Document the developed code, the tests performed and the result of the processes of implantation of the components.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.8 and CE2.9; C3 with respect to CE3.4 and CE3.5; C4 with respect to CE4.8.

Other capabilities:

Prove a good professional.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Use time and effort to extend knowledge and supplemental information for use in your work.

Learn new concepts or procedures and effectively leverage training using acquired knowledge.

Contents:

1. Features of the operating system architecture

Major operating system architectures and their features.

Managing resources.

Libraries and system functions.

2. Analysis of development requirements

The software development cycle in systems management.

Analysis, design and programming for systems management.

Process Models: Nomenclature and Representation.

Data Models: Nomenclature and Representation.

Diagramming and documentation tools.

Quality metrics and standards for software development.

3. Developing software items for system management and their resources

Development tools: editors, compilers.

Structured programming techniques and tools oriented to system programming: data types and structures, operators, logical structures, statements, recursiveness, concurrent programming, exceptions.

Calls to System Functions.

4. Testing and documentation of software items for system management and their resources

Planning and design of tests.

Software debugging techniques and tools.

Testing and verification of development.

Software and documentation tools for developed software.

Software compression and packaging tools.

Software and software distribution and deployment systems.

Development Control Systems (CVS).

5. Device handlers (drivers)

Architecture of the computer equipment subsystems.

Managing the buses and ports of the operating systems.

Managing the devices of the operating systems.

Specific modes and device handler development standards.

Device handler development and verification tools.

Device handler installation and distribution procedures on operating systems.

6. Developing cross-system communications processes

Concurrent access to system resources.

Communication protocols.

Physical devices and communication ports.

Communications services.

Yields of communications services.

Network programming.

Client/Server Applications.

'Sockets'.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the creation of software elements for the management of the system and its resources, which will be credited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: SOFTWARE DEVELOPMENT BASED ON COMPONENT-ORIENTED TECHNOLOGIES

Level: 3

Code: MF0965_3

Associated with UC: Develop software elements with component-based programming technologies

Duration: 210 hours

Assessment capabilities and criteria:

C1: Identify the features and architectures of development technologies, oriented to components for the creation and modification of software elements integrated in these environments, according to existing standards and regulations.

CE1.1 Describe the development techniques and methods involved in the development paradigm, oriented to components for making and modifying software elements, according to the standards of this technology.

CE1.2 Classify tools and languages oriented to objects used in component-oriented development, describing their characteristics to identify those that are specific to the creation or modification of the software elements, according to the given functional specifications.

CE1.3 Classify the standards of component models, describing the gateways to interoperate between heterogeneous components, to perform the tasks of integrating the developed elements according to functional and technical specifications.

CE1.4 Identify diagramming and documentation techniques for software development based on component-oriented technologies, according to design standards of component-oriented methodologies.

CE1.5 In a convenient design of component design within a given architecture and with precise functional specifications:

-Perform the diagramming and pre-development documentation for the component, to optimize the component creation processes according to the specifications received.

-Identify the different interfaces and techniques used for component intercommunication, in order to apply them to the development of new components.

-Define the interfaces of the software component to be developed for intercommunication with the other components of the system, according to technical specifications of the component architecture and functional needs.

-Design the component structure using the component creation standards, according to technical specifications of the architecture used and functional needs.

-Confect the design documentation performed by following the specified patterns, rules, and procedures.

C2: Build software elements from the needs specifications and with the development conditions of the component technology used.

CE2.1 Explain the development and implementation approaches for building components by applying the reuse principle.

CE2.2 Describe the process of adapting an existing component to include it in the architecture you want to reuse, according to technical specifications of the component technology used.

CE2.3 Enunciate the design process features of a new component to include in the architecture you want to use, ensuring future reuse.

CE2.4 Classify the programming and debugging tools to optimize the development phase of the components according to given specifications.

CE2.5 Identify the elements and parameters of the component interface, for development with specific tools and languages, to implement the communications path with the rest of the components according to the architecture interface definition standards.

CE2.6 Apply component installation techniques, checking that you run the required actions and their availability for applications that invoke it, according to technical specifications of the architecture.

CE2.7 In a scenario of developing reusable software components, given a design of its structure and functional and technical specifications:

-Check that the functionality of the designed component can be extended for future reuses, modifying but the same to achieve it.

-Develop the component using object-oriented tools and languages and according to the design specifications resulting from the previous check.

-Debug and test the developed component using the available tools.

-Document the component and its interfaces to facilitate future reuse.

CE2.8 In a scenario of software development reusing components, given functional and technical specifications:

-Use component repositories to locate those that conform to the given specifications and can be reused.

-Design the modifications to be made to the existing component to meet the given specifications.

-Modify the component using tools and object-oriented languages.

-Debug and test the modified component using the available tools.

-Document the modifications made to the component and its interfaces to facilitate its future reuse.

-Use centralized or distributed version control tools to ensure the proper control of changes in the software by facilitating the development and testing of modifications related to new functionality and error correction.

C3: Apply component deployment and integration procedures in a component-oriented technology environment, according to technical specifications of the architecture.

CE3.1 Describe the techniques available to perform the component search process, which satisfy the requirements imposed in the initial design.

CE3.2 Classify the assessment and component selection methods, based on a series of requirements imposed by the initial design specifications.

CE3.3 Perform structural tests to verify that the selected component communicates with the other components and does not produce conflicts, according to quality and safety criteria, and the preliminary design.

CE3.4 Define the procedures for deployment and adaptation to perform the implementation of the software element, according to requirements of the developed component and following criteria of quality, safety and specifications of the architecture.

CE3.5 Describe the integration, configuration, and interconnection processes of the selected components, so that they can build the final application according to the quality and safety criteria specified in the initial design.

CE3.6 Monitor the performance of the developed or selected components to ensure their integration into the system, following quality and safety criteria.

CE3.7 Documenting deployment and deployment by following the specified patterns, rules, and procedures.

CE3.8 In a properly characterized scenario, deployment of an already developed software component, according to functional and technical specifications given:

-Apply structural test techniques to the developed component according to established quality standards and standards.

-Incorporate the deployment, adaptation, configuration and integration of the component according to technical specifications and development implementation.

-Tracing component tests according to quality and safety standards.

-Set up the tool for performing automatic test batteries according to quality standards and standards.

-Develop documentation using the templates provided or built into the tool itself.

-Generate quality and metrics reports, and interpret the results.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.7 and CE2.8; C3 with respect to CE3.8.

Other capabilities:

Prove a good professional.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate creativity in the development of the work you do.

Demonstrate a degree of autonomy in the resolution of contingencies related to its activity.

Use time and effort to extend knowledge and supplemental information for use in your work.

Learn new concepts or procedures and effectively leverage training using acquired knowledge.

Contents:

1. Object-oriented programming

The paradigm of object orientation.

Objects: relationships, attributes, and methods.

Classes and data types.

Object-oriented development.

Object-oriented programming techniques.

Object-oriented programming development tools.

2. Component orientation conceptual fundamentals

The concept of component: components and objects.

Reuse of code as a target.

Dependencies of the context.

Components and Interfaces.

Component States.

Specifying and implementing the component.

3. Component architectures

Features of component architectures.

Current Architectures.

Integration and deployment of components.

4. Component-oriented programming

Component-oriented programming versus object-oriented programming.

Component-oriented programming concepts.

Interface Description Languages (IDLs).

5. Distributed programming

Planning and designing software testing with component-based programming technologies.

Software debugging techniques and tools.

Testing and verification of development.

Software and documentation tools for developed software.

Software compression and packaging tools.

Software and software distribution and deployment systems.

Development Control Systems (CVS).

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the development of software elements with component-based programming technologies, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX XIII

Professional Qualification: Auxiliary Operations for Mounting and Maintenance of Microcomputer Systems

Professional Family: Informatics and Communications

Level: 1

Code: IFC361_1

General Competition

Perform auxiliary operations for the assembly and maintenance of microcomputer and peripheral equipment, under the supervision of a responsible person, applying quality criteria and acting in conditions of safety and respect for the environment, following instructions and established procedures.

Competition Units

UC1207_1: Perform microcomputer equipment mount auxiliary operations

UC1208_1: Perform microcomputer system maintenance auxiliary operations

UC1209_1: Perform auxiliary operations with information and communication technologies

Professional Environment

Professional Scope

Develops its professional activity in the area of support and CAU (Center for User Care) dedicated to information technology in entities of public or private nature, companies of any size, both self-employed and foreign, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located mainly in the services sector, in the productive subsectors dedicated to the marketing, assembly, maintenance and repair of microcomputer equipment and services, to the technical assistance of computer science, in telecentres networks and in all those productive sectors that use computer systems for their management.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Microcomputer equipment assembly operators

Microcomputer systems maintenance operators

Microcomputer equipment assembly aids

Microcomputer systems maintenance auxiliaries

Associated Training (330 hours)

Training Modules

MF1207_1: Computer component mount auxiliary operations (150 hours)

MF1208_1: Microcomputer systems maintenance auxiliary operations (90 hours)

MF1209_1: Auxiliary operations with information and communication technologies (90 hours)

COMPETITION UNIT 1: PERFORM MICROCOMPUTER EQUIPMENT MOUNT AUXILIARY OPERATIONS

Level: 1

Code: UC1207_1

Professional Realizations and Realization Criteria:

RP 1: Collaborate on the assembly and replacement of internal components of a microcomputer equipment for operation, using detailed guides, following instructions received and complying with established safety and quality standards.

CR 1.1 Detailed internal device and component connection guides are located for mounting and replacing elements in a microcomputer equipment, following instructions received.

CR 1.2 The components of the microcomputer equipment are installed or replaced by fixing them in the different ports and internal bays, following instructions received, using specific tools and protection elements, and complying with the safety standards and quality criteria established by the organization.

CR 1.3 The internal devices of the microcomputer system are connected to the existing buses and cables, both data and power, to mount the computer equipment, taking into account its physical characteristics and following detailed guides.

CR 1.4 The installation or replacement of the component is checked to ensure its fixation within the computer equipment, recording the results obtained according to regulations of the organization.

CR 1.5 Waste and disposable components of component replacement are treated for disposal or recycling, following instructions received and in accordance with applicable environmental regulations on waste treatment.

RP 2: Collaborate on the assembly, replacement and connection of peripherals to maintain and/or increase the functionality of the computer system, using detailed assembly and connection guides, following instructions received and complying with the established safety and quality standards.

CR 2.1 The detailed guides for mounting and connecting peripherals are located to make the connection of the same to the microcomputer equipment, following instructions received.

CR 2.2 Peripherals are connected by cables and connectors to the appropriate buses, to enable their communication with the system, taking into account their physical characteristics and following detailed assembly and connection guides.

CR 2.3 The connection of peripherals to computer equipment, to other peripherals, to auxiliary equipment required by the device itself or to the communications lines is performed to increase the system's performance, ensuring the fastening and the electrical connections, and complying with safety standards and quality criteria established by the organization.

CR 2.4 Network connection devices such as repeaters, switches, or 'routers' are located in distribution cabinets called racks or default sites to extend the local network and share resources through it, following instructions received, using specific tools and protection elements, and complying with safety standards and internal quality criteria for work.

CR 2.5 The location and attachment of the peripheral and the connection of the data and power cables are checked to ensure their assembly, recording the results obtained according to regulations of the organization.

CR 2.6 The peripherals of a microcomputer equipment are replaced or mounted by following the instructions received and complying with the safety standards and internal quality of work criteria.

CR 2.7 The waste and disposable elements of the replacement of peripherals are treated for disposal or recycling, following instructions received and in accordance with the applicable environmental regulations on waste treatment.

RP 3: Apply procedures and execute testing and monitoring programs to verify the operation of the computer equipment, following detailed guides and instructions received.

CR 3.1 The test procedure is applied in a methodical manner to ensure its execution, following the guidelines indicated in the work guides.

CR 3.2 Testing tools are used to check the functionality of the computer equipment, following instructions received.

CR 3.3 The results obtained by the application of the procedures and the execution of the test programs are contrasted with the results indicated in the work guides, in order to verify the completion of the process, following instructions received.

CR 3.4 The check-up tasks, as well as the detected incidents, are recorded to maintain the control of the verified equipment, according to the procedures of the organization.

Professional Context:

Production media:

Computer equipment. Protective and safety elements: glasses, gloves, static discharge of electricity, among others. Common tools and tools for the assembly of equipment and peripherals. Internal components of the computer: processors, memory modules, motherboards, among others. Network, video, and communications adapters, among others. Storage devices. Network connection devices: repeaters, switches, 'routers', among others. Physical interfaces. Input, output and input/output peripherals. Hardware tools and testing software. Uninterruptible power supply systems. Structured cabling.

Products and results:

Computer equipment mounted and checked. Peripherals connected to computer equipment.

Information used or generated:

Manuals and detailed guides for mounting components on computer equipment. Manuals and detailed guides for connection of peripherals to computer equipment. Technical information of the equipment. Hardware, vendor, and pricing product catalogs. The quality plan of the organization. Documentation on the applicable regulations on safety and hygiene and the prevention of occupational risks. Registration of assembly, check-up and connection of peripherals.

COMPETITION UNIT 2: PERFORM AUXILIARY MICROCOMPUTER SYSTEMS MAINTENANCE OPERATIONS

Level: 1

Code: UC1208_1

Professional Realizations and Realization Criteria:

RP 1: Apply routine checking and cleaning procedures for media and peripherals of the computer system to maintain its functionality, following detailed guides and instructions received.

CR 1.1 The reading/writing peripherals of removable magnetic and optical media and the usual operating procedures are identified, in order to proceed to their maintenance in accordance with the instructions received.

CR 1.2 The cleaning of magnetic and optical media and peripherals is performed using devices and techniques for cleaning the reading/writing heads to maintain their functionality, following detailed guides, and complying with the safety standards and quality criteria established by the organization.

CR 1.3 Cleaning of document printing devices is done using specific tools, following detailed guides, and meeting the safety standards and quality criteria set by the organization.

CR 1.4 Keyboards, mice and other devices are cleaned using brushes, vacuum cleaners and specific devices and products, meeting safety standards and quality criteria set by the organization.

CR 1.5 The check of the status of the peripherals is performed to detect possible anomalies in their operation and to communicate the incidents produced to the top level technician, following instructions received.

CR 1.6 The tasks performed as well as the detected incidents are recorded to control the maintenance of the equipment, following the plans of the organization.

CR 1.7 Waste and disposable elements are treated for disposal or recycling, following instructions received and in accordance with the applicable environmental regulations on waste treatment.

RP 2: Replace wiring and consumable elements of equipment and peripherals to ensure the continuity of their use, following detailed guides and instructions received and complying with established safety standards.

CR 2.1 The replacement of consumable elements in peripherals and other devices is performed using the specific tools according to the peripheral or device, applying the means to open, without risk and with security for the operator and the device, the cover thereof, complying with the established safety standards.

CR 2.2 The ink or toner cartridges of document printing devices are replaced to maintain their functionality, following the detailed guides included in the peripheral documentation itself or in indications within the device, and the instructions received.

CR 2.3 Print devices are fed on paper or forms and the peripheral adjustment or alignment tasks are performed to maintain their operability, following detailed guides and instructions received.

CR 2.4 Network and cable lashes between equipment and peripherals are replaced, to maintain the desired functionality, using specific tools and complying with the established safety standards, taking into account the interconnection to be performed and following the instructions received.

CR 2.5 New peripherals for peripherals are replaced by the detailed guides included in the peripheral documentation itself or instructions received.

CR 2.6 The replacement of consumable items is checked by testing to verify the functionality of the peripheral, following established procedures.

CR 2.7 The tasks performed, as well as the detected incidents, are recorded to control the maintenance of the equipment and peripherals, following the maintenance plans of the organization.

CR 2.8 Packaging, waste and disposable elements are treated for disposal or recycling, following instructions received and in accordance with the applicable environmental regulations on waste treatment.

RP 3: Apply unattended installation/upgrade procedures of microcomputer equipment to perform installations through a local network, intranet or extranet, following detailed guides and instructions received.

CR 3.1 The different physical elements required to perform the unattended installation/upgrade between microcomputer equipment are identified and checked, following detailed work guides and instructions received.

CR 3.2 The silent installation/upgrade procedures for microcomputer equipment are carried out in a methodical manner and following the guidelines set out in the installation guides, to ensure the duplication of a microcomputer equipment.

CR 3.3 The image is installed using the techniques and applying the procedures indicated in the installation guide, to service the microcomputer equipment, following instructions received.

CR 3.4 The installed/updated equipment is checked to verify its functionality, using the techniques and applying the system verification and verification procedures, indicated in the installation guide, following instructions received.

CR 3.5 System-specific parameters are configured to suit your environment, following the instructions in the installation guide and instructions received.

CR 3.6 The tasks performed, as well as the detected incidents are recorded to take control of the cloned teams, according to the organization's maintenance plans.

RP 4: Collaborate on the tasks of labeling, packing and moving equipment, peripherals and consumables, to facilitate their storage, according to safety and cataloging instructions established by the organization.

CR 4.1 The delivery of equipment, peripherals, components and consumables is checked to verify that the delivery matches the order and that they are in good condition, following instructions received.

CR 4.2 Equipment, peripherals, and consumables are tagged to facilitate their storage and control of 'stocage', using specific tools and following the cataloging rules and guidelines set out in the organization.

CR 4.3 Equipment, peripherals, and consumables are packed to facilitate their storage, using the resources and materials available to the effect, following the established organization and safety criteria.

CR 4.4 Equipment, peripherals and consumables are moved to replace them or change their location, using the resources indicated by the organization, following the instructions and complying with the safety standards established by the organization.

CR 4.5 Packaging, waste and disposable elements are treated for disposal or recycling, following instructions received and in accordance with the applicable environmental legislation on waste treatment.

CR 4.6 The tasks performed as well as the detected incidents are recorded to facilitate the control of the warehouse, following the organization's maintenance plans.

Professional Context:

Production media:

Computer equipment. Media and peripheral cleaning tools. Storage devices. Network devices: repeaters, switches, routers among others. Physical interfaces. Input, output and input/output peripherals. Consumable elements in peripherals and other corporate devices. Network and power cable latigulls and data between equipment and peripherals. Equipment packaging material, peripherals and consumables. Product label tools. Labeling. Computer 'cloning' software applications. Software and software applications.

Products and results:

Peripherals and supports clean and maintained. Substituted consumable elements. Updated and operational IT equipment. Peripherals and consumables packed, labelled and moved.

Information used or generated:

Documentation and manuals for system use and operation. Manuals and detailed guides for the maintenance of peripherals. Manual and detailed guide to the replacement of consumables. Detailed manuals and guides for 'cloning' applications and processes. Catalog of consumable products. Hardware and software product labels. Documentation on safety and hygiene standards and prevention of occupational risks. The quality plan of the organization. Applicable environmental legislation on waste treatment. Record of the maintenance operations performed. Component delivery apbarans.

COMPETITION UNIT 3: PERFORM AUXILIARY OPERATIONS WITH INFORMATION AND COMMUNICATION TECHNOLOGIES

Level: 1

Code: UC1209_1

Professional Realizations and Realization Criteria:

RP 1: Handle the file system and peripherals, using the user environment tools provided by the operating system and network services, following instructions received.

CR 1.1 The computer equipment is turned on and visually checked for the messages of the boot and connections with the peripherals, following the established procedure.

CR 1.2 The graphical user interface that the operating system provides is used to locate and access the tools and utilities of the system, according to usage needs.

CR 1.3 File system handling tools are used to perform folder and file creation and manipulation operations, and organize information to make it easier to use, following instructions.

CR 1.4 Peripheral devices such as the printer and scanner are used to present or obtain information and manipulate it with specific computer applications, according to usage needs and following instructions received.

CR 1.5 Information storage devices and media (USB sticks, CDs, DVDs, removable disk drives, among others) are used to access and manipulate it, according to usage needs and following instructions received.

CR 1.6 The resources of a local network are used to access shared folders, files, and devices, following instructions received.

RP 2: Use devices and multimedia applications to handle information, following instructions received.

CR 2.1 Multimedia devices such as microphones, digital cameras, tablets, music players, WebCams, are connected and used to obtain or access their information, following the instructions received.

CR 2.2 The multimedia software attached to or included in the operating system (photo viewers, music software, among others) is used to access information associated with multimedia devices, following instructions received.

CR 2.3 Multimedia learning applications (educational games, encyclopedias, computer-assisted teaching, among others) are used as support for the training and technical retraining of the individual, according to needs of use.

RP 3: Use office-processing applications to make simple documents in a clean and orderly manner, following instructions and using specific formats.

CR 3.1 The options for the application of the word processing application that have to do with the creation, storage, printing and preview are used for the manipulation of the documents, following instructions received.

CR 3.2 The options of the office processing office for applying formats to documents: bold, italic, underline, size and type of fonts, numbering and bullets, tabulations and paragraph alignment, among others, are used to improve the presentation of the same, following instructions received.

CR 3.3 The functions for handling blocks of text within a document are used to cut, copy, move and apply formats to them within the document, following instructions received.

CR 3.4 The images are inserted using the options provided by the word processing application, adjusting them and applying the format indicated, to improve the presentation of the documents, following instructions received.

CR 3.5 The headers and footers are added to customize the documents, using the options provided by the word processing application, inserting autotexts and applying the indicated format, following instructions received.

CR 3.6 The content of the document is verified for error free text, using the spelling correction tools provided by the word processing application and making the necessary changes, following instructions received.

RP 4: Use other office applications (from databases, presentations, spreadsheets, among others) to store and obtain information using designs already made, following instructions received.

CR 4.1 The already designed and created databases are opened by running the appropriate office application, to introduce and present data using already-developed forms and reports, following instructions received.

CR 4.2 The already-worked spreadsheets are opened by running the corresponding office application, to enter, display and print data, following instructions received.

CR 4.3 The already elaborated presentations are opened by running the corresponding office application, to print and view slides, following instructions received.

RP 5: Use Internet resources to search for and obtain information on the internal and external network, using browsers and following the instructions received.

CR 5.1 The browser starts and is used to access Web pages and move around the links they provide, following instructions.

CR 5.2 Web page seekers are used to locate information about specific topics by indicating them in the search criteria, following instructions received.

CR 5.3 Localized information is downloaded and stored on the computer for further use, following instructions received and taking into account applicable regulations.

CR 5.4 Browser options are used to configure the home page and save the addresses of the sites for quick access (favorites), following instructions received.

RP 6: Exchange information using Internet services (mail, messaging, and virtual training platforms, among others) and those provided by the corporate intranet, following instructions received.

CR 6.1 The email account is used to send and receive messages and attach files, according to usage needs and following instructions received.

CR 6.2 The news and blog forums, among others, are used to consult and leave opinions, formulate and answer questions, about specific topics, according to needs of use and following instructions received.

CR 6.3 Instant messaging and video conferencing tools are used to perform message communications with other connected users, according to usage needs and following instructions received.

CR 6.4 Virtual training platforms are used for learning, exchanging information between users and the tutor, according to usage needs and following instructions received.

CR 6.5 The exchange of files between users of the corporate intranet and the Internet is done using specific tools, according to the needs of use and following instructions received.

Professional Context:

Production media:

Computer equipment. Operating systems. Local network configured as an intranet. Local network e-mail. Internet connection. Internet Tools: browser, email. Multimedia software. Multimedia devices. Office tools and applications. Mobility devices, tablets, smartphones.

Products and results:

Local file system organized and connected to corporate use network drives. Captured and stored images and sounds. External information obtained or exchanged on the Internet and stored. Documents and presentations.

Information used or generated:

Operating System Manuals. Manuals for multimedia devices and their applications. Office of office applications. Internet utility user guides. Documents produced, checked in spelling and correctly presented.

TRAINING MODULE 1: AUXILIARY ASSEMBLY OPERATIONS FOR COMPUTER COMPONENTS

Level: 1

Code: MF1207_1

Associated with UC: Perform Microcomputer Equipment Mount Auxiliary Operations

Duration: 150 hours

Assessment capabilities and criteria:

C1: Manipulate electrical and electronic elements safely in equipment assembly tasks by identifying applicable instruments and regulations.

CE1.1 Explain the different components of a microcomputer equipment, identifying those that need a security in the assembly tasks.

CE1.2 Describe previous operations and checks for the safe handling of electronic components, taking into account, in particular, instructions to avoid static electricity.

CE1.3 Identify the measuring instruments and devices needed to safely manipulate electronic equipment, following directions from the use guides.

CE1.4 Identify the security measures to be applied in the handling of electrical and electronic elements taking into account the safety regulations on the prevention of occupational risks.

CE1.5 In a convenient, well-characterized, practical assumption of component assembly in a computer equipment:

-Identify the components to handle with security measures in the mounting procedure.

-Indicate the security measures to be taken into account according to the different electrical and electronic elements involved in the assembly procedure.

-Describe the devices and personal security elements required to perform the activity.

C2: Identify hardware components in a microcomputer system by distinguishing their features and functionalities, to mount, replace and connect them to a computer.

CE2.1 Identify the functional blocks of a microcomputer system for localization on the base plates of different manufacturers, taking into account the form factor of the equipment.

CE2.2 Citar each of the hardware components of a microcomputer system specifying its characteristics and elements that form it.

CE2.3 Distinguished the types of ports, internal bays, and existing connection cables of a microcomputer system, identifying them if they are data or power.

CE2.4 In a practical, well-characterized case, identifying components in different types of base plates with cards and devices (hard disk drives, optical media readers and recorders, bus extensions, among others):

-Recognize the different hardware components.

-Identify the functions of each of the components.

-Describe the connection types that will require the components that need it.

C3: Identify the elements involved in the mounting procedures and assemble the internal hardware components using the appropriate tools and following instructions to mount the microcomputer equipment.

CE3.1 Interpret the instructions for instructions concerning the integration or assembly procedures of the internal hardware component of a microcomputer system in order to be able to be assembled, taking into account the form factor of the computer equipment.

CE3.2 Citar the different tools to be used in the procedures for mounting, replacing or connecting internal hardware components of a microcomputer system.

CE3.3 Distinguished on the base plates the different socket sockets of microprocessors and the dissipators, identifying the means of fixing each of them.

CE3.4 Distinguished the different types of ports, internal bays and existing connection cables of a microcomputer system, and their fixing systems, identifying them by means of graphical schemes.

CE3.5 Identify, by means of the appearance and colors, the card connectors of the microcomputer equipment, by means of diagrams and diagrams.

CE3.6 Identify the correct positions for installing a device or card in the appropriate slot or bay, according to detailed installation guides.

CE3.7 Describe the different safety standards established in the use and management of the tools used in the integration and assembly procedures of internal hardware components in a microcomputer system.

CE3.8 In a practical, well-characterized, well-characterized, installation, replacement, and connection of internal hardware components in a microcomputer system, following detailed work guides:

-Interpret the instructions in the detailed guide and identify the components to mount, replace, or connect.

-Use cabinets and boxes that allow organized access to the tools to use and choose the appropriate ones to install or uninstall components.

-Integrate or assemble internal hardware components (memory, processor, video card, stack, among others) into the microcomputer system's motherboard and connect the internal hardware components (hard disk, DVD, among others) that require connection cables for integration into the microcomputer system.

-Successfully install and fix the internal cards and components on the microcomputer equipment in compliance with the security standards established for the assembly, replacement or connection of the hardware component used.

-Collect the tools and disposable items for disposal or recycling after doing the work according to the work guide.

-Register the operations performed in a given format.

C4: Describe the elements involved in the procedures for mounting, replacing or connecting peripherals and applying these procedures, to extend or maintain the functionality of the system, following detailed guides and instructions given.

CE4.1 Interpret the guidance guides on the procedures for mounting, replacing and connecting a microcomputer system to be able to perform these procedures, taking into account the different technologies.

CE4.2 Describe the different tools to be used in the procedures for mounting, replacing and connecting peripherals of a microcomputer system, using specific guides.

CE4.3 Identify the external ports of a microcomputer equipment for the connection of peripherals, using sketches and graphic schemes.

CE4.4 Citar the characteristics and types of connectors of the data and electrical power cables to be used in the connection of peripherals to the microcomputer equipment.

CE4.5 Describe the procedures and tools used to make data connection cables between peripherals and microcomputer equipment, using detailed guides.

CE4.6 Citar the different safety standards established in the use and management of the tools used in the procedures of assembly, replacement and connection of peripherals in a microcomputer system.

CE4.7 List preventive measures to safely manipulate data and power connections, taking into account the type of component.

CE4.8 In a practical, well-characterized, well-characterized, installation, replacement, and connection of peripherals in a microcomputer system following detailed work guides:

-Identify the peripheral components to be mounted, replaced and connected, as well as the different ports and their corresponding cables and connectors, distinguishing those connections with electrical power from those that do not have it and selecting the appropriate tools to mount, replace and connect a peripheral.

-Confect data connection cables between peripherals and microcomputer systems if necessary and perform the assembly or replacement of the peripheral and its connection, with confidence, accuracy and compliance with the safety standards.

-Locate network connection devices (repeater, switch, and 'router', among others) in distribution cabinets or default sites using the appropriate tools.

-Check, by means of light indicators, that the connected peripherals have electrical power and the data connections.

-Collect disposable items for disposal or recycling by following the work guide.

-Register the operations performed by following the established formats.

CE4.9 In a practical, well-characterized scenario, of installation already made of microcomputer equipment and peripherals:

-Recognize the different types of connectors and wiring intended for connection to the electrical grid.

-Distinguished the different types of connectors and cables for data communication.

-Use the appropriate tools to replace network and power-wired lashes and data between equipment and peripherals, complying with the established safety standards before performing the procedures for replacing connectors and wiring equipment and peripherals.

-Collect disposable items for disposal or recycling by following the work guide.

-Register the operations performed by following the established formats.

C5: Identify and apply procedures and testing tools for the microcomputer system, to verify the assembly, replacement and connection of peripherals and components, following detailed guides.

CE5.1 Identify the test procedures guides to be applied in the assembly or replacement processes, taking into account the element to be verified.

CE5.2 Classify the different test tools and procedures associated with each hardware component.

CE5.3 Describe the data cabling checking tools by handling detailed guides.

CE5.4 Describe and apply the procedures to verify that the microcomputer equipment performs the power on and POST procedure, identifying the source of the problems, if any.

CE5.5 Describe the operating system load operations and the possible failures that occur in the startup phase of the microcomputer equipment.

CE5.6 In a practical scenario, properly characterized in the installation, replacement and connection of peripherals and components in a microcomputer system:

-Verify the functionality of the data connection cables between the microcomputer and the peripherals.

-Perform tasks to check the connections of the microcomputer equipment and the peripherals connected to it.

-Turn on the equipment and observe the result of the POST phases.

-Interpret microcomputer equipment information during operating system load.

-Select and use configuration and configuration tools to verify system operation.

-Register the operations performed in a given format.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.4; C3 for CE3.8; C4 for CE4.8 and CE4.9; C5 for CE5.6.

Other capabilities:

Adapt to the specific organization of the company, integrating in the system of technical-labor relations.

Interpret and execute the instructions you receive and take responsibility for the work you do, communicating effectively with the right person at any time.

Organize and execute operations according to the instructions received, with quality and safety criteria, applying the specific procedures of the organization.

Habit to the organization's work rate by meeting the daily performance goals defined in the organization.

Show at all times an attitude of respect towards colleagues, procedures and internal rules of the organization.

Contents:

1. Architecture and internal components of microcomputer equipment

The Central Processing Unit.

Carhomes, types.

Power supplies, types.

Fans and heat sinks.

The motherboard, the 'chipset', the EPROM.

Microprocessors, sockets, and types.

Memories: RAM memories, features, and formats.

Buses and data connectors.

Cabling and power connectors.

Socket and expansion bays.

Expansion cards: features; types: graphic, sound, network, among others.

Types and components of attachment of components to the housings.

Input/Output Systems: Storage devices: hard drives, features and types; optical and magnet readers/recorders-optical, features, and types.

Other component types.

2. External connectors and buses of a microcomputer system

Ports: Parallel, Serial, USB (Universal Series Bus), 'Firewire' (IEEE 1394), among others.

Wireless Connectors: infrared port (IrDA standard), radio frequency ('Bluetooth' and 'ZigBee' standards), among others.

Network Cabling: Cable types and connector types.

3. Input/Output Systems: Microcomputer peripherals

Basic peripherals: monitor, keyboard, mouse, and printers.

Other peripherals: speakers, microphone, scanner, multimedia devices, among others.

Connectivity devices: modem, repeater, switch, 'router', among others.

Connections.

4. Techniques for mounting, replacing, and connecting microcomputer components and peripherals

Mounting guides.

Tools used in the procedures for mounting, replacing, or connecting components and computer peripherals.

Procedures for installing and fixing microcomputer components to the housing and the motherboard.

Connection of peripheral devices in the microcomputer system.

Test and verification software.

Test and verification procedures.

Security in the use of electrical and electronic tools and components.

Electrical safety: measures to prevent electrical hazards; damage caused by electric shock.

Environmental protection regulations.

Criteria and security conditions in the procedures.

Prevention of more common accidents.

Personal protective equipment and security means.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the performance of auxiliary microcomputer equipment assembly operations, which shall be accredited by one of the following two forms:

-Level 1 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: AUXILIARY OPERATIONS OF MICROCOMPUTER SYSTEMS MAINTENANCE

Level: 1

Code: MF1208_1

Associated with UC: Perform Microcomputer Systems Maintenance Auxiliary Operations

Duration: 90 hours

Assessment capabilities and criteria:

C1: Describe the techniques and apply them in the procedures for checking the functionality of supports and peripherals for the verification of the same, following detailed instructions.

CE1.1 Identify the different techniques for checking functionality of supports and peripherals, taking into account the technology of each of them.

CE1.2 Interpret the instructions for instructions received regarding the procedures for checking the functionality of the media and the peripherals in order to verify and verify the proper functioning of the same.

CE1.3 Citar the characteristics of the tools used to check the state of the supports and the information contained therein, following guides of use.

CE1.4 In a practical, well-characterized scenario, a microcomputer equipment check with reading units and several supports:

-Describe media characteristics.

-Describe the risks inherent in each support.

-Apply the media checking procedures using specific tools, recording the results and the incidents produced.

C2: Identify and apply the cleaning procedures of supports and peripherals using detailed guides inherent to the characteristics of these hardware elements, to maintain the functionality of the same.

CE2.1 Interpret the guides of instructions received regarding the procedures for cleaning of supports and peripherals to be carried out, taking into account the different ways of opening the elements for the access to its interior.

CE2.2 Describe the characteristics of the supports and peripherals, taking into account the aspects that affect their maintenance.

CE2.3 Identify the different types of maintenance and cleanup that media, their read/write units, printers, keyboards, mice, and other devices should be subjected to.

CE2.4 Classify the different tools and devices needed to apply the cleaning procedures of the supports and peripherals, using guides for their use.

CE2.5 In a practical, well-characterized case of media and peripheral cleaning, following instructions specified in the detailed guide:

-Identify media and peripherals to be cleaned and cleaning procedures.

-Use the necessary devices and tools to apply the media and peripheral cleaning procedures.

-Meet the established security rules before applying the media and peripheral cleaning procedures.

-Collect waste and disposable elements of supports and peripherals for disposal or recycling.

-Check that the support or peripheral maintains its functionality.

-Register the operations performed following the given formats.

C3: Describe the consumable elements needed to be used in the microcomputer system and its peripherals, and perform the replacement of the same using detailed guides.

CE3.1 Describe the types of consumable elements inherent in the different peripherals existing in a microcomputer system, taking into account the different technologies.

CE3.2 To cite the existing regulations on the recycling and disposal of computer consumables framed in respect of the environment.

CE3.3 Interpret the procedures for replacing consumable items in printers and other peripherals from detailed guides and documentation provided by the manufacturer.

CE3.4 In a convenient, well-characterized, practical assumption of replacement of consumable items, such as printer ink and toner cartridges, paper forms, adhesive label sheets, and envelopes, among others, following detailed instructions:

-Prepare the consumable item as a pre-replacement step.

-Interpret the device guides to proceed to the paper feed as needed.

-Replace consumable elements in compliance with established safety standards and apply the verification and test procedures of peripherals.

-Use the necessary means for the recovery and recycling of consumable materials according to environmental conditions.

-Verify that after replacing the consumable and consumable element the computer device maintains its functionality.

-Register the operations performed following the given formats.

C4: Identify the elements involved in the physical replication of microcomputer equipment and apply unattended installation/update procedures following detailed guides.

CE4.1 Describe physical replication functions ("cloning") of disks and partitions in microcomputer systems, taking into account the different software installations inherent in each type of user.

CE4.2 Citar the different physical elements involved in an installation/update procedure unattended between microcomputer equipment, indicating its use and the problems that may derive from them.

CE4.3 Describe the features of the software tools used to install disk images or partitions by pointing to the application restrictions.

C4.4 Discriminate the different media storage of disk images or disk partitions, for transport and subsequent installation, according to detailed guides.

CE4.5 List the startup phases of a microcomputer system to verify the functionality of the installed image, taking into account the type of unattended installation performed.

CE4.6 In a convenient, properly characterized, installation/update scenario unattended among multiple teams according to received instructions:

-Interpret the instruction guide for the silent installation/upgrade procedure to apply.

-Analyze the target computer (on which the image is to be implanted) and verify that it meets the prerequisites.

-Use the image management tool and proceed with the deployment of the image, complying with the security rules.

-Verify the result obtained.

-Register the operations performed following the given formats.

C5: Describe and perform labeling, packaging, storage, and shipment of equipment, peripherals, and consumables, depending on the needs and procedures established.

CE5.1 Describe the conditions of handling, transport and storage of equipment and components of a microcomputer system.

CE5.2 Identify the different types of packaging of equipment, peripherals and consumables inherent in each computer device, taking into account quality standards and respect for the environment.

CE5.3 Recognize the tools needed to perform labeling and packaging tasks for equipment, peripherals, and consumables, describing their specific uses.

CE5.4 Detailed procedures for performing team, peripheral, and consumable labeling tasks, taking into account work guides.

CE5.5 In a practical, well-characterized case, of packing and moving equipment, peripherals, and consumables, following instructions given:

-Identify the appropriate packaging for each device.

-Perform pre-packaging tasks for them.

-Label and pack the different devices using the appropriate tools.

-Collect disposable items appropriately for disposal or recycling by complying with established standards.

-Verify that the packaging and labelling of the same complies with the quality standards established in this respect.

-Register the operations performed following the given formats.

CE5.6 In a practical, properly characterized, storage and cataloging scenario of equipment, peripherals, and consumables, following instructions received:

-Check that the components to be stored correspond to the delivery order and are in good condition.

-Perform pre-labeling and storage tasks for them.

-Label and store different devices using the appropriate tools.

-Classify and label components so that they are perfectly cataloged.

-Collect disposable items for disposal or recycling and verify that their labeling complies with the quality standards established in this respect.

-Meet the established security rules and record the operations performed in the given formats.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.4; C2 with respect to CE2.5; C3 with respect to CE3.4; C4 with respect to CE4.6; C5 for CE5.5 and CE5.6.

Other capabilities:

Take responsibility for the work you develop.

Comply with the production standards set by the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Interpret and execute the work instructions.

Learn new concepts or procedures and effectively leverage training using acquired knowledge.

Contents:

1. Ancillary techniques for the maintenance of microcomputer systems

Maintenance of computer systems.

Importance.

Maintenance levels.

Description and classification of auxiliary techniques for the maintenance of microcomputer systems.

Periodic maintenance of storage units.

Maintenance of information media.

Media and peripheral cleaning techniques.

Verification and diagnostic tools: POST procedures ('Power-On Self Test ').

Computer System Diagnostic Tools.

Information media optimization and checking tools.

Software tools for preventive maintenance.

2. Consumable elements of microcomputer systems

Types and features.

Measures for the preservation and recycling of consumable items.

Consumable item replacement procedures.

Security in handling and replacement of consumable items.

3. Physical replication methods for partitions and hard disks on microcomputer equipment

Functionality and objectives of the replication process.

Security and prevention in the replication process.

Disk partitions: partition types and management tools.

Image creation and deployment tools and system replicas: information sources; imaging and system replication procedures; image verification procedures and system replicas.

4. Techniques for labeling, packaging, storing and moving equipment and computer components

Labeling procedures.

Labelling tools and accessories.

How to store and operate the labeling tools.

Labelling software.

Labeling components of a microcomputer system.

Consumable labeling: CD/DVD/Blu-ray media pressing techniques; multimedia and use of pressing applicators.

Packaging of internal components of a microcomputer system.

Peripheral packaging.

Internal rules for storage, cataloging and preservation of components and peripherals of a microcomputer system.

Precautions to consider in the transfer of microcomputer systems.

Processing of computer waste: purpose; methods; treatment, disposal and use of computer waste; places of recycling and disposal of computer waste.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the performance of auxiliary operations for the maintenance of microcomputer systems, which shall be accredited by one of the following two forms:

-Level 1 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: AUXILIARY OPERATIONS WITH INFORMATION AND COMMUNICATION TECHNOLOGIES

Level: 1

Code: MF1209_1

Associated with UC: Perform auxiliary operations with information and communication technologies

Duration: 90 hours

Assessment capabilities and criteria:

C1: Identify the functional blocks of a computer system and recognize the different elements of the equipment and its peripherals, using its manuals.

CE1.1 Identify the physical components of a computer system using functional schemas.

CE1.2 Describe the functions of the central processing unit using diagrams.

CE1.3 Explain the functions and characteristics of the peripherals by locating your means of connection with the computer system and the type of consumable you use.

CE1.4 Describe the functions and characteristics of the storage units by pointing to the corresponding media.

CE1.5 Describe the procedures for starting and stopping the computer equipment and its peripherals, identifying the problems that may arise during the process.

C2: Describe and manage the basic operating system utilities for the use of computer equipment, following the established procedure.

CE2.1 Explain the functions of the operating system by relating them to the elements of the computer system.

CE2.2 Distinguished and use the user interface elements provided by the operating system to operate within the computing team and prepare a workbench.

CE2.3 Identify the tools and functionalities provided by the operating system for file system handling by differentiating local and remote folders and drives.

CE2.4 List the characteristics of the applications provided by the operating system for the management of the peripherals connected to the computer equipment.

CE2.5 Describe the tools and services provided by the operating system to access and share resources within a local network by relating them to the file system.

CE2.6 In a convenient, properly characterized, practical operation of the operating system of a properly installed and configured personal computer equipment:

-Identify your functional physical elements and boot the computer, visually verifying that the system load is performed without errors.

-Operate with folders and files using the file system handling tool provided by the operating system, exploring the information contained in storage media such as CD, DVD, Blu-ray, removable memories, USB sticks, among others.

-Capture information through the scanner and store it for later use using the tools provided by the operating system.

-Perform the local print of previously stored information using the tools provided by the operating system.

-Apply the controlled power-off procedures for personal computer equipment.

CE2.7 In a convenient, properly characterized, convenient, access to shared resources and information exchange between multiple teams, using the services of the local network:

-Extract information from an external drive of type CD-ROM, DVD, or 'pendrive', among others.

-Access folders and files to obtain information from other teams.

-Print documents for other printers in the network.

-Handle folders and files using the shared resources of the local network.

C3: Identify multimedia devices and get information from them using multimedia applications, following some instructions.

CE3.1 Identify multimedia devices and their connection to computer equipment for use with multimedia applications, connecting them to the corresponding ports.

CE3.2 Identify the types of compression formats used to record multimedia information, relating them to their uses and the applications that use them.

CE3.3 In a properly characterized scenario, to obtain multimedia information using the multimedia applications:

-Connect the devices to the specified ports.

-Identify and use the appropriate multimedia software for each device.

-Get images and store them in the specified format and location.

-Get music and sounds and store them in the format and location specified.

-Capture videos and store them in the specified format and location.

C4: Describe and use the main functions of a word processor and perform simple and elementary documents, according to the instructions received.

CE4.1 Explain the functions and characteristics of a word processor by relating them to the types of documents to be produced.

CE4.2 Describe document creation, modification, and manipulation procedures using word processing tools.

CE4.3 Identify the formats that can be applied to the text contained in the documents to improve the presentation of the same: bold, italic, underlined, size and type of fonts, numbering and bullets, tabulations and paragraph alignment, among others, taking into account the styles to be applied.

CE4.4 Describe the functions that are used to insert images and graphic objects into documents, taking into account the object type.

CE4.5 Identify the functions that are used to add headers and footers to documents, following style instructions received.

CE4.6 In a convenient, properly characterized, document creation scenario for presenting information using a word processor, following specified formats:

-Select and apply text and block text formats.

-Insert predesigned images and objects that the word processor provides, and format them.

-Insert headers and footers into documents by adding 'autotexts' and applying formats.

-Pass the spell checker.

-Save and print the documents.

C5: Describe the functionality of other office applications or use them for the treatment and presentation of information, using already defined designs and following instructions received.

CE5.1 Explain the characteristics and the use of the software applications of spreadsheet, database and presentation of documents in slides, relating them to the text processing.

CE5.2 In a convenient, properly characterized, practical assumption of handling a spreadsheet already designed:

-Open and close the spreadsheet.

-Enter data into cells.

-Save the changes made.

-Print the spreadsheets.

CE5.3 In a convenient, properly characterized, scenario of handling an already designed database, with its tables, relationships, forms, and reports created:

-Open and close the database.

-Display and enter data through the forms already created.

-Save the changes made.

-Print the data using the reports already created.

CE5.4 In a convenient, well-characterized scenario, in which an already designed presentation is available, perform the following operations following instructions received:

-Open and close the already created presentation.

-Present the slides.

-Print the slides.

C6: Describe and manage the utilities that the Internet provides to search the internal and external network, following instructions received.

CE6.1 Explain the features and functions of the Internet network and a corporate intranet by linking them to the type of information to be searched and used.

CE6.2 List and enunciate the characteristics of a Web page and the possibilities of navigation between pages, distinguishing between secure and non-secure pages.

CE6.3 Recognize the tools used to navigate the network, search for information, and add search criteria.

CE6.4 In a convenient, properly characterized, information search on the Internet:

-Open the browser and use it to access pages and their links.

-Use a finder and locate information according to the criteria indicated.

-Customize your browser using tool utilities (home page, link colors, font size, among others).

-Download information and store it in the indicated locations.

-Identify security means and procedures during access to Web pages to prevent unwanted installation of software and other threats (padlock, HTTPS) and use digital certificates or signatures to navigate through agencies or institutions.

-Add the most visited pages to the list of favorites and use the browser functions to access the history of visited pages.

C7: Describe and manage the utilities offered by the Internet network and the corporate "intranet" for the exchange of information between users.

CE7.1 Explain the functionalities offered by the mail tools for information exchange, pointing out their possibilities for organizing work and performing task tracking.

CE7.2 Describe the features of news forums and 'blogs', among others, and the tools used to consult and leave opinions on specific topics within.

CE7.3 Identify and distinguish the functionalities offered by instant messaging and video conferencing tools to establish conversations and clarify instructions when direct contact is not possible.

CE7.4 Recognize the functionalities offered by virtual training platforms ('e-learning ') to use as a means for continuous learning.

CE7.5 In a convenient, properly characterized, convenient, sending and receiving message using a mail service:

-Create a mail account through a Web server that provides the service.

-Create a new message by adding recipients and subject, using the formatting functions, and sending it.

-Check the inbox of the mail tool and open the new messages.

-Attach files to mailings.

-Arrange mail folders.

CE7.6 In a convenient, properly characterized, information exchange scenario using instant messaging and video conferencing services:

-Access the instant messaging and video conferencing service.

-Enable private instant conversations and allow or deny access to the conversation to other people.

-Set up video conferences with one or more users using the indicated programs and media.

-Use the elements: whiteboards, shared desktops, and file transfer, among others, that provide the messaging tools.

CE7.7 In a convenient, well-characterized scenario of using virtual training platforms:

-Access the virtual platform.

-Navigate the contents offered by the virtual platform.

-Use the communication tools provided by the platform (mail, forum, and messaging) to exchange messages and jobs with the tutor and other users.

Capabilities whose acquisition must be completed in a real workbench:

C2 with respect to CE2.6 and CE2.7; C3 with respect to CE3.3; C4 with respect to CE4.6; C5 with respect to CE5.2, CE5.3 and CE5.4; C6 with respect to CE6.4; C7 with respect to CE7.5, CE7.6 and CE7.7.

Other capabilities:

Maintain an assertive, empathetic and conciliatory attitude to others by demonstrating cordiality and kindness in the treatment.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Interpret and execute the work instructions.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Contents:

1. The computer and its operation in the basic use of ICT

Core components.

Connection and startup.

Types of peripherals.

Operating system: features; graphical user interface, desktop; file and folder management: operating system scan, basic scan and search functions; use of peripherals.

Local area networks in the basic use of ICT: uses and features; access to shared resources; wireless networks; devices with wireless connection to the network and equipment.

2. Multimedia environments in the basic use of ICT

Multimedia devices and applications.

Multimedia Formats.

Multimedia information exchange procedures between computers and devices.

3. Office-based applications in the basic use of ICT

Text processor: structure and functions of a word processor; application of formatting to documents; insertion of objects into documents; page configuration; spell checker.

Ofimatic spreadsheet applications, database and presentations: document opening; data insertion; slide presentation; printing.

4. Internet, email and virtual platforms for training in the basic use of ICT

Internet: features and uses; Web documents; Web browsing: Web browsers, browser settings, browser description and operation; Web clients: features and uses; search engines: features and uses; use of digital certificates and signatures; protection of the operating system and applications against malicious attacks from the Internet: ('fishing ',' malware ',' spyware ').

Email: functionalities and types; instant messaging: types and features; video conferencing: features; forums: types and features; tools and uses of internet services; other internet services.

Virtual training platforms: 'e-Learning' applications; features and uses.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the performance of auxiliary operations with information and communication technologies, which will be accredited by one of the following two forms:

-Level 1 academic training (Spanish Framework of Qualifications for Higher Education) or other higher level education related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX XIV

Professional Qualification: First-Level Maintenance on Radiocommunications Systems

Professional Family: Informatics and Communications

Level: 2

Code: IFC362_2

General Competition

Perform local and metropolitan area wireless network implementation processes, and perform software installation, configuration, commissioning, maintenance, and first-level incident resolution of mobile and fixed network radio communications equipment, following established procedures.

Competition Units

UC1210_2: Put into service and maintain local and metropolitan area wireless networks

UC1211_2: Configure and service fixed and mobile network radio communications equipment

UC1212_2: Maintain and resolve first-level incidents on fixed and mobile network radio communications systems

Professional Environment

Professional Scope

Develops its professional activity in the area of communications dedicated to radio communications systems in entities of public or private nature, companies of any size, both self-employed and foreign, regardless of their legal form. It develops its activity, depending on whether it is functional or hierarchically superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of their professional activity in accordance with the applicable regulations.

Productive Sectors

It is located fundamentally in the communications sector, in the subsector of the installation, maintenance and technical assistance to radio communications networks, communications operators and communications services, although it could be located in any productive sector that for its size and organization needs to manage radio communications networks.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Top-level maintenance operators on radio communications equipment

Top-tier maintenance operators in wireless communications networks

Associated Training (540 hours)

Training Modules

MF1210_2: You can service and maintain local and metropolitan area wireless networks (180 hours)

MF1211_2: Configuration and commissioning of fixed and mobile network radio communications equipment (150 hours)

MF1212_2: First-level maintenance of fixed and mobile network radio communications equipment (210 hours)

COMPETITION UNIT 1: PUT INTO SERVICE AND MAINTAIN LOCAL AND METROPOLITAN AREA WIRELESS NETWORKS

Level: 2

Code: UC1210_2

Professional Realizations and Realization Criteria:

RP 1: Configure the devices and equipment that are part of the wireless network of local or metropolitan area, to achieve optimal coverage, following specifications received and complying with established safety standards.

CR 1.1 The devices and equipment of the local wireless network are placed and oriented to achieve optimal coverage, starting from the base infrastructure, following specifications received and complying with safety standards.

CR 1.2 Wireless network adapters are assembled and connected on devices and equipment in the wireless network, using recognized drivers for each operating system and ensuring non-existence of conflicts, following procedures and complying with established safety standards.

CR 1.3 The parameters in access points are configured to enable communication between devices and equipment in the wireless network and local area networks, following established procedures.

CR 1.4 The introduction of parameters into the subscriber's internal unit of a fixed link in metropolitan area networks is done using its configuration tools, following the instructions and specifications reflected in the high order.

CR 1.5 The inventories of the devices and equipment, their configurations and the software that form the wireless networks of local and metropolitan area are elaborated and maintained to ensure their location and availability, following the rules of the organization.

CR 1.6 Device and equipment configuration tests are performed to verify the connection to the access points or the base stations of the metropolitan network, following established procedures and complying with the safety standards.

CR 1.7 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, following the procedure established by the organization.

CR 1.8 The associated specific technical documentation is interpreted, where appropriate, in the most frequent foreign language in the sector.

RP 2: Perform testing and verification procedures for wireless network devices and devices in the local and metropolitan area to ensure network functionality and quality of service, following established procedures and safety standards.

CR 2.1 Access points and antennas, in pre-network inspection procedures, are located in the test locations identified by the project, supplying electrical energy to them and configuring the basic parameters indicated, following the established procedure and complying with the safety standards.

CR 2.2 The connectivity and status of wireless network devices and equipment are verified to ensure the provision of services, following established procedures and complying with the quality regulations of the organization.

CR 2.3 The physical security systems and access restrictions for installed equipment are checked to prevent unauthorized manipulations that may alter the service delivery parameters, following established procedures.

CR 2.4 Exploration measures in the estimated coverage areas are performed with specific instrumentation and equipment, to check that they have the required quality of service and comply with established safety standards, following established procedures and taking into account the existence of both desired and interfering radio channels.

CR 2.5 The values of the samples taken are recorded together with other information that will allow to determine exactly the point and the moment in which they have been carried out, following specifications of the work order.

CR 2.6 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, following the procedure established by the organization.

RP 3: Understand and resolve first-level incidents produced on local and metropolitan area wireless network devices and devices to maintain functionality, following established performance protocols.

CR 3.1 Incident notification systems are observed to detect possible alarms according to the operational and security procedures of the organization.

CR 3.2 The location of the radio frequency device and equipment in which an incident occurs and the nature of the device is identified by interpreting the information obtained through the user through functional tests and using measurement and diagnostic instrumentation.

CR 3.3 Signal intensity measures in the wireless environment in which incidents are recorded are performed in passive mode (only reception) using the most appropriate instrumentation or applications in each case and applying the established safety standards.

CR 3.4 The configuration of fixed and/or mobile devices and equipment with problems to be associated with the wireless network is verified to check that it meets the set parameters.

CR 3.5 The detected and isolated incidence is diagnosed and its solution is presented by determining its exact location to rehabilitate the interrupted services and following the established protocol of action.

CR 3.6 The incidence that has not been achieved to isolate or to solve is reported to the level of responsibility for its management according to the protocols and procedures of the organization's actions.

CR 3.7 The repair of the incident to rehabilitate the services is performed with the specific tools and applying the established safety standards.

CR 3.8 The activities performed are documented according to the internal models established by the organization, in order to record the information for later use.

Professional Context:

Production media:

Computer Equipment. Wireless communications equipment and devices. Field meter. Computerised tools for connectivity testing. Office tools. Wireless network adapters. Installation tools. Antennas, cables, connectors and accessories. Laptop with specific purpose software for all the frequency bands involved. GPS positioner, digital camera. Access points, network electronics and metropolitan network base stations. Internal and external fixed subscriber units of metropolitan networks. Mobile devices. Portable wireless and wired network testers. Elements of protection and security. RF power meters.

Products and results:

Wireless network devices configured properly. Functional parameters on configured external network connection devices. Verified local and metropolitan area wireless network devices and devices. Wireless data networks with coverage extended to the interior of buildings. Wi-Fi networks with public access 'hotspot' indoors and outdoors. Malladas wireless networks in local and metropolitan areas. Point-to-point (backhaul) wireless links in configured local and metropolitan area networks. Scanning measurements in electromagnetic fields performed. First level support for network services and established user devices.

Information used or generated:

Technical configuration documentation and test technical reports of elaborate equipment. Work orders. Parts of Incidents. Technical documentation of devices. Historical incident reports. Functional verification plans. Testing protocols. Quality manuals. Quality standards and criteria defined by the organisation. Applicable safety regulations in electronic equipment installations. Verification and verification reports. Described installation and basic parameter configuration procedures. IEEE 802.11, 802.15, 802.16, and 802.20 standards. Installation manuals for access points and base stations. Information about the installation of communications equipment and software. Applicable regulations, regulations and standards. Documentation on safety standards and prevention of occupational risks. Documentation on WIFI security protocols.

COMPETITION UNIT 2: SET UP AND SERVICE FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS EQUIPMENT

Level: 2

Code: UC1211_2

Professional Realizations and Realization Criteria:

RP 1: Check the installation of radio communications devices and devices for fixed and mobile networks, as well as their connection to the associated radiant system, in order to verify whether it conforms to the specifications received.

CR 1.1 The specifications and technical documentation of radio communications equipment and devices to be put into service are recognized and interpreted in order to identify equipment and devices to be verified.

CR 1.2 The installation of the transceiver and the radiant system is checked in order to preserve them in the face of possible installation failures, using specific tools and tools, following established procedures and complying with the safety standards.

CR 1.3 The connections of the various radio communications devices and devices with the radiant system are verified to ensure their installation and subsequent operation, using specific tools, following established procedures and complying with the safety standards.

CR 1.4 The orientation and inclination of the antennas is verified to ensure that it corresponds to the received specifications, and that it takes into account possible magnetic influences of nearby metal objects.

CR 1.5 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, following the procedure established by the organization.

RP 2: Install the software for devices and radio communications equipment for fixed and mobile networks for putting into service, following established procedures.

CR 2.1 The software for radio communications devices and equipment is installed for operation using specific tools, following the established procedure.

CR 2.2 The functionality of the various hardware components of radio communications equipment is verified using specific software tools, following established procedures.

CR 2.3 The software version of radio communications devices and equipment is registered following the established procedure, to keep the version information used on all devices.

CR 2.4 The activities performed, as well as the detected incidents, are documented in a standardized format to maintain record and job tracking, following the procedure established by the organization.

CR 2.5 The associated specific technical documentation, where appropriate, is interpreted in the foreign language of most frequent use in the sector.

RP 3: Configure mobile and fixed network radio communications devices and devices to enable the communications link, following established procedures.

CR 3.1 The values of the configuration parameters of the radio communications equipment are determined, interpreting the technical documentation of each equipment, as well as the specifications and procedures for putting into service.

CR 3.2 The specific software tools for parameter loading are used to configure the radio communications devices and devices of the fixed and mobile network, and to enable the communication link, following the instructions given in the work order.

CR 3.3 The configuration of the devices is verified using the tools and tools specified, to check its functionality, following the instructions given in the work order, reinitializing the device to load the configuration if necessary.

CR 3.4 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, following the procedure established by the organization.

RP 4: Perform the verification procedures for the connection of fixed and mobile radio communications devices and equipment, to ensure the functionality of the network, following instructions specified in the test protocol.

CR 4.1 The communication between fixed radio communications devices is verified, following the procedures established by the organization, using appropriate tools and tools, and complying with established safety standards.

CR 4.2 The communication between mobile radio communications devices is verified, following the procedures established by the organization, using appropriate tools and tools, and complying with established safety standards.

CR 4.3 Exposure measures are performed to check that the radiation is not excessive, using the appropriate instrumentation and equipment, following the procedure established by the organization and complying with established safety standards.

CR 4.4 The measures for checking the coverage area of the base station are performed to verify the estimates made in the project and the areas in which it is served, following the procedure established by the organization and complying with the established safety standards.

CR 4.5 The testing of the integration of devices and equipment in the radio communications network is performed to verify its functionality, following established procedures and taking into account the quality criteria of the organization.

CR 4.6 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, following the procedure established by the organization.

Professional Context:

Production media:

Radio communications equipment for fixed and mobile networks. Equipment for the measurement of specific parameters of radio communications of fixed and mobile networks. Tools specific to the measurement and load of parameters in the equipment and in the system. Internal use tools for the documentation of the processes performed. Software installation tools. Software tools for network management and services. Office tools. Instrumentation and equipment of measurement of exposure. Measurement instrumentation of the quality of the connection between antennas and transceiver. Elements of protection and security. Laptops. Spectrum analyzers.

Products and results:

Installation of verified radio communications devices and equipment. Radio communications equipment for fixed and mobile networks with its installed software. Radio communications equipment for fixed and mobile networks configured and verified.

Information used or generated:

Project (or part of the project) of the radio communications system. Specifications and installation requirements for radio communications equipment. Regulations and standards. Quality criteria of the organization. Configuration procedures. Installation procedures. Test protocol. Documentation on safety standards and prevention of occupational risks. Safety regulations in electronic equipment installations. Manuals and technical specifications of radio communications equipment. Installation and verification reports. Test reports and errors. Measurement reports. Documentation on security protocols in fixed and mobile networks.

COMPETITION UNIT 3: MAINTAIN AND RESOLVE FIRST-LEVEL INCIDENTS IN FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS SYSTEMS

Level: 2

Code: UC1212_2

Professional Realizations and Realization Criteria:

RP 1: Carry out periodic maintenance of radio communications devices and devices for fixed and mobile networks, in order to guarantee the communications services within the quality parameters required by the organization, following the established procedures and applicable security regulations.

CR 1.1 The procedures for preventive maintenance of the different elements and equipment of the radio communications system are interpreted to identify the tasks necessary to maintain the functionality of the system with the required quality level, taking into account the technical specifications thereof.

CR 1.2 The visual indicators of alarm summary presented by the hardware of the radio communications equipment are inspected to check the correct operation of the same, following the established procedure.

CR 1.3 The wiring between radio communications equipment and other transmission systems, between the same and the feeding systems, as well as the associated radiant system are visually inspected to check that they have not suffered any deterioration which could lead to failures in the system, following the established procedure and complying with the applicable safety regulations.

CR 1.4 The visual inspection of the installation is performed to determine if there have been modifications in the environment of the same that have resulted in the appearance of possible obstacles that could disturb the intensity of the signal, following the established procedure.

CR 1.5 The local management software applications of radio communications equipment are used to perform field measurements, checking whether there are significant variations on the values reflected in the test document of acceptance of the equipment in question, which could indicate a malfunction of some module of the radio communications equipment.

CR 1.6 The ventilation units of the radio communications equipment are cleaned or replaced to ensure the operation of the equipment in the appropriate climatic conditions for its operation, in accordance with the established procedure and in compliance with the safety regulations.

CR 1.7 The batteries of the equipment of radio communications equipment and associated power systems are verified or replaced to maintain their operation, in accordance with the procedures laid down and in compliance with the applicable safety regulations.

CR 1.8 Software updates for radio communications equipment are made to correct errors or add new functionality, following established procedures.

CR 1.9 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, following the procedure established by the organization.

RP 2: Understand the alarms presented by the hardware of the devices and radio communications equipment of fixed and mobile networks, and by the local management software thereof, to detect the origin of the anomaly, following specifications received.

CR 2.1 The visual alarm indicators presented by each hardware module of the radio communications equipment are inspected to try to narrow down the modules that may be damaged, taking into account the critical aspects of the alarm that they present.

CR 2.2 The local management software applications of the radio communications equipment of fixed and mobile networks are used, for additional information on the incidents presented by the different units that form the equipment, and that show a fault indication or malfunction, following specifications received.

CR 2.3 The local management software applications of mobile and fixed network radio communications equipment are used to perform field records to check whether the incidence presented by the radio communications equipment corresponds to the actual failure of a unit, or is caused by an abnormal condition of propagation.

CR 2.4 The incidence presented is diagnosed, when it is not an anomalous condition of propagation, interpreting the information provided by the local management applications of the different teams, identifying the physical or logical component that fails and in a time according to the established service level.

CR 2.5 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, collecting the information for the update of the incident history, following the procedure established by the organization.

RP 3: Repair of fixed and mobile radio communications devices and equipment to maintain network functionality, following established procedures and performance protocols and applicable safety regulations.

CR 3.1 The wiring associated with a radio communications equipment unit is checked by checking that it is correctly labeled, and if necessary is labeled, so that during replacement of the broken unit there are no errors of connection, following the established procedure and complying with the established safety standards.

CR 3.2 The devices and equipment of radio communications that have malfunction are adjusted using specific tools to return them to their optimal operation, with the required precision, following the established procedures and complying with the safety standards.

CR 3.3 The code of the spare drives is identified to check that it is the same or that it is compatible with that of the unit to be replaced, as indicated in the technical documentation of the equipment.

CR 3.4 The hardware configuration of the broken unit is queried in case it needs to be copied to the spare drive, following the established procedures.

CR 3.5 The damaged units are replaced using specific tools that prevent the deterioration of the units in the replacement process, following the established procedure and complying with the safety standards.

CR 3.6 The operation of the radio communications equipment, after the repair of the fault, is verified and verified that it conforms to the conditions reflected in the tests of acceptance of the specific equipment, using for this the indicators of alarms presented by the hardware of the equipment and the applications software of local management, following the established procedure.

CR 3.7 The inventory of existing units is kept up to date after a breakdown, using the local management software applications of radio communications equipment, following the established procedure.

CR 3.8 The activities performed, as well as the detected incidents, are documented in a standardized format for later use, collecting the information for the update of the history of equipment breakdowns, following the procedure established by the organization.

Professional Context:

Production media:

Tools for electrical and mechanical work. Measuring instruments of electrical quantities. Software and Diagnostic Hardware. Power meter. Software for installation and utilities of radio communication equipment. Computers and peripherals. Multi-test equipment. Photo cameras. Software with specific programs of local management of radio communication equipment. Installation-specific tools. Copper cables, fiber optic cables, coaxial cables, and waveguides. Elements of protection and security. Laptops.

Products and results:

Fixed and mobile radio communications equipment maintained. Reports of broken units. Installed unit inventory files. 'Back-up' files of radio communication equipment configurations.

Information used or generated:

Work Orders. Parts of breakdown description. Technical information of devices. Technical service manuals of the equipment to be maintained and repaired. Internal service sheets on team breakdown statistics. Historical incidents. Standards for personal safety and equipment and materials. Manual of procedures. Maintenance plans. Technical documentation of the manufacturers of radio communications equipment and radio systems. Radio station acceptance test protocol results document. Software update procedure document. Technical documentation of the radio communication equipment. Technical documentation of the feeding systems associated with the radio communication equipment. Installation manuals for radio communication equipment. Manuals of the local management programmes for radio communication equipment. Regulations, regulations and standards. Documentation on security protocols in fixed and mobile networks.

TRAINING MODULE 1: COMMISSIONING AND MAINTAINING LOCAL AND METROPOLITAN AREA WIRELESS NETWORKS

Level: 2

Code: MF1210_2

Associated with UC: Putting in service and maintaining local and metropolitan area wireless networks

Duration: 180 hours

Assessment capabilities and criteria:

C1: Identify the features and features of devices and equipment in a local and metropolitan area wireless network for further configuration.

CE1.1 Describe the main features of the wireless technologies reference standards based on the rate of data transfer, coverage area scope, and typical application.

CE1.2 Define the functions and characteristics of devices and/or equipment in a wireless network of local or metropolitan area: access point, antennas, network adapter, subscriber interior unit, 'router', among others, for putting into service.

CE1.3 Explain the basic positioning and orientation techniques of devices and equipment in a wireless local area network for optimal coverage.

CE1.4 Describe the power supply techniques on twisted pair (PoE) for access points and recognize the limitations imposed by this medium.

CE1.5 Describe the techniques and inventory tools used in the network to perform the recording of devices and equipment that make up the network as well as their configurations and the changes produced.

CE1.6 In a practical, properly characterized, identification of devices and equipment that form a local and metropolitan area network to classify and describe their functionality, following technical specifications given:

-Classify devices according to their typology and functionality.

-Recognize the indicators and the state of operation of the devices as indicated in the technical manual.

-Check the record of the devices in the inventory.

-Identify connections between devices and equipment.

C2: Apply the configuration procedures of local and metropolitan area wireless network devices and devices for commissioning, following technical specifications.

CE2.1 Describe the configurable parameters of equipment and devices in a local and metropolitan wireless network.

CE2.2 Interpret the configuration procedures for computers and devices in a local and metropolitan area wireless network.

CE2.3 Use software tools and wizards for device and equipment configuration based on the technical and functional specifications.

CE2.4 In a convenient, properly characterized, scenario of configuring a wireless network with a single access point and local coverage inside a building to enable communication in the building:

-Locate the elements in the network map and identify the functions they perform.

-Check that the location of the access point and that the network and power cables meet the set requirements.

-Determine from the information specified in the work order and the technical documentation of the access point, such as setting up a configuration session from a laptop.

-Set the configuration session to enter the basic parameters, (SSID, radio channel, keys, and encryption type), prioritizing the use of assisted menus ('Wizard ') and save the access point configuration.

-On a computer with a wireless network adapter, create a network connection with the SSID of the configured access point, enter the key and type of security encryption, verify that the association is produced.

-Register the equipment configurations in the inventory and record the tasks performed according to the procedure guide.

CE2.5 In a practical, well-characterized case of integration of computer and communications equipment into a wireless network inside a building with several access points already configured and installed to enable communication between the teams and the network, following specifications given:

-Locate the elements in the network map and identify the functions they perform.

-Classify the available network adapters (PCI, PCMCIA, USB, and MiniPCI, among others), each matching the requirements of the installation and the equipment to be integrated into the wireless network.

-Collect all available network adapter information and driver drivers required for each operating system, as well as the software utilities required for your installation, and install the wireless network adapter, observing the established security and protection media and using the appropriate tools in each case.

-Introduce parameters that allow the association to the appropriate access point and are reflected in the work order by using the software tools of the installed network adapter or operating system.

-Apply the functional and operational test procedures of the installed device, verifying that the equipment is correctly associated with the wireless network.

-Register the tasks, configurations, and configuration software in the inventory by following the prompts in the procedure guide.

C3: Apply test and verification procedures to determine the connectivity of devices and equipment in the local and metropolitan area wireless network, following specifications.

CE3.1 Describe the test and verification procedures applicable to each device and equipment in the wireless network, depending on your technical specifications.

CE3.2 Distinguished physical security systems and access restrictions for devices and devices in the network for application in testing and verification procedures.

CE3.3 In a practical, well-characterized scenario, of carrying out screening measures during an inspection process prior to the implementation of a local or metropolitan area network:

-Identify the tools required to perform the measurements: laptop with wireless network adapter, network monitoring software, and test access point, among others.

-Employ the configured access point for the scan measures at the required location, following the standard procedures.

-Trim the user defined zones and log the signal levels as well as the signal/noise ratio for each indicated point.

-Detect during scan measures the possible existence of active channels used by colindant access points other than the test by scoring the busy channel and its signal level for further analysis.

-Determine the approximate boundaries of the coverage area for the access point under test, according to the standard employee and the work order specifications.

-Locate, if necessary, if necessary photographs of the same, the construction or furniture elements that can be a potential impediment in the propagation of the radio signals and that are not contemplated in the instructions indicated is the inspection process and record the values in the order and format described by the instructions of the inspection process.

CE3.4 In a practical, well-characterized case of verification of the connectivity of equipment and devices of a wireless network already implemented from local or metropolitan area to ensure its functionality:

-Identify the computers and devices in the network to verify.

-Recognize the test and verification procedure applicable to each device and equipment.

-Identify the impact on the service of the verification procedure to be applied.

-Test the appropriate equipment.

-Record the tasks performed by following prompts in the procedure guide.

C4: Describe the types and characteristics of the incidents of the devices and equipment of the local and metropolitan wireless networks, and proceed to your solution according to given specifications.

CE4.1 Define the meaning of alarms and alerts for devices and equipment that form the wireless network of local and metropolitan area and the types of incidents that occur in them, to ensure the delivery of services.

CE4.2 Describe the techniques and tools that are used to isolate and diagnose the causes that have produced an incident, taking into account the symptoms detected in the wireless network and the information reported by the users to proceed with their solution.

CE4.3 Select and apply the diagnostic and repair procedures for the incidence on the wireless network based on the device and equipment affected.

CE4.4 In a practical, properly characterized, simulation of an incident in which a user equipment cannot be associated with a wireless network, following given specifications:

-Check from another reference team if it is possible to perform the association to determine if the failure occurs on the user end or the access point.

-Review the basic configuration parameters for the selected network connection on the user equipment.

-Check that the operating system correctly recognizes the wireless adapter and that there are no conflicts with other hardware devices.

-Verify that the network connection selected by the user is appropriate and that there are no other access points or networks that interfere with it.

-Check that the indicator light indicators are in the right state and that the unit is properly powered by the power supply and that the orientation of the antennas is adequate and that they are in good condition.

-Set up a configuration session using a direct wired connection and verify the basic access point configuration parameters.

-Restart the access point before retesting new association tests with it.

-Log the symptoms and record the procedure used, as well as the tasks performed following the procedure guide.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6; C2 with respect to CE2.4 and CE2.5; C3 with respect to CE3.3 and CE3.4; C4 with respect to CE4.4.

Other capabilities:

Take Responsibility for the work that you develop and the fulfillment of the objectives.

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Propose alternatives with the aim of improving results.

Demonstrate creativity in the development of the work you do.

Demonstrate stress resistance, mood stability and impulse control.

Adapt to new situations or contexts.

Contents:

1. Wireless networking standards

Local Area Wireless Networks: Classification, Reference Standards.

Metropolitan Area Wireless Networks: Classification, Reference Standards.

802.11 standard: architecture, evolution, security.

2. Local and metropolitan area wireless networks

Fundamental concepts of propagation and radiofrequency.

Local area network devices and devices: network adapters, access points, antennas, among others. Power supply over twisted pair.

Metropolitan area wireless network devices and devices: subscriber unit, base stations, and antennas.

3. Integrating and configuring teams in local and metropolitan area wireless networks

Team integration: adapter and driver installation processes, conflict resolution. Configuring local area wireless networks: parameters and configuration tools. Configuring metropolitan wireless networks: parameters and configuration tools. Configuration particularities for different operating systems.

4. Test and verification operations on local and metropolitan area wireless networks

Coverage Map.

Basic procedures for exploration and coverage measures.

Connectivity tests between devices and equipment.

Management of utilities and specific instrumentation.

Documentation of the measures taken.

5. Diagnosis and resolution of first-level incident breakdowns in local and metropolitan area wireless networks

First-level diagnosis, localization, and repair procedures.

Diagnostic tools.

Types of breakdowns in local and metropolitan area networks: alarms and alerts, association, feeding, antenna orientation, equipment connection, device conflicts, and interferences.

Protection and security measures.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to commissioning and maintenance of wireless local and metropolitan area networks, which will be accredited by one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: SETTING UP AND COMMISSIONING RADIO COMMUNICATIONS EQUIPMENT FOR FIXED AND MOBILE NETWORKS

Level: 2

Code: MF1211_2

Associated with UC: Set up and service fixed and mobile network radio communications equipment

Duration: 150 hours

Assessment capabilities and criteria:

C1: Distinguished the functions of the devices and radio communications equipment of fixed and mobile networks as well as their connections, and perform the verification of the installation according to the given technical specifications.

CE1.1 List the radio technologies used in fixed and mobile radio communications networks, taking into account the standards and associated protocols.

CE1.2 Explain the functions of the devices and radio communications equipment of fixed and mobile networks, as well as the interfaces that are used for the connection between them, and from the same to the backbone network.

CE1.3 Citar the protocols used in fixed and mobile radio communications networks, according to the technologies used in the connection.

CE1.4 List the applicable standards for the connection interfaces of radio devices, including and with the backbone, explaining their data rate and functional characteristics.

CE1.5 Describe the techniques and tools used in the verification processes of the installation of the devices and equipment of the network of fixed and mobile radio communications.

CE1.6 In a practical, well-characterized scenario, verification of the installation of equipment of a radio communications system, following specifications given:

-Identify the computers and devices that form the system to be verified.

-Identify the security rules to be met in the verification.

-Check the installation of the transceiver and the radiant system using specific tools and tools.

-Check the connection between devices and equipment and the radiant system using specific tools.

-Register the activities performed and the incidents produced according to specified formats.

C2: Apply software installation and configuration procedures for devices and radio communications equipment for fixed and mobile networks, for commissioning according to given specifications.

CE2.1 Describe the procedures for implementing the software and loading the configurations into the mobile and fixed network radio communications devices.

CE2.2 Explain the function and values of the main parameters involved in the configuration of the radio communications devices for fixed and mobile networks, taking into account the technical specifications of the devices.

CE2.3 In a convenient, well-characterized scenario of installing the software for mobile and fixed network radio communications devices for further configuration:

-Identify the software to install and the appropriate equipment.

-Install the software using the specified tools.

-Register the version of the software to keep the team record up to date.

-Verify the functionality of the computer with the new software installed.

-Register the activities performed and the incidents produced.

CE2.4 In a practical, properly characterized, configuration in a radio communications device for fixed and mobile networks for the implementation of a communications service, according to specifications given and following the established procedures:

-Identify the radio network equipment to be configured.

-Select the configuration to be implemented using the specified tools and tools.

-Perform the configuration in accordance with the established procedure.

-Verify that the required communication services are enabled.

-Register the activities performed and the incidents produced according to specified formats.

C3: Apply test and verification procedures on devices and radio communications equipment for fixed and mobile networks to ensure the functionality of the devices, according to given specifications.

CE3.1 Identify the parameters to be tested, according to the particular implementation of the fixed and mobile network radio communications devices used.

CE3.2 Citar the techniques and test tools used to verify the radio communications devices of fixed and mobile networks implanted.

CE3.3 Classify the test procedures to be applied to verify the communication between the devices of the radio communications network, taking into account the equipment involved and its characteristics.

CE3.4 Describe the processes and tools that are used for both exposure and exploration measurement of the coverage area.

CE3.5 To cite safety regulations and recommendations regarding radiation exposure measures in radio communications systems to be met in the working environment.

CE3.6 In a practical, well-characterized case of verification of the putting into service of radio communications devices of fixed and mobile networks:

-Identify the teams involved in the practical configuration.

-Identify the features of the installed equipment from your specifications, as well as the applicable test procedures.

-Discriminate the test parameters and procedures, as well as the order of execution.

-Apply the security regulations to the job.

-Perform the tests.

-Interpret the results obtained.

-Register the activities performed and the incidents produced according to specified formats.

CE3.7 In a practical, properly characterized, exposure measurement scenario, following specifications received:

-Select the measure items to use.

-Identify and apply safety measures at work, as well as exposure to electromagnetic fields.

-Perform the exposure measures.

-Record the results of the measures and scale them to the top level.

-Register the activities performed and the incidents produced according to specified formats.

CE3.8 In a practical, well-characterized scenario, measuring the coverage area scan according to received specifications:

-Select the measure items to use.

-Identify and apply security measures in both work and exposure.

-Perform coverage area scan measures.

-Record the results of the measures and scale them to the top level.

-Register the activities performed and the incidents produced according to specified formats.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6; C2 with respect to CE2.3 and CE2.4; C3 with respect to CE3.6, CE3.7 and CE3.8.

Other capabilities:

Demonstrate interest in the broad knowledge of the organization and its processes.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Demonstrate flexibility to understand changes.

Demonstrate stress resistance, mood stability and impulse control.

Habit to the organization's work rate.

Contents:

1. Fixed and mobile radio communications networks

Elements and technologies in radio communications systems. Private mobile networks.

Mobile phone networks, protocols, services and technologies.

Access networks via radio on fixed land systems, classification and technologies.

2. Components of fixed and mobile radio communications networks

Fixed radio network devices and devices: types, characteristics, operation, connections.

Mobile radio network devices and devices: types, features, operation, connections.

3. Commissioning of equipment in fixed and mobile radio communications networks

Put-in-service procedures.

Parameters and configuration tools in fixed networks, operation and features.

Settings and configuration tools in mobile networks, operation, and features.

4. Test and verification operations on fixed and mobile radio communications networks

Instrumentation, characteristics and application of measures, tools for the verification of the operation of the equipment.

Instruments for electromagnetic field measurements.

Parameter measures.

Device measures.

Test Procedures.

5. Safety standards applicable to the putting into service of fixed and mobile radio communications equipment

Protection and security measures.

Personal security rules.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the configuration and commissioning of radio communications equipment for fixed and mobile networks, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: FIRST-LEVEL MAINTENANCE OF FIXED AND MOBILE NETWORK RADIO COMMUNICATIONS EQUIPMENT

Level: 2

Code: MF1212_2

Associated with UC: Maintain and resolve first-level incidents in fixed and mobile network radio communications systems

Duration: 210 hours

Assessment capabilities and criteria:

C1: Identify the physical structure of the radio communications equipment of fixed and mobile networks, of the modules and of the units that form them, to facilitate the maintenance and replacement of damaged units.

CE1.1 Classify the types of fixed and mobile radio networks according to the technology and standards used and the function they perform.

CE1.2 Perform the block diagram of the various radio communications equipment that make up the fixed and mobile networks.

CE1.3 Explain the internal structure and functional blocks of the radio communications equipment of fixed and mobile networks, listing and describing the different functional parts thereof, according to the technology and standards.

CE1.4 Explain the technical characteristics and identify the parameters of each of the modules and units of a radio system of fixed and mobile networks according to technical specifications.

CE1.5 Describe service protection systems (redundant systems) in the face of breakdowns and/or potential propagation problems that the radio communications equipment of the fixed and mobile network incorporates.

CE1.6 Describe the type of mounting of the radio communications equipment of fixed and mobile networks identifying the 'subframes' and the units that form it.

CE1.7 In a practical, duly characterized, practical case of description of the physical structure of the fixed and mobile radio communications equipment from their documentation:

-Describe the units of the different modules, relating the actual elements to the symbols that appear in the schema.

-Explain the type, characteristics, and functionality of the drives.

-Citar the functional blocks, explaining their typology and characteristics.

-Describe the variation in the parameters, characteristic of the units that form the equipment, making modifications to the same, explaining the relationship between the effects detected and the causes that produce them.

-Develop a report memory of the activities developed and obtained results, structuring them in the necessary sections for appropriate documentation of the same.

C2: Apply preventive maintenance procedures to equipment and auxiliary systems for fixed and mobile radio communications, to ensure their operation and minimize or avoid service outages.

CE2.1 Recognize preventive maintenance procedures to apply to the various equipment of fixed and mobile radio communications networks.

CE2.2 Identify the power and ventilation systems of radio communications equipment, as well as the various auxiliary elements required, taking into account their functionality.

CE2.3 In a convenient, properly characterized, preventive maintenance of a mobile network base station to maintain system service and functionality:

-Identify the different equipment and elements to be maintained.

-Meet established security rules.

-Perform visual inspection of alarm indicators, power and connection wiring, the radiant system.

-Check and clean the ventilation units and batteries of the equipment and power systems, and replace them.

-Perform software updates.

-Register the activities performed and the incidents produced according to specified formats.

CE2.4 In a convenient, properly characterized, preventive maintenance scenario of a mobile radio network controller to maintain the service and functionality of the system:

-Identify the various elements to be maintained.

-Meet established safety standards and perform visual inspection of alarm indicators, power and connection wiring.

-Check and clean the ventilation units and batteries of the equipment and power systems, and replace them.

-Perform configuration backups and software updates.

-Review occupancy level of hard drives, percentage of occupancy of transmission lines, and CPU.

-Register the activities performed and the incidents produced according to specified formats.

CE2.5 In a practical, properly characterized, preventive maintenance scenario of a fixed radio network terminal to maintain the service and functionality of the system:

-Identify the various elements to be maintained.

-Meet established security rules.

-Perform visual inspection of alarm indicators, power and connection wiring.

-Check and clean the equipment's ventilation units and batteries, and replace them.

-Perform configuration backups and software updates.

-Register the activities performed and the incidents produced according to specified formats.

C3: Identify alarms, describe incident types, and repair first-level breakdowns of mobile and fixed network radio communications devices and equipment, following given specifications.

CE3.1 Classify the first level alarms of devices and equipment of fixed and mobile radio communications, to facilitate the diagnosis of incidents taking into account the technical specifications.

CE3.2 Identify the incidents that produce the first level alarms in the devices and radio communications equipment of fixed and mobile networks, relating them to each unit, in order to detect possible operating anomalies.

CE3.3 Describe the connection and the type of input and output signals of the units that form the radio communications equipment to avoid errors during the repair of the fault.

CE3.4 Classifying the typical breakdowns of the radio communications equipment of fixed and mobile networks that have to do with the radio communications services.

CE3.5 Explain the systematic incident resolution and breakdown repair procedures to recover communications service interruption situations.

CE3.6 Citar the functionalities of local management software applications for use in the identification, treatment and resolution of alarms presented by radio communications equipment.

CE3.7 In a practical, well-characterized case, alarm detection and resolution:

-Inspect the visual indicators presented by radio communications equipment to locate the alarm.

-Interpret the documentation of the equipment, identifying the different functional blocks and characteristic parameters.

-Use local management applications to obtain information about the alarm and characterize it by the incident it produces on the network.

-Measure and interpret the signals and parameters of the radio communications equipment, making the necessary adjustments, according to the documentation thereof and using the appropriate instruments.

-Locate the device responsible for the breakdown, making the necessary modifications and/or replacements for this location with the prescribed quality, following standard procedures, in an appropriate time.

-Register the activities performed and the incidents produced according to specified formats.

CE3.8 In a practical, properly characterized, incident-resolution scenario, perform the replacement of a broken unit, following the established procedure:

-Meet established security rules.

-Determine if it is necessary or not to cut the power of the unit to proceed to its replacement and check the labeling of the wiring to prevent errors of connection after the replacement.

-Select the appropriate tools for removing the cables attached to the drive as well as to remove the drive from the 'subframe', and verify the compatibility of the spare drive with the broken down.

-Identify the hardware configuration of the drive to replace if appropriate, to configure the spare drive, and insert the new drive.

-Verify the disappearance of the associated alarms at both the hardware level and the local management software level.

-Use the local management applications to verify the operation and update the inventory of the units and record the activities performed and the incidents produced according to specified formats.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.7; C2 with respect to CE2.3, CE2.4 and CE2.5; C3 with respect to CE3.7 and CE3.8.

Other capabilities:

Finish the job based on criteria of suitability, speed, economy and effectiveness.

Propose challenging targets that represent a higher level of performance and effectiveness than previously achieved.

Demonstrate stress resistance, mood stability and impulse control.

Interpret and execute work instructions.

Act quickly in problematic situations and not just wait.

Demonstrate flexibility to understand changes.

Contents:

1. Physical architecture of fixed radio communications networks

Physical architecture of a fixed network radio communications system.

Fixed radio network terminals: internal structure and functional blocks, units and modules that form them, types of assembly.

2. Physical architecture of mobile radio communications networks

Physical architecture of a mobile network radio communications system.

Base stations for mobile radio networks: internal structure and functional blocks; types of assembly. Mobile radio network controllers: internal structure and functional blocks; types of assembly.

3. Antennas and service protection systems

Antennas: types of antennas ('arrays ', omnidirectional, parabolic), concept of polarization in the antennas.

Service Protection Systems (redundancy).

4. Preventive maintenance operations of fixed and mobile radio communications equipment and devices

Tools and tools for the assembly and adjustment of radio communications equipment.

Base station maintenance, network controller, radio terminals, and antennas.

Power systems (rectifiers, batteries and generators): characteristics and measures to be carried out, electrotechnical regulation, characteristics of circuit breakers and fuses, wiring of the power system, earth-taking systems, relays.

HVAC systems.

Transmission media: coaxial cables, waveguides; identification of connectors and cable types; guide-wave pressurization systems.

Instruments and measurement procedures in radio communications equipment.

Conditions for correct operation: maximum curvature, influence of upcoming electromagnetic fields, humidity.

5. Diagnosis and resolution of first-level incident breakdowns in fixed and mobile radio communications networks

Types of breakdowns.

Diagnostic and troubleshooting procedures.

Diagnostic tools: Local and centralized network management systems.

Repair of first-level incident breakdowns.

6. Safety standards applicable to the maintenance of fixed and mobile radio communications equipment

Protection and security measures.

Personal security rules.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the maintenance and resolution of first-level incidents in fixed and mobile network radio communications systems, which will be accredited by one of the following two forms:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

ANNEX XV

Professional Qualification: Administration and Programming in Enterprise Resource Planning and Customer Relationship Management Systems

Professional Family: Informatics and Communications

Level: 3

Code: IFC363_3

General Competition

Install, configure, and manage enterprise resource planning and customer relationship management systems (ERP-CRM systems: Enterprise Resource Planning-Customer Relationship Management), adapting them by programming software components, based on design specifications, to support the organization's business rules, and ensuring its operation within the company's organizational parameters.

Competition Units

UC1213_3: Install and configure enterprise resource planning and client relationship management systems

UC1214_3: Administer enterprise resource planning and client relationship management systems

UC1215_3: Perform and maintain software components in a client relationship management and business resource planning system

Professional Environment

Professional Scope

Develops its professional activity in the IT department dedicated to the administration and programming of business resource planning and client relationship management systems (ERP-CRM systems), in entities of public or private nature, small and medium-sized enterprises or micro-enterprises, both self-employed and independent, regardless of their legal form. It develops its activity, depending on its case, functional and/or hierarchically of a superior. You may have staff in your position at times, for seasons or in a stable way. The principles of universal accessibility are applied in the development of professional activity in accordance with the applicable regulations.

Productive Sectors

It is located primarily in the services sector, in the computer consulting and application development subsector or in any production sector that uses integrated systems of enterprise resource planning and customer relationship management for its management.

Relevant occupations and jobs

The terms of the next relationship of occupations and jobs are used with a generic and omnicomrensivo character of women and men.

Business resource planning and client relationship management system administrators

Software component developers in enterprise resource planning and client relationship management systems

Associated Training (600 hours)

Training Modules

MF1213_3: Installing and configuring enterprise resource planning and client relationship management systems (150 hours)

MF1214_3: Administration of enterprise resource planning and client relationship management systems (210 hours)

MF1215_3: Creating and maintaining software components in enterprise resource planning and client relationship management systems (240 hours)

COMPETITION UNIT 1: INSTALL AND CONFIGURE ENTERPRISE RESOURCE PLANNING AND CLIENT RELATIONSHIP MANAGEMENT SYSTEMS

Level: 3

Code: UC1213_3

Professional Realizations and Realization Criteria:

RP 1: Install and configure the data warehouse system (data warehouse) on ERP-CRM systems for operation, following technical specifications received and according to the needs of the organization.

CR 1.1 The server computer on which the data store is installed is configured to host it, following technical specifications received and product guides.

CR 1.2 The data warehouse system software is installed and configured on the servers for operation, following the manufacturer's recommendations and guidelines and the advice of experts or consultants.

CR 1.3 The tools for the migration and installation of components in the development, testing and exploitation environments, of the data warehouse software, are configured to be able to perform the adaptive and corrective maintenance of the same and their verification before releasing them for use by the end user, following technical specifications and according to the needs of the organization.

CR 1.4 The installation and configuration testing of the data warehouse system is performed to verify its functionality, following technical specifications and implementation needs.

CR 1.5 The relevant details of the installation and test of the data warehouse system, as well as the incidents produced during the process, are reflected in the documentation to keep track of the work done, following the procedure established by the organization.

RP 2: Install and configure the enterprise resource planning system (ERP) for further adaptation to the company's particularities and exploitation, following technical specifications received and according to the needs of the organization.

CR 2.1 The server computer on which the enterprise resource planning system is installed is configured to host it, following technical specifications received and product guides.

CR 2.2 The ERP system software is installed and configured on the servers for operation, following the manufacturer's recommendations and guidelines and the advice of the experts or consultants.

CR 2.3 Access services are installed and configured so that users can work with the ERP system, following product guidelines and recommendations and organization policies.

CR 2.4 The ERP system's remote support framework is installed and configured so that the maintenance company can perform such support, based on agreed conditions and protocols and the organization's security policy.

CR 2.5 The tools for the migration and installation of components in the development, testing and exploitation environments, in ERP systems, are configured to be able to perform the adaptive and corrective maintenance of the same and their verification before releasing them for use by the end user, following technical specifications and according to the needs of the organization.

CR 2.6 The installation and configuration tests of the ERP system are performed to verify its functionality, following specifications received and according to the needs of the implantation.

CR 2.7 The relevant details of the installation and testing of the ERP system, as well as the incidents produced during the process, are reflected in the documentation to keep track of the work done, following the procedure established by the organization.

RP 3: Install and configure the Customer Relationship Management System (CRM) for further adaptation to the company's particularities and exploitation, following technical specifications received and according to the needs of the organization.

CR 3.1 The server team on which the client relationship management system is installed is configured to host it, following technical specifications received and product guides.

CR 3.2 The CRM system software is installed and configured on the servers for operation, following the manufacturer's recommendations and guidelines and the advice of the experts or consultants.

CR 3.3 Access services are installed and configured so that users can work with the CRM system, following product guidelines and recommendations and organization policies.

CR 3.4 The CRM system's remote support framework is installed and configured so that the maintenance company can perform that support, based on agreed conditions and protocols and the organization's security policy.

CR 3.5 The tools for migration and installation of components in the development, test and operating environments, in CRM systems, are configured to be able to perform the adaptive and corrective maintenance of the same and their verification before releasing them for use by the end user, following technical specifications and according to the needs of the organization.

CR 3.6 The installation and configuration tests of the CRM system are performed to verify its functionality, following specifications received and according to the needs of the implantation.

CR 3.7 The relevant details of the installation and testing of the CRM system, as well as the incidents produced during the process, are reflected in the documentation to keep track of the work done, following the procedure established by the organization.

Professional Context:

Production media:

Computer equipment. Hardware equipment required for the installation of a business resource planning, client relationship management, and data warehouse system. Communications infrastructure. Operating system software and its installation and configuration tools. Database software and its installation and configuration tools. Installation Software for each of the systems, free or proprietary: ERP, CRM, data warehouse and other horizontal modules. Remote assistance software tools.

Products and results:

ERP, CRM, and data warehouse systems installed and configured. Initial load and/or data migration.

Information used or generated:

Operating system and data manager installation guides and manuals. Guides and installation manuals for the various ERP, CRM and data warehouse systems. Installation manuals for other business management modules. Implementation plan and documentation guidelines for the organization. Elaborate documentation on the installation and configuration of the implanted systems and the initial load and/or migration of data. Inventory of incidents. Installation and testing reports.

COMPETITION UNIT 2: ADMINISTER ENTERPRISE RESOURCE PLANNING AND CLIENT RELATIONSHIP MANAGEMENT SYSTEMS

Level: 3

Code: UC1214_3

Professional Realizations and Realization Criteria:

RP 1: Manage the data warehouse to maintain and ensure its operation, based on the criteria set by the organization and the recommendations of the product manufacturer.

CR 1.1 The access service decided by the organization is administered and maintained so that administrators can work with the data warehouse system, following product guidelines and recommendations and the organization's security policies.

CR 1.2 The data warehouse system monitoring tools are used for the detection of processes that overload and collapse the system, following technical specifications and according to the needs of the organization.

CR 1.3 Data extraction processes and other background processes are monitored and monitored, following established guidelines and procedures.

CR 1.4 The detected or reported incidents are resolved to maintain the stability of the data warehouse system, according to the technical documentation and following the instructions received, provided that these exist and correspond to the organization; in another case the manufacturer or the contracting company is informed and registered to manage the maintenance contract.

CR 1.5 The new components and software elements of the data storage system are installed in the development, test and operation environments, and are configured to be able to perform the maintenance of the same and their verification before releasing them for use by the CRM and ERP systems, following technical specifications and according to the needs of the organization.

CR 1.6 The processes performed as well as the incidences produced in the administration are reflected in the documentation to keep track of the work done, following the procedure established by the organization.

RP 2: Administer the enterprise resource planning system (ERP) to maintain and ensure its operation, in accordance with the criteria established by the organization and the recommendations of the product manufacturer.

CR 2.1 The access service decided by the organization is administered and maintained so that users can work with the enterprise resource planning system, following product guidelines and recommendations and the organization's security policies.

CR 2.2 The ERP system monitoring tools are used for the detection of processes that overload and collapse the system, following specifications received and according to the needs of the organization.

CR 2.3 Data extraction processes and other background processes are monitored and tracked, following established guidelines and procedures.

CR 2.4 The detected or reported incidents are resolved to maintain the stability of the ERP system, according to the documentation and following the instructions received, provided that these exist and correspond to the organization; in another case the manufacturer or the contracting company is informed and registered to manage the maintenance contract.

CR 2.5 The system saturation control tools and data manager access delay times are managed to refine and optimize the ERP system operation, according to technical specifications and organizational needs.

CR 2.6 The new components and software elements of the ERP system are installed in the development, test and operation environments, and are configured to be able to perform the maintenance of the same and their verification before releasing them for use by the end user, following technical specifications and according to the needs of the organization.

CR 2.7 The processes performed as well as the incidences produced in the administration are reflected in the documentation to keep track of the work done, following the procedure established by the organization.

RP 3: Administer the Customer Relationship Management System (CRM) to maintain and ensure its operation, based on the criteria established by the organization and the recommendations of the product manufacturer.

CR 3.1 The access service decided by the organization is managed and maintained so that users can work with the CRM system, following product guidelines and recommendations and the organization's security policies.

CR 3.2 The CRM system monitoring tools are used for the detection of processes that overload and collapse the system, following technical specifications and according to the needs of the organization.

CR 3.3 Data extraction processes and other background processes are monitored and tracked, following established guidelines and procedures.

CR 3.4 The CRM system administration tools are managed to facilitate the administration of all the elements that make up the CRM system, following established guidelines and procedures.

CR 3.5 The detected or reported incidents are resolved to maintain the stability of the CRM system, following the documentation and instructions received, provided that they exist and correspond to the organization; in another case the manufacturer or the contracting company is informed and registered to manage the maintenance contract.

CR 3.6 The system saturation control tools and data manager access delay times are managed to refine and optimize the operation of the CRM system, following technical specifications and according to the needs of the organization.

CR 3.7 The new components and software elements of the CRM system are installed in the development, test and operation environments, and are configured to be able to perform the maintenance of the same and their verification before releasing them for use by the end user, following technical specifications and according to the needs of the organization.

CR 3.8 The processes performed as well as the incidences produced in the administration are reflected in the documentation to keep track of the work done, following the procedure established by the organization.

RP 4: Implement security procedures in ERP, CRM and data warehouse systems to ensure controlled access and data integrity, addressing the needs of the organization.

CR 4.1 Data backup operations on ERP, CRM, and data warehouse systems are performed to prevent their loss, following established procedures and addressing the policy established by the organization.

CR 4.2 The creation and management of users, roles and profiles is done to address requests related to access to ERP, CRM and data warehouse systems and to their different modules, following specifications received and according to the needs of the organization.

CR 4.3 The components that are accessed from the CRM are configured to ensure that they can only access them who must, following the established guidelines and procedures and taking into account the security policy of the organization.

CR 4.4 Data using the ERP, CRM and data warehouse systems subject to the Data Protection Act (LOPD) are identified and reported to the security department to take the necessary steps, following established procedures.

CR 4.5 The processes performed as well as the incidents produced are reflected in the documentation to keep track of the work done, following the procedure established by the organization.

CR 4.6 The procedures for backing up and the levels of these copies are planned according to the needs of the organization, the times of the copies, the times of recovery, the required storage spaces, and the validity of the copy history.

CR 4.7 The verification tests of the backup copies are performed and their functionality is verified according to the quality specifications of the organization and the applicable regulations.

CR 4.8 Backup copies are tagged and stored for later recovery in accordance with the organization's quality regulations, organization security plan specifications, and legal regulations.

CR 4.9 The backups are recorded in an inventory for identification and recovery, in accordance with the security regulations of the organization and applicable regulations.

CR 4.10 The documentation of the procedures for obtaining and verifying backup copies as well as the contingency plans and the resolution of incidents is made according to the regulations of the organization and the applicable regulations.

Professional Context:

Production media:

Computer equipment. Operating systems and databases. ERP, CRM and data warehouse systems. User administration tools and permission management to resources in ERP, CRM, and data warehouse systems. Performance control tools in ERP, CRM and data warehouse systems. Process monitoring tools in ERP, CRM and data warehouse systems. Memory usage monitoring tools in ERP, CRM and data warehouse systems. Storage device management monitoring tools in ERP, CRM, and data warehouse systems. Preoperating stress test tools in ERP, CRM, and data warehouse systems.

Products and results:

ERP, CRM, and integrated data warehouse systems managed and operating correctly. Performance of ERP, CRM and data warehouse systems appropriate to the operating parameters. ERP, CRM, and secure data warehouse systems and integrated into the access and use of resources. Backup copies.

Information used or generated:

Operating manuals. Operating system and data manager administration manuals. Manuals and administration guides for the various ERP, CRM and data warehouse systems. Documentation guidelines for the organization. Plan of operation of the organisation. Manuals of the monitoring tools. Graphics and performance analysis. Access listings and user restrictions. Incident report. Protocol for action against incidents. Current legislation on data protection. Internal rules of the organisation. Inventory of backup copies. Inventory of incidents. Backup copy plan. Contingency plan for backup copies.

COMPETITION UNIT 3: PERFORM AND MAINTAIN SOFTWARE COMPONENTS IN A CLIENT RELATIONSHIP MANAGEMENT AND ENTERPRISE RESOURCE PLANNING SYSTEM

Level: 3

Code: UC1215_3

Professional Realizations and Realization Criteria:

RP 1: Perform data dictionary maintenance and query operations in enterprise resource planning and client relationship management systems (ERP-CRM systems) for the extraction and subsequent processing of information, following established design specifications.

CR 1.1 Data dictionary objects and their relationships are created and maintained using the tools provided by the ERP-CRM systems, following the design specifications received and internal rules of the organization.

CR 1.2 The tools and languages of consultation and manipulation provided by the ERP-CRM systems are used to extract information contained therein, following the specifications received, according to their characteristics and complying with the applicable data protection regulations.

CR 1.3 Access to data managers is done to extract information using the tools and languages provided by the ERP-CRM systems, following the specifications received and the characteristics of the same.

CR 1.4 The tasks performed are documented for registration and subsequent use, following rules of the organization.

CR 1.5 Data and information are safely extracted in accordance with the quality standards of the organization and the applicable data protection regulations.

RP 2: Create and maintain software components to manipulate and load information into enterprise resource planning and customer relationship management systems (ERP-CRM systems), using the provided languages and tools, following established design specifications.

CR 2.1 The tools provided by ERP-CRM systems are used to handle data and generate forms and listings, following technical specifications and addressing usage needs.

CR 2.2 Language programming elements are used to create components that handle the data contained in ERP-CRM systems, following technical specifications and according to the needs of the organization.

CR 2.3 Processes for automating data extractions ('batch inputs ') are created using the tools and languages provided by the ERP-CRM systems, following the specifications received and the characteristics of them.

CR 2.4 Software components are maintained and modified to add new functionalities to ERP-CRM systems, according to system exploitation needs.

CR 2.5 The software components manufactured or modified are checked to demonstrate the added or modified functionality in ERP-CRM systems, complying with the organization's regulations.

CR 2.6 The software components created on ERP-CRM systems are documented for registration and subsequent use, adjusting to the rules of the organization.

RP 3: Develop components and queries within the data warehouse system (data warehouse) to store and collect information ('data mining '), based on established design specifications.

CR 3.1 Information structures (cubes, multicubes) and their relationships are implemented to store the corporate information of the data warehouse system and facilitate its handling, following technical and design specifications, in compliance with the rules of the organization.

CR 3.2 The data sources that make up the data warehouse system are managed to make them available, according to needs and in compliance with the organization's security rules.

CR 3.3 Information extractions on the data warehouse system are generated and integrated on the basis of efficiency criteria, following technical specifications, according to the rules of the organization and complying with applicable data protection regulations.

CR 3.4 Extraction of data from the external system is configured by defining the communication structure, transfer, and transfer rules, following technical specifications, according to the rules of the organization and complying with applicable data protection regulations.

CR 3.5 Software components are created to collect data warehouse system and source system information using query and manipulation languages, following technical specifications and complying with applicable data protection regulations.

CR 3.6 The software components created and the queries made are documented for registration and subsequent use, following the rules of the organization.

Professional Context:

Production media:

Computer equipment. Operating systems and data managers. ERP, CRM and data warehouse systems. Tools and languages for querying and manipulating data in ERP, CRM and data warehouse systems. Design specifications. Technical specifications. Rules of the organisation. Programming languages. Software testing and verification tools. Documentation tools.

Products and results:

Query components, forms, and listings for obtaining and manipulating data in ERP, CRM, and data warehouse systems. Components for data extraction in ERP, CRM and data warehouse systems.

Information used or generated:

Operating system and database operating manuals. Operating manuals for the various ERP, CRM and data warehouse systems. Language manuals and tools for information manipulation in ERP, CRM and data warehouse systems. Documentation guidelines for the organization. Plan of operation of the organisation. Documentation of developed components. Applicable rules on data protection. Internal rules of the organisation. Technical specifications. Test plan. Documentation on the data and components.

TRAINING MODULE 1: INSTALLING AND CONFIGURING ENTERPRISE RESOURCE PLANNING AND CLIENT RELATIONSHIP MANAGEMENT SYSTEMS

Level: 3

Code: MF1213_3

Associated with UC: Installing and configuring enterprise resource planning and client relationship management systems

Duration: 150 hours

Assessment capabilities and criteria:

C1: Identify the functionality and configuration parameters and install the data warehouse system on ERP-CRM systems for further operation, following deployment models and using installation and configuration manuals.

CE1.1 Distinguished the general functions and features of the data warehouse systems in ERP-CRM systems to decide the options that arise during your installation, using diagrams and diagrams.

CE1.2 Identify the various components and modules of a data warehouse system in ERP-CRM systems to add the different functionalities to it, defining different types of implementation.

CE1.3 Recognize the configuration parameters of the data warehouse system in ERP-CRM systems to adjust its operation, according to the installation guide.

CE1.4 Recognize the necessary elements that allow the connection of the data warehouse system with the ERP system, for obtaining data.

CE1.5 Explain the system of transport of components between the different development, test and operating environments and the data warehouse system, to initiate the flow of modifications and their verification before being released for use by the end user, according to technical specifications.

CE1.6 In a practical, properly characterized, installation and configuration scenario of a data warehouse system within ERP-CRM systems for further operation, following the manuals and installation guides:

-Perform the installation of the data warehouse software using wizards and taking into account the different modules to be implemented, also installing the required patches for operation following indications of the installation guides.

-Configure and adjust parameters for data warehouse, ERP, and CRM systems, running configuration scripts, and using system-provided tools, following installation and configuration guides.

-Test the connection and flow of data between the data warehouse system and the ERP and CRM systems.

-Configure the transport of objects between different environments.

-Perform tests to ensure the functionality of the installation.

-Document procedures performed according to specified formats.

C2: Identify the functionality and configuration parameters and install the ERP system for further operation, following implementation models and using installation and configuration manuals.

CE2.1 Distinguished the general features and functions of ERP systems to decide the options that are presented during your installation, using diagrams and diagrams.

CE2.2 Identify the different components and modules of an ERP system: financial, sales and purchases, among others, to add the different functionalities to it, defining different types of implementation.

CE2.3 Recognize the configuration parameters of the ERP system to adjust its operation, taking into account the different models of implementation according to economic sector and type of exploitation.

CE2.4 Distinguished access services for clients and their configuration parameters, for the connection of users to the ERP system.

CE2.5 Identify the configuration parameters required to install the remote support framework, based on the features of this service.

CE2.6 Recognize the necessary elements that allow the connection of the ERP system to other systems, according to implementation types.

CE2.7 Explain the system of transport of components of ERP systems, between different development, test and operating environments, to initiate the flow of modifications and their verification before being released for use by the end user, according to technical specifications.

CE2.8 In a practical, properly characterized, installation and configuration scenario of an ERP system for operation, following the manuals and installation and configuration guides:

-Perform the installation of the ERP system software using wizards and taking into account the different modules to be implemented, also installing the necessary patches for its operation.

-Configure and adjust ERP system parameters, using and running system-provided configuration scripts and tools.

-Install and configure the access services environment for clients.

-Install and configure the remote support framework.

-Configure the transport of objects between different environments.

-Perform tests to verify the operation with the operating system and the data manager.

-Document procedures performed according to specified formats.

C3: Identify the functionality and configuration parameters and install the CRM system for further operation, following deployment models and using installation and configuration manuals.

CE3.1 Distinguished the general functions and features of CRM systems to decide the options that are presented during your installation, using diagrams and diagrams.

CE3.2 Identify the various components and modules of a CRM system (mobility and call center, among others) to add the different functionalities to it, defining different types of implementation.

CE3.3 Recognize the configuration parameters of the CRM system to adjust its operation, distinguishing implementation models according to economic sector and type of operation.

CE3.4 Distinguished access services for clients and their configuration parameters, for the connection of users to the CRM system.

CE3.5 Identify the configuration parameters required to install the remote support framework, based on the features of this service.

CE3.6 Recognize the necessary elements to make the connection of the CRM system with the ERP system, to obtain the data that it needs.

CE3.7 Explain the system of transport of components of CRM systems, between different development, test and operating environments, to initiate the flow of modifications and their verification before being released for use by the end user, according to technical specifications.

CE3.8 In a convenient installation and configuration scenario of a CRM system for operation, following manuals and installation and configuration guides:

-Perform the installation of the CRM system software using wizards and taking into account the different modules to be implemented, also installing the required patches for operation.

-Configure and tune CRM system parameters using and running system-provided scripts and configuration tools.

-Install and configure the client access services environment and the remote support framework.

-Configure the transport of objects between different environments.

-Perform tests to verify the operation of the installation and configuration.

-Document procedures performed according to specified formats.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.6; C2 with respect to CE2.8; C3 with respect to CE3.8.

Other capabilities:

Demonstrate interest in the broad knowledge of the organization and its processes.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Demonstrate flexibility to understand changes.

Demonstrate stress resistance, mood stability and impulse control.

Habit to the organization's work rate.

Contents:

1. ERP Systems

Architecture and features of an ERP system.

Organization of a company, features of the functional modules of an ERP system.

The basic module in an ERP system, operational functionalities.

Modules of an ERP system: description, typology and inter-module interconnection.

2. CRM systems

Architecture and features of a CRM system.

Organization of an enterprise and its external relations, electronic business characteristics (e-business).

The basic module in a CRM system, operational functionalities.

Characteristics of the functional modules of a CRM system, typology, inter-module interconnection.

3. Data warehouse systems (data warehouse) on ERP-CRM systems

Architecture and features of data warehouse systems on ERP-CRM systems. Use and benefits of data warehouse systems in the enterprise.

Data warehouse system components and components.

4. Installing, configuring, and updating the data warehouse software

Data store system installation processes.

Data store system configuration parameters, definition, types, and features. Updating the data warehouse system and applying updates.

Connection of the data warehouse system with the ERP and CRM systems: features and configuration parameters.

Development, testing, and operating environments on data warehouse systems: installation and configuration of the transport system.

Operating tests.

Error Log.

Documentation for the installation and configuration of the data store.

5. Installing, configuring, and upgrading the ERP system

ERP system installation processes.

ERP system configuration parameters: description, typology, and usage.

Updating the ERP system and applying updates.

Other modules, features, and installation.

ERP system access services: configuration features and parameters, installation. Development, testing and operating environments; installation, configuration of the transport system.

Remote technical assistance in the ERP system: installation and configuration.

Operating tests.

Documentation for the installation and configuration of the ERP system.

6. Installing, configuring, and upgrading the CRM system

CRM system installation processes.

CRM system configuration parameters, definition, types, and features.

Updating the CRM system and applying updates.

Other modules, features, and installation.

CRM system access services: configuration features and parameters, installation. Development, testing and operating environments on CRM systems: installation and configuration of the transport system.

Remote technical assistance in the CRM system: installation and configuration.

Operating tests.

Documentation for the installation and configuration of the CRM system.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the installation and configuration of enterprise resource planning and client relationship management systems, which will be credited using one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 2: ADMINISTRATION OF ENTERPRISE RESOURCE PLANNING AND CLIENT RELATIONSHIP MANAGEMENT SYSTEMS

Level: 3

Code: MF1214_3

Associated with UC: Administer Business Resource Planning and Customer Relationship Management Systems

Duration: 210 hours

Assessment capabilities and criteria:

C1: Identify the data warehouse processes, monitor and resolve any incidents that occur to maintain system functionality and performance, following technical specifications and according to usage needs.

CE1.1 Describe the data store parameters that influence your performance, according to technical specifications.

CE1.2 Describe the main data warehouse processes and the features of the monitoring tools to track them.

CE1.3 Use the tools that evaluate the performance of the data store to detect code and performance problems among others and correct them, following the technical specifications received.

CE1.4 Detailed data warehouse monitoring and detection procedures to proceed with resolution or scaling to the top level, following the indications of the technical manuals and specifications received.

CE1.5 In a practical, duly characterized, case-resolution scenario based on an ERP, CRM, and data warehouse system in which an incident is occurring relative to the data warehouse and following technical specifications given:

-Analyze the detected symptoms, recognizing the affected performance parameters, and identify the involved processes that should be monitored using the appropriate tools.

-Fix incidents using the appropriate procedures and administrative manuals, or scale them to the top level.

-Verify system operation, after the incident has been resolved.

-List and quantify system performance improvements obtained after applying actions for this.

-Describe the back-back procedures in anticipation that the changes do not produce the desired effect.

-Document the operations performed on the system in order to be applied if the circumstances are replayed, according to specified formats.

C2: Identify the processes of the ERP system, monitor them and resolve the incidents that occur to maintain the functionality and performance of the system, following technical specifications and according to the needs of use.

CE2.1 Describe the parameters of the ERP system that influence their performance, according to technical specifications.

CE2.2 Describe the main processes of the ERP system and the features of the monitoring tools to track them.

CE2.3 Use the tools that evaluate the performance of the ERP system to detect code and performance problems among others and correct them, following the technical specifications received.

CE2.4 Detailed the procedures for monitoring and detecting incidents of the ERP system to proceed to its resolution or scaling to the top level, following the indications of the technical manuals of administration and specifications received.

CE2.5 In a practical, properly characterized, incident-resolution scenario from low performance simulation or execution failure of one or more processes and 100% server memory occupancy, over an ERP system, using stress generation tools on 'preexploitation':

-Capture the basic performance data (number of processes running, percentage of memory used per process) using performance tools.

-Analyze the data obtained by sorting, sorting, grouping, and charting.

-Verify that your environment meets the hardware and software requirements determined by the manufacturer.

-If the loss of performance or failure is reproducible, determine the steps to reproduce it and do so without other connected users to know what element causes the problem.

-If the loss of performance or failure is not reproducible, increase the trace levels of the server components and wait for the loss to occur again to determine its causes and reproduce it voluntarily.

-Document the performed tasks and the incidents produced according to specified formats.

C3: Identify the processes of the CRM system, monitor them, and resolve the incidents that occur to maintain the functionality and performance of the system, following technical specifications and according to usage needs.

CE3.1 Describe the CRM system parameters that influence your performance, according to technical specifications.

CE3.2 Describe the main processes of the CRM system and the features of the monitoring tools to track them.

CE3.3 Use the tools that evaluate the performance of the CRM system to detect code and performance problems among others and correct them, following the technical specifications received.

CE3.4 Detailed the procedures for monitoring and detecting incidents of the CRM system to proceed with its resolution or scaling to the top level, following the indications of the technical manuals of administration and specifications received.

CE3.5 In a convenient, properly characterized, Telephony-Computer Integration (CTI) scenario in which the CTI administration tool does not appear to users of the CRM system that need it:

-Verify that the communications server and the CTI driver are installed and running.

-Verify the communications configuration parameters, especially those that reference the maximum number of active communications sessions per agent.

-Verify that there are no orphaned communications sessions (active on server but no user connected for that agent).

CE3.6 In a convenient, properly characterized, scenario of failure in the browser response to a web client connection request to a CRM system:

-Verify that your environment: browser versions, installed patches, additional software, and other hardware requirements meet the requirements of the product.

-Log the date and time when the error occurred to verify later in the machine error log that no other critical errors occurred than this might have occurred.

-Enable the available diagnostic mechanisms to determine the CPU occupancy, memory occupancy, and other values for successive occasions when the error is returned.

-If the error is reproducible, determine if it occurs with the standard application or only in the 'tailored' application by the developers. If the error occurs only with the configured application, try to turn off different parts of the configuration performed to detect the source of the error.

-If the error is not reproducible, increase the trace levels of the server components and wait for the error to occur again to determine its causes and reproduce it voluntarily.

-Document the performed tasks and the incidents produced according to specified formats.

C4: Identify techniques and tools to ensure customer access to ERP, CRM and data warehouse systems, following established technical specifications.

CE4.1 Detailed the features of the access channels to the ERP, CRM, and data warehouse systems.

CE4.2 Determine the modules or components of the ERP, CRM, and data warehouse systems required to allow access through the possible channels.

CE4.3 Describe the procedures for monitoring the access channels to ERP, CRM and data warehouse systems to observe their status and performance.

CE4.4 Create users, groups, roles, privileges, and authorization profiles to ERP, CRM, and data warehouse systems, to ensure access to it and the users ' work, according to given specifications.

CE4.5 In a convenient, well-characterized scenario, managing client access to ERP, CRM and data warehouse systems, following technical specifications given:

-Identify the possible access channels according to the requirements.

-Configure the modules or components required to create the client connection.

-Configure connections between the ERP system, CRM and data warehouse, and a 'mobile' system.

-Create authorization profiles and users, associating profiles with users.

-Verify the operation of the connection performed and the created and associated users and profiles.

-Document the performed tasks and the incidents produced according to specified formats.

C5: Describe the operation and management of the system of transport of objects and components between different development, test and operating environments, to maintain the flow of modifications and their verification before being released for use by the end user, according to technical and functional requirements.

CE5.1 Describe the physical and logical architectures of the development, test, and exploitation environments of ERP, CRM, and data warehouse systems to identify the needs of transportation management.

CE5.2 Explain the characteristics of the transport tools between development, test and exploitation environments in ERP, CRM and data warehouse systems, taking into account technical and functional specifications.

CE5.3 Describe the component step procedures developed between development, test, and exploitation environments in ERP, CRM, and data warehouse systems using the specific tools of these products.

CE5.4 In a practical, well-characterized case of component transport management between development, test and operating environments in ERP, CRM and data warehouse systems, following technical specifications:

-Identify the components involved in the transport and possible incompatibilities between them.

-Relate the versions in each environment (development, test, and exploitation) of the product or the developed components.

-Verify the syntax of the component and possible transport results.

-List the steps to be taken to perform the transports between the environments.

-Verify component transport summaries and their possible results.

-Document the performed tasks and the incidents produced according to specified formats.

C6: Identify techniques and tools to ensure the integrity and actuality of data from ERP, CRM and data warehouse systems, following technical specifications.

CE6.1 Interpret the backup plan and perform its execution to ensure the integrity of the ERP, CRM, and data warehouse systems.

CE6.2 2 Describe the necessary measures to be taken to ensure the integrity and confidentiality of information stored and manipulated within ERP, CRM and data warehouse systems, taking into account applicable data protection regulations.

CE6.3 Describe the physical and logical architecture involved in data extraction procedures in ERP, CRM, and data warehouse systems.

CE6.4 Describe data extraction procedures (batch inputs) between ERP and CRM systems, and data warehouse; CRM and data warehouse; and CRM and ERP, identifying and executing extractors for data collection.

CE6.5 Interpret traces (logs) obtained after the launch of data extraction procedures on the system to verify or detect incidents in execution.

CE6.6 In a convenient, properly characterized, data extraction scenario between ERP, CRM, and data warehouse systems, following specifications received:

-Prepare data extraction processes (batch inputs) following the specifications received.

-Launch the data extraction procedures.

-Observe traces (logs) and interpret results.

-Run the data store extractors and display the produced logs.

-Identify and correct any incidents that occur in the extraction process.

-Document the performed tasks and the incidents produced according to specified formats.

Capabilities whose acquisition must be completed in a real workbench:

C1 with respect to CE1.5; C2 with respect to CE2.5; C3 with respect to CE3.5 and CE3.6; C4 with respect to CE4.5; C5 with respect to CE5.4; C6 with respect to CE6.6.

Other capabilities:

Demonstrate interest in the broad knowledge of the organization and its processes.

Communicate effectively with the right people at every moment, respecting the channels established in the organization.

Adapt to the organization, its organizational and technological changes as well as new situations or contexts.

Demonstrate flexibility to understand changes.

Demonstrate stress resistance, mood stability and impulse control.

Habit to the organization's work rate.

Contents:

1. Maintenance management in ERP, CRM, and data warehouse systems

Processes of ERP, CRM and data warehouse systems.

Parameters of systems that influence performance.

Monitoring and Performance Evaluation Tools: Features and Features. System traces (logs). Incidents: identification and resolution.

2. Transportation of components between development, test, and operating environments in ERP, CRM, and data warehouse systems

Version control and management of the different environments.

Architectures of the different environments according to the operating system.

The transport system: features and elements involved.

Transport tools, features and functionalities.

Errors in transport execution: types and solution.

3. Data extraction processes in ERP, CRM, and data warehouse systems

Features and functionalities.

Execution procedures.

Incident resolution; execution traces.

4. ERP, CRM, and data warehouse system security

Systems access channels: features and functionality.

Creating user, roles, and authorization profiles.

Back-lin/off-line backups and system restore; planning.

Managing assignments on CRM systems: Creating service assignment rules.

Assigning business processes to services.

Training context parameters:

Spaces and installations:

The spaces and facilities will respond, in the form of a classroom, a workshop, a workshop of practices, a laboratory or a singular space, to the training needs, according to the Professional Context established in the Unit of the associated Competition, taking into account the applicable regulations of the productive sector, prevention of risks, occupational health, universal accessibility and environmental protection.

Professional or former trainer profile:

1. Domain of knowledge and techniques related to the administration of enterprise resource planning and client relationship management systems, which will be credited using one of the following two ways:

-Level 2 academic training (Spanish Framework of Qualifications for Higher Education), Technical Engineer, Diplomacy or other higher level related to the professional field.

-Professional experience of a minimum of 2 years in the field of competencies related to this training module.

2. Accredited pedagogical competence in accordance with what is established by the competent authorities.

TRAINING MODULE 3: CREATING AND MAINTAINING SOFTWARE COMPONENTS IN ENTERPRISE RESOURCE PLANNING AND CLIENT RELATIONSHIP MANAGEMENT SYSTEMS

Level: 3

Code: MF1215_3

Associated with UC: Perform and maintain software components in a client relationship management and enterprise resource planning system

Duration: 240 hours

Assessment capabilities and criteria:

C1: Identify data dictionary objects and keep them using languages and tools provided by ERP-CRM systems, following the defined design specifications.

CE1.1 Explain the features and elements that make up the data model used in ERP and CRM systems, according to the design specifications set.

CE1.2 Identify the types of objects and structures that make up the ERP-CRM system data dictionary.

CE1.3 Describe the mechanisms that guarantee the integrity of the data contained in the data dictionary: primary key, foreign key and referential integrity, among others, according to the data model and the logical system design.

CE1.4 Describe the features and functionalities of the languages and tools provided by the ERP-CRM system used for the creation of objects and data structures.

CE1.5 Create objects and data structures, as well as their relationships using languages and tools provided by the ERP-CRM system, according to the system data model.

CE1.6 In a convenient, properly characterized, practice of maintaining data dictionary objects by following a specified logical layout and data model:

-Identify the objects that make up the logical layout.

-Identify the objects to be modified.

-Identify the relationships between the objects.

-Perform maintenance operations using the tools and languages provided by the ERP-CRM system.

-Document procedures performed according to specified formats.

C2: Create queries, reports, and forms using the languages and tools provided by the ERP-CRM system to extract and present information from them, following the design specifications.

CE2.1 Describe the features and functionalities of the query languages provided by the ERP and CRM systems used for the extraction of information, according to their technical specifications.

CE2.2 Describe the characteristics of the tools provided by the ERP-CRM system to extract and present the information from these, according to their technical and functional specifications.

CE2.3 Explain the characteristics of the forms and reports, identifying the types and elements that compose them for their elaboration according to the specifications received.

CE2.4 Present information extracted from the ERP-CRM system in forms and reports using tools provided by those and following technical specifications received.

CE2.5 In a convenient, well-characterized, practical scenario for extracting information from ERP and CRM systems using query languages and tools specific to them, following specifications received:

-Identify the sources that contain the information to be extracted.

-Perform data extraction operations using the que