Royal Decree 1531 / 2011, 31 October, Laying Down Twelve Certificates Of Professionalism Of The Professional Family Computing And Communications That Are Included In The National Repertory Of Professional Certificates.

Original Language Title: Real Decreto 1531/2011, de 31 de octubre, por el que se establecen doce certificados de profesionalidad de la familia profesional Informática y comunicaciones que se incluyen en el Repertorio Nacional de certificados de profesionalidad.

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$20 per month, or Get a Day Pass for only USD$4.99.
It law 56 / 2003, of 16 of December, of employment, establishes, in its article 3, that corresponds to the Government, to proposed of the current Ministry of work e immigration, and prior report of this Ministry to the Conference sectoral of employment and Affairs labour, the elaboration and approval of them provisions regulatory in relation to, between others, it training professional occupational and continuous in the field State as well as the development of such management.

The article 26.1 of the cited law 56/2003, of December 16, after modification carried out by the Royal Decree-Law 3/2011, on 18 February, on urgent measures for the improvement of employability and reform of active employment policies, dealt with the subsystem of vocational training for employment, which, since the entry into force of the Royal Decree 395/2007 23 March, which regulates it, they have been integrated vocational training in the workplace - the occupational training and the continuous patterns. This subsystem, according to the described legal precept and in accordance with the provisions of the organic law 5/2002, of qualifications and vocational training, will be developed within the framework of the national system of qualifications and vocational training and the national employment system.

Moreover, the organic law 5/2002, of 19 June, he understands the national system of qualifications and vocational training as a set of instruments and actions necessary to promote and develop the integration of offers of training and evaluation and accreditation of professional skills. Main instruments of this system are the national catalogue of professional qualifications and the recognition, evaluation, accreditation and registration of the same procedure. In its article 8, the organic law 5/2002, of 19 June, establishes certificates of professionalism to accredit vocational qualifications of those who have obtained them and that they will be issued by the competent administration, official character and validity throughout the national territory. Moreover, in its article 10(1), indicate that the General Administration of the State, in accordance with what is established in article 149.1.30. 2nd and 7 of the Constitution and after consulting the General Council of vocational training, will determine the titles and certificates of professionalism, which will constitute vocational training offers relating to the national catalogue of professional qualifications.

The national catalogue of the professional qualifications, according to article 3.3 of the Royal Decree 1128 / 2003 of 5 September, which regulates the national catalogue of the professional qualifications, in the wording given to it by the Royal Decree 1416 / 2005, of 25 November, constitutes the basis to develop conducive training offer the degree of vocational training and certificates of professionalism and the associated cumulative and modular training offer to a unit of competition, as well as of other offers training tailored to groups with needs specific. In accordance with article 8.5 of the same Royal Decree, the training offer of the certificates of professionalism will adjust to indicators and minimum quality requirements that guarantee the fundamental aspects of an integrated system of training, which are established by mutual agreement between the educational and labour administrations, after consulting the General Council of vocational training.

The Royal Decree 34/2008, of 18 January, which regulates professional certificates amended by the Royal Decree 1675 / 2010, of 10 December, defines the structure and content of the certificates of professionalism, based on the national catalogue of professional qualifications and the guidelines laid down by the European Union, and establishes that the public State employment service with the collaboration of the national reference centres, develop and update certificates of professionalism, which will be approved by Royal Decree.

On the other hand, in the new wording of article 11.2 of the text revised of the workers ' Statute Act, introduced by the Royal Decree-Law 10/2011, August 26, on urgent measures for the promotion of youth employment, the promotion of stability in employment and maintenance of the program of professional retraining of people who exhausted their protection by unemployment regulates the new contract for training and learning which provides that qualification or professional competence acquired through this new contractual figure will be object of accreditation through, among other means, the certificate of professionalism or cumulative partial certification.

In this regulatory framework should be that the Government established twelve certificates of professionalism of the professional family computing and communications in the areas of professional development, systems and telematics and communications and that will they be incorporated into the national repertoire of certificates of professionalism by levels of professional qualification according to the professional competence required by the productive activities, as set out in article 4.4 and annex II of the Royal Decree 1128 / 2003 previously cited.

In the process of elaboration of this Royal Decree he issued report the Council General of vocational training, the General Council of the national system of employment and has been informed the sectoral Conference on employment and labour issues.

By virtue, on the proposal of the Minister of labour and immigration and prior deliberation of the Council of Ministers at its meeting of October 28, 2011, I have: article 1. Object and scope of application.

This Royal Decree is to establish twelve certificates of professionalism of the professional family computing and communications that are included in the national repertoire of certificates of professionalism, regulated by Royal Decree 34/2008 of 18 January, which regulates professional certificates, amended by the Royal Decree 1675 / 2010, of 10 December.

Such certificates of professionalism have official character and validity throughout the national territory and do not constitute a regulation of professional practice.

Article 2. Certificates of professionalism that are established.

Certificates of professionalism established correspond to the professional family computing and communications and then are that they relate, whose specifications are described in the annexes listed: professional family: computing and communications - Annex I. preparation and publication of Web pages. Level 2.

-Annex II. Operation of systems software. Level 2.

-Annex III. Operation of departmental networks. Level 2.

-Annex IV. Operation of voice and data communications systems. Level 2.

-Annex V. maintenance of first level in radiocommunication systems. Level 2.

-Annex VI. Administration of databases. Level 3.

-Annex VII. Management of voice and data networking. Level 3.

-Annex VIII. Development of applications with Web technologies. Level 3.

-Annex IX. Management and monitoring of alarms in communications networks. Level 3.

-Annex X. Administration and design of departmental networks. Level 3.

-Annex XI. Management of computer systems. Level 3.

-Annex XII. Administration and programming systems for customer relationship management and enterprise resource planning. Level 3.

Article 3. Structure and content.

The contents of each certificate of professionalism responds to the structure established in the following paragraphs: to) in the section I: identification of certificate of professionalism.

(b) in paragraph II: professional profile of the professional certificate.

(c) in paragraph III: formation of the professional certificate.

(d) in paragraph IV: requirements for trainers.

(e) in section V: minimum requirements of spaces, facilities, and equipment.

Article 4. Admission requirements to the formation of the certificates of professionalism.

1. it shall be for the competent labour administration checking that students possess the training and professional requirements to pursue training in the terms laid down in the following paragraphs use.

2 to gain access to the formation of the training modules of the certificates of professionalism of the levels of professional qualification 2 and 3 students must meet one of the following requirements: to) be in possession of the title of graduated in obligatory secondary education level Bachelor's degree for level 3 or 2.

(b) be in possession of a certificate of professionalism of the same level of module or training modules and/or the certificate of professionalism to which you want to access.

(c) be in possession of a certificate of professionalism of level 1 of the same family and professional area for level 2 or a certificate of professionalism of level 2 of the same family and professional area for level 3.

(d) meet the academic requirement of access to the vocational training from level to level 2 or higher grade for level 3, or you have passed the corresponding access tests regulated by the educational administrations.

(e) have passed University entrance test for adults aged 25 or 45-year-old.

(f) have sufficient training or professional knowledge allowing to study the formation with use.

Article 5. Trainers.


1. regulations on training and expertise for the delivery of certificates of professionalism are the gathered in paragraph IV of each certificate of professionalism and must be met both in the modality as a distance.

2. in accordance with the provisions in article 13.3 of the Royal Decree 34/2008, of 18 January, may be hired as experts to provide specific training modules which are specified in paragraph IV of the annexes to the certificates of professionalism, the qualified professionals with expertise in the area of the unit of competency that is associated with the module.

3. to prove the teaching competence required, the trainer or expert must be in possession of the certificate of professional occupational trainer or equivalent training in teaching methods of vocational training for adults.

(The requirement laid down in the preceding paragraph shall be exempt: to) those who are in possession of official university qualifications Bachelor of pedagogy, educational psychology or teacher in any of their specialties, a diploma of graduate in the field of psychology or pedagogy, or an official university degree of postgraduate in the aforementioned fields.

(b) those who possess an official university degree other than those referred to in the preceding paragraph and in addition are in possession of the certificate of pedagogical or professional specialization teaching qualifications and pedagogical qualification certificate. Likewise, shall be exempted those who certify the possession of enabling Master's degree for the practice of the regulated professions of teacher of compulsory secondary education, vocational training and official schools of languages.

(c) those who prove a proven teaching experience of at least 600 hours in the last seven years in vocational training for employment or educational system.

4. the trainers that offer distance learning must have training and experience in this mode, the use of information and communication technologies, as well as meeting the specific requirements established for each certificate of professionalism. To such end, the authorities competent will develop programs and actions specific to the training of these trainers.

Article 6. Contracts for the training and the learning.

(It training inherent to them contracts for it training and the learning is held, in regime of alternation with the activity labor paid, in them terms planned in the development regulatory referred in the article 11.2 d) of the text consolidated of the law of the Statute of them workers, according to writing given by the Real Decree-Law 10 / 2011, of 26 of August , of measures urgent for the promotion of the employment of them young, the promotion of the stability in the employment and the maintenance of the program of retraining professional of them people that exhausted their protection by unemployment.

Article 7. Training to distance.

1. when the training module include distance learning, must be authorized by the competent labour administration teaching supports that allow a process of systematic learning for the participant who must meet the requirements of accessibility and design for all and necessarily will be supplemented with tutorial assistance.

2. training modules which, in its entirety, to develop a distance will require the realization of, at least, one final test of Presential character.

Article 8. Authorized centres for teaching it.

1 centres and training institutions that impart education leading to the award of a certificate of professionalism must comply with the prescriptions of the trainers and the minimum requirements of spaces, facilities and equipment established in each of the modules training that constitute the certificate of professionalism.

2 training contracts for training and learning inherent in alternation with paid work regime, will be taught in the training centres of the network referred to in the fifth additional provision of the organic law 5/2002, of 19 June, qualifications and vocational training, previously recognized for this purpose by the national employment system.

Article 9. Correspondence with the titles of vocational training.

The accreditation of units of competition obtained through the overcoming of professional modules of training titles shall have the effect of exemption for the module or training modules for professional certificates associated with these units of competence established in the present Royal Decree.

Sole additional provision. Level of certificates of professionalism in the European qualifications framework.

Once you establish the relationship between the national qualifications framework and the European qualifications framework, the corresponding level of professionalism certificates laid down in Royal Decree within the European framework of qualifications shall be determined.

Sole transitional provision. Contracts for training.

The theoretical training of training contracts concluded prior to the entry into force of the Royal Decree-Law 10/2011, August 26, on urgent measures for the promotion of the employment of young people, the promotion of stability in employment and maintenance of the program of professional retraining of people who exhausted their protection by unemployment It shall be governed by the legal or conventional regulations in force on the date in which they were held.

First final provision. Title competence.

This Royal Decree is issued under the powers that are attributed to the State in the article 149.1.1., 7th and 30th of the Spanish Constitution, which attributes to the State the exclusive competence for the regulation of basic conditions that guarantee the equality of all Spaniards in the exercise of rights and in the fulfilment of the constitutional duties; labour legislation; and the regulation of the conditions for obtaining, issuing and approval of academic and professional qualifications and basic standards for the development of article 27 of the Constitution, in order to ensure the fulfilment of the obligations of the public authorities in this matter.

Second final provision. Normative development.

It authorizes the Minister of labour and immigration to issue many provisions are called for the development of this Royal Decree.

Third final provision. Entry into force.

This Royal Decree shall enter into force the day following its publication in the "Official Gazette".

Given in Madrid on October 31, 2011.

JUAN CARLOS R.

The Minister of labour and immigration, VALERIANO GÓMEZ SÁNCHEZ annex I I. identification of the certificate of professional designation: preparation and publication of Web pages.

Code: IFCD0110 professional family: information technology and communications.

Professional area: development.

Level of professional qualification: 2 professional qualification of reference: IFC297_2 preparation and publishing of Web pages (Royal Decree 1201 / 2007 of 14 September).

Relationship of competition units comprising professionalism certificate: UC0950_2: build web pages.

UC0951_2: Integrating software components into web pages.

UC0952_2: Publishing web pages.

General competence: create and publish web pages that integrate text, images and other elements, using brands and languages appropriate editors, according to specifications and given «usability» conditions and perform installation and verification of the same in the corresponding server.

Professional environment: Professional: Professional operates both self-employed and employed in companies or entities public or deprived of any size, fitted with intranet, extranet, or Internet network infrastructure in the area of development of the it Department.

Productive sectors: is located mostly in the service sector, and mainly in the following types of companies: companies in software development with web technologies; companies that have as objective of business marketing services for analysis, design and construction of computer applications for network infrastructure intranet, Internet, and extranet; companies or entities that use computer systems for its management.

Occupations and relevant jobs: developer of web pages.

Maintainer of web pages.

Duration of associated training: 560 hours.

Relationship of training modules and training units.

MF0950_2: Construction of web pages. (210 hours).

● UF1302: creating web pages with the markup language. (80 hours).

● UF1303: development of style sheets. (70 hours).

● UF1304: development of templates and forms. (60 hours).

MF0951_2: Integration of components software in web pages. (180 hours).

● UF1305: programming languages of script in web pages. (90 hours).

● UF1306: testing capabilities and optimization of web pages. (90 hours).

MF0952_2: Publishing web pages. (90 hours).

MP0278: Module not working professional practice of preparation and publishing of Web pages (80 hours).

II. professional profile of the professionalism unit certificate of competence 1 name: build WEB pages.


Level: 2 code: UC0950_2 realizations professionals and criteria of performance MOP1: make web pages to present information using web authoring tools, following received design specifications.

CR1.1 the authoring tool is installed and configured in order to use it in the preparation of the web pages, following the specifications received.

CR1.2 attendees who provide editing tools are identified and are used to facilitate the creation of pages, according to the technical specifications of the tool.

CR1.3 the elements provided by the authoring tool are inserted and configured, using the options (menus, toolbars, controls) which provides, according to the received design specifications.

CR1.4 made pages are tested in web browsers to verify that they meet the features specified in the design, as well as the criteria of 'usability' and accessibility defined by the Organization, according to established procedures.

CR1.5 made pages errors are detected and corrected using the own authoring tool, to ensure compliance with the design specifications, according to quality criteria and procedures of the organization test.

CR1.6 the specific technical documentation associated with the tool, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Create web pages and enhance those already carried out using brands, according to design specifications received language.

CR2.1 the elements provided by the markup language, used to present information on the web pages according to the design specifications received.

CR2.2 the type of content to expose (texts, images, tables, elements multimedia, links, among others) in the page is identifies and is used them tags corresponding that provides the language, following the specifications of design received.

CR2.3 attributes and values of the elements are identified and are adjusted to improve the format, functionality and the design of the page, according to the received design specifications.

CR2.4 modifications to the Web page identifies and tags, elements and the corresponding attributes are used to fit the page to the new changes, according to the design specifications received.

CR2.5 made and modified pages are tested in web browsers to verify that they meet the features specified in the design as well as criteria of 'usability' and accessibility defined by the Organization, according to established procedures.

CR2.6 made pages functional errors are detected and corrected, to ensure compliance with the specifications of development according to procedures of the organization.

CR2.7 developed page is documented for later use and modification according to patterns, rules and procedures set forth in the design.

RP3: Add functionality to web pages creating interactive interfaces and other reusable items, received design specifications.

CR3.1 templates are created by defining the elements that compose them as well as editable and non-editable regions and apply to the pages to adapt them to a predefined design, received specifications for design and development.

CR3.2 the form objects (text fields, list boxes, checkboxes and radio buttons, among others) are identified and inserted in the pages, to interact with the data received specifications for design and development.

CR3.3 style sheets are created to standardize the appearance of pages and make them more attractive, according to specifications of design and development received.

CR3.4 layers are created to add behaviors within the web page, using the parts provided by the tool according to received specifications for design and development.

CR3.5 made pages are tested in web browsers to verify that they meet the features specified in the design as well as criteria of 'usability' and accessibility defined by the Organization, according to established procedures.

Media production computer and peripheral equipment professional context. Systems operating. Tools office. Web editing tools. Browsers today, and of new design technology. Languages of brands. Languages of script. Multimedia tools. Communication protocols. Web servers. «Usability» standards and accessibility. Applications for verification of accessibility of web sites.

Products and results conducted and verified web pages. Interactive interfaces on web pages.

Information used or generated design and specifications of the pages to perform. Manual operation of the web authoring tools. Job templates. Corporate graphic design specifications. Current legislation on intellectual property and copyright. Documentation associated with developed pages. «Usability» manuals. Quality standards and criteria of 'usability' and accessibility defined by the organization. Documentation associated with developed pages.



Unit of competition 2 name: integrate components SOFTWARE in WEB pages.

Level: 2 code: UC0951_2 realizations professionals and criteria of performance MOP1: interpret software components developed in client script languages, received specifications.

CR1.1 programming structures which make up the scripts are recognized in order to interpret the logic of operation of the same.

CR1.2 data types that are used in scripts are identified to describe the values that store, taking into account the technical specifications of the language.

CR1.3 operations of input, output and calculation are performed in scripts, are different to determine the process carried out with the data as per specifications received.

CR1.4 the elements and objects provided by the script language, are identified to differentiate the features that add to the scripts according to given specifications.

CR1.5 handlers of events provided by the language of script are identified, to detail the interactions that occur with the user according to given specifications.

CR1.6 the documentation technical specific associated to the language of script, is interpreted, in his case, in the language foreign of use more frequent in the sector.

Rp2: adjust components software already developed in web pages to add functionality to the same, following specifications received.

CR2.1 those components already developed is seek and is selected in collections of the organization or in Internet, to integrate them in the pages according to the procedure established.

CR2.2 them specifications functional of them components already developed is interpreted, for locate it and configure it within the page to perform according to the procedures established.

CR2.3 them components already developed is adjusted and is integrated in the pages, to include features specific according to the procedure established.

CR2.4 the attributes and properties of the elements that are already developed components are identified and modified, to conform to the functionality of the page where it is integrated according to the specifications received.

CR2.5 the documentation relative to them modifications made in the website in development, is performs for its rear record in accordance with the normative of the organization.

RP3: verify the integration of them components software in them web pages to ensure the compliance of the features expected, according to them criteria of quality of the organization.

CR3.1 them tests of integration of the component is performed to verify the functionality of the page, attending to specifications functional and to them standards of quality of the organization.

CR3.2 them pages with components software already developed is tested using a browser, to verify that responds to them specifications given according to the procedures established.

CR3.3 integration errors are detected and corrected using the specified tools, to ensure that the functionality of the component within the page.

CR3.4 the documentation for integration testing is performed to their subsequent registration, according to the specifications and quality standards of the organization.

CR3.5 the use of already developed software components is performed, ensuring the integrity of the system and the criteria of distribution and standardization of the organization.

Media production computer and peripheral equipment professional context. Operating systems. Office Tools. Rapid development tools. Web editing tools. Browsers today, and new technological concept. Internet search engines. Markup languages. Languages of script. Components software already developed and/or distributed by business computer. Servers web. Systems of security. Protocols of communication. Tools for debugging and testing.

Products and results web pages with components integrated in operation.

Information used or generated


Design and specifications of the application. The software operation manuals. Manual of the tools of development used. Documentation of training courses. Documentation of exploitation of the customer environment. Technical support for assistance. Current legislation on intellectual property and copyright. «Usability» manuals. Corporate graphic design specifications.

Documentation associated with developed pages.

Competition 3 denomination unit: publishing WEB pages.

Level: 2 code: UC0952_2 realizations professionals and criteria of performance MOP1: managing the website, using transfer tools, to locate the pages according to the specifications of the system administrator.

CR1.1 the web site storage space is managed, to locate the folders and files that are according to specifications received.

CR1.2 transfer tool is configured to create the connection to the web server, following the procedure laid down.

CR1.3 files and folders are transferred and links are redirected to their destinations, from the local to the production system environment, to make operational the page on the website by procedure (manual or automatic) hyperlinks, as per specifications received redirection.

CR1.4 them commands and orders that provides the tool is used to add, delete, modify and update them folders and files of the website according to the specifications received.

CR1.5 folders and files transferred are verified with the original files in the local environment, to ensure the transfer according to the established procedure.

CR1.6 the process of transfer and updating of information on the website is documented, for their subsequent registration according to the procedures and rules of the organization.

CR1.7 the documentation technical specific associated to them tools, is interpreted, in his case, in the language foreign of use more frequent in the sector.

Rp2: perform tests of the functionality of them pages developed to ensure its operation and appearance end, according to them specifications of design and quality of the organization.

CR2.1 them links, both between them pages developed as them links external, is checked to ensure that van to the destination defined in each one of those cases, according to procedures established.

CR2.2 aesthetic appearance is checked to ensure that it is consistent with the format developed in the local environment, according to design criteria set by the organization.

CR2.3 aspects relating to the 'usability' of developed pages are checked, to ensure that they have not changed with respect to pages developed in the local environment, according to the criteria of quality and "usability" set by the organization.

CR2.4 transferred pages are checked, to ensure that Assembly continues to meet specifications for design and quality after the transfer according to established procedures.

CR2.5 transferred pages are tested on different operating systems and with different browsers, to ensure their compatibility and functionality according to the specifications of the organization.

RP3: Disclose developed webpages to be used by users, according to the quality standards established by the organization.

CR3.1 developed pages are integrated in the system origin or website that have been manufactured, according to the specifications received.

«Home page» home page CR3.2 and all that are defined as linkable externally, are linked via hyperlinks from the source system, to verify the relationships of all the pages that make up the site according to the specifications received.

CR3.3 the pages developed is publishing to expose your information, through procedures manual or automatic, in search engines and directories, according to criteria of availability preset.

Media production computer and peripheral equipment professional context. Operating systems and configuration parameters. Page publication tools. Transfer tools. Browsers. Internet search engines. Protocols of communication. Testing and debugging tools. Web servers.

Products and results web pages, published and verified its functioning.

Information used or generated design and specifications of the application. Manuals of use and operation of computer systems. The software operation manuals. Manual of the used publication tools. Documentation of training courses. Documentation of exploitation of the customer environment. Standards of quality and criteria of ' usability ' and accessibility defined by the Organization-III. CERTIFICATE of professional training training module 1 name: construction of WEB pages.

Code: MF0950_2 professional skill level: 2 associated with the competition unit: UC0950_2: build web pages.

Duration: 210 hours training unit 1 name: creation of WEB pages with the language of brands.

Code: UF1302 duration: 80 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and criteria of evaluation C1: identify those elements provided by them languages of brands and make web pages using these languages having in has its specifications technical.

CE1.1 identify the structure of a website written using languages of brands, as well as the sections of header and body of the document, to identify them parts that the form according to a design specified.

CE1.2 describe the tags and attributes that is used to give format to the document, as well as to present information in form of table and of lists.

CE1.3 describe the tags and attributes that is used to insert links and routing, both within the web page as to others documents and pages located in any destination.

CE1.4 identify the types of formats of multimedia files, both audio and video integrated into web pages.

CE1.5 quote them tags and attributes that are need to insert images and elements multimedia, as well as to create maps of images depending on the specifications received.

CE1.6 explain them criteria of «usability» and accessibility to them content of web pages, to allow a better quality of navigation and understanding of them users, taking in has criteria defined and normative standard of accessibility and «usability».

CE1.7 create a website that includes several frames for the presentation of other pages, following some specifications of design received.

CE1.8 make web pages to present information with a language of brands according to a design specified:-choose the tags to give format to the document.

-Mapping an image creating several areas active.

-Choose the brands to present the information in form of lists and of tables.

-Insert tags to move is within the same page.

-Create tags to link to other documents and web addresses.

-Insert brands to present images, sounds and videos.

-Specify the labels to create frames and linking multiple pages.

-Insert marks that allow the execution of programs.

-Create layers to present information in different areas of the page.

-Identify several browsers and test the functionality of the page.

-Apply the criteria of 'usability' and accessibility.

-Document made page.

C2: Identify the features and functionality of the web authoring tools, and use them in the creation of web pages, taking into account their development environments.

CE2.1 identify the functions and features of the tools used for editing web pages, taking into account the technical specifications of the same.

CE2.2 interpret the technical documentation provided by the authoring tool, even if it is published in the foreign language most often used in the sector, to operate the help in the realization of web pages, according to the technical specifications of the same.

CE2.3 install and configure a tool for editing web pages, according to specifications received:-install the authoring tool following the technical specifications.

-Configure the tool to use.

CE2.4 make web pages with web editing, according to a specified design tools:-identify the components that provides tool for inserting elements into the page.

-Configure the attributes and properties of the inserted elements.

-Test page made using various web browsers.

-Fix possible errors arising in the processing of the page.

-Document made page.

Contents 1. The markup languages.

-Characteristics of the markup languages.

-Use of tags.

-Compatibility.

-Text editors.

-Structure of a document created with markup language.

-Beginning of the file.

-Headlines.

-Title.

-Styles.

-Body.

-Scripts.

-Web browsers.

-Text-mode browsers.

-The most widely used browsers.

-Explorer, Mozilla, Opera, etc.

-Display differences.

-Marks to format the document.

-Start and end marks.

-Appearance marks.

-Paragraph marks.

-Marks of fonts and colors.

-Ordered lists.


-Links and addresses.

-Creation of a link.

-Types of link.

-Anchors.

-Links.

-Links and navigation.

-Frames and layers.

-Frames.

-Creation of frames.

-Types of frames.

-Situation of the frames.

-Configuration of the frames.

-Layers.

-Definition of layers.

-Creation of layers.

-Use of the layers.

2. images and multimedia elements - inclusion of images: formats and attributes.

-Include images on pages.

-Attributes of the images.

-Properties of image locations.

-Image maps.

-Definition of map.

-Creation of a map with an image.

-To establish different parts in the image.

-Linking the different parts of the image.

-Inclusion of elements multimedia: audio, video and programs.

-Characteristics and properties of the multimedia elements.

-Resources for the functioning of the multimedia elements.

-Tags and properties for the insertion of audio.

-Tags and properties for the inclusion of video.

-Tags and properties for the inclusion of programs.

-Audio and video formats.

-Description of the audio formats.

-Description of video formats.

-Resources for audio configuration.

-Resources for video settings.

-Canopies.

-Texts with movement.

-Use of labels to include canopies.

-The porches and the different browsers.

3 techniques for accessibility and usability - web accessibility, the accessibility advantages.

-Definition of accessibility.

-Applicability of accessibility.

-Description of the benefits of accessibility.

-Ease of access.

-Improvements in navigation.

-Independence of the browsers.

-Web usability, importance of usability.

-Definition of usability.

-Web-individuo interaction.

-Applicability of usability.

-Resources on usability.

-Applications to verify the accessibility of websites (standards).

-Web standards resources.

-Use of resources on the web pages.

-Check the accessibility in web pages.

-Design of web sites usable.

-Description of web sites usable.

-Study of the structure and design of web sites usable.

-Adaptation of web sites usable.

-Use of the web sites usable.

4. Tools for editing web-installation and configuration of tools of Edition web.

-Functions and features.

-Description of the elements of the Web tools.

-Location of the elements of the web tools.

-Properties of the elements of the web tools.

-Tasks with a web-editing tool.

-The language of brands and web-editing tools.

TRAINING unit 2 name: elaboration of style sheets.

Code: UF1303 duration: 70 hours referrer of competition: this training unit corresponds with the RP3 with regard to style sheets.

Capabilities and C1 evaluation criteria: describe the characteristics of the style sheets for formatting web pages, and style according to a design of specified files.

CE1.1 identify the features and benefits that provide style sheets to define the form of presentation of web pages according to specified design.

CE1.2 describe the tags and attributes that are used to define styles to a page and parts thereof, taking into account design specifications.

CE1.3 describe the syntax and attributes that are used to create styles, in order to create files with style declarations.

CE1.4 link to the pages of a web site with a style file, to standardize the appearance of the website according to specifications received.

CE1.5 make a file with statements of style to standardize the format of a web site, according to a specified design:-identify the syntax used to assign the style to labels.

-Link to the styles file web pages.

-Test the pages using multiple browsers web.

-Apply criteria of ' usability ' and accessibility.

-Document the file created.

C2: design, locate and optimize them content of a website, to adapt it to the format of the same, facilitate its handling to them users and optimize it according to a design specified.

CE2.1 select them contained of the website to adapt them to the format of the same in accordance with the specifications received.

CE2.2 locate and distribute them elements to facilitate the handling of the page from the users.

CE2.3 optimize the web pages taking in has its elements, content and their functionalities.

Contents 1. Sheets of style in the construction of web pages-functions and features.

-Description of styles-use of styles.

-Styles in the markup language.

-Styles with web editing tools.

-Style sheets and accessibility.

-Adaptation of the style sheets.

-Types of style: embedded, linked, imported, in line.

-Description of the types of style.

-Link a style sheet to an HTML document.

-Embed a style within an HTML document.

-Import a style sheet from an HTML document.

-Import a style sheet, using a file with styles.

-Use and optimization of the types of styles.

-Selectors and style rules.

-Structure of the styles.

-Basic syntax of styles.

-Use of elements and seudoelementos.

-Use of classes and pseudo-classes.

-Style attributes for fonts, color and background, text and blocks (paragraphs).

-Description of the style attributes.

-Use of style attributes.

-Creation of style files.

-Definition of style files.

-Creation of generic style files.

-Adaptation of style for different web pages files.

2. Design, location, and optimization of the contents of a web page.

-Creation of a functional document.

-Description of the goals of the website.

-Definition of the functional elements of the web page.

-Description of each item.

-Design of the contents.

-Identification of the information put on the web page.

-Selection of content for each item in the page.

-Use of the functional design specification document.

-Types of the location of the content page.

-Definition of the types of page based on the contents and functionalities.

-Selection of the types of website page.

-Use functional document for the specifications of the type of page.

-Specifications of navigation.

-Creation of a map of navigation pages.

-Use functional document to integrate navigation map.

-Elements used for navigation.

-Definition of the elements used to navigate.

-Use functional document to specify the navigation items.

-Elaboration of a user guide.

TRAINING unit 3 name: development of templates and forms.

Code: UF1304 duration: 60 hours referrer of competition: this training unit corresponds with the RP3 as regards forms and templates.

Capabilities and C1 evaluation criteria: create templates for web pages according to the design specifications received.

CE1.1 describe the characteristics that offer web templates in the elaboration of pages with identical design.

CE1.2 describe the utilities that provide web pages-editing tools for creating templates, taking into account the technical specifications of the tool.

CE1.3 create web templates with editing tools, according to a specified design:-identify the editable and non-editable regions that make up the template.

-Insert the elements and assign the specified attributes.

-Apply the criteria of 'usability' and accessibility.

-Apply a created template to a web page.

-Test the web site with the associated template using various web browsers.

-Document template made.

C2: Creating forms and integrate them into web pages to include interactivity in them, some received functional specifications.

CE2.1 identify the tags and attributes that are used in the creation of forms, taking into account the specifications of the markup language.

CE2.2 describe the tags and attributes that are used to define controls that form the forms according to the interactions to handle.

CE2.3 make pages that incorporate forms to interact with the user, in accordance with a specified design:-identify controls that create and place them inside the form.

-Assign the specified properties to the inserted checks.

-Assign the properties to the form (action, method and encoding type).

-Apply the criteria of 'usability' and accessibility.

-Test page and the form using various web browsers.

-Fix possible errors arising in the preparation of the form and the page.

-Document made page.

Contents 1. Forms in the construction of web pages - features.

-The interactivity of web pages.

-The variability of the data of the web page.


-The sending of information to servers.

-Elements and attributes of form.

-Description and definition of the elements of a form.

-Use of fields and text.

-Tags of the form.

-Sizes, columns and rows of the forms.

-Form controls.

-Description of the form controls.

-Use of action buttons.

-Use of drop-down list.

-Use of check boxes.

-Use of text fields.

-Forms and events. Criteria of accessibility and usability in the form design.

-Grouping of data.

-Adequacy of the size of the form (division in different pages).

-Identification of the mandatory fields.

-Logical sorting of data request.

-Correct information to the user.

-Use of error and confirmation pages.

2 templates in the construction of web pages - functions and features.

-Description of a web template.

-Elements of a web template.

-Structure and organization of the elements of the template.

-Specify the editable areas of a template and the fixed parts.

-Use of templates.

-Editable and non-editable fields.

-Define and create those fields susceptible of changes in a template.

-Define and create non-modifiable fields in a template.

-Apply templates to web pages.

-Templates on the web.

-Search for templates on the net.

-Adaptation of templates to web pages.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1302 80 50 unit training 2 - 3 70 40 training unit UF1303 - 60 40 sequence UF1304: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: integration of components SOFTWARE in WEB pages.

Code: MF0951_2 professional skill level: 2 associated with the competition unit: UC0951_2: integrating software components into web pages.

Duration: 180 hours training unit 1 name: programming with languages of script in WEB pages.

Code: UF1305 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and criteria of evaluation C1: identify the structures of programming and data types that are used in the development of scripts, according to received specifications.

CE1.1 describe structures sequential, conditional and iteration are used to group and organize a programme's actions.

CE1.2 recognize the syntax of the language of script that described them structures of programming in the development of scripts, according to the specifications technical of the language.

CE1.3 explain the types of data used to represent and store the values of the variables in the development of scripts, according to the technical specifications of the language.

CE1.4 identify the operators that are used to make the calculations and operations within a script.

CE1.5 quote the instructions provided by the language of script to perform input and output of data, in accordance with the technical specifications of the language.

CE1.6 distinguish the methods to run a script using various web browsers.

CE1.7 interpret scripts that solve a problem previously specified:-identify the type and use of the data declared in the script.

-Describe the programming structures used to organize the actions of the programme.

-Recognize the instructions provided by the script language used in the operations of handling, input and output data.

-Insert the script into the web page using the appropriate tags.

-Test the functionality of the script using a browser.

-Detect and correct the syntax and runtime errors.

-Document the changes made to the script.

C2: Distinguish the properties and methods of the objects provided by the language's script, based on the technical specifications of the language.

CE2.1 explain the browser objects, as well as its properties and methods, which are used to add functionality to web pages, taking into account the technical specifications of the language.

CE2.2 identify objects predefined script language to handle new structures and utilities that add new features to the pages, according to the technical specifications of the language.

CE2.3 describe and identify the document objects that allow you to add interactivity between the user and the script, as well as its properties and methods.

CE2.4 describe the events that provides the language of script: mouse, keyboard, focus, form and charge, among others, to interact with the user and relate them to the objects of the language.

CE2.5 interpret scripts that add aesthetic effects the presentation of the pages:-identify the objects on which the aesthetic effects are applied.

-Identify the properties and methods used to add effects.

-Recognize the events used to carry out the actions.

-Describe the function or functions of effects by identifying the parameters of the same.

-Make changes to the script following received specifications.

-Detect and correct the syntax and runtime errors.

-Document the changes you made.

CE2.6 interpret scripts that are validated entries of data in the fields of a form:-identify the objects of the form that are validated within the script.

-Identify the properties and methods used to validate each entry.

-Recognize provided by script language functions used for data validation.

-Describe the events that are used in the implementation of the actions.

-Describe the function or functions of validation by identifying the parameters of the same.

-Make changes to the script following received specifications.

-Detect and correct the syntax and runtime errors.

-Documenting the performed script.

CE2.7 interpret the technical documentation associated with the script language, even if it is published in the foreign language most often used in the sector, using the aid in the integration of scripts.

C3: Identifying already developed scripts that suit the specified features and integrate them into web pages according to specifications received.

CE3.1 locate and download the already developed component either from the Internet or from the collections listed received specifications.

CE3.2 identify objects, properties and methods and its functionality within the script already developed in order to adjust them to the page where it is to join.

CE3.3 identify the events included in the script to distinguish the interactions with the user.

CE3.4 describe the logic of operation of the script identifying structures of programming and data with which it operates.

CE3.5 integrate scripts already developed in a web page, to add specific functionality according to the specifications received:-download the already developed component.

-Use a script editing tool.

-Modify the properties and attributes of the objects that make up the script to fit the specifications received.

-Check the availability for use of the script taking into account copyright and legislation.

-Integrate the script to the web page previously indicated.

-Test the functionality of the resulting page using a browser.

-Correct the errors detected.

-Document the processes carried out.

Contents 1. The logic of programming - programming methodology.

-Description and use of logical operations.

-Scripts and parts of a program.

-Ordinogramas.

-Description of a flow chart.

-Elements of a flow chart.

-Operations in a program.

-Implementation of elements and operations in a flow chart.

-Pseudocodigos.

-Description of pseudocode.

-Creation of the pseudocode.

-Objects.

-Description of objects.

-Functions of objects.

-Behaviour of the objects.

-Attributes of objects.

-Creation of objects.

-Examples of code in different languages.

-Codes in structural languages.

-Code language scripts.

-Codes in object-oriented languages.

2. language of script-features of the language.

-Description of the language oriented to events.

-Description of the language interpreted.

-The interactivity of the language's script.

-Relationship of the language of screenplay and the language of brands.

-Extension of the capabilities of the language of brands.

-Addiction of properties interactive.

-Syntax of the language's script.

-Tags identifying within the language of brands.


-Specifications and features of the instructions.

-The language of script elements.

-Variable.

-Operations.

-Comparisons.

-Assignments.

-The language of script objects.

-Methods.

-Events.

-Attributes.

-Features.

-Types of scripts: immediate, deferred, and hybrid.

-Script within the body of the markup language.

-Executable to open the page.

-Executable for an event.

-Script in the header of the markup languages.

-Script within the body of the markup language.

-Execution of a script.

-Execution when loading the page.

-Execution after an event.

-Execution of the procedure within the page.

-Times of execution.

-Execution errors.

3. elements basic of the language of script-Variables and identifiers.

-Declaration of variables.

-Operations with variables.

-Data types.

-Boolean data.

-Numerical data.

-Text data.

-Null values.

-Operators and expressions.

-Assignment operators.

-Operators of comparison.

-Arithmetic operators.

-Operators on bits.

-Logical operators.

-String operators.

-Special operators.

-String expressions.

-Arithmetic expressions.

-Logical expressions.

-Object expressions.

-Control structures.

-IF statement.

-WHILE statement.

-FOR sentence.

-Sentence BREAK.

-Sentence CONTINUE.

-SWITCH statement.

-Features.

-Definition of functions.

-RETURN statement.

-Feature properties.

--Predefined script language functions.

-Creation of functions.

-Particularities of the functions in the script language.

-Instructions for input / output.

-Description and operation of input and output instructions.

-Reading of keyboard data.

-Storage in variables.

-Printing on the result screen.

-Sentence PROMPT.

-Sentence DOCUMENT. WRITE.

-Sentence DOCUMENT. WRITE.

4. script development - development tools, use.

-Create scripts with text tools.

-Create scripts in web applications.

-Resources on web for scripting.

-Debug: syntax and runtime errors.

-Definition of the types of errors.

-Writing of the program source.

-Compilation of the source program.

-Correction of syntax errors.

-Correction of errors of execution.

-Error messages.

-Functions to handle errors.

5. management of objects in the script language - object hierarchy.

-Description of the objects in the hierarchy.

-Shared properties of the objects.

-Navigate through the hierarchy of objects.

-Properties and methods of the objects in the browser.

-The Windows top object #.

-The navigator object.

-Current URL (location).

-URLs visited by the user.

-Content of the current document (document).

-Title, the background color, and forms.

-Properties and methods of the objects in the document.

-Properties of the document object.

-Examples of document properties.

-Methods of document.

-Writing of the document flow.

-Open methods () and close () of document.

-Properties and methods of the objects on the form.

-Main properties of the object form (Name, action, method, target).

-Methods of the object form (submit, reset, get, post).

-Properties and methods of the objects in the language.

-Document (write text, color font, background color, get elements in the current document HTML, page title).

-Windows (open).

-History (go).

-Locatiton (server).

-Navigator (name, version and details of the browser).

6. the events of the language of script - use of events.

-Definition of events.

-Actions associated with the events.

-Hierarchy of events from the Windows object.

-Events in form elements.

-Onselect (to select an item on a form).

-Onchange (to change the State of an element of the form).

-Mouse events. Keyboard events.

-Mouse events.

-Onmousedown (by clicking on an element on the page).

-Onmousemove (to move the mouse on the page).

-Onmouseout (to get out of the area occupied by an element on the page).

-Onmouseover (to enter the mouse pointer in the area occupied by an element on the page).

-Onmouseup (when the user released the mouse button which had previously struck).

-Keyboard events:-Onkeydown (when you press a key the user).

-Onkeypress (to let down a key a certain time).

-Onkeyup (by releasing the pressed key).

-Events approach.

-onblur (when an element loses focus of the application).

-onfocus (when a page element or window win the focus of the application).

-Form events.

-Onreset (when you click on a form reset button).

-Onsubmit (by clicking the submit form button).

-Window events.

-Onmove (to the move the window of the browser).

-Onresize (to the resize the window of the browser).

-Other events.

-Onunload (to the leave a page).

-Onload (to the end of loading is the page or images).

-Onclick (to the make click in to the button of the mouse on an element of the page).

-Ondragdrop (to the release something that it has dragged on the page).

-Onerror (to the not to is upload a document or an image).

-Onabort (to the stop is the load of an image, of the page or go is of the page).

7 search and analysis of scripts - search in specialized sites.

-Page official.

-Tutorials.

-Forums.

-Libraries.

-Operators Boolean.

-Operation of the operators Boolean.

-Use in different search engines.

-Techniques of search.

-Expressions.

-Definitions of searches.

-Specifications.

-Refinement of search techniques.

-Use of separators.

-Use of connecting elements.

-Cross-scripting.

-Free Scripts.

-Generalization of codes.

TRAINING unit 2 name: functionality tests and optimization of WEB pages.

Code: UF1306 duration: 90 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and C1 evaluation criteria: apply techniques for test and verification of the integration of the components on the web page to check functionality and 'usability', according to received specifications parameters.

CE1.1 identify the phases that involved in the verification of the integration of components on pages.

CE1.2 classify the different types of files that is van to integrate in the page, verifying the installation of the «plug-in» corresponding in the browser web.

CE1.3 verify the integration of scripts already developed in web pages to test its functionality:-select several browsers.

-Define the environments of test.

-Identify the parameters to verify.

-Document the processes carried out.

Contents 1. Validation of data in web pages-features of validation.

-Description of the functions.

-Utility for them functions.

-Implementation of the functions.

-Validations alphabetic, numeric and in date.

-Definition of validations.

-Code of validation.

-Implementation of the code of validation.

-Check forms.

-Identification of data.

-Implementation of the code of verification.

-Checking of the data entered by the user.

2. effects special on web pages-working with images: images of replacement e images multiple.

-Selection of images.

-Optimization of images.

-Implementation of code with several images.

-Work with texts: effects aesthetic and of movement.

-Creation of texts improved and with movement.

-Implementation of effects.

-Adequacy of the effects to the web page.

-Work with frames.

-Where use the frames.

-Limitations of the frames.

-Alternatives to frames.

-Work with windows.

-Creation of multiple windows.

-Interactivity between several windows.

-Other effects.

-Effects with HTML.

-Effects with CSS.

-Effects with layers.

3. testing and verification on web pages - verification techniques.

-Fundamental.

-HTML techniques.

-CSS techniques.

-Debugging tools for different browsers.

-Utilities for HTML.

-Utilities for javascripts.

-Utilities for CSS.

-Utilities for Sun.

-Verification of the compatibility of scripts.

-Parameters for different browsers.

-Creation of alternative code for different browsers.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF1305 - UF1306 90 50 sequence: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: publishing WEB pages.

Code: MF0952_2


Level of professional qualification: 2 associated with the competition unit: UC0952_2 publishing web pages.

Duration: 90 hours capacity and criteria of evaluation C1: identify the resources available on the web site and create the storage structure for the publication of pages and their components.

CE1.1 distinguish the properties and security settings of the file system of the web site, which will carry out the publication of pages.

CE1.2 classify mandates and used commands as possible to make the generation or modification of the structure of storage in accordance with instructions received.

CE1.3 in a case study, which is available from a web server, with access to a directory in which we permit creation, modification and removal of elements, to create the infrastructure of storage of the web site following received specifications:-check the permissions to the directory.

-Creating the elements of the structure of storage according to specifications received.

-Use the commands for creation, modification and removal of container elements in the structure of storage.

-Identify errors in the creation and modification of elements in the storage system.

-Document the processes carried out.

C2: Transfer files to the site of publication, using the tools established according to specifications received.

CE2.1 identify the functions and features of the tools that are used for file transfer, taking into account the functional specifications of the same.

CE2.2 identify the commands and orders provided by the tool, to perform the transfer according to the specifications received.

CE2.3 specify the possible configurations of the transfer tool, to create the connection to the web site according to specifications received.

CE2.4 use the transfer tool, to keep up-to-date the web site received specifications:-add new pages and components to the web site.

-Delete pages and components of the web site.

-Update pages and components in the web site.

-Document tasks performed.

CE2.5 interpret the technical documentation that provides the transfer tool, even if it is published in the foreign language most often used in the sector, using the help in the publication of web pages, according to the technical specifications of the same.

C3: Verify the transferred pages, taking into account criteria of quality and 'usability' to ensure their functionality.

CE3.1 identify the environments of test that is van to use for the verification depending on the specifications received.

CE3.2 verify them components of execution in browser (plug-ins) for the reproduction of content special in the website, according to the specifications received.

CE3.3 classify characteristics to verify in the browsers used on the market, to ensure the compatibility of the pages with them, according to established specifications.

CE3.4 verify them pages transferred, to ensure the functionality of them same:-check that the appearance aesthetic of them pages meet the specifications of design and quality established.

-Redirect the links necessary in those pages transferred.

-Identify the possible points conflicting in the pages developed.

-Check that the specifications are met by the links on the pages.

-Document the processes carried out.

C4: Expose the pages in search engines and directories according to preset criteria for availability.

CE4.1 identify and locate search engines and directories on the Internet where to publish the developed pages.

CE4.2 identify and describe the descriptors that synthesize the content of the pages to the end that are found by the search engines.

CE4.3 register pages published in search engine to expose the information contained in them:-select the search engines.

-Include descriptors in the pages made using appropriate tags.

-Use an application of automatic publication to publish made pages.

-Publish manually the pages that not to publish is with a procedure automatic.

-Regularly check the functionality of the posted page.

Contents 1. Safety in the publishing of web pages - features security on different file systems.

-Operating system Linux.

-Operating system Windows.

-Other operating systems.

-Access permissions.

-Types of access - access - access implementation - type choice orders of creation, modification and deletion.

-Description of orders in different systems - implementation and testing of the different orders.

2. file transfer tools - settings.

-Generic parameters.

-Specific parameters for different servers.

-Connection to remote systems.

-Description of remote systems.

-Connection to remote systems orders.

-Operations and commands / orders to transfer files.

-Description of file transfer operations.

-Ways to transfer files.

-Phases for the transfer of files.

-Operations and commands / orders for update and delete files.

-Description of operations of updating and deletion of files.

-Phases for the update of files.

-Phases for the disposal of files.

3. publishing of web pages-search generic.

-Inclusion of the site in different search engines.

-Google, Altavista, etc.

-Specialized search engines.

-Inclusion of the website in various search engines.

-Thematic.

-Meta search.

-Geographical.

-By categories.

-By key words.

-Key words: keywords and standard systems of 'metadata'.

-Definition of descriptors.

-Usefulness of descriptors.

-Incorporation of the descriptors in a web page.

-Applications of publication automated.

-Applications free.

-Applications built-in to server free.

-Applications built-in to servers of payment.

-Procedures of publication.

-Organization of the information to publish.

-Location of the information to publish.

-Specification of the location of the different files.

-Phases to publish the web page.

4 tests and verification of web pages - verification techniques.

-Check based on criteria of quality.

-Check based on criteria of usability.

-Tools for debugging for different browsers.

-Tools for Mozilla.

-Tools for Internet Explorer.

-Tools for Opera.

-Creation and use of functions of debugging.

-Other tools.

-Browsers: types and "plug-ins".

-Description of plug-ins.

-Accessories for images.

-Accessories for music.

-Plug-ins for video.

-Plug-ins for content.

-Machine virtual.

Guidelines methodological training to distance: module training number of hours total of the module No. of hours maximum susceptible of training to distance module training-MF0952_2 90 50 criteria of access to them students will be them established in the article 4 of the Real Decree that regulates the certificate of professionalism of the family professional to which accompanies this annex.

MODULES OF PRACTICES PROFESSIONAL NOT LABOR OF PREPARATION AND PUBLICATION OF WEB PAGES.

Code: MP0278 duration: 80 hours capabilities and criteria of evaluation C1: create, retouch and integrate components software in web pages, in accordance with the specifications of design received from the company.

CE1.1 make web pages using those languages and environments of development of the company and in accordance with the specifications received.

CE1.2 Add features to web pages in accordance with the design specifications received.

CE1.3 integrate and adjust components software on web pages received specifications.

CE1.4 Verify the integration of components, as well as the functioning of external pages, following specifications and procedures of the company and the compliance with the criteria of usability and accessibility.

CE1.5 documenting the work performed in accordance with the procedures of the company.

C2: Publishing web pages according to the specifications of the system administrator and business procedures.

CE2.1 manage the web site, using the transfer of the Organization, and in accordance with the specifications of the system administrator.

CE2.2 testing sites and web pages, in accordance with the procedures, specifications, design and quality of the organization.

C3: Participate in the process of work of the company, following the rules and instructions set forth in the work center.

CE3.1 behave responsibly both in human relations and works to be carried out.

CE3.2 respect the procedures and rules of the workplace.

CE3.3 undertaken with diligence the tasks according to the instructions received trying to it adapt to the pace of work of the company.


CE3.4 integrate is in the processes of production of the Centre's work.

CE3.5 use established communication channels.

CE3.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Creation of web pages.

-Description of the business processes of creation, retouching and integration of software components.

-Development environments and tools used in the company.

-Corporate graphic design specifications.

-Sources of information used and generated.

-Criteria of usability and accessibility, defined by the organization.

-Documentation of the processes in accordance with the procedures of the company.

-Plans of safety and quality of the organization.

2. publication of web pages.

-Description of the business procedures and safety in the publication of web pages.

-Tools transfer and specific software used by the company for the publication of web pages - documentation of the processes in accordance with the procedures of the company.

3. integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.

-Interpretation and execution with diligence the instructions received.

-Recognition of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. the trainers training modules required accreditation requirements * professional experience required in the field of competition with no accreditation MF0950_2 Accreditation Unit: construction of web pages.





● Bachelor, engineer, architect or the title of the corresponding level or other equivalent securities ● Diplomado, technical engineer, technical architect or the title of the corresponding level or other equivalent securities ● technician in the family of information technology and communications ● certificate of professionalism of level 3 of the professional's computing and communications family, area development 1 year 3 years MF0951_2 : Integration of components software in web pages.





● Degree, engineer, architect or the title of grade corresponding u others titles equivalent ● diploma, engineer technical, architect technical or the title of grade corresponding u others titles equivalent ● technical upper in the family of computer and communications ● certificate of professionalism of level 3 of the family professional of computer and communications, area of development 1 year 3 years MF0952_2 : Publication of web pages.





● Bachelor, engineer, architect or the title of the corresponding level or other equivalent securities ● Diplomado, technical engineer, technical architect or the title of the corresponding level or other equivalent securities ● technician in the family of information technology and communications ● certificate of professionalism of level 3 of the professional's computing and communications family, area development 1 year 3 years * in the past three years.



V. requirements minimum of spaces, facilities and equipment space training surface m² 15 students surface m² 25 students classroom's computer 60 75 space training M1 M2 M3 classroom of computer X X X space training equipment classroom of computer-PCs installed in network and connection to Internet.

-Cabinet of wiring with panels of patched, and devices of connection to network.

-Based, network and web server software.

-Antivirus and security software.

-office software.

-Software for websites - Software to create and modify images - printer and peripherals.

-Web editing tools.

-Programming client and server code editing tools.

-Tools for debugging and testing.

-Page publication tools.

-Tools for transfer.

-Multimedia tools.

-Rapid development tools.

-Current browsers.

-Browser type text.

-Markup languages. Script languages.

-Web servers.

-Application for verification of accessibility of web sites.

-Internet search engines.

-Software components already developed and/or distributed by computer companies.

-Canon of projection.

-Flip charts.

-Slate.

-Classroom material.

-Table and Chair for the trainer.

-Tables and chairs for students.

-Auxiliary furniture for classroom equipment.





Not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex II I. identification of the certificate of professional designation: operation of computer systems.

Code: IFCT0210 professional family: information technology and communications.

Professional area: Systems and telematics.

Level of professional qualification: 2 professional qualification of reference: IFC300_2 operation of computer systems (Royal Decree 1201 / 2007 of 14 September).

Relationship of competition units comprising professionalism certificate: UC0219_2: install and configure the base software on systems with.

UC0957_2: Maintain and regulate the physical subsystem in computer systems.

UC0958_2: Execute administration and maintenance procedures on the base and client application Software.

UC0959_2: Maintain the security of the physical and logical subsystems in computer systems.

General competence: procedures for Administration and configuration of the software and hardware of the computer system, as well as resolve any incidents that can be produced during normal operation of it and monitor its performance and consumption, according to specifications received.

Professional environment: Professional: develops his professional activity employed in companies or entities public or deprived of any size that have computers for their management, in the area of the Department of computer science systems.

Productive sectors: is located mostly in the service sector, and mainly in the following types of companies: companies or entities that use computer systems for its management; companies dedicated to the marketing of computers and computer services; companies that provide computer technical support services; telecentre networks; in the different public administrations, as part of the computer support of the organization.

Occupations and relevant jobs: 3812.1023 technical systems with.

Operator's systems.

Technical of support software.

Duration of the training partner: 600 hours.

Relationship of modules training and of units training.

MF0219_2: (transverse) installation and configuration of systems operating. (140 hours) ● UF0852: installation and update of systems operating. (80 hours) ● UF0853: exploitation of the capabilities of the system microcomputer. (60 hours)

MF0957_2: maintenance of the subsystem physical of systems software. (150 hours) ● UF1349: maintenance and inventory of the physical subsystem. (90 hours) ● UF1350: monitoring and management of incidents of the systems physical. (60 hours)

MF0958_2: maintenance of the subsystem logic of systems software. (150 hours) ● UF1351: management and operation of the software of a system computer. (90 hours) ● UF1352: monitoring and management of incidents of the software. (60 hours)

MF0959_2: maintenance of the security in systems software. (120 hours) ● UF1353: monitoring of the accesses to the system computer. (90 hours) ● UF1354: copies of security and restoration of the information. (30 hours)

MP0286: module of practices professional not labour's operation of systems software (40 hours).

II. PROFESSIONAL PROFILE PROFESSIONALISM CERTIFICATE


Competition 1 denomination unit: install and configure the SOFTWARE's BASE in systems with.

Level: 2 code: UC0219_2 realizations professionals and criteria of performance MOP1: carry out processes of installation of operating systems for use with systems, received specifications.

CR1.1 characteristics of operating systems are classified, to decide the version to install and the type of installation, depending on technical specifications received.

CR1.2 the installation of the operating system requirements are checked, to verify that there is sufficiency of resources and compatibility in the destination of the installation team, according to the established procedure.

CR1.3 the destination of the installation team prepares to locate the operating system, enabling infrastructure in mass storage, according to the specifications received devices.

CR1.4 the operating system is installed by applying the processes indicated in the installation manuals that accompany it, to get a computer in a functional State, following the procedure laid down.

CR1.5 the operating system is configured to operate, within the specified parameters, following established procedures and as indicated in the technical documentation.

CR1.6 the programs of utility included in the system operating is installed for his use, according to the specifications technical received.

CR1.7 verification of the installation is performed to check the functionality of the operating system, using start and stop, and analysis of performance tests, following established procedures.

CR1.8 the documentation of the performed processes made and archived for later use, following internal models established by the organization.

CR1.9 the specific technical documentation is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Upgrade the operating system to ensure its operation, following received technical specifications and procedures of the organization.

CR2.1 versions of the software base, accessories of the system and device drivers are checked to ensure suitability, according to the established procedure.

CR2.2 obsolete versions of the software base, accessories of the system and device drivers are identified to proceed with your upgrade and ensure its functionality, according to technical specifications and procedures.

CR2.3 supplements and "patches" to the operation of the base software are installed and configured, indication of the system administrator to maintain security in it, according to established procedures.

CR2.4 the update check is performed, to test the functionality of the operating system using tests of start and stop, and analysis of performance, according to established procedures.

CR2.5 the documentation of the performed processes made and archived for later use, according to the standards set by the organization.

RP3: Exploit the features of the microcomputer system through the use of the base software and applications standards, taking into account the needs of use.

CR3.1 functions and applications provided by the base software are identified for use, according to the instructions of the technical documentation and the needs of use.

CR3.2 with file system operations are performed using the interface that provides the operating system, according to user needs and technical specifications.

CR3.3 the tools of configuration that provides the system operating is running to select options from the environment of work, according to specifications received and needs of use.

CR3.4 them processes of execution of applications is carried out, to exploit the functions of each an of them according to them needs operational and functional.

CR3.5 messages provided by the base software are interpreted, to control the operation of the microcomputer system by consulting manuals, documentation provided by the manufacturer and specifications given by the organization.

CR3.6 them procedures of use and management of them peripheral connected to the system microcomputer, from them users, is made to exploit its features, following the documentation technical and procedures stipulated by the organization.

Media production equipment professional context. Peripherals. Systems operating. Utilities and applications built-in to the systems operational. Updates for operating system updates. Technical documentation associated with operating systems. Free software.

Products and results with operating systems installed and configured computers. Operating systems configured and operating. Computer organized logically. Updated operating system.

Information used or generated manuals and documentation technique of systems operating. Manual update of operating systems. The applications included in the operating system manuals. Installation, configuration and updating the operating system reports. Plan of security and quality of the organization.

Unit of competition 2 name: maintain and adjust the subsystem physical in computer systems.

Level: 2 code: UC0957_2 realizations professionals and completion criteria: RP1: check and maintain the physical devices to use connections, following established procedures.

CR1.1 the operation of the physical devices is checked using the tools and techniques appropriate under adequate safety conditions and according to established procedures.

CR1.2 faulty physical devices, malfunction or poor performance are updated or replaced with same or similar components that fulfil the same function and ensure its compatibility in the system to maintain operating the same, according to established procedures.

CR1.3 the tasks of checking and verification to ensure the connection of the physical devices are conducted according to established procedures or according to the system administrator, and always under adequate safety conditions.

CR1.4 detected incidences are checked if they are registered, otherwise they are documented and are recorded for later use, according to established procedures.

CR1.5 the specific technical documentation associated with the devices is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Review and ensure expendable elements for the functioning of the computer system according to stated specifications and usage requirements.

CR2.1 consumable items are checked, to ensure their compatibility and functionality using tools and techniques, according to established procedures and under adequate safety conditions.

CR2.2 expendable exhausted, deteriorated or useless elements are replaced by other equal or similar that they fulfil the same function and ensure its compatibility with devices of the system following the established procedure, the manufacturer standards and under conditions of sufficient security.

CR2.3 the functioning of the computer system, with expendable items installed, is checked to ensure its operation, according to the established procedure.

CR2.4 recycling and reusing consumables procedures apply, for both environmental and economic objectives according to rules of the Organization and environmental specifications.

CR2.5 detected incidences are checked if they are registered, otherwise they are documented and are recorded for later use according to established procedures.

CR2.6 the specific technical documentation associated with the devices is interpreted, where applicable, in the foreign language most often used in the sector.

RP3: Monitor the physical subsystem performance reporting of incidents detected according to established specifications.

CR3.1 monitoring tools are checked, to verify its operation, according to the procedures established by the organization.

CR3.2 monitoring tools are used to detect possible anomalies in the functioning of the physical devices in the system, according to procedures established by the organization.

CR3.3 alarms and monitored events are documented and their record is archived for later use, according to established procedures.

CR3.4 measurement programs are executed, to verify the performance of the physical devices, according to established procedures and user needs.

CR3.5 established to respond to certain alarms and incidences corrective actions are conducted according to established procedures.

CR3.6 detected incidences are checked if they are registered, otherwise are documented and are recorded for later use, according to established procedures.

RP4: control and review them inventories of the subsystem physical to ensure their validity according to the procedures established.

CR4.1 them inventories of them components physical of the system is checked, for ensure its validity, according to the rules of the organization.


CR4.2 the changes detected in features, configuration or status of physical components are documented according to established procedures, to keep the inventory up to date.

CR4.3 incidents detected over faulty components, unauthorized configuration changes, unauthorized installation of components, or illegal uses of the same are documented and archived for later use according to established procedures.

Professional media production computer equipment context: components, devices, wiring and equipment for portable equipment, among others. Teams of middle range ("minis") and large ('mainframes'). Assembly and measurement equipment: tools for Assembly and disassembly, tension meters, tools for the manufacture of wiring. Consumables for the operation of the system. Systems operating. Automatic inventory software. Tools office. Software for monitoring. Software of diagnosis. Management tools.

Products and results inventory revised and updated from the subsystem physical. System computer with subsystem physical in operation optimum and a use right of their resources.

Information used or generated inventory of the system computer. Technical documentation of the physical devices in the system. Technical documentation of the basis of the system software. Manual operation of the monitoring software. Software operation manuals of inventory. Technical documentation of the manufacturer of consumable items. Technical documentation of diagnosis system and peripheral devices. Standards and environmental safety. Standards of safety and hygiene at work. Reports of incidences of maintenance of physical devices. Reports of incidents of maintenance of items consumable. Reports of incidences of physical subsystem performance.



Competition 3 denomination unit: run procedures of management and maintenance in the SOFTWARE of BASE and of application of client.

Level: 2 code: UC0958_2 realizations professionals and criteria of performance MOP1: maintain and check the update from user applications to ensure its operation, according to technical specifications and procedures of the organization.

CR1.1 application software is installed to support the functional needs of the indication of the system administrator and users according to established procedures.

CR1.2 not used application software is uninstalled to avoid a bad use of the storage space, according to established procedures.

CR1.3 application software updates are carried out to maintain and renew the functionalities of the system, according to specifications of the manufacturer and the rules of the organization.

CR1.4 detected incidences are checked if they are registered, otherwise are documented and are recorded for later use, according to established procedures.

CR1.5 diagnostic processes are performed on computers in which incidents have been detected using specific and remote management in order to solve them or scale them according to established procedures.

CR1.6 the specific technical documentation is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Perform the basic software management tasks to maintain the computer system in operation, according to established procedures.

CR2.1 hardware and software maintenance and cleaning media are conducted periodically, with specific tools, to ensure its integrity and performance, according to established procedures.

CR2.2 management tasks for the maintenance of the software configuration of base and application on the client computers is performed according to established procedures and user needs.

CR2.3 peripherals connected to client computers are logically configured in application software, for exploitation, according to established procedures and technical specifications.

CR2.4 the execution of management tasks is done using specific software tools that facilitate its implementation, according to technical specifications and user needs.

CR2.5 the execution of scheduled administrative tasks is checked, to ensure its performance and frequency, according to established procedures and user needs.

CR2.6 the execution of programs or scripts is performed, indication of the administrator, and according to established procedures, to carry out administrative tasks, documenting the results.

CR2.7 detected incidences are checked to establish if they are registered, otherwise are documented and are recorded for later use, according to established procedures.

CR2.8 detected incidents are resolved or escalated, to proceed with his solution, according to established procedures.

CR2.9 the specific technical documentation is interpreted, where applicable, in the foreign language most often used in the sector.

RP3: Monitor the performance of the base and application software, reporting of results, according to established procedures.

CR3.1 monitoring tools are checked, to verify its operation, according to the procedures established by the organization.

CR3.2 monitoring tools are used to detect possible anomalies in the functioning of the base and system application software, according to procedures established by the organization.

CR3.3 alarms and monitored events are documented and their record is archived for later use, according to established procedures.

CR3.4 measurement of software programs are executed, to check the performance of the processes, according to established procedures.

CR3.5 established to respond to certain alarms and incidences corrective actions are conducted, according to established procedures.

CR3.6 detected incidences are checked, to establish whether they are registered, otherwise they are documented and are recorded for later use, according to established procedures.

RP4: Monitor and review software inventories to ensure their validity and update, as per specifications received.

CR4.1 inventories of the logical components of the system are checked, to ensure its validity, according to the rules of the organization.

CR4.2 the changes detected in version, configuration or status of logical components, are documented to maintain up-to-date inventory, according to established procedures.

CR4.3 IDs of the logical components subject to copyright are checked, to maintain control over the installed licenses, according to the legislation in force.

CR4.4 incidents detected on malfunction of software, unauthorized configuration changes, unauthorized installation of components or improper uses of them are documented for later use, according to established procedures.

Professional context media production computer equipment and peripherals. Media: disk, tape, CD-ROM, DVD, among others. Base software. Office applications. Application software. Monitoring software. Patches and updates. File compression software. Records managers. Managers of boot. Tools administrative. Software of inventory automatic. Tools of management remote.

Products and results inventory revised and updated from the subsystem logic. Computer system with logical subsystem operation.

Information used or generated technical documentation of the physical devices in the system. Technical documentation of the basis of the system software. Inventories of the logical subsystem. Manual operation of the monitoring software. Software operation manuals of inventory. Organigram of the organization. Plan of security and quality of the organization. Standards and environmental safety. Legislation about data protection and confidentiality of the information. Manual of administrative tools. Reports of incidences of maintenance of base and application software. Reports of incidents of the logical subsystem performance.

Competition 4 denomination unit: maintain the security of the SUBSYSTEMS physical and logic in computer systems.

Level: 2 code: UC0959_2 realizations professionals and criteria of performance MOP1: check access to the computer system, to ensure the implementation of established procedures and security plan, informing of the anomalies detected.

CR1.1 the monitoring tools, to trace the activity of the system and the access are checked to ensure its operation, according to the plan of the system.

CR1.2 them files of trace of connection of users and the files of activity of the system is collected to locate the existence of access or activities not desired.

CR1.3 them incidents detected in the access to the system are proven to establish if are registered, in other case is documented and is recorded for its use later according to procedures established.

CR1.4 the changes detected in the configuration of control of access of users to the system is documented, to keep the inventory updated, according to procedures established.


Rp2: Check the operation of the established security mechanisms reporting anomalies detected persons of superior responsibility.

CR2.1 system users access permissions are checked, to ensure its validity, according to the plan of the system.

CR2.2 user security policies are checked to ensure their validity, according to the plan of the system.

CR2.3 protection anti-virus and malware systems are reviewed, with regard to its update and functional configuration, to ensure the safety of the team, according to the procedures established by the organization.

CR2.4 detected incidences are checked to establish if they are registered, otherwise are documented and are recorded for later use, following established procedures and reporting to the immediate superior.

CR2.5 diagnostic processes are performed on computers in which incidents have been detected using specific and remote management in order to solve them or scale them according to established procedures.

RP3: Perform the backup, to ensure the integrity of the data, according to established procedures and the security plan.

CR3.1 backups are performed, to protect data in the system, according to the periodicity, support and procedure established in the system security plan.

CR3.2 backups occur, to ensure the use of the same, according to the procedures established in the system security plan.

CR3.3 storage of backups to prevent loss of information, is carried out under the conditions and according to the procedure indicated in the security system and the recommendations of the manufacturer of the support plan.

CR3.4 detected incidences are checked, to establish whether they are registered, otherwise are documented and recorded for later use, according to established procedures.

RP4: Verify that environmental and safety conditions are maintained according to established plans, reporting any anomalies.

CR4.1 them specifications technical of them devices is checked to ensure that is meet the recommendations of them manufacturers. with regard to conditions environmental and of security.

CR4.2 the location of them equipment and devices physical is check for ensure that is meet them requirements with regard to security, space and ergonomics established by the organization.

CR4.3 detected incidences are checked to establish if they are registered, otherwise are documented and are recorded for later use according to established procedures and reporting to the immediate superior.

CR4.4 the actions corrective established to solve certain incidents detected is carried out according to procedures established.

Media production computer and peripheral equipment professional context. Stands for information. Software of base. Office applications. Monitoring software. Software to perform backups. Antivirus software. Patches and updates. File compression software. Records managers. Managers of boot. Administrative Tools. Tools and devices of security.

Products and results system backups to prevent loss of data. Computer system with logical subsystem operation. Secured computer system front access and unwanted actions. Computer system in environmental safety conditions.

Information used or generated technical documentation of the physical devices in the system. Technical documentation of the basis of the system software. Manual operation of the monitoring software. Manual operation of the devices and security tools. Organigram of the organization. Plan of security and quality of the organization. Standards and environmental safety. Legislation about data protection and confidentiality of the information. Manual of administrative tools. Reports of incidents of access to the system. Mechanisms of system security incident reports. Reports of incidences of backups.

III. formation of professionalism certificate training module 1 name: installation and configuration of operating systems.

Code: MF0219_2 professional skill level: 2 associated with the competition unit: UC0219_2 install and configure the software-based systems with.

Duration: 140 hours.

TRAINING unit 1 name: Installation and update of system operating code: UF0852 duration: 80 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and C1 evaluation criteria: classify the functions and features of the base software for the operation of a microcomputer system.

CE1.1 describe major architectures with systems detailing the Mission of each of the functional blocks that compose them.

CE1.2 explain the concept of operating system, and identify the roles in the microcomputer system.

CE1.3 distinguish the elements of an operating system by identifying the functions of each of them, taking into account their technical specifications.

CE1.4 classify operating systems and versions used in computers detailing their key features and differences, according to technical specifications.

CE1.5 identify the phases involved in the installation of the operating system by checking the computer requirements to ensure the possibility of installation.

C2: Implement processes of installation and configuration of operating systems to enable the functionality of the computer, according to specifications received.

CE2.1 in so-called practical, properly characterized, installing an operating system on a computer to put it into operation:-check that the computer meets the requirements and has the resources needed for the installation of the base software.

-Prepare the installation target computer formatting and creating the partitions listed in the specifications.

-Install the operating system, following in the footsteps of the technical documentation.

-Configure the system with the specified parameters.

-Install utility programs indicated in the specifications.

-Check the installation by starting and stopping tests.

-Documenting the work done.

CE2.2 identify procedures that are used to automate the installation of operating systems on computers of the same characteristics through the use of tools, cloning software and other needy installation tools.

CE2.3 in so-called practical, properly characterized, installing an operating system on computers with the same characteristics, according to received specifications:-prepare one of the teams to install the operating system and the listed utilities.

-Install and configure the operating system in the footsteps of the technical documentation.

-Install utility programs indicated in the specifications.

-Select the software tool to perform the cloning equipment.

-Proceed to the imagery of the system installed for distribution.

-Implement, using management tools for disk images, those obtained on multiple computers with the same characteristics to the original to get activate their functional resources.

-Testing of start and stop to check facilities.

-Documenting the work done.

CE2.4 interpret the technical associated documentation, even if it is published in the foreign language most often used in the sector, using the aid in the installation of the operating system.

C3: Upgrade the operating system of a computer to include new features and fix security problems, according to technical specifications.

CE3.1 identify susceptible to reset an operating system software components to perform your upgrade, taking into account their technical specifications.

CE3.2 identify and classify sources of obtaining elements of update to perform the processes of implementation of patches and operating system upgrades.

CE3.3 describe the procedures for updating the operating system taking into account the security and integrity of the information on the computer.

CE3.4 in so-called practical, properly characterized, upgrade of an operating system for the incorporation of new functionalities, according to received specifications:-identify the components to upgrade the operating system.

-Check the requirements of updating the software.

-Update the specified components.

-Verify the performed processes and the absence of interference with the other components of the system.

-Document update processes.

Contents 1. A microcomputer system architectures.

-Functional scheme of a computer.

-Subsystems.

-The central processing unit and its elements.

-Internal memory, types and features.

-Input and output units.

-Storage devices, types and features.

-Buses.

-Types.

-Features.


-Correspondence between the physical and logical subsystems.

2. functions of the computer operating system.

-Basic concepts.

-Processes.

-The files.

-Calls to the system.

-The core of the operating system.

-The interpreter command.

-Features.

-User interface.

-Management of resources.

-File management.

-Task management.

-Support service.

3. elements of a computer operating system.

-Management of processes.

-Memory management.

-The system of input and output.

-System of files.

-Protection system.

-System of communications.

-System of interpretation of orders.

-Line of command.

-Graphical interface.

-Programs of the system.

4. current computer operating systems.

-Classification of operating systems.

-Free software.

-Characteristics and use.

-Differences.

-Versions and distributions.

5. installation and configuration of computer operating systems.

-Requirements for installation. Compatibility hardware and software.

-Phases of installation.

-Configuration of the boot in the BIOS device.

-Formatted disk.

-Disk partitioning.

-Creation of the file system.

-Configuration of the operating system and devices.

-Installation and configuration utilities and applications.

-Types of installation.

-Minimum facilities.

-Facilities standards.

-Custom installations.

-Attended or unattended installations.

-Network installations.

-Restoring an image.

-Verification of the installation. Start and stop tests.

-The installation and configuration documentation.

6. replication physical of partitions and drives hard.

-Programs of copies of security.

-Cloning.

-Functionality and goals of the process of replication.

-Safety and prevention in the process of replication.

-Partitions of disk.

-Types of partitions.

-Tools of management.

-Tools of creation and implementation of images and replicas of systems:-sources of information.

-Images and replicas of systems implementation procedures.

7. update of the computer operating system.

-Classification of update sources.

-Automatic update.

-The centres of support and help.

-Update procedure.

-Update of operating systems.

-Update of software components.

-Critical components.

-Safety components.

-Drivers.

-Other components.

-Verification of the upgrade.

-Update documentation.

TRAINING unit 2 name: exploitation of features of the MICROCOMPUTER system code: UF0853 duration: 60 hours referrer of competition: this training unit corresponds with the RP3 capabilities and C1 evaluation criteria: use applications that provide operating systems, for the exploitation of the same according to technical specifications.

CE1.1 use the applications provided by the operating system describing its characteristics for the use and operation thereof, taking into account their technical specifications and functional needs.

CE1.2 use the applications provided by the operating system for the Organization of the disk and filesystem, according to received technical specifications.

CE1.3 use the accessibility options that have current operating systems, to set up accessible environments for people with disabilities, according to technical and functional specifications.

CE1.4 set work environment options using the tools and applications that provides the operating system, following received specifications and user needs.

CE1.5 describe the applications provided by the operating system for the exploitation of the capabilities of the peripherals connected to the system, according to needs of use.

CE1.6 classified messages and announcements provided by the microcomputer system to discriminate their importance and criticality, and procedures of response according to given instructions.

CE1.7 interpret the technical associated documentation, even if it is published in the foreign language most often used in the sector, using the help of the operating system.

Contents 1. Operating system utilities.

-Features and functions.

-Configuration of the working environment.

-Administration and management of file systems.

-Management of resources and processes.

-Management and editing files.

2. Organization of the disk and file system.

-File system.

-FAT.

-NTFS.

-Logical units of storage.

-Structuring of data.

-Folders or directories.

-Files.

-Types of files.

-Folders and system files.

-Structure and configuration of the file browser.

-File operations.

-Creation.

-Copy and move.

-Removal and recovery.

-Search for files.

3. configuration of the accessibility options.

-Options to facilitate the display of screen.

-Use of narrators.

-Options to make it easier to use the keyboard or mouse.

-Voice recognition - use text and Visual alternatives for people with hearing difficulties 4. Configuration of the computer system.

-Configuration of the working environment.

-Customization of the visual environment.

-Regional settings of the computer.

-Customization of basic peripherals.

-Other.

-Print Manager.

-Device Manager.

-Protection of the system.

-Advanced system settings 5. Using the tools of the system.

-Partitioned disk.

-Backup.

-Release of space.

-Task scheduling.

-System Restore.

6. management of resources and processes.

-Messages and system notices.

-System events.

-System performance.

-Task Manager.

-The system registry editor.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 80 40 training unit 2 UF0852 - UF0853 60 30 sequence: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: maintenance of the computer systems physical subsystem.

Code: MF0957_2 professional skill level: 2 associated with the competition unit: UC0957_2: maintain and regulate the physical subsystem in computer systems.

Duration: 150 hours training unit 1 name: maintenance and inventory of the physical subsystem.

Code: UF1349 duration: 90 hours referrer of competition: this training unit corresponds to the RP1, RP2 and RP4.

Capabilities and criteria of evaluation C1: identify the physical components of a computer system, detailing their connections and main indicators of performance and State to obtain appropriate, according to established specifications operating parameters.

CE1.1 identify the types of physical components of the system classifying them according to different criteria: functions and types of device, among others.

CE1.2 describe the technologies of connection devices, expansion slots and ports detailing the basic characteristics to identify the possibilities of interconnection of components with the system, according to technical specifications.

CE1.3 describe the techniques and inventory tools used in the system to check physical components as well as changes therein according to the specified technical data.

CE1.4 identify the physical devices that make up the system, to categorize and describe its functionality:-classify the devices according to their typology and functionality.

-Recognize the indicators and the State of operation of the devices according to instructions in the technical manual.

-Interpret the associated technical documentation, even if it is published in the foreign language most often used in the sector, using the help.

-Check the registry of devices in inventory and register the detected changes.

-Related physical devices with their respective connectors.

C2: Handle the types of consumables by associating them with physical devices, to guarantee its functionality, according to technical specifications.

CE2.1 describe the types of devices that used material fungible as part of their operational of operation for apply them procedures of control and replacement of the same according to specifications technical.

CE2.2 classify them types of material fungible according to criteria of manufacturer, of function, of duration, of material, of grade of reuse and possibility of recycling between others to identify them features of them themselves.


CE2.3 identify the tasks and the problems of maintenance for each type of material fungible according to specifications technical of the documentation associated.

CE2.4 explain it form of manipulate them types of materials expendable to ensure it security e hygiene in the work according to the specifications indicated in the documentation technical.

CE2.5 describe the procedures of recycled and treatment of waste of materials expendable to comply the normative environmental.

CE2.6 do the handling of consumables to replace it or replace it, according to given specifications:-relate the consumables with the corresponding physical devices, according to specifications of the device.

-Choose the consumables for the device according to criteria of functionality and economy.

-Interpret the technical associated documentation, even if it is published in the foreign language most often used in the sector, to be used as support.

-Interpret the signals of the device about the consumables according to indications of technical documentation.

-Install the consumables in the device technical specifications.

-Do performance tests of the device with the new consumables.

-Apply established procedures of fungible materials handling: insertion, extraction, handling for recycling and manipulation to recharge one expendable unit among others.

-Document the processes carried out.



(C) ontenidos 1. Components of a system computer.

-Computer systems.

-Definition.

-Components.

-Classification.

-Structure of a computer system.

-The central system.

-The central processing unit.

-Functions and types.

-Purpose and functioning.

-Internal structure.

-Current microprocessors. Main features.

-Architectures for processors: CISC and RISC.

-The system of memory main.

-Functions and types.

-Hierarchy of memories.

-Characteristics of main memory.

-Spaces for addressing and memory maps.

-The I/O system.

-Functions and types.

-I/O processors.

-I/O subsystem.

-Peripheral drivers.

-Peripheral devices.

-Classification and types.

-Features technical and functional.

-Communications subsystem.

-Communications processors.

-Physical elements of the communications network.

-Connection between components.

-Hierarchy of buses. Classification.

-Addressing. Types of transfer.

-Timing (synchronous, asynchronous, cycle party).

-Ports and connectors.

-Multiprocessor architectures.

-Performance characteristics.

-Type: MPP (massively parallel processing) vs symmetric multiprocessing (SMP).

-Scalable and distributed architectures.

-Features.

-Advantages and disadvantages.

-Concepts of Clusters, multiclusters and GRID.

-Diagnostic tools.

-Types of tools. Detection of devices.

2. the mass storage devices.

-Concepts of mass storage devices.

-Access time.

-Capacity.

-Speed transfer, etc.

-Types of devices.

-Storage interfaces / connection technologies.

-Integrated device Electronics (IDE).

-Fibre Channel (FC) - Small Computer System Interface (SCSI) - Serial-Attached SCSI (SAS) - Internet SCSI (iSCSI) - architectures / advanced storage technologies.

-Protection RAID drives.

-Storage networks.

-Storage Area Networks (SAN) - Network Attached Storage (NAS).

-Manager of logical volumes (LVM).

3. disk devices.

-A disk storage subsystem components.

-Controller.

-Hard drives.

-Power supply.

-Cables.

-LEDs, controls and types of connectors.

-Diagnostic procedures.

-Diagnostic indicators - tools diagnostic software.

-Hardware diagnostic tools.

-Update or replacement of components.

-Precautions in the handling of components sensitive to the static.

-Replacement of units of disk.

-Replacement of other components.

-Checking or verification of the operation.

-Wiring of the subsystem of storage on disk.

-Settings basic of the Hardware.

-Productivity of storage.

-Concepts General on installation of cabinets of mounting.

-Identification of components and description of indicators.

-Procedure of replacement or removal of units of disk.

-Interconnection of components.

-Symbology.

-Handling ESD.

4. devices of storage on tape.

-Tasks basic of an operator.

-On and off of the units mounted in rack.

-Protection or habilitation of writing of those cartridges.

-Caution in the handling of cartridges.

-Insertion and manual removal of tape cartridges.

-Identification of defective cartridges.

-Cleaning of the tape drives.

-The initial program loading.

-Tasks with the system menu.

-Connect or disconnect units online.

-View the settings.

-Tape drives.

-Features and specifications.

-Components of a tape drive.

-A tape drive installation procedure.

-Types of messages from the unit's tape and interpretation.

-Identification of problems.

-Procedures of intervention of the operator.

-The standard TapeAlert.

-Panel of control and indicators.

-Cartridges of tape.

-Types of cartridges of tape and features.

-Formats.

-Components external and memory of a cartridge.

-Cartridges WORM (Write Only Read Many).

-Information, management and care.

-Procedures for cleaning.

-System of tapes.

-Libreriade tapes.

-Precautions for safety and environment.

-Components leading from a library of tapes.

-The panel of operator.

-Operation of a library of tapes.

-Mode automated.

-Manual mode. An operator tasks.

-Components functional of a frame of a library of tapes.

-Stands for storage of tape.

-Modalities and States operating from a library of tapes.

-Description of the controls and indicators of a library of tapes.

-Procedures operating basic to perform from the panel of operator.

-Procedures operating advanced to perform from the Manager of library.

-Procedures operating in mode manual.

-Actions of the operator to anomalies in the library.

-Tape virtualization.

5. fungible material of physical devices in a computer system.

-Types of devices that use consumables.

-Classification of the consumables.

-Recycling.

-Royal Decree 833/88 of 20 July, which approves the regulation for the execution of law 20/1986, basic of toxic and hazardous waste.

-Definitions.

-Labelling and packaging. Pictograms.

-Storage.

-European waste catalogue. Classification of consumables.

-The safety data sheets.

-Identification of hazards.

-First aid.

-Handling and storage.

-Other data.

-Reuse of the consumables.

6. dot matrix printers of points and lines.

-Security in the handling of dot matrix printers.

-Warnings and cautions. Symbology.

-Safety instructions in the installation, maintenance and handling of paper and printer management.

-Main components and their location.

-Types of interfaces.

-Control panel.

-Printer ribbons.

-Placement or replacement of tape cartridges.

-Continuous and manual paper feed.

-Systems of management of printers.

-Realization of printing tests.

-Printer settings.

-Search for errors and Diagnostics.

7. laser printers.

-Security in the handling of laser printers.

-Warnings and cautions. Symbology.

-Safety instructions in the installation, maintenance and handling of the toner cartridges, printer, laser radiation management and safety of ozone.

-Main components and their location.

-Functional areas.

-Types of interfaces.

-Control panel.

-Types of consumables and its duration.

-Continuous and manual paper feed. Storage.

-Replacement of the consumables.

-Responsibilities and tasks of the operator.

-Cleaning of the printer.

8 ink-jet printers.

-Safety in the use of ink-jet printers.

-Warnings and cautions. Symbology.

-Safety instructions in the installation, maintenance and manipulation of ink cartridges and printer management.

-Inkjet printer parts.

-Cleaning of the printer.

-Lubrication.

-Consumables.

-Replacement of consumables.

-Verification of the ink cartridge status indicator lights, control panel or through the printer driver.

-Replacing ink cartridges.

-Replacement of the maintenance box.

9. inventory techniques in computer systems.

-Records of inventory of physical devices.

-An inventory life cycle.

-Relevant information for an inventory.

-Techniques of inventory (passive, active scanning).

-ITIL methodology.


-Inventory of computer system software tools.

-Functions Basic.

-Components.

-Remote monitoring agent.

-Remote Management Agent - Administration user interface.

-Devices - reporting module - scanner configuration.

-Configuration - configuration of the devices scan - agents interpretation of reports.

-Basic use of inventory software.

TRAINING unit 2 name: monitoring and management of incidents of physical systems.

Code: UF1350 duration: 60 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and C1 evaluation criteria: Regular performance of the physical devices using monitoring tools, according to a given specification.

CE1.1 detailing the critical components that affect the performance of the computer system, to identify the causes of possible deficiencies in the operation of the equipment, according to technical specifications.

CE1.2 explain the types of metrics used for testing and determination of the performance of physical devices, according to specifications of the devices.

CE1.3 identify the parameters of configuration and performance of the physical devices in the system to optimize the functionality and quality of the services performed by the computer taking into account quality and performance parameters.

CE1.4 describe them tools of measure of the performance physical and monitoring of the system, classifying them metric available in each case, to apply the procedures of evaluation in them elements of the system computer, according to specifications technical received.

CE1.5 apply procedures of measure of the performance physical using the tools indicated to check that the functionality of the system computer is within parameters preset, according to some specifications technical given.

CE1.6 procedures of verification and detection of anomalies in the records of events and alarms of performance on the physical devices to its notification to the system administrator, following a given technical specifications.

CE1.7 perform the evaluation of the performance of them devices physical of the system to check its functionality and operability, according to specifications of performance given:-select the tool of measurement according to specifications given or indications of the administrator.

-Implement procedures of measurement using the tool selected.

-Review the results obtained to check that the measures are within them parameters normal, acting according to procedures established before situations anomalous.

-Make configuration changes to the physical devices indicated according to specifications received.

-Register in the inventory made configuration changes.

-Documenting the work detailing detected anomalous situations.

C2: Interpret the incidences and alarms detected in the physical subsystem and perform corrective actions to your solution according to given specifications.

CE2.1 identify performance issues produced by the physical devices that make up the subsystem to classify the corrective actions to be applied according to the specifications received.

CE2.2 explain strategies to detect anomalous situations in the operation of the subsystem.

CE2.3 procedures for the detection of incidents through the use of specific tools and indicators of activity of the physical devices in the system control, taking into account the technical operating specifications.

CE2.4 apply established response procedures for the resolution of incidents detected in the functioning and performance of the physical devices according to given specifications.

CE2.5 perform corrective actions to resolve the malfunction of physical devices in the system, given procedures to apply:-execute measurement procedures using the selected tool.

-Check the connection of the devices.

-Compare the results with the expected results to check whether it has been or not an incidence.

-Replace or update the component or device fault ensuring its compatibility with the system.

-Execute response procedures before produced incidents.

-Register in the inventory corrective actions.

-Documenting the work detailing situations of impact produced.

Contents 1. Introduction to the evaluation and performance metrics.

-Definitions and basic concepts of the performance evaluation.

-Information processing system.

-Performance.

-Performance.

-Critical computer systems resources and components.

-Performance evaluation techniques.

-Measurement. Indexes.

-Simulation. Workload.

-Analytical modeling.

-Reference systems.

-Performance metrics - network performance metric.

-System performance metrics.

-Services performance metrics.

2. techniques of monitoring and measurement of performance of the physical devices.

-Representation and analysis of the results of the measurements.

-Performance of the physical devices.

-Configuration and performance parameters.

3. monitoring tools.

-Installation of a platform for monitoring procedure.

-Technical requirements.

-General concepts related to monitoring.

-Protocols (ICMP, SNMP) network management.

-Information repositories:-CMDB (Base of data of the management of configuration).

-MIB (managed information Base).

-Items or instances to monitor.

-Types of instances.

-Types of events.

-Services.

-Supervision.

-User profiles.

-Responsibilities.

-A monitoring platform architecture.

-Management Console.

-Components of a monitoring platform.

-Central server.

-Repository of components.

-Monitoring agents.

-Proxies, remote management.

-The monitoring console.

-Description.

-Management of events, types and actions.

-Other types of management.

-Functionality to manage and monitor the infrastructure.

-Notification system.

4. monitoring of physical devices.

-The IPMI standard.

-Cross-platform monitoring tools.

-Monitoring of resources.

-Processor load.

-Free space on the file system.

-Use of physical memory.

-The number of input/output operations.

-Number of open files.

-Monitoring of printers.

-Monitoring of other resources.

-Monitoring of the use of network services.

-Electronic mail (SMTP, POP3).

-HTTP Keep-Alives.

-Secure remote connections (SSH).

-Other services.

-Parameters of configuration and performance of the physical devices.

-Optimization of the cache.

-The size of the paging file.

-Size of memory dedicated to the Java Virtual machine.

-Other parameters.

-Definition of active, passive alarms, events, and alerts.

5. models of monitoring and management: service management according to ITIL - ITIL processes structure and the relationship between them.

-Responsibilities, functions, levels of personnel, etc., of service to the user.

-Processes and procedures of the Service Center to the user.

6 techniques for diagnosis of the physical subsystem alarms and incidents.

-Classification of the physical devices alarms and incidents.

-Fall of the system.

-Services not available.

-Alerts automatic of failures of peripherals.

-Threshold for use of space in disk exceeded.

-Other incidents and alarms.

-Strategies for detecting situations anomalous in the operation of the subsystem.

-Tools of diagnosis of incidents and alarms of the devices physical.

-Methods established for solution incidents.

-Tools of management remote from devices (console virtual, terminals remote, etc.)

-Incident management tools - registry and its valuation.

-Temporary closure and decommissioning.

-Reject / claim incidents.

-Record time actuation and Control of maximum times.

-Preparation of reports.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF1349 - 60 40 sequence UF1350: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: maintenance of the computer systems logical subsystem.

Code: MF0958_2 professional skill level: 2 associated with the competition unit:




UC0958_2: Run procedures administration and maintenance in the base software and client application.

Duration: 150 hours training unit 1 name: management and operation of the SOFTWARE a system computer code: UF1351 duration: 90 hours referrer of competition: this training unit corresponds to the RP1, RP2 and RP4.

Capabilities and criteria of evaluation C1: identify the components software of a computer system detailing its features and settings, according to a given functional specifications.

CE1.1 mention the types of software for classification according to the purpose, functions and modes of implementation among others, according to the technical specifications of software manufacturers.

CE1.2 describe the characteristics of the components the system software, distinguishing its capabilities, taking into account the technical specifications.

CE1.3 explain and describe the types of user interfaces to discriminate the main characteristics of each of them, according to specifications of the systems used.

CE1.4 identify the elements of the component configuration software to ensure the functioning of the system, as per specifications received.

CE1.5 carry out the identification of components system software for use, according to given specifications:-operate with the user interface of the software component using the usual mechanisms for each type.

-Operate with the functional options of each component software according to instructions of the technical documentation.

-Identify the configuration of a component software according to instructions of established procedures.

-Check the registration of a component software inventory and register the detected changes.

-Check the licenses of use of the software taking in has them rights of author and the legislation current.

C2: install and update programs of the software of application to offer functionality to those users, following some specifications given.

CE2.1 installing application software to add functionality to the system components:-check the software installation requirements to be implemented in the system.

-Interpret the documentation technical associated, even if is edited in the language foreign of use more frequent in the sector using it's help.

-Verify that the licenses of use of them components software meet the legislation current.

-Perform the procedures of installation of components.

-Configure the installed software components to use peripherals and devices of the computer system.

-Carry out the procedures for uninstalling software components, if necessary.

-Verify the performed processes and the absence of interference with the other components of the system.

-Document the processes of installation and deinstallation made detailing the activities carried out.

-Keep updated software inventory recording the changes you made.

CE2.2 enumerate the main procedures to keep the software updated, according to the technical specifications of the type of software and the manufacturer.

CE2.3 describe the procedures to apply an update, detailing security problems in the installation and upgrade of software to maintain the functional parameters of the equipment.

CE2.4 upgrade application software in a system to readjust to the new needs:-identify the version of the software update component and the conditions of compatibility to be considered for updating.

-Locate the updates made available by the manufacturer, not yet implemented.

-Identify the 'patches' and other modules of code to increase the functionality of the component or to correct improper behavior.

-Check and check that the licenses of use of them components software meet the legislation current.

-Uninstall the components involved before applying any updates, according to data in the documentation.

-Technique, established procedures and indications of the administrator.

-Apply the previously identified updates to the component software according to instructions of the technical documentation, procedures and indications of the administrator.

-Configure the component software according to the specifications given after the upgrade.

-Check that the software component has the desired functionality by performing test runs.

-Document the process of update detailing produced incidents.

-Keep updated software inventory recording the changes you made.

C3: Implement management procedures and maintain the functioning of the system within specified parameters, according to given technical specifications and user needs.

CE3.1 identify the administrative tools available in the system, detailing its features and applications, to perform management procedures.

CE3.2 explain the types of physical media for the storage of information detailing the tasks for the maintenance of its data structures.

CE3.3 describe the types of computer systems management tasks detailing its features, execution modes and available for automatic execution mechanisms taking into account technical specifications.

CE3.4 quote techniques of maintenance of the configuration of the base and software application that is needed to maintain the operation of the system.

CE3.5 perform management tasks for the maintenance of the components of the system, according to given specifications:-select the administrative tool.

-Interpret the associated technical documentation, even if it is published in the foreign language most often used in the sector using the help.

-Applying procedures for the maintenance of information stands.

-Applying procedures for the maintenance of the software base and application settings.

-Configure and verify the operation of the devices installed from the application software.

-Run and check the programming of the automatic administrative tasks.

-Run programs and administrative scripts according to the indications of the administrator.

-Document all procedures detailing the incident detected.

-Keep updated software inventory recording the changes you made.

Contents 1. The Software on the computer system.

-Definition of "Software".

-Classification of the software.

-According to the purpose.

-According to the functions, - according to the mode of execution.

-System software and user software.

-Functions and features.

-User interfaces.

-Interface definitions.

-Characteristics of an interface.

-Types of interfaces.

-Elements of configuring software components.

2. procedures for the installation of software components.

-Software of management and maintenance of assets.

-Basic functions of a software of management and maintenance of assets.

-User management.

-Inventory of Hardware and Software.

-Notices.

-Measurement applications.

-Management of licenses.

-Software distribution.

-Other functions.

-Requirements for a system management and maintenance of assets.

-Components and system requirements.

-Installation of components: parameters and configuration.

-Database server.

-Client. Remote deployment tools.

-The console of the system.

-The Server Gateway.

-The customer Gateway.

-Installation and configuration of the database.

-Implementation of specific settings to clients, groups and/or departments.

-User management.

3. the inventory of software.

-Records and databases of the software installed.

-Inventory software tools.

-Functions Basic.

-Inventory Software.

-Obtaining of installed applications.

-Perform queries to the database.

-Generation of reports.

-Administration of licenses.

-Other operations.

4. procedures for the installation of components software.

-Software licenses.

-Definitions.

-Types of license: ownership, use and distribution of the software.

-Most important non-proprietary software licenses: GPL, BSD, MPL, EUPL.

-Rights of author and current regulations.

-Installation and testing of application software components.

-Identification of the requirements of the system.

-The manufacturer's documentation.

-Parameters and configuration of the system in the installation process.

-The installation process.

-Scheduled and remote facilities.

-Configuration of applications for access to peripherals.

-Realization of tests.

-Records and databases of the software installed.

-Tools for software distribution.

-Obtain information from the software distribution.

-Perform queries to the database.

-Generation of reports.

-Management of packages software.

-Creation and distribution of packages.

-Programming of the deployment.

-Publication of packages.

-Facilities not automated.


-Creation of installers and files of command.

-Other functions.

5. software maintenance procedures.

-Types of software maintenance.

-Corrective.

-Evolutionary.

-Objectives of a maintenance plan.

-Management of the maintenance procedures.

-Change control.

-Management of change requests and responsible for them.

-Application software update process.

-Similarities with the process of installation.

-Verification of update requirements.

-The process of uninstalling the unused software.

-Software update process.

-Restoration of the prior to the update software.

-Realization of tests.

-Maintenance of the database.

-Elimination of data, computers, and users.

-Elimination of programs and applications.

-Export and import of data.

-Backup.

6. management procedures.

-Basic concepts on the administration of network systems.

-The network operating system.

-Tasks basic of management.

-Environments of system, profiles and properties.

-Management of applications and processes.

-Drivers and devices hardware.

-Management of processes, services and events.

-Automate tasks administrative, directive and procedures.

-Types of tasks administrative more common, features and modes of execution.

-Tools administrative.

-Maintenance of the system of files and stands of information.

-Types of stands physical for the storage of information.

-Maintenance of means of storage removable.

-Defragmentation of disks.

-Compression of drives, folders and files.

-Release of disk space.

-Preparation of copies of safety and recovery of data.

-Maintenance of the configuration of the software of base and of application.

-Administration of printers of network and services of printing.

-Installation and configuration of printers local and of network.

-Management of the works.

-Execution of tasks administrative automatic.

-Wizards and utilities in line of command.

-Administration of tasks scheduled.

-Task scheduling.

-Execution of programs and scripts administrative.

-Types of command files.

-Content of the files of command.

-Allocation of files of commands.

-Tools of management remote.

UNIT training 2 name: monitoring and management of incidents of the SOFTWARE.

Code: UF1352 duration: 60 hours reference of competition: this unit training is corresponds with the RP3.

Capabilities and criteria of evaluation C1: identify them parameters of performance of the software base and of application using technical and tools specific of monitoring and measure for verify the quality and functionality of the services provided by the system computer.

CE1.1 explain them fundamentals of the measure of the performance of software detailing the technical used for the evaluation of the functionality of the system.

CE1.2 identify the parameters of configuration and performance of those elements of the software base and of application, to monitor the system.

CE1.3 describe them tools of measurement of the performance of the software, classifying them metric available in each case, taking in has them specifications technical partner.

CE1.4 explain the techniques of monitoring and measurement carried out by tools, to improve the performance of the base software and application, taking into account the associated technical specifications.

CE1.5 procedures of verification and detection of anomalies in the records of events and alarms from performance in the software, to your notification to the administrator of the system, according to given specifications.

CE1.6 the measurement of the performance of the software base and application to detect anomalous situations, according to given specifications:-select the measurement according to the indications of the Administrator tool.

-Run custom procedures using the selected tool.

-Review the results to verify that the measurements are within the normal parameters, acting according to indications received.

-Documenting the work done.

C2: Identify the incidences and alarms detected in the logical subsystem to perform corrective actions according to a given specification.

CE2.1 classify incidents and performance and access alarms produced in the system software elements to detect malfunctions in software.

CE2.2 classify diagnostic tools to be used to isolate the cause that produces the alert or incident, taking into account the given incident resolution procedures.

CE2.3 specified procedures of response to address incidents detected in the operation of the software base and application, following the instructions.

CE2.4 apply corrective actions to resolve the malfunction of the software base and application according to given specifications:-identify the incidents detected in the operation of the base software or application.

-Use in the event of malfunction of software diagnostic tools.

-Execute response procedures before produced incidents.

-Use local or remote system management tools to solve the problem.

-Documenting the work detailing situations of impact produced.

-Keep updated software inventory by recording incidents and changes made.

Contents 1. Techniques of monitoring and measurement of the performance of software elements.

-Basic concepts on the performance metrics and evaluation.

-Performance of the software components and configuration settings.

-Parameters of configuration and performance of the software base.

-Parameters of configuration and performance of the application software.

-Monitoring of the software tools.

-Measurement of the performance of the software tools.

-System Monitor.

-Basic concepts.

-The interface of the monitor.

-The configuration of the monitor.

-Logs and performance alerts.

-Monitoring utilities performance from the command line.

-Performance measurement procedure.

-The performance monitoring configuration.

-Method and frequency of supervision.

-Components and aspects of supervision.

-Registration of the performance data.

-Selection of appropriate monitoring counters.

-Description of typical performance problems.

-Optimization, test equipment and troubleshooting strategies.

-Supervision of the use of the memory.

-Supervision of the activity of the processor.

-Supervision of the activity of the disk.

-Monitoring the activity of the network.

-Supervision of the services available in the operating system.

-Remote maintenance: tools and configuration.

2. the operations management platform.

-Operations management platform security concepts.

-Terminology.

-Profiles, description and scope.

-The basic components of an operations management platform.

-The operations console.

-Description of the operations console.

-Features and functions.

-Access to the console.

-Description of the modules of the management packs.

-Monitors.

-The rules for obtaining data and their types.

-Incidents and alarms - identification of incidences and alarms.

-Classification of the severity.

-Resolution of incidences and alarms through the execution of tasks.

-Configuration of notifications.

-Creation of reports.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 1 UF1351 - UF1352 60 40 sequence: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 4 name: maintenance of security in computer systems.

Code: MF0959_2 professional skill level: 2 associated with the competition unit: UC0959_2: maintain the security of the physical and logical subsystems in computer systems.

Duration: 120 hours training unit 1 name: monitoring of access to the information system.

Code: UF1353 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and criteria of evaluation C1: identify the types of access to the computer system as well as the same security mechanisms describing their main characteristics and commonly associated tools to ensure the use of the resources of the system.


CE1.1 describe the system of access control mechanisms detailing the Organization of users and groups to ensure the security of information and functionalities supported by computer, according to the technical specifications.

CE1.2 explain the systems procedures to set permissions and user rights, detailing your organization and associated administrative tools to organize security policies, according to the procedures established in the base software.

CE1.3 common security mechanisms can be classified into systems by detailing its objectives, characteristics and associated tools to guarantee the security of information and functionalities supported by the computer.

CE1.4 identify the mechanisms of protection of the system from viruses and malicious programs to ensure your update.

CE1.5 identify the security mechanisms of the system to maintain the protection of the same, according to specified procedures of operation:-identify the users and groups defined on the system running the administrative tools listed in the given procedures.

-Locate, for each user, the access permissions and associated security policies, operating with the administrative tools listed in the given procedures.

-Check antivirus applications and protection against malicious are updated.

-Check the registration of users and groups in the inventory, registering the detected changes.

C2: Interpret the traces of access monitoring and system uptime by identifying anomalous situations, according to a given specification.

CE2.1 list the mechanisms of the system of traces of access and activity for monitoring detailing their sphere of action, main features and associated tools.

CE2.2 describe incidents produced in the access user and system activity, classifying them by security levels to detect anomalous situations in these processes.

CE2.3 identify them tools to extract them files of traces of connection of users and them files of activity of the system to facilitate its consultation and manipulation, according to their specifications technical.

CE2.4 interpret the content of files of trace of connection of users and the files of activity of the system to locate access and activities not press following the procedure indicated by the administrator.

CE2.5 in practical cases, where it boasts users connection trace files and files of system activity, perform the analysis and evaluation of them to detect possible access and activities undesirable, according to given specifications:-identify the characteristics of a recordset of users following the indications of the administrator.

-Locate a record of a user given and explain their characteristics.

-Extract and register them situations anomalous relating to a user according to the indications of the administrator.

-Document the actions carried out.

CE2.6 distinguish the tools used for diagnosis and detection of incidents both in local application such as remote management, solution or scaled them, according to a given specification.

Contents 1. Management of information security - the security objective.

-Computer security-related terms.

-Safety management processes.

-The safety management objectives.

-Benefits and difficulties.

-Security policy. The organic law of protection of data of a personal nature.

-Risk analysis.

-Identification of resources.

-Identification of vulnerabilities and threats: attacking external and internal.

-Protective measures.

-Security plan.

-Interaction with other processes of information technologies.

-Physical security and it security.

2. logical security system - access to the system and application software.

-User concept, features, group user, permissions (ACLs) access control list.

-The users security policies.

-User authentication:-definition and basic concepts.

-Weak and strong authentication systems.

-Biometric authentication systems and other systems.

-Local access, remote and Single Sing-On.

-Tools for the management of users.

-The directory service: basic concepts, protocols and implementations.

-Directory: LDAP, X 500, Active Directory.

-Management tools for users and computers.

-Basic administration of the directory service.

-Confidentiality and availability of information on the position of the end user.

-Files and access control systems.

-Permissions and rights on the files.

-Safety at the user.

-Type of malicious software.

-Detection of viruses and malicious software.

-Antivirus, antispyware, firewall, filters spam, etc.

-Disinfection of affected data and recovery techniques.

-Remote incident management tools.

3 procedures of monitoring of the access and the activity of the system - objectives of the monitoring and the management of security incidents.

-Trace monitoring procedures.

-Identification and characterization of monitorizables or auditable aspects.

-Classification of events and incidents: System, security, application - trace monitoring mechanisms: logs of the system, monitoring of user consoles - the traces record information.

-Techniques and monitoring tools.

-Techniques: correlation of logs, events.

-Monitoring tools.

-Tools of the operating system.

-Systems based on computer (HIDS).

-Systems based on network (NIDS).

-Prevention of intrusion (IPS) systems.

-Monitoring reports.

-Collection of information.

-Analysis and event correlation.

-Verification of the intrusion.

-Alarms and corrective actions - incident management agencies:-national. IRIS-CERT, esCERT.

-International. CERT, FIRST.

TRAINING unit 2 name: backup and restore information.

Code: UF1354 duration: 30 hours reference of competition: this training unit corresponds with the RP3 RP4.

Capabilities and C1 evaluation criteria: implementing backup and restoration procedures, verify its realization and handling storage media to ensure the integrity of the information in the computer system, according to a given specification.

CE1.1 classify the various means of storage and security of data in the computer system for use in the process of copy according to established specifications.

CE1.2 explain the procedures and tools for the realization of backup and storage of data in the computer system to ensure the integrity of the information in the system.

CE1.3 explain the procedures and tools for restoration of data in a computer system for the retrieval of information from the system, according to the given specifications.

CE1.4 explain them procedures and tools for the verification of the copy of security and of the restoration of data to ensure the reliability of the process according to them specifications given.

CE1.5 in a system of storage of data with several devices, perform copies of security to ensure the integrity of data, given ones procedures to follow:-select the device of storage and tool to perform the copy.

-Perform the backup according to the periodicity and the specified procedure or indication of the administrator.

-Check the completion of the backup.

-Label made copy and proceed to your storage according to environmental conditions, location and safety specified.

-Check and register the detected incidences.

-Document the processes carried out.

CE1.6 carry out the restoration of backups to retrieve stored information, given some procedures to follow:-select the tool to perform the restoration according to the type and support of backup made.

-Carry out the process of restoration according to the indications received.

-Verify the restoration process by checking the destination of the same.

-Check and register the detected incidences.

-Document the processes carried out.

C2: Describe the environmental conditions and safety for the operation of the equipment and physical devices that guarantee the given operating parameters.

CE2.1 describe the environmental factors that influence the location and conditioning of spaces of physical devices, expendable material and media to complete the installation requirements of the devices, according to the technical specifications of the same.

CE2.2 identify safety and ergonomics factors to be considered in the location of equipment and physical devices to ensure the conditions of implantation of the devices, according to the technical specifications of the same.

CE2.3 check the environmental conditions to ensure the status of equipment and physical devices, according to the specified rules:


-Check that the location of the physical devices, expendable material and media meet standards and technical specifications.

-Check the registration of location of devices physical and material fungible in the inventory, recording them changes detected.

-Identify the conditions of security and environmental appropriate and not appropriate.

-Propose corrective actions to ensure the safety and environmental requirements.

Contents 1. Copies of security-types of copies of security (full, incremental, differential).

-Architecture of the service of copies of backup.

-Means of storage for copies of security.

-Tools to carry out backup copies.

-Basic functions.

-Configuration of backup and restoration options.

-Realization of backup copies.

-Restoration of backups and verification of the integrity of the information.

-Realization of backup and restoration on remote systems.

2. physical environment of a computer system.

-Computers and the environment: adequacy of the physical space.

-Location and preparation of spaces of physical devices.

-Factors environmental.

-Safety and ergonomic factors.

-Location and conditioning of consumables and media.

-External agents and their influence on the system.

-Negative effects on the system.

-Creation of the right environment.

-Environmental conditions: humidity temperature.

-Industrial factors: dust, smoke, interference, noise, and vibration.

-Human factors: functionality, ergonomics and quality of installation.

-Other factors.

-Risk factors.

-Electrical safety concepts.

-Electrical installation requirements.

-Electrical and electromagnetic disturbances.

-Static electricity.

-Other risk factors.

-Measuring devices.

-Corrective actions to ensure safety requirements and environmental.

-The center of data (CPD).

-Requirements and location of a data center.

-Conditions of the external environment.

-Factors that affect the physical security of a CPD.

-Conditioning.

-Physical security systems.

-Emergency and evacuation plan.

3 regulations and standards - ANSI/TIA-942-2005 standard.

-Measures of safety in the treatment of data of character personal (RD 1720 / 2007).

-The safety guide.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 1 UF1353 - UF1354 30 20 sequence: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULES OF PROFESSIONAL PRACTICES OF OPERATION OF COMPUTER SYSTEMS.

Code: MP0286 duration: 40 hours capacity and C1 evaluation criteria: install and configure the basic software in accordance with protocols and procedures established in the company.

CE1.1 identify the phases involved in the installation of operating system by checking the computer requirements.

CE1.2 perform the installation, configuration and update the operating system, as well as programs of utilities, in accordance with each received specifications and the needs of the client.

CE1.3 verify the operation of the computer after installation.

CE1.4 use the applications that provide the operating systems for the operation of the same.

CE1.5 documenting the work performed in accordance with the procedures of the company.

C2: Maintain and regulate the business computer system, as well as the safety of the subsystems, in accordance with established procedures and depending on the administrator of the system or person delegated.

CE2.1 perform tasks of checking and verification of the connections of the physical components of the system, as well as the own equipment, proceed to their replacement or upgrade, in accordance with the procedures of the company or the system administrator.

CE2.2 replace consumable items at the request of users or when an alarm, in accordance with the procedures established in the company, so thus by then verifying the operation of the equipment.

CE2.3 assist in the monitoring of the performance of the subsystem, physical and logical, running the measurement programs, under the supervision of the system administrator, informing him of the results and working, when necessary, corrective measures.

CE2.4 make or review the inventory of the system, in accordance with the rules of the Organization, noting the incidents detected for later use, in accordance with established procedures.

CE2.5 perform diagnostic processes on the client computers, as well as, install and update user applications in accordance with the indications of the administrator of the system and the business procedures.

CE2.6 collaborate on the base and application software management tasks at the suggestion of the system administrator CE2.7 assist in the verification of the security mechanisms established by the company, as well as access to the system, as well as, perform backups, established procedures, or by indication of the system administrator.

CE2.8 documenting the work performed in accordance with the requirements and business processes.

C3: Participate in the process of work of the company, following the rules and instructions set forth in the work center.

CE3.1 behave responsibly both in human relations and works to be carried out.

CE3.2 respect the procedures and rules of the workplace.

CE3.3 undertaken with diligence the tasks according to the instructions received trying to it adapt to the pace of work of the company.

CE3.4 integrated into the production processes of the work center.

CE3.5 use established communication channels.

CE3.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Installation, configuration and maintenance of systems with according to the procedures of the company.

-Installation and configuration of the basic software.

-Participation in the installation and configuration of local area networks.

-Collaboration in the installation, configuration, maintenance and user assistance of software packages in accordance with corporate procedures.

2. maintenance and security policies of the business computer system.

-Architecture of the computer system of the company.

-Computer systems operator functions.

-The system inventory and corporate applications.

-Monitoring platforms and software management and maintenance of enterprise IT assets.

-Operating procedures for the maintenance of the physical subsystem.

-Logical organization maintenance procedures.

-The Organization's security policies.

-Backup and restore procedures.

3. integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.

-Interpretation and execution with diligence the instructions received.

-Recognition of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. the trainers training modules required accreditation requirements * professional experience required in the field of competition with no accreditation MF0219_2 Accreditation Unit: installation and configuration of operating systems.





● Bachelor, engineer, architect or the title of the corresponding level or other equivalent securities ● Diplomado, technical engineer, technical architect or the title of the corresponding level or other equivalent securities ● technician in the family of information technology and communications ● certificate of professionalism of level 3 Professional computing and communications family, systems and telematics 1 year 3 years MF0957_2 : Maintenance of the physical subsystem in computer systems.





● Bachelor, engineer, architect or the title of the corresponding level or other equivalent securities ● Diplomado, technical engineer, technical architect or the title of the corresponding level or other equivalent securities ● technician in the family of information technology and communications ● certificate of professionalism of level 3 Professional computing and communications family, systems and telematics 2 years 4 years







MF0958_2: maintenance of the subsystem logic in systems software.





● Degree, engineer, architect or the title of grade corresponding u others titles equivalent ● diploma, engineer technical, architect technical or the title of grade corresponding u others titles equivalent ● technical upper in the family of computer and communications ● certificate of professionalism of level 3 of the family professional of computer and communications, area of systems and telematics 2 years 4 years MF0959_2 : Maintenance of security in computer systems.





● Bachelor, engineer, architect or the title of the corresponding level or other equivalent securities ● Diplomado, technical engineer, technical architect or the title of the corresponding level or other equivalent securities ● technician in the family of information technology and communications ● certificate of professionalism of level 3 Professional computing and communications family, systems and telematics 2 years 4 years * in the last five , except MF0219_2 which will be in three years.

V. requirements minimum of spaces, facilities and equipment space training surface m² 15 students surface m² 25 students 60 75 computer room space training M1 M2 M3 M4 classroom of computer X X X X space training equipment Aula de Informática - PCs installed in network and Internet connection.

-Cabinet with panels of patched, and connecting to network devices.

-Base and network software.

-Antivirus and security software.

-Software for backup and recovery.

-Software of management and maintenance of it assets: automatic inventory software applications, license management, distribution of the software, etc.

-Software for monitoring.

-Diagnostic software.

-Management tools.

-File compression software.

-Disks and boot managers.

-Diagnostic software.

-Software for connectivity testing.

-Remote management tools.

-office software.

-Disk or tape storage subsystem.

-Dot matrix printers, laser and ink jet.

-Assembly and measurement equipment: tools for Assembly and disassembly, tension meters, tools for the manufacture of wiring.

-Canon of projection.

-Flip chart.

-Slate.

-Classroom material.

-Table and Chair for the trainer.

-Tables and chairs for students.

-Auxiliary furniture for classroom equipment.

* Equipment and corresponding software must be updated.





Not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex III I. identification of the certificate of professional designation: operation of departmental networks.

Code: IFCT0110 professional family: information technology and communications.

Professional area: Systems and telematics.

Level of professional qualification: 2 professional qualification of reference: IFC299_2 operation of departmental networks (Royal Decree 1201 / 2007 of 14 September).

Relationship of competition units comprising professionalism certificate: UC0220_2: install, configure, and verify the elements of the local network according to established procedures.

UC0955_2: Monitor processes of local network communications.

UC0956_2: perform the processes of connection between network private and networks public.

General competence: perform procedures that ensure the connectivity offered by a departmental network, as well as access to the resources of the same, through the configuration and monitoring of the elements of connection, the installation software network, the operations of maintenance, the resolution of problems or incidents detected, according to established specifications.

Professional environment: Professional: develops his professional activity for employed persons, companies or entities public or deprived of any size, fitted with intranet, extranet, or Internet network infrastructure in the area of systems and telematics in the Department of computer science, or networks and communications.

Productive sectors: is located mostly in the service sector, and mainly in the following types of companies: public bodies and companies which by its size and organization need to have departmental networks; companies engaged in the installation and maintenance of computer networks.

Occupations and relevant jobs: 3812.1023 technical systems with.

Local network operator.

Telematic network operations technician.

Associated training duration: 530 hours ratio of training modules and training units.

MF0220_2: (Transverse) implementation of elements of the local network. (160 hours) ● UF0854: installation and configuration of the nodes of a local area network. (90 hours) ● UF0855: verification and troubleshooting in a local area network. (70 hours)

MF0955_2: Monitoring of the local network. (180 hours) ● UF1344: monitoring of the local area network and installation of components. (90 hours) ● UF1345: maintenance of the network of local area and update of components. (50 hours) ● UF1346: safety in the local area network management. (40 hours)

MF0956_2: Interconnection of private networks and public networks. (150 hours) ● UF1347: installation and configuration of the nodes of internetwork private public (90 hours) ● UF1348: monitoring and troubleshooting in the interconnection of public networks (60 hours) private networks.

MP0285: Module not working professional practice of operation of departmental networks (40 hours).

II. professional profile of the certificate of professional competition 1 denomination unit: install, configure and verify the elements of the network LOCAL according to procedures established.

Level: 2 code: UC0220_2 realizations professionals and criteria of performance MOP1: install and configure nodes in the local network and software to implement internal communications services, according to established procedures.

CR1.1 the physical network map is interpreted to identify the elements that make up the local network, according to the specifications received.

CR1.2 the computers on the network modules are installed, so that they can offer connectivity characteristics according to the indicated physical configuration and following established procedures.

CR1.3 the active elements of the network (routers and switches) are logically configured to implement services using software according to the specifications received tools and techniques.

CR1.4 the programs of management protocols and services are installed and configured, to implement internal communications services according to the manufacturers specifications and applying established procedures.

CR1.5 the nodes of the network software is installed and configured to provide connectivity between these nodes according to the specifications received.

CR1.6 installation and configuration of devices in the local network, processes are documented for your registration using the formats indicated by the organization according to the established procedure.

CR1.7 the specific technical documentation associated with the software and devices, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Verify operation and the operating parameters of the hubs and other network interconnection devices, to ensure the service provided according to established procedures.

CR2.1 the operation of local network interconnection devices is checked, to verify the operation of the network using the tools hardware and software specific, according to established procedures.

CR2.2 interconnection devices status is checked, to verify that they are active and are accessible by accessing them through the tools of management network, according to established procedures.


CR2.3 permitted and prohibited connection options are checked for safety in services, using specific tools according to the specifications received.

CR2.4 the access to the resources of the network is checks to ensure the service, following them procedures established for verify that is enter to them resources allowed.

CR2.5 interconnection devices configuration is verified locally and remotely, to ensure their functionality according to established procedures.

RP3: Configure the protocols for integration of devices the network, according to the indications of the administrator and operating specifications of the organization.

CR3.1 values for the configurable parameters of the communication protocols are set, to integrate each node of the network according to established procedures and following addressing and the Organization's security policies.

CR3.2 the protocols associated with the installed network applications are configured on servers, to support services implemented in accordance with installation manuals and specifications received.

CR3.3 routers and switches are configured, so manage protocols and services as per specifications received and pre-defined working procedures.

CR3.4 encryption software is installed and configured on the nodes of the network to be determined, according to established procedures and received specifications for virtual private networking.

CR3.5 functional tests of the configuration of communications devices, are made to ensure the conformity of the same with respect to the requirements set out in the operational specification of the organization.

CR3.6 the protocol configuration is documented for your registration using the formats indicated by the organization according to the established procedure.

RP4: Manage the issues detected in the network devices to correct them or report them, according to established protocols and the predefined procedures.

CR4.1 incident reporting systems are observed, to address possible according to the operating procedures and the Organization's security alarms.

CR4.2 the location of the element in which the incidence, have been held by interpreting the information received and the technical documentation, to isolate the problem hardware and software, according to the technical documentation and the protocols of the organization before contingencies.

CR4.3 symptoms reported by users or by incident management systems, are verified for diagnosis of the problem according to the technical documentation.

CR4.4 the incidence detected and isolated is diagnosed and is raises its solution, to rehabilitate them services interrupted or damaged, according to the normative of quality and them plans of contingency.

CR4.5 the incidence that not is has got isolate is reported to the level of responsibility top for your management according to them protocols and procedures of performance before contingencies of the organization.

CR4.6 repair of incidence is done with the right tools and respecting safety standards established by the organization.

CR4.7 the documentation of the detection, diagnosis and solution of the incidence is makes for perform the registration of the same according to them protocols of it organization.

CR4.8 the information of the State of the incidence is transmits to the user end for complete the process of your management according to the normative of the organization.

Context professional means of production analyzers of network. Certification of wiring. Hand tools for electrical and mechanical works. Software for testing connectivity tools. Software tools for control of inventory of network elements. Computers, printers, and peripherals. Systems operating. Hubs, switches and routers. Network cards. Cables and connectors. Software for network clients. Network management software. Proprietary software of network devices. Tools office. Map of the network.

Products and results connected to the lines of data communications equipment. Local network installed and configured according to specifications. Inventory and descriptive record of the physical devices of communication network and its configuration.

Information used or generated map of the network. Inventory of the hardware of the organization. Work orders. Network documentation. Manual installation of the devices. Manual configuration of devices. Operating specifications of the organization. Quality manual. Standards and quality criteria for the organization. Security plan. Maintenance plan. Environmental regulations. Rules of safety and hygiene at work. Reliable and up-to-date network documentation.



Unit of competition 2 name: monitor the processes of communications of the network LOCAL.

Level: 2 code: UC0955_2 realizations professionals and criteria of performance MOP1: carrying out of monitoring of the local network and verification of the parameters of communications within the functional limits, to ensure the absence of congestion of network traffic, according to procedures of the network management and control of quality of service of the organization.

CR1.1 remote monitoring probes are installed and configured in the indicated points of the network, provide information to a platform of centralized management, according to established procedures.

CR1.2 network software agents are installed on nodes to manage, provide information to a platform of centralized management, according to established procedures.

CR1.3 activity of these services log files are collected, in order to maintain storage and resources management in conditions of process, according to the specifications of the organization.

CR1.4 network management tool and selection of alarms and alerts filters, interface are configured to optimize the processes of reporting and management of incidents, according to the security procedures set out in the organization.

Rp2: Implement periodic and preventive devices on the local network maintenance processes, in order to ensure the communications services within the parameters set out in the communication of the Organization requirements.

CR2.1 the network map is updated by launching computer discovery task from the management platform, to provide a real picture of the network, according to the specifications received.

CR2.2 network devices, both active and passive, are checked for possible damage or alterations according to established procedures.

CR2.3 detected deficiencies, located through inspection processes, is overcome by putting in place appropriate measures for its solution according to established procedures and standards of quality and service of the organization.

CR2.4 causes of the abnormal behavior of the network devices are identified, to proceed with its solution by applying the established diagnostic methodology, using the tools provided hardware and software and consulting the technical documentation according to established procedures.

CR2.5 established tests have been conducted using suitable tools, to verify that the security and configuration of the network are those of agreement to the policies and standards.

CR2.6 the test results are collected and documented for your registration using the formats indicated by the organization according to the established procedure.

RP3: Update the components of hardware and software for local network communications devices, to adapt its functionality to the changes in technologies according to plans of the organization.

CR3.1 communications equipment software updates to accommodate new features, as per specifications received and according to the established procedure.

CR3.2 communications equipment settings are modified to change the functionality, or adapted to new introduced equipments, following the procedures established by the plans of the organization.

CR3.3 the actions carried out on devices are documented, to facilitate its follow-up using the formats indicated by the Organization, according to the established procedure.

RP4: Applied concerning physical and logical security procedures to local network communications devices, to ensure access to services to authorized according to the Organization's security regulations.

CR4.1 notifications of security alerts are addressed, to detect the occurrence of incidents of security according to the specifications received.

CR4.2 communications devices are reviewed, to ensure that its physical and logical access is controlled according to the given specifications of security.

CR4.3 audit of communications devices files are collected, to detect possible undue access following safety procedures.

CR4.4 "Network analysis" or any of its sections is performed periodically or incidents, to observe the network traffic using specialized, according to established procedures of safety equipment and tools.


CR4.5 carried out actions are documented, to facilitate its follow-up, using the formats indicated by the Organization, according to the established procedure.

Context professional means of production analyzers of network (sniffers). Certification of wiring. Hand tools for electrical and mechanical works. Software for testing connectivity tools. Network inventory software tools. Computers, printers, and peripherals. Operating systems. Hubs, switches and routers. Network cards. Cables and connectors. Software for network clients. Network management software. Network monitoring software. Probes for monitoring remote (RMON). Software owners of those devices from network. Office Tools. Tools of audit. Map of the network.

Products and results network local installed and configured according to specifications. Monitored local network. Updated the network map. Up-to-date inventory and descriptive record of the physical devices of communication network and its configuration.

Information used or generated map of the network. Inventory hardware and network configuration. Work orders. Network documentation. Manual installation of the devices. Manual configuration of devices. Operating specifications of the organization. Quality manual. Maintenance plan. Security plan. Regulations environmental and safety and health at work. Reliable and up-to-date network documentation.

Competition 3 denomination unit: make the processes of connection between network private and networks public.

Level: 2 code: UC0956_2 realizations professionals and criteria of performance MOP1: install the nodes of interconnection of public and private networks to enable communication between the two, according to instructions of the organization.

CR1.1 the requirements of device implantation, as well as the lines of communications with their corresponding interfaces, are tested to ensure compliance with the conditions of compatibility according to the technical documentation of the same.

CR1.2 the interfaces and adaptation of lines of communication modules are installed and verify, to proceed with their rear connection according to the requirements of the communications device implantation.

CR1.3 device is installed and parameters for electrical power, mechanical fastening and others, are checked to ensure the provision of the service of communications, according to the specifications received.

CR1.4 between the lines of communications and device connections are made, to ensure communication between the public and private network according to the technical specifications and instructions listed in the work order.

CR1.5 the installation work is documented, to solve the technical and administrative needs of the organization according to specified protocols.

CR1.6 the specific technical documentation associated with devices, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Configure the communication protocols in the interconnection of network devices to ensure connectivity between the public and private network according to specifications of the organization.

CR2.1 active communications equipment configuration creates and modifies to allow coexistence and/or interconnection of virtual local networks over public networks.

CR2.2 physical and logical configuration of routers for connection with external networks is checked, using the right tools to find out if they are prepared for the connection or lack them some component hardware or software, according to established procedures.

CR2.3 external interfaces of the routers are configured, to provide connectivity with the outside according to the indications of the communications company.

CR2.4 interconnection devices are verified through testing services, to ensure their functionality, according to the quality criteria and the communications of the organization plan.

CR2.5 the tasks performed are documented for the needs of registration, according to the protocols of the organization.

RP3: Keep interconnection of network devices to ensure the continuity of the service, according to the plan of communications of the organization.

CR3.1 communications services are checked periodically to ensure its continuity and its performance, using management tools for network technical specifications and criteria of the organization.

CR3.2 alerts and alarms systems are periodically checked to ensure the provision of communications services, according to the plan of communications of the organization.

CR3.3 connectivity with other networks devices is checked by conducting functional tests, to verify the functionality of the same, according to the procedures established in the operational specification of the organization.

CR3.4 the tasks performed in the interconnect devices are documented, to meet the needs of registration according to the protocols of the organization.

RP4: Meet and manage incidents and alerts in the private network connectivity elements, to keep the connection with the public network according to specifications of the organization.

CR4.1 requests for resolution of incidents and detected alerts are collected or redirected to the center of attention to the user, according to the established procedures, to be aware of them and carry out monitoring, study and analysis.

CR4.2 the symptoms collected in the part of incidents and alerts, are checked by performing initial testing to diagnose and localize the nature of it using the corresponding guide troubleshooting according to the established procedure of action.

CR4.3 diagnosis and localization of the incidence and alert and its resolution, is performed to maintain the connection using the corresponding troubleshooting guide.

CR4.4 solved incidents and alerts served is completed and closes in incident management applications, continue the flow of resolution and are reported to the user according to the established procedures.

CR4.5 end of incidence or alert report is done in the standard format, collecting sufficient information to update the historical incident.

Professional context, means of production active network elements. Wiring analyzers. Network management tools. Control of public lines of communications tools. Sniffers. Hand tools for electrical and mechanical works. Software for testing connectivity tools. Office Tools. Diagnostic tools. Firmware updates. Incident management applications. Map of the private network.

Products and results routers, switches and bridges installed correctly according to specifications. Resolved incidents. Alerts generated by treated and managed network monitoring systems. Interconnection of public networks and private maintained and operating elements.

Information used or generated work orders. Parts of incidents. Troubleshooting guides. Historical reports of incidents. Quality manual. Standards and quality criteria defined by the organization. Technical reports of commissioning.

III. formation of professionalism certificate training module 1 name: implementation of elements of the LOCAL network.

Code: MF0220_2 professional skill level: 2 associated with the competition unit: UC0220_2: install, configure, and verify the elements of the local network according to established procedures, duration: 160 hours training unit 1 name: installation and configuration of the nodes of a network AREA LOCAL.

Code: UF0854 duration: 90 hours referrer of competition: this training unit corresponds to the RP1, RP3.

Capabilities and C1 evaluation criteria: sorting the elements of communications that make up a local network, to identify the components that make up the physical map.

CE1.1 explain a local network topologies, taking into account existing technologies and architectures.

CE1.2 list the elements that can be found on the physical map of a local network depending on the scope and used network infrastructures.

CE1.3 describing each of the members of a local network elements taking into account its characteristics and associated features.

CE1.4 in a practical case of an already installed LAN develop your physical and logical map as per specifications received.

CE1.5 identify the technical and legal regulations affecting the implementation of local networks on the basis of given procedures.

CE1.6 interpret the technical documentation associated with the elements of communication, even if it is published in the foreign language most often used in the sector, using the help.

C2: apply them procedures of installation and configuration of the nodes of the network local, as well as them managers of protocols and others programs that support services of communications.

CE2.1 list and explain the features of the protocols that are configured on a local network taking into account technology and standards used CE2.2 explain the addressing system of the nodes that is used on the local network based on network technologies used.


CE2.3 in a case study of installation and configuration of the nodes in a network to implement internal communications, according to specifications received services:-interpreting technical documentation identifying the elements that make up the installation.

-Identify different intakes of network nodes and their representation in the Cabinet of connections.

-Select the appropriate tools for installation.

-Install network along with their corresponding drivers adapters.

-Install and configure network protocols to be used according to the specifications received.

-Install and configure various network specifications received services.

-Documenting the activities carried out.

CE2.4 apply the configuration specified to them elements active (switches and routers), making use of some procedures specified CE2.5 identify the normative legal and technical that affects to it implementation of them networks local depending on some specifications given.

C3: set the configuration of them parameters of them protocols of communications in them nodes of the network, for its integration in it own network, following some procedures given.

CE3.1 identify parameters to configure communication protocols, its function and its permitted range of values.

CE3.2 interpret them specifications of a configuration of protocols of communications determined, taking in has them needs of integration of the node in the network and the implementation of the services corresponding.

CE3.3 list the procedure to follow to apply a configuration default to a node's network.

CE3.4 configure the different protocols of communications according to some specifications techniques given.

CE3.5 identify the configuration parameters of the protocols with the security features of transmission and encryption, for integration into secure networks taking into account the criteria of security given.

CE3.6 document processes to make configuration of the protocols in the nodes of the local network according to a given specification.

Contents 1. Local area network architecture.

-Classification of networks on the basis of the territory covering.

-Characteristics of a local network.

-Local area network architecture.

-Basic topologies.

-Physical and logical topology.

-Method of access to the cable.

-Protocols of communications.

-Most widely used local area networks architectures.

-Regulations.

-Standardization committees.

-Standards for local area networks.

-Common telecommunications infrastructures.

2. elements of a local area network.

-Features and functions - workstations.

-Servers.

-Network cards.

-Connectivity equipment.

-Repeaters.

-Concentrators (Hubs).

-Switches (Switches).

-Routers (Routers).

-Gateways (gateway).

-Bridges (Bridges).

-Wireless devices.

-Network operating system.

-Streaming media.

-Copper media: cable's coaxial and twisted.

-Optics: Fiber Optic Cables.

-Wireless communications.

-Structured cabling.

-Subsystems wiring structured.

-Standard TIA/EIA structured cabling envelope.

-Standards of Cable UTP / STP.

-The physical and logical map of a local area network.

3. local area network protocols.

-Introduction to the protocols.

-Model of interconnection of systems open (OSI).

-The level physical.

-Protocols of the level of link.

-Protocol of control of link logical (LLC).

-Protocol of control of access to the medium (MAC).

-Protocols of strife.

-Protocols for way of witness.

-Others.

-Ethernet.

-Introduction to Ethernet.

-Ethernet and the OSI model.

-Addressing MAC.

-Weft Ethernet.

-Technologies Ethernet.

-Other link layer protocols: Token Ring, FDDI, etc.

-Network layer protocols.

-Internet Protocol (IP).

-Introduction to IP - IP address.

-Assignment of addresses.

-Routing - other network layer protocols (IPX, etc)-physical and logical addresses.

4. installation and configuration of the nodes in the local area network.

-The communications closet.

-Elements of the communications closet.

-Representation in the closet of the captures of network nodes.

-Installation of network adapters and drivers.

-Installation and configuration of common network protocols.

-Characteristic parameters.

-Configuration of the TCP/IP protocol.

-TCP/IP configuration elements.

-IP address.

-Subnet mask.

-Gateway.

-DNS server.

-WINS server.

-NetBIOS configuration.

-Assignment to a working group.

-Correct configuration of other protocols: IPX/SPX, etc.

-Security settings - authentication of identity.

-Data encryption.

-Systematic setup procedures.

-Installation and configuration of network services.

-Network access services.

-File service.

-Printing services.

-Postal service.

-Other services.

-Procedure of application of configurations to routers and switches.

-Terminal emulation applications.

-Configuration of terminal emulation applications.

-Application configurations to routers and switches.

TRAINING unit 2 name: verification and troubleshooting in a LOCAL AREA network.

Code: UF0855 duration: 70 hours referrer of competition: this training unit corresponds to the RP2 and RP4.

Capabilities and C1 evaluation criteria: the procedures for testing and verification of network connectivity elements and tools for these processes.

CE1.1 explain the stages of a process of verification of connectivity in a local network.

CE1.2 list the tools used to verify connectivity in a local network, according to the technologies implemented in local networks.

CE1.3 explain the operation of network management tools to check the status of communications devices, taking into account the technical specifications of the tools.

CE1.4 in a case study of a local network already installed, verify connection settings allowed and forbidden, as well as access to shared resources, following a given procedure.

In a case study of a local network already installed CE1.5: documenting the processes of test and verification made, according to technical specifications.

C2: Attend the incidences of the elements of the local network communications, and proceed to your solution according to given specifications.

CE2.1 describe any incidents that occur in the elements of communications of local networks, depending on the elements involved with them and employed communications technologies.

CE2.2 list the procedures and tools used for the detection of incidents of the elements of communications on the local network, according to a defined contingency plan specifications.

CE2.3 describe the techniques and tools that are used to isolate and diagnose the causes that have produced an incidence data in the network, as indicated in the contingency plan.

CE2.4 explain them procedures systematic of resolution of incidences of them elements of communications of the network local, depending on the devices in which is detected them incidents.

CE2.5 in practical cases, properly characterized, resolve faults simulated within a local network, to proceed with his solution to a received specifications and following a given procedure:-interpret alarms generated by the system's detection of incidents.

-Locate the causal element of the incidence.

-Resolve the incident, pre-established procedures.

-Register the incidence in the appropriate document.

Contents 1. Verification and testing of local area network connectivity elements.

-Verification and test tools.

-Tools of verification and testing of operating systems.

-TCP/IP commands.

-Obtain the IP configuration.

-Realization of connection tests.

-Interpretation of answers.

-Systematic procedures of verification and proof of local network connectivity elements.

2. types of incidents that may occur on a local area network.

-Incidents at the level of connectivity of the link.

-Incidents at network level.

3. detection and diagnosis of incidents in local area networks.

-Diagnostic tools of communication in local network devices.

-Incident in local networks management processes.

4. checking of coaxial and twisted-pair cables.

-Checking of wiring tools categories.

-Analyzers or cable testers.

-Features.

-Procedure of checking of twisted pair cables.

-Open circuit.

-Short.

-Cross threads.

-Cross pairs.

-Split pair.

-Detection of telephone voltages.

-Bypass bridge.

-Detection of Ethernet ports.

-Coaxial cables checking procedure.

-Power-over-Ethernet detection procedure.

-Procedures for locating cables using tones.

5. checking and resolution of incidents at network level.

-Checking tools.


-Detection of related problems:-long and short frames.

-Excessive traffic.

-Netware.

-TCP/IP.

-Configuration of the Host.

-Name resolution.

-NetBIOS.

-Connection to the proxy or http server.

-Connection to the server of post.

-Connection to the server for printing.

-Others.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF0854 - 70 40 sequence UF0855: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULE training 2 name: monitoring of the network LOCAL.

Code: MF0955_2 level of qualification professional: 2 associated to the unit's competition: UC0955_2: monitor the processes of communications of the network local.

Duration: 180 hours unit training 1 name: installation of components and monitoring of the network of AREA LOCAL.

Code: UF1344 duration: 90 hours referrer of competition: this training unit corresponds to the RP1.

Capabilities and C1 evaluation criteria: describe the techniques and procedures of monitoring of the local network according to a given specification.

CE1.1 identify the parameters that identify the performance of a local network taking into account its architecture and technology support network.

CE1.2 list the tools used in a local network monitoring hardware and software taking into account their technical specifications.

CE1.3 explain the functioning of the network management tools for traffic information and performance of communications on the local network, according to technical specifications of own tools.

CE1.4 explain the process to continue to monitor the traffic on a local network topologies and network protocols implemented.

Contents 1. The network management.

-Definition, purpose and evolution.

-Architecture and functioning of a network management system.

-Components of a network management system.

-Organizational. Basic activities.

-Technical.

-Basic procedures: monitoring and control.

-Characteristics of a network management system.

-Functional.

-ISO functional areas of network management.

-Software tools included in network management systems.

2. the network monitoring.

-Types of monitoring information.

-Access to management information.

-Monitoring mechanisms: polling and notifications.

-Performance management.

-Performance indicators.

-Monitoring of performance indicators.

-Main tasks in the management of benefits.

-Installation and configuration of remote monitoring probes.

-Installation of network software agents.

-Management of activity files.

-Configuration of the interface of the tool of management of network and selection of alarms and alerts 3 filters. Management and control in communication protocols.

-Factors that determine the performance of a local network.

-Lines of communications.

-Communications equipment.

-Servers.

-Characteristics of the traffic.

-Failures.

-Other factors.

-Metrics.

-Delay.

-"Throughput" or capacity.

-Length packet / message.

-Number of nodes.

-Load.

-Speed.

-Connectivity.

-Availability.

-Reliability.

-Level of redundancy - measurement tools.

-Features and operation of the main tools used in local area networks: hardware, software and diagnostic and monitoring.

-Management protocols.

-Definition.

-Standards (TMN - "telecommunications Management Network").

-Comparison and characteristics of protocols:-CMIP (Common Management Information Protocol) - SNMP (Simple Network Management Protocol) 4. Analysis procedures of communication in local network protocols.

-Protocol Analyzers.

-Definition, uses and types.

-Analyzers trade protocols and free distribution.

-The user interface.

-Application of filters for traffic capture.

-Capture filter - display filters.

-Analysis of traffic at network level.

-Capture.

-Interpretation.

-Remote monitoring and intrusion detection probes.

-Definition and types.

-Monitoring.

-SNMP - probe RMON - intrusion (IDS) detection probes. Definition.

TRAINING unit 2 name: maintenance of the network LOCAL and updating of components.

Code: UF1345 duration: 50 hours referrer of competition: this training unit corresponds to the RP2 and RP3.

Capabilities and criteria of evaluation C1: identify anomalous behaviors of the devices on your local network, and proceed to your attention and resolution following a given procedure.

CE1.1 identify the alarm notifications which inform about incidents and abnormal behaviours according to preventive maintenance plans dies.

CE1.2 describe the functions and properties of the diagnostic and monitoring tools used to isolate the cause of the incidence according to the specifications of the own tools.

CE1.3 describe the procedures of troubleshooting according to the plan of preventive and periodic maintenance.

CE1.4 describe the corrective actions carried out according to specifications received documentation procedures.

CE1.5 on a local network in which faults simulated in the network devices, to your solution according to given procedures have been characterized: – identify the symptoms of abnormal operation.

-Characterize it according to the effects produced.

-Formulate a hypothesis of the possible cause of the dysfunction.

-Describe the intervention plan to resolve the anomaly.

-Implement the plan described and remedy the malfunction detected.

-Documenting the activities carried out.

C2: Describe and carry out processes for updating the hardware and software of communication devices, to ensure its integrity and reliability.

CE2.1 list updatable components of communications devices, describing their characteristics.

CE2.2 identify the parameters of compatibility of the components to be updated to ensure effectiveness in processes according to technical specifications of these components.

CE2.3 describe the steps to follow for the communications device software update, detailing actions taken at each step and the software tools used.

CE2.4 to perform the replacement of parts of communications devices to achieve a given configuration, following defined procedures.

CE2.5 to upgrade communications device software to achieve a given configuration, following defined procedures.

Contents 1. Configuration management.

-Objective of configuration management.

-Inventory management.

-Tools of self-discovery.

-Combination with CAD tools for cable management.

-Database.

-Management of the topology.

-Incident management: TTS (Trouble Ticket Systems).

-Management of external suppliers.

-Change management.

-Other types of configuration management.

2. management of failures.

-Objective.

-Features.

-Proactive management - preventive tests management. Types of tests.

-Reactive management: management of the lifecycle of the incidence.

-Monitoring and diagnostic tools.

-Common utilities.

-Monitoring systems.

3. procedures of diagnosis in local networks.

-Diagnostic tools, included in the operating system.

-Ping.

-Ipconfig.

-Nbstat.

-Netstat.

-Net.

-Nslookup.

-Netsh.

-Traceroute.

-Etc.

-Specialized diagnostic tools.

-Logic analyzers.

-Wiring analyzers.

-Network management tools.

-General characteristics of a network management system.

-Software tools included in network management systems.

-Tools / most used network management systems.

4. updating of the local area network communications devices.

-The communications closet.

-Communications devices.

-Procedures for updating hardware and software of routers and switches.

-Upgradeable hardware components.

-Update of configurations of routers and switches.

5 tools for graphic design and documentation for networks.

-Types and functions of tools for graphic design and documentation for local networks.

-Need for documentation of the network.

-Problems with the documentation.

-(office) generic tools.

-Specialized tools.

TRAINING unit 3 name: safety in the LOCAL AREA network management.

Code: UF1346 duration: 40 hours referrer of competition: this training unit corresponds with the RP4.



Capabilities and evaluation criteria




C1: Identify collected security alerts using management tools or inspected facilities.

CE1.1 describe the functions of a management tool for network according to the specifications of the tool itself and the architectures and network technologies implemented.

CE1.2 list them alerts of security that can appear in a red local, describing their manifestations.

CE1.3 describe the features of them alerts given of high in tools of management and them limits established, so is displayed in these tools according to specifications technical of the tool.

CE1.4 locate the component and the cause that triggered an alert of safety in a management tool, noting that tool and the affected teams following defined procedures.

CE1.5 describe them types of alarms and its gravity that is can detect with a tool of management, taking in has the information supplied by the tool and some plans of contingencies given.

Contents 1. Management of it security.

-Functions of the management of it security.

-Cycle safety.

-Assets.

-Threats.

-Vulnerabilities and impacts.

-Risk analysis.

-Security costs.

-Security policy.

2. implementation of security services.

-Physical access control.

-Control of access logical.

-Protection of information in transit.

3. management of the security of the local network.

-Local network security factors.

-Local network security procedures.

-Management of risks on the local network.

-Contingency plans.

-Remote monitoring and intrusion detection probes.

-Intrusion (IDS) detection systems.

-Types.

-Detection (passive) / prevention (active).

-Intrusion over the network or servers.

-Intrusion (IDS) detection tools.

-Tools of notification of alerts and alarms in local networks.

-Monitoring consoles.

-Way of notification.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF1344 - UF1345 50 30 formative unit 3 - 40 20 sequence UF1346: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: networking private and public networks.

Code: MF0956_2 professional skill level: 2 associated with the competition unit: UC0956_2 processes of connection between private networks and public networks.

Duration: 150 hours training unit 1 name: installation and configuration of the nodes of interconnection networks private with public.

Code: UF1347 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and criteria of evaluation C1: identify the characteristics of the devices for interconnection of networks, public and private, according to standards of communications technologies.

CE1.1 explain the characteristics of the devices for the interconnection of the private networks to public networks to identify its capabilities according to the technologies and architectures used communications.

CE1.2 list the technologies used in the interconnection of networks, describing its characteristics to identify the characteristics of the integration of technologies of communications on the basis of their technical specifications.

CE1.3 identify connection services, as well as their interrelationship and how to implement them on the computers on the local network for the provision of services of communications, according to the technologies used.

CE1.4 identify services of interconnection that communications service providers support that connects the private network, describing the profiles of the services that are available to assess the adequacy of these services taking into account the functional specifications is expected to address.

C2: apply procedures of installation and verification of the devices of interconnection of networks private and public following some specifications given.

CE2.1 identify the parameters that make up the services of interconnection with the public network according to the technical characteristics of the service itself and interconnection device.

CE2.2 identify, in the standard of quality in force, the requirements pertaining to the interconnection with the public network.

CE2.3 describe the interfaces that are used in the connection of private networks to public networks depending on the type of used nets (connecting devices and lines of communications, among others).

CE2.4 explain the safety regulations applicable to the installation of a device for interconnection of private and public networks, according to the technical characteristics of the devices to be installed and the environmental conditions of the installation itself.

CE2.5 interpret the technical associated documentation, even if it is published in the foreign language most often used in the sector, using the aid in the installation and verification.

CE2.6 install a device of internetwork private and public to support communications services, according to given specifications:-interpret the technical documentation to verify the fulfillment of prerequisites to installation equipment.

-Install and connect the required adaptation modules making use of tools and following the instructions given in the corresponding technical documentation.

-Perform tests to verify the functionality of the devices installed.

-Register in the documentation of the equipment the activities carried out.

C3: Configure the protocols and them parameters of interconnection of them devices of link between networks private and public, following some instructions specified.

CE3.1 identify the parameters of configuration and management of interconnection of networks private virtual, in them devices of link according to some specifications of configuration given.

CE3.2 classified, according to their functions, the protocols used in them devices of interconnection between networks private and public and identify them services that will be supported by them.

CE3.3 describe the procedures and tools used to implement configurations in them devices of interconnection of networks private with networks public, so is support them services of communications.

CE3.4 explain the function and the values of each one of them parameters that involved in the configuration of a device of link according to specifications technical of the device.

CE3.5 implement a configuration on a device interconnect for communications services, according to a received specifications:-interpret the work order to select, to deploy Setup.

-Load the selected configuration using the specified media.

-Check that the communication between interconnected networks services are enabled.

-Documenting the activities carried out.

Contents 1. Interconnection of networks.

-Basic concepts on public networks.

-Interconnection with the public network services.

-Parameters: power supply, mechanical restraint, other.

-Interconnection requirements. Quality standards.

-Depending on the type of network interfaces.

-Safety regulations.

-A network interconnection device architecture.

-Interfaces.

-Modules.

-Cables.

-Concepts of routing.

-Segmentation of networks.

-Routing algorithms.

2. network interconnection devices.

-Most common networking interfaces.

-Interconnection of local area (RAL-RAL) - interconnection of large area (RAL-MAN or RAL-WAN) - features of networking services.

-Used technologies.

-Identification of connection services.

-Interrelationship of services.

-Implementation in computers on the local network.

-Providers of communications services.

-Interconnection services.

-Profiles of the services.

3. network interconnection protocols.

-Protocols used in the interconnection networks of public and private.

-Classification according to their functions.

-Supported services.

-TCP/IP protocol stack.

-Introduction.

-OSI model.

-Levels. Description of each one.

-Encryption. Virtual private networks.

-Description.

-Applications.

-Types.

-Implementations.

-Parameters for configuration and management of virtual private networking.

-Security mechanisms.

-Masking and redirection.

-Packet filtering.

-Features.

-Criteria.

-Advantages.

4. procedures of installation and testing of network interconnect devices.

-Physical and electrical safety regulations applicable to internetwork devices.

-List of the main standards.

-Highlights of each.


-Charging procedures of internetwork devices configuration.

-Load through files.

-Modification of parameters.

-Firmware update.

-Connections local and remote for configuration.

-Procedures for verifying the communication services.

TRAINING unit 2 name: monitoring and troubleshooting networking in private with public networks.

Code: UF1348 duration: 60 hours referrer of competition: this training unit corresponds with the RP3 RP4.

Capabilities and C1 evaluation criteria: monitor and verify the operation of the equipment of interconnection with external networks by means of specific software tools.

CE1.1 identify the functions and field of application of the tools and applications of supervision and monitoring, depending on the characteristics of the interconnection equipment.

CE1.2 explain operating procedures of monitoring based on interconnection equipment tools to monitor.

Monitoring on the basis of the test to perform and explain tool is CE1.3 select connect it according to a given specification.

CE1.4 describe the established monitoring procedures to ensure the provision of services according to received operating specifications.

CE1.5 in a so-called practical monitor interconnection, according to specifications received equipment and by following a few instructions:-select the monitoring tool.

-Connect the tool to the computer and set it up.

-Monitoring equipment to detect traffic congestion and anomalies in the service.

-Write a report on the activities carried out and the results obtained.

C2: solve the incidents detected in the devices of interconnection of networks private and public, following some instructions given.

CE2.1 describe them incidents that is produce in them devices of interconnection of the networks private with them networks public of communications, according to information received of tools of notification or others media.

CE2.2 identify the procedures and tools used for the detection of incidents, according to private and public networking devices.

CE2.3 describe them technical and tools that is used to isolate and diagnose the causes that produce incidents, in devices of interconnection of networks private and public according to some procedures and specifications given.

CE2.4 explain them procedures systematic of resolution of incidents depending on the specifications of some plans of contingency given.

CE2.5 in so-called practical, properly characterized, interpret and solve them incidents in devices of interconnection with dysfunctions simulated, according to some specifications received and following some instructions given:-interpret them alarms generated by the system of detection of incidents.

-Locate the causal element of the incidence.

-Solve the problem specified procedures.

-Register the incidence in the specified documents.

Contents 1. Procedures for monitoring of network interconnect devices.

-Internetwork devices monitoring tools.

-Description.

-Use.

-Main functions.

-Tools and applications used. Features.

-Monitoring tests.

-Types of testing.

-Selection, connection and configuration of the tool.

-Systematic procedures of monitoring of internetwork equipment.

-Items to be monitored.

-Tools to use.

-Steps to follow.

-Results of the process.

-Checklists.

2. procedures for troubleshooting networking devices.

-Types of incidences in the interconnection of public and private networks.

-Classifications.

-Local, remote.

-Affected computers.

-Impact on services.

-Affected services.

-Etc.

-Examples.

-Diagnostic tools and notification of incidents in networking devices.

-Protocol Analyzers.

-Tools "help-desk".

-Incident management procedures.

-Isolation and diagnosis of incidents.

-Techniques used.

-Tools.

-Contingency plans.

-Systematic troubleshooting procedures.

-ITIL incident management.

-Organization of a customer care center.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance unit training 1-UF1347 90 50 unit training 2-UF1348 60 40 sequence: for access to the unit training 2 must have is exceeded it unit training 1.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULES OF PRACTICES PROFESSIONAL NOT LABOUR OF OPERATION OF NETWORKS DEPARTMENT.

Code: MP0285 duration: 40 hours capabilities and criteria of evaluation C1: participate, in accordance with the instructions received, in the installation, configuration, put up, and maintenance of a network of area local in accordance with them procedures established in the company.

CE1.1 interpret the documentation technical associated to the elements of communication.

CE1.2 install and configure them nodes of the network local, as well as them managers of protocols and others programs that support services of communications in accordance with the procedures established.

CE1.3 apply the procedures of test and verification of network connectivity elements using the tools required hardware and software.

CE1.4 participate in the resolution of faults in the network local, using the tools and procedures established by the company.

CE1.5 documenting the work performed in accordance with the requirements and procedures business.

C2: collaborate in the monitoring and interconnection of the network local with them networks public, following the indications of the administrator of network and them procedures business established.

CE2.1 collaborate in the installation of them probes of monitoring remote and them agents of the software of network, as well as, in the configuration of the interface of it tool of management of network, in accordance with the indications of the administrator of network.

CE2.2 participate in the processes of maintenance periodic and preventive, the interconnection with networks public, as well as, in the update of them components hardware and software of them devices of communications of the network local.

CE2.3 collaborate in the maintenance of network interconnect devices, addressing and managing incidents according to the business processes and the indications of the administrator of the network.

CE2.4 documenting the work performed in accordance with the requirements and procedures business.

C3: participate in the process of work of the company, following them rules and instructions established in the center of work.

CE3.1 behave is responsibly both in the relations human as in those works to perform.

CE3.2 respect the procedures and rules of the Centre's work.

CE3.3 undertake with diligence the tasks according to the instructions received trying to of that is adapted to the rhythm of work of the company.

CE3.4 integrate is in the processes of production of the Centre's work.

CE3.5 use the channels of communication established.

CE3.6 respect in all moment the measures of prevention of risks, health work and protection of the environment.

Contents 1. Connectivity of the networks Department of the company.

-The Organization hardware inventory.

-Operational specifications of the organization.

-The parts of work and other business documentation.

-Maintenance plan.

-Criteria and procedures of quality in the organization.

-Tools used in the different business processes.

-Procedures for implementation of local networks in the company.

-Business procedures of monitoring of the processes of communication.

-Connection procedures of departmental networks to public networks.

2. integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.

-Interpretation and execution with diligence the instructions received.

-Recognition of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. the trainers training modules required accreditation requirements * professional experience required in the field of competition with no accreditation MF0220_2 Accreditation Unit: implementation of elements of the local network.





● Bachelor, engineer, architect or corresponding degree or other equivalent securities


● Diplomado, technical engineer, technical architect or the title of the corresponding level or other equivalent securities ● technician in the family of information technology and communications ● certificate of professionalism of level 3 of the professional of IFC, systems and telematics family 1 year 3 years MF0955_2: monitoring of the local network.





● Bachelor, engineer, architect or the title of the corresponding level or other equivalent securities ● Diplomado, technical engineer, technical architect or the title of the corresponding level or other equivalent securities ● technician on the family computer and communications ● professionalism of level 3 of the professional of IFC family certificate, systems and telematics 2 years 4 years MF0956_2 : Interconnection of private networks and public networks.





● Degree, engineer, architect or the title of grade corresponding u others titles equivalent ● diploma, engineer technical, architect technical or the title of grade corresponding u others titles equivalent ● technical upper in the family of computer and communications ● certificate of professionalism of level 3 of the family professional of IFC, area of systems and telematics 2 years 4 years V. requirements minimum of spaces , Facilities and equipment space training surface m² 15 students surface m² 25 students 60 75 computer room space training M1 M2 M3 M4 classroom of computer X X X X space training equipment Aula de Informática - PCs installed in network and Internet connection.

-Cabinet with panels of patched and network connection devices: hubs, switches and routers.

-Base and network software.

-office software, internet tools.

-Antivirus and security software.

-Network analyzers.

-Analyzers / certifiers wiring.

-Tools software for connectivity testing.

-Inventory of network elements control software tools.

-Printer and peripherals.

-Network management software.

-Network monitoring software.

-Probes for monitoring remote (RMON).

-Tools for auditing.

-Control of public lines of communications tools.

-Applications of management of incidents.

-Canon of projection.

-Flip chart.

-Slate.

-Classroom material.

-Table and Chair for the trainer.

-Tables and chairs for students.

-Auxiliary furniture for classroom equipment.

* Equipment and corresponding software must be updated.





Not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex IV I. identification of the certificate of professional designation: operation of voice and data communications systems.

Code: IFCM0110 family professional: computing and communications.

Professional area: communications.

Level of professional qualification: 2 professional qualification of reference: IFC301_2 operation in voice communications systems and data (Royal Decree 1201 / 2007 of 14 September).

Relationship of competition units comprising professionalism certificate: UC0960_2: install, configure, and verify public network access equipment.

UC0961_2: Configure and maintain services in private telephone switching equipment.

UC0956_2: Carry out the processes of connection between private networks and public networks.

General competence: install, configure functional parameters, and apply the processes of maintenance and operational testing of communications equipment, making connections between the lines of communications and systems that manage traffic information, to verify the performance parameters and quality of communications services, according to specified procedures.

Professional environment: Professional: develops his professional activity employed in companies or entities public or deprived of any size that have connection to networks of public transport and transmission of data, networks and Communications Department.

Productive sectors: is located mostly in the service sector, and mainly in the following types of companies: public bodies and companies in any productive sector which by its size and organization need to manage voice and data networking.

Occupations and relevant jobs: communications operator.

Field communications technician.

Operator of telephony equipment.

Duration of associated training: 550 hours ratio of training modules and training units.

MF0960_2: Implementation of communications networking equipment. (210 hours) ● UF1863: installation and configuration of devices and connectivity services associated (90 hours) ● UF1864: testing and verification of the transport and transmission and associated connectivity services devices. (70 hours) ● UF1865: operation and supervision of the equipment and services. (50 hours)

MF0961_2: Maintenance of telephone services. (150 hours) ● UF1866: installation and configuration of services in telephony equipment. (60 hours) ● UF1867: preventive maintenance of the equipment and services of telephone switching equipment. (50 hours) ● UF1868: operation and supervision of telephone switching equipment. (40 hours)

MF0956_2: (transverse) interconnection of networks private and networks public. (150 hours) ● UF1347: installation and configuration of the nodes of interconnection of networks private with public (90 hours) ● UF1348: monitoring and resolution of incidences in the interconnection of networks private with networks public (60 hours) MP0394: module of practices professional not labour of operation in systems of communications of voice and data (40 hours).

II. profile professional of the certificate of professionalism unit of competition 1 name: install, configure and verify equipment of access to networks public.

Level: 2 code: UC0960_2 realizations professional and criteria of realization RP1: install them devices of transport and transmission of data, to access to networks public of communications to enable resources of connectivity, according to the specifications technical and normative of security.

CR1.1 the installation requirements are verified prior to ensure the functioning of the communications device, according to the specifications of the technical documentation and received work orders.

CR1.2 the normative of security is applied in the process of installation of the device to eliminate risks personal and ensure the result of the installation, according to them specifications of it organization.

CR1.3 them interfaces and modules of adaptation of the lines of communication is installed and verified, to proceed to its rear connection according to them requirements of implementation of the device of communications.

CR1.4 the device is installed and is checked them parameters corresponding to the power electric, clamping mechanical and others, to ensure the provision of the service of communications according to them specifications received.

CR1.5 them connections between them lines of communications and the device, is made to ensure their functionality according to them specifications technical and them indications that is related in the order of work.

CR1.6 the installation work is documented, to solve the technical and administrative needs of the organization according to specified protocols.

CR1.7 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Configure communications devices to adjust connectivity services to given requirements, according to the supplied operating specifications.

CR2.1 configuration of the communications team is done, to enable the connectivity services according to the specifications of the work order.

CR2.2 configuration is loaded into the device, to define its functional parameters according to technical specifications and work orders received.


CR2.3 tools for remote management of communications devices, are used to load and modify settings according to the operational needs of the organization.

CR2.4 the final tests of the device, are performed to verify that the services and operating parameters are required, according to the criteria of quality of service of the organization.

CR2.5 configuration and test the communications device, processes are documented to record the activities according to the protocols defined by the organization.

RP3: Perform the procedures of verification of the transport and data transmission devices, to ensure continuity in the provision of services of communication according to established procedures.

CR3.1 connectivity and State of the equipment are checked, to ensure the provision of services according to rules of the Organization and the parameters of the Service contracted with you user.

CR3.2 them routes alternative and them elements redundant is check, to check the availability of the same according to them plans of contingencies of the organization.

CR3.3 the capacity of them lines and them parameters functional of them services is checked, to keep them within them levels preset according to the normative of quality and service of the organization.

CR3.4 parameters of physical security and access restrictions are checked, to prevent the misuse of the resources provided by the communications devices according to the Organization's security plan.

CR3.5 them processes of checking and verification is documented to register them tasks made, according to the protocols of the organization.

RP4: manage and attend them incidents in the service of them devices of access to networks external to the Organization, for correct them or inform of them according to the protocols established and them procedures of performance predefined.

CR4.1 them systems of notification of incidents is observed to detect possible alarms, according to those procedures operating and of security of the organization.

CR4.2 the location of the device in which the incidence occurred is performed, by interpreting the information received and the technical documentation to isolate the problem hardware and software, taking into account the protocols of action against contingencies of the organization.

CR4.3 symptoms reported by users or by management tools, are verified to obtain a precise diagnosis of the problem according to the technical documentation.

CR4.4 incidence detected and isolated is diagnosed and raises its solution, under the supervision of a superior, to rehabilitate the services interrupted or damaged, according to the quality standards and contingency plans.

CR4.5 incidence that has not been isolated reports to the level of superior responsibility for its management according to protocols and procedures to contingencies of the organization.

CR4.6 repair of the incidence for rehabilitation services is done with specific tools and respecting safety standards established by the organization.

CR4.7 the documentation for the detection, diagnosis and solution of incidence is made, to register the same according to the protocols of the organization.

Media production equipment professional context. Communications equipment (modems, routers, and FRAD (Frame Relay Access Device),) among others. Transport and data transmission equipment. Instruments computer for evidence of connectivity. Office Tools. Hand tools for electrical and mechanical works.

Products and results external network connection devices installed. Functional parameters in external network connection devices configured. Maintained external network connection devices.

Information used or generated work orders. Parts of incidents. Technical documentation of external network connection devices. Historical reports of incidents. Functional verification plans. Maintenance plans. Quality manuals. Standards and quality criteria defined by the organization. Electronic equipment installations safety regulations. Technical configuration documentation. Technical reports of commissioning.



Unit of competition 2 name: set up and maintain services in equipment private switching TELEFÓNICA.

Level: 2 code: UC0961_2 realizations professionals and criteria of performance MOP1: deploy services in telephony equipment to enable features in the organization according to specifications received.

CR1.1 drawings and diagrams of the telephone system are interpreted to identify the structure of the same and the elements that compose it according to the design of telephone network specified.

CR1.2 telephony services are implemented, to support functional requirements according to technical specifications and the organization.

CR1.3 components which are used for enabling the services are installed, to support new features taking into account involved safety regulations.

CR1.4 verification of the installation of the components is carried out, to ensure the continuity and the quality of service implemented according to specifications of the organization.

CR1.5 the documentation concerning the activities undertaken is completed for their subsequent registration, according to the protocols of the organization.

CR1.6 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Set the operating parameters of services in telephone switching equipment, to ensure the effectiveness and functionality of the provision according to established procedures.

CR2.1 technical documentation of switching equipment is interpreted, to identify susceptible of manipulation according to technical specifications configuration parameters.

CR2.2 telephone switching equipment configuration is performed, to ensure the provision of the services arranged according to the requirements of communications of the organization.

CR2.3 the operational services provided by telephone switching equipment testing, to verify the parameters for the provision of services according to the quality standards and the needs of communications of the organization.

CR2.4 the documentation concerning the activities undertaken is completed for their subsequent registration, according to the protocols of the organization.

RP3: Meet and manage incidents in telephone switching equipment, so that interruptions in the provision of services does not occur or whether the possible minimum, according to established protocols and procedures.

CR3.1 processes of maintenance and periodic monitoring of the historical records of operations, are made to ensure the operation of the equipment according to the needs of communications of the organization.

CR3.2 processes to verify the safety and the planned restrictions are made, to prevent improper uses of resources from telephony according to specifications of the organization.

CR3.3 them channels of notification of incidents (communication of users, tools of management and systems of alarms, between others), is enabled to perform it collected of information according to the specifications of security and quality of the organization.

CR3.4 the reported incidence is confirmed to proceed with its solution by means of simulations and tests of the affected devices, according to the protocols of action against contingencies.

CR 3.5 diagnostic processes, run to isolate the cause which has produced the reported incidence, according to the protocols of action against contingencies of the organization.

CR3.6 the incident whose cause is not isolated or are not diagnosed are reported to higher technical levels for your treatment according to the protocols of action against contingencies of the organization.

CR3.7 repair or replacement of components or elements that produce the incidence, is carried out taking into account the standards of safety and quality of the Organization, to retrieve the parameters of operation of telephony services.

CR3.8 the documentation related to the activities carried out, is completed for their subsequent registration according to the protocols of the organization.

Media production equipment of telephone switching professional context. Computerized instruments to schedule telephone switchboards. Office Tools.

Products and results of telephone switching equipment installed. Functional parameters configured telephone switching equipment. Maintained and operating switchboards.

Information used or generated work orders. Parts of incidents. Technical documentation of telephone switching equipment. Historical reports of incidents. Functional verification plans. Maintenance plans. Manual of quality. Standards and criteria of quality defined by the organization. Scaling of communication of results or unforeseen events found. Information of configuration of the network signed by the equipment of telephony.

Documentation technique of configuration. Reports technical of put in service.

Unit of competition 3


Denomination: carry out the processes of connection between networks private and networks public.

Level: 2 code: UC0956_2 realizations professionals and criteria of performance MOP1: install the nodes of interconnection of public and private networks to enable communication between the two, according to instructions of the organization.

CR1.1 the requirements of device implantation, as well as the lines of communications with their corresponding interfaces, are tested to ensure compliance with the conditions of compatibility according to the technical documentation of the same.

CR1.2 the interfaces and adaptation of lines of communication modules are installed and verify, to proceed with their rear connection according to the requirements of the communications device implantation.

CR1.3 device is installed and parameters for electrical power, mechanical fastening and others, are checked to ensure the provision of the service of communications, according to the specifications received.

CR1.4 between the lines of communications and device connections are made, to ensure communication between the public and private network according to the technical specifications and instructions listed in the work order.

CR1.5 the installation work is documented, to solve the technical and administrative needs of the organization according to specified protocols.

CR1.6 the specific technical documentation associated with devices, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Configure the communication protocols in the interconnection of network devices to ensure connectivity between the public and private network according to specifications of the organization.

CR2.1 active communications equipment configuration creates and modifies to allow coexistence and/or interconnection of virtual local networks over public networks.

CR2.2 it configuration physical and logical of them routers of connection with networks external is checks, using the tools appropriate for find out if are prepared for the connection or them missing some component hardware or software, according to procedures established.

CR2.3 external interfaces of the routers are configured, to provide connectivity with the outside according to the indications of the communications company.

CR2.4 interconnection devices are verified through testing services, to ensure their functionality, according to the quality criteria and the communications of the organization plan.

CR2.5 the tasks performed are documented for the needs of registration, according to the protocols of the organization.

RP3: Keep interconnection of network devices to ensure the continuity of the service, according to the plan of communications of the organization.

CR3.1 communications services are checked periodically to ensure its continuity and its performance, using management tools for network technical specifications and criteria of the organization.

CR3.2 alerts and alarms systems are periodically checked to ensure the provision of communications services, according to the plan of communications of the organization.

CR3.3 connectivity with other networks devices is checked by conducting functional tests, to verify the functionality of the same, according to the procedures established in the operational specification of the organization.

CR3.4 the tasks performed in the interconnect devices are documented, to meet the needs of registration according to the protocols of the organization.

RP4: Meet and manage incidents and alerts in the private network connectivity elements, to keep the connection with the public network according to specifications of the organization.

CR4.1 requests for resolution of incidents and detected alerts are collected or redirected to the center of attention to the user, according to the established procedures, to be aware of them and carry out monitoring, study and analysis.

CR4.2 the symptoms collected in the part of incidents and alerts, are checked by performing initial testing to diagnose and localize the nature of it using the corresponding guide troubleshooting according to the established procedure of action.

CR4.3 diagnosis and localization of the incidence and alert and its resolution, is performed to maintain the connection using the corresponding troubleshooting guide.

CR4.4 them incidents solved and alerts served is completed and is close in the applications of management of incidents, to continue the flow of resolution and is reported to the user following them procedures established.

CR4.5 the report of end of incidence or alert is performed in the format standard, collecting the information enough to update the historical of incidents.

Professional context, means of production active network elements. Analyzers of wiring. Tools for management of network. Control of public lines of communications tools. Sniffers. Hand tools for electrical and mechanical works. Software for testing connectivity tools. Office Tools. Diagnostic tools. Firmware updates. Incident management applications. Map of the network private.

Products and results routers, switches and bridges installed correctly according to specifications. Resolved incidents. Alerts generated by treated and managed network monitoring systems. Interconnection of public networks and private maintained and operating elements.

Information used or generated work orders. Parts of incidents. Troubleshooting guides. Historical reports of incidents. Manual of quality. Standards and quality criteria defined by the organization. Technical reports of commissioning.

III. formation of professionalism certificate training module 1 name: implementation of communications networking equipment.

Code: MF0960_2 professional skill level: 2 associated with the competition unit: UC0960_2: install, configure, and verify public network access equipment.

Duration: 210 hours training unit 1 name: installation and configuration of devices and services of connectivity partners.

Code: UF1863 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and criteria of evaluation C1: identify transport and data transmission devices as well as the modules and interfaces for connection to the public communications of voice and data lines.

CE1.1 explain the functions of devices of transport and transmission of data and connection interfaces that are used for connecting to public networks, according to specifications of the devices.

CE1.2 list the technologies employed in the transportation and transmission of data, taking into account standards and associated protocols.

CE1.3 quote protocols that are used in the transmission of data, taking into account the lines and the technologies used in the connection.

CE1.4 list the standards applicable to interfaces connected to public networks of voice and data communications, explaining their mechanical, electrical and functional characteristics and procedure according to specifications of the elements used in these networks.

CE1.5 explain the characteristics of the means of transmission can be found in the public networks of voice and data communications, taking into account existing technologies.

C2: Identify the processes of installation, configuration and implementation of voice and data communications device configurations, and apply them to integrate devices into networks of public communications according to given specifications.

CE2.1 explain the safety regulations applicable to the installation of a device for voice and data communications, according to specifications of the device itself.

CE2.2 describe procedures to implement configurations on voice and data communications devices.

CE2.3 explain the function and values of each of the parameters involved in the configuration of a device for voice and data communications, taking into account the technical specifications of the same.

CE2.4 install devices of voice and data communications, for the provision of services of communications, according to given specifications:-interpret the technical documentation team, even if it is published in the foreign language most often used in the sector, using the aid in the installation.

-Verify the fulfillment of prerequisites to installation.

-Install and connect the required adaptation modules making use of specific tools and following the instructions given in the corresponding technical documentation.

-Perform tests to verify that the devices work.

-Register in the documentation of your computer activities.

CE2.5 perform the configuration in a communications device, for the implementation of a communications service, following received specifications:-interpret the work order to select the settings to deploy using remote management tools and the media.

-Check that the required communication services are enabled.


-Documenting the activities carried out.

Contents 1. Internetwork protocols.

-Protocols used in the interconnection networks of public and private.

-Classification according to their functions.

-Supported services.

-TCP/IP protocol stack.

-Introduction.

-OSI model.

-Levels. Description of each one.

-Encryption. Virtual private networks.

2. public voice and data networks.

-Features.

-Topology networks voice: mesh, star... - hierarchy voice networks: internal, Local, international transit.

-Hierarchy/architecture data networks. Internet.

-Differences between private networks and public networks.

-Voice/data convergence. IMS, VoIP.

-Switching of circuits and switching of packets.

-General description.

-Applications current and future.

-Convergence.

-Architectures and topologies in networks of transmission and transport.

-Redundancy and protection of routes. Rings.

-Transmission technologies: PDH, SDH, DWDM... - streaming media: guided (electrical, optical), unguided.

3. transmission of data.

-Data and signals.

-Native data transmission.

-Digitization of voice: procedure and most common codecs (PCM, G.

-Units of measurement.

-Definition of common units: baud, bps, concept of Erlang.

-Means of transmission.

-Unguided (wireless): radio transmission.

-Guided:-electrical wiring. Features.

-Optical fibers. Main features and technical principles of optical transmission.

-Unwanted effects.

-Introduced by the medium: attenuation, noise and interference.

-Introduced by the system: Jitter, delay, wander.

4. transmission equipment.

-Modems. Multiplexers. Concentrators.

-General description of functions and blocks elementary components.

-Sections of the network where they are deployed.

-Supported interfaces: operational and management.

-Other devices (communications processors, protocol converters).

-General description of functions and blocks elementary components.

-Sections of the network where they are deployed.

-Supported interfaces: operational and management.

5. installation of transmission equipment.

-Physical and mechanical installation of equipment (cabinets, fixtures, wiring distribution and environmental conditions, among others).

-Installation of trusses, cabinets, and racks.

-Manual and general standards of suppliers.

-Verification of environmental conditions in accordance with operational specifications of the system.

-Power supply and associated safety procedures.

-Auxiliary elements (systems of uninterruptible power supply, air-conditioning and batteries, among others).

-Rectifiers. Block components and functions. Dimensioning.

-SAIs. Block components and functions. Dimensioning.

-Batteries. Block components and functions. Dimensioning.

-Air conditioning. Load heat and sizing.

-Electronic equipment installations safety regulations.

6. configuration of the communications equipment.

-Functional unit and system testing.

-Configuration of transportation services and interfaces:-types of possible interfaces: E1/T1, E2/T2,..., STM1, STM-4, STM-16,..., electrical and optical - transportation services.

Protection/redundancy.

-Configuration parameters for interfaces and services supported by the teams.

-Remote management tools: functional and operating characteristics.

-General description and features.

-Protocols/interfaces supported: SNMP, CMIP.

-Graphical user interface. Description of the interface and functions that supports.

-Other methods of operation. Command line.

TRAINING unit 2 name: testing and verification of transport devices and transmission and associated connectivity services.

Code: UF1864 duration: 70 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and C1 evaluation criteria: apply devices of transport test procedures and data transmission, using specific tools and techniques.

CE1.1 identify the parameters to be tested, according to the particular implementation of devices for transmission and transport of data used.

CE1.2 describe the techniques and testing tools that are used to verify communications devices implanted, taking into account the characteristics of the same.

CE1.3 classified procedures for the test to be applied, taking into account the particular application and the teams involved.

CE1.4 perform implantation of devices for transmission and transport of communications, according to specified instructions:-identify the teams involved in practical settings.

-Identify the characteristics of the equipment from your specifications, as well as the applicable test procedures.

-Discriminating parameters and test procedures, as well as the order of preparation.

-Interpret the results and reasoning them.

-Documenting the activities carried out.

Contents 1. Installation of transmission equipment tests.

-Mechanical safety testing procedures.

-Testing of stability and leveling.

-Cooling/dissipation level evidence.

-Resistance to vibrations.

-Wiring test procedures, food, electrical safety and EMC (electromagnetic compatibility).

-Verification of continuity and electrical distribution.

-Verification of status of electrical safety. Lands.

-Electromagnetic compatibility (IEC regulations and product standards).

-Synchronism signals test procedures.

-Verification of generation/reception of synchronism.

-Continuity check and distribution of the sync signal.

-Functional unit and system testing.

-Functional testing of internal and external power. Level of functional and global unity.

-Test timing and clock signal distribution. Level of functional and global unity.

-Testing internal connectivity (functional unit) and external (system level) and operation.

TRAINING unit 3 name: operation and SUPERVISION of the equipment and services.

Code: UF1865 duration: 50 hours reference of competition: this unit training is corresponds with the RP4.

Capabilities and C1 evaluation criteria: resolve incidents detected in devices of access to public communications networks, according to a given specification.

CE1.1 identify the team presenting problems and the source of information according to given specifications.

CE1.2 apply techniques of information gathering and analysis, to identify with precision the incidence according to specifications received.

CE1.3 describe any incidents that occur in the installation and configuration of devices of access to public communications networks, to identify the response in each case according to procedures in given contingencies plans.

CE1.4 classify tools notification of incidents and monitoring of the system, taking into account its function, type and scope of supervision for use in the management of incidents, as described in incident management and contingency plans.

CE1.5 describe the techniques used for, a splitting of a reported incidence, locate the broken device, according to given incident response and contingency plans.

CE1.6 explain the systematic troubleshooting procedures to recover communications services breakdown situations, following received specifications.

CE1.7 solve faults simulated on public network access devices, to ensure the continuity and quality of the provision of services of communications, according to given specifications:-interpret alarms generated by the incident reporting system.

-Enumerate devices used for the reporting of incidents.

-Locate the incidence device.

-Resolve the incident by applying the listed protocols.

-Register the incidence in the appropriate document.

Contents 1. Incidents in public network access device.

-Common incidences.

-Internal incidents.

-HW fault.

-SW faults.

-Internal/interconnection interfaces configuration failures.

-External incidents (attributable to the service provider).

-Fall of services by the service provider.

-Incident management teams access to public networks.

-Equipment management/monitoring systems.

-General description. Principles of operation. Alarms.

-Functional blocks. Procedures of analysis and identification of faults.

-Failover procedures. Examples and case studies.

-Scaled. Any contingency/business continuity plans.

-Incident management tools.

-General description. Features.

-Incident management/documentation procedures.

-Notifications and scaled (internal and/or service provider).

-Scaling procedure (and monitoring) of unsolved problems. Documentation and follow-up.

-Tools of monitoring equipment for the location and notification of incidents.

Methodological guidelines training distance: training units






Total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF1863 - UF1864 70 40 formative unit 3 - 50 20 sequence UF1865: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: maintenance of telephone services.

Code: MF0961_2 professional skill level: 2 associated with the competition unit: UC0961_2: Configure and maintain services in private telephone switching equipment.

Duration: 150 hours training unit 1 name: installation and configuration of services in equipment of telephony.

Code: UF1866 duration: 60 hours reference of competition: this unit training is corresponds with the RP1 and RP2.

Capabilities and criteria of evaluation C1: describe the features of them teams of telephony to identify them services supported by them, according to some specifications functional given.

CE1.1 describe the hierarchical and functional structure of telephone networks, depending on the scope and used communications infrastructure.

CE1.2 explain the features of a system of telephony and the elements of that consists, according to the technologies existing in the market.

CE1.3 describe the functions of signaling in networks of telephony, according to those standards and systems standardized existing.

CE1.4 list the types of subsystems of switching and explain its operation, to identify them stands of them services to implement according to specifications functional given.

CE1.5 describe the services which can supply a system of telephony on the basis of existing technologies.

CE1.6 explain the technologies involved in the provision of services of telephony on the basis of the communications infrastructure to use.

CE1.7 quote the criteria used in the selection of a system of telephony from functional specifications of services given.

C2: Install telephony services on computers of the telephone system according to given technical and functional specifications.

CE2.1 interpret a diagram of a telephone system, identifying the elements that compose it according to the technologies and means of communication (elements and lines) existing.

CE2.2 describe the procedures to incorporate new telephony services into an existing system, starting from a given specification.

CE2.3 install telephony services in a team of telephony, from given functional specifications:-interpret the technical documentation team, even if it is published in the foreign language most often used in the sector, using the aid in the installation.

-Verify the fulfillment of prerequisites to installation.

-Install and connect the required modules making use of specific tools and following the instructions given in the corresponding technical documentation.

-Perform tests for verify that the devices installed work according to the specifications given.

-Register in the computer's documentation carried out extensions.

Contents 1. Phone networks.

-Architectures.

-Topologies: Mesh,... - star levels: internal, Local, transit, international... - types of networks: private (mono/multisite), virtual (Centrex), public... - switching subsystem.

-Technology: TDM, IP, mixed, IMS... - elements: access, switching, Call Handling, pricing and management... - Services: Basic, supplementary, pricing, value added (intelligent network).

-Signalling subsystem.

-TDM signaling protocols: network (N7), user (Q931...).

-IP/IMS signaling protocols: SIP, H.323...

2. telephone equipment.

-Terminals.

-TDM: Description and services.

-Provided by the Terminal.

-Provided by the network.

-IMS: Description and services.

-Provided by the Terminal.

-Provided by the network.

-Switches/Call Servers.

-TDM Centrals.

-PBX (IP/TDM).

-Description of the IMS concept.

-Multi-line systems.

-Gateways.

-Switches.

3. telephone services.

-Definition and attributes of the basic service.

-Description.

-Scenario (s) generic (s) calls.

-Pricing and additional services.

-Generic (TDM).

-Specific/additional (IMS: presence, mobility, multimedia,...).

-Quality of service (QoS) indicators.

-Statistical counters.

-Treatment and reporting of statistics.

-Feedback-> preventive maintenance.

4. private telephone switching equipment configuration procedures.

-Configuration of PBX private switching.

-Numbering plans: internal, external, emergency, etc.

-List and description of available services.

-Configuration and parameters corresponding to the services available.

-Notions of communications via man-machine command / GUI (Graphical User Interface).

-Packages of voice switches configuration.

-Procedures and diagnostic and troubleshooting and incident management.

TRAINING unit 2 name: preventive maintenance of the equipment and services of equipment of switching phone code: UF1867 duration: 50 hours referrer of competition: this training unit corresponds with the RP3 as regards maintenance.

Capabilities and C1 evaluation criteria: apply procedures for the configuration and maintenance of services of telephony according to technical specifications.

CE1.1 explain the procedures for the configuration of services identifying the operating parameters of these.

CE1.2 distinguish the parameters used in telephony services to make the process of charging for the use of such services, according to a given specification.

CE1.3 verification of the configuration of services and check possible interactions and incompatibilities, according to given specifications.

CE1.4 set up a new telephone service:-identify modifications to carry out programming of the subsystem of telephone switching, from the received requests.

-Reprogram the phone switching subsystem using the procedures specified in the technical documentation.

-Carry out operational testing of the new service configured according to established procedures.

-Record the operations carried out in the technical documentation of the equipment according to procedures of the organization.

Contents 1. Private telephone switching equipment configuration procedures.

-Configuration/customization of services.

-Configuration/customization of services.

-Procedure Setup (by service). Associated commands.

-Activation/configuration verification procedures.

-Examples.

-Preventive maintenance.

-Description detailed statistical counters.

-Analysis of statistical counters and associated reports.

-Tests.

Changes/modifications of the services configuration.

TRAINING unit 3 name: operation and SUPERVISION of the equipment and services of telephone switching.

Code: UF1868 duration: 40 hours referrer of competition: this training unit corresponds with the RP3 as regards the management of incidents.

Capabilities and C1 evaluation criteria: resolve incidents detected in telephony services according to specifications received.

CE1.1 describe any incidents that occur in telephone systems taking into account the services offered.

CE1.2 classify the tools of detection and notification of incidents and monitoring of telephone services, depending on its scope of supervision, services and observed parameters.

CE1.3 describe the techniques used to isolate and diagnose the causes originating incident in depending on the type of telephony services.

CE1.4 explain the systematic procedures of troubleshooting according to the type of incidence and the service that affects.

CE1.5 solve faults simulated in telephone systems, following received specifications:-interpret the reported incidence.

-Locate the causal element of the incidence.

-Resolve the incident by applying the listed protocols.

-Register the incidence in the indicated documentation.

Contents 1. Telephone switching subsystem management procedures.

-Test and verification of the subsystem of telephone switching procedures.

-Procedures and tools for diagnosing and troubleshooting and incident management.

-Diagnosis and troubleshooting and incident management procedures.

-Function Alarm Surveillance: concepts and related items.

-Analysis and alarm information.

-Documentation and follow-up of incidents: trouble ticketing tools and procedures.

-Case studies and examples.


-Procedures for resolution, verification and test failures and incidents.

-Implementation of procedures of resolution of incidents.

-Testing, verification and final resolution. Documentation and follow-up.

-Scaling procedure and follow-up of unsolved problems. Documentation and follow-up.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 60 30 formative unit 2 UF1866 - UF1867 50 20 formative unit 3 - 40 20 sequence UF1868: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: networking private and public networks.

Code: MF0956_2 professional skill level: 2 associated with the competition unit: UC0956_2 processes of connection between private networks and public networks.

Duration: 150 hours unit training 1 name: installation and configuration of the nodes of interconnection of networks private with public.

Code: UF1347 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and criteria of evaluation C1: identify the characteristics of the devices for interconnection of networks, public and private, according to standards of communications technologies.

CE1.1 explain the characteristics of the devices for the interconnection of the private networks to public networks to identify its capabilities according to the technologies and architectures used communications.

CE1.2 list the technologies used in the interconnection of networks, describing its characteristics to identify the characteristics of the integration of technologies of communications on the basis of their technical specifications.

CE1.3 identify connection services, as well as their interrelationship and how to implement them on the computers on the local network for the provision of services of communications, according to the technologies used.

CE1.4 identify services of interconnection that communications service providers support that connects the private network, describing the profiles of the services that are available to assess the adequacy of these services taking into account the functional specifications is expected to address.

C2: Apply installation procedures and verification of private and public networking devices according to given specifications.

CE2.1 identify the parameters that make up the services of interconnection with the public network according to the technical characteristics of the service itself and interconnection device.

CE2.2 identify, in the standard of quality in force, the requirements pertaining to the interconnection with the public network.

CE2.3 describe the interfaces that are used in the connection of private networks to public networks depending on the type of used nets (connecting devices and lines of communications, among others).

CE2.4 explain the safety regulations applicable to the installation of a device for interconnection of private and public networks, according to the technical characteristics of the devices to be installed and the environmental conditions of the installation itself.

CE2.5 interpret the technical associated documentation, even if it is published in the foreign language most often used in the sector, using the aid in the installation and verification.

CE2.6 install a device of interconnection of networks private and public for support services of communications, following some specifications given:-interpret the documentation technical of the team to verify the compliance of them requirements prior to the installation.

-Install and connect the modules of adaptation required making use of tools and following the instructions indicated in the documentation technical corresponding.

-Perform tests to verify the functionality of the installed devices.

-Register in the documentation of the equipment the activities carried out.

C3: Configure the protocols and them parameters of interconnection of them devices of link between networks private and public, following some instructions specified.

CE3.1 identify the parameters of configuration and management of interconnection of networks private virtual, in them devices of link according to some specifications of configuration given.

CE3.2 classified, according to their functions, the protocols used in the devices of interconnection between public and private networks and identify the services that will be supported by them.

CE3.3 describe the procedures and tools used to implement settings on devices for interconnection of private networks with public networks, so that communications be supported.

CE3.4 explain the function and values of each of the parameters involved in the configuration of a device's link according to technical specifications of the device.

CE3.5 implement a configuration on a device interconnect for communications services, according to a received specifications:-interpret the work order to select, to deploy Setup.

-Load the selected configuration using the specified media.

-Check that the communication between interconnected networks services are enabled.

-Documenting the activities carried out.

Contents 1. Procedures of management in the subsystem of switching phone.

-Procedures of test and verification of the subsystem of switching phone.

-Procedures and tools of diagnosis and management of faults and incidents.

-Diagnosis and troubleshooting and incident management procedures.

-Function Alarm Surveillance: concepts and related items.

-Analysis and alarm information.

-Documentation and follow-up of incidents: trouble ticketing tools and procedures.

-Case studies and examples.

2. interconnection of networks.

-Basic concepts on public networks.

-Interconnection with the public network services.

-Parameters: power supply, mechanical restraint, other.

-Interconnection requirements. Quality standards.

-Depending on the type of network interfaces.

-Safety regulations.

-A network interconnection device architecture.

-Interfaces.

-Modules.

-Cables.

-Concepts of routing.

-Segmentation of networks.

-Routing algorithms.

3. devices for interconnection of networks.

-Interfaces more habitual of interconnection of networks.

-Interconnection of area local (RAL-RAL).

-Interconnection of area wide (RAL-MAN or RAL-WAN).

-Characteristics of the services of interconnection of networks.

-Technologies employed.

-Identification of the services of connection.

-Interrelation of those services.

-Implementation in computers on the local network.

-Providers of communications services.

-Interconnection services.

-Profiles of the services.

4. network interconnection protocols.

-Protocols used in the interconnection networks of public and private.

-Classification according to their functions.

-Supported services.

-TCP/IP protocol stack.

-Introduction.

-OSI model.

-Levels. Description of each one.

-Encryption. Virtual private networks.

-Description.

-Applications.

-Types.

-Implementations.

-Parameters for configuration and management of virtual private networking.

-Security mechanisms.

-Masking and redirection.

-Packet filtering.

-Features.

-Criteria.

-Advantages.

5. procedures of installation and testing of network interconnect devices.

-Physical and electrical safety regulations applicable to internetwork devices.

-List of the main standards.

-Highlights of each.

-Charging procedures of internetwork devices configuration.

-Load through files.

-Modification of parameters.

-Firmware update.

-Local and remote connections for configuration.

-Procedures for verifying the communication services.

TRAINING unit 2 name: monitoring and troubleshooting networking in private with public networks.

Code: UF1348 duration: 60 hours referrer of competition: this training unit corresponds with the RP3 RP4.

Capabilities and C1 evaluation criteria: monitor and verify the operation of the equipment of interconnection with external networks by means of specific software tools.

CE1.1 identify the functions and field of application of the tools and applications of supervision and monitoring, depending on the characteristics of the interconnection equipment.

CE1.2 explain operating procedures of monitoring based on interconnection equipment tools to monitor.


Monitoring on the basis of the test to perform and explain tool is CE1.3 select connect it according to a given specification.

CE1.4 describe the established monitoring procedures to ensure the provision of services according to received operating specifications.

CE1.5 monitor interconnection, according to specifications received equipment and by following a few instructions:-select the monitoring tool.

-Connect the tool to the computer and set it up.

-Monitoring equipment to detect traffic congestion and anomalies in the service.

-Write a report on the activities carried out and the results obtained.

C2: Resolve incidents detected in private and public networking devices, following some instructions.

CE2.1 describe any incidents that occur in the interconnect devices from the private networks to public networks communications, according to information received notification tools or other means.

CE2.2 identify the procedures and tools used for the detection of incidents, according to private and public networking devices.

CE2.3 describe the techniques and tools that are used to isolate and diagnose the causes that they produced incidents, devices for interconnection of private and public networks, according to given specifications and procedures.

CE2.4 explain the systematic procedures of troubleshooting according to the specifications of a given contingency plans.

CE2.5 interpret and resolve incidents in interconnect devices with simulated dysfunctions, according to received specifications and following some instructions:-interpret alarms generated by the system's detection of incidents.

-Locate the causal element of the incidence.

-Resolve the incidence by applying the procedures specified.

-Register the incidence in the documentation specified.

Contents 1. Procedures for monitoring of network interconnect devices.

-Tools of monitoring in devices of interconnection of networks.

-Description.

-Use.

-Main functions.

-Tools and applications. Features.

-Monitoring tests.

-Types of testing.

-Selection, connection and configuration of the tool.

-Systematic procedures of monitoring of internetwork equipment.

-Items to be monitored.

-Tools to use.

-Steps to follow.

-Results of the process.

-Checklists.

2. procedures for troubleshooting networking devices.

-Types of incidences in the interconnection of public and private networks.

-Classifications.

-Local, remote.

-Affected computers.

-Impact on services.

-Affected services.

-Etc.

-Examples.

-Diagnostic tools and notification of incidents in networking devices.

-Protocol Analyzers.

-Tools "help-desk".

-Incident management procedures.

-Isolation and diagnosis of incidents.

-Techniques used.

-Tools.

-Contingency plans.

-Systematic troubleshooting procedures.

-ITIL incident management.

-Organization of a customer care center.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF1347 - 60 40 sequence UF1348: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

PROFESSIONAL PRACTICES MODULES OPERATING IN VOICE COMMUNICATIONS SYSTEMS AND DATA.

Code: MP0394 duration: 40 hours capacity and C1 evaluation criteria: participate in installation, configuration, and verification of network access equipment public, private telephone switching equipment, as well as, the interconnection of private networks with public networks, in accordance with the procedures established in the company.

CE1.1 interpret the technical documentation associated with the equipment of public network access and private telephone switching equipment.

CE1.2 assist in the installation, configuration, and verification of the communications devices of access to public networks and telephone switching, according to the business processes.

CE1.3 participate in the processes of public and private networks connecting, installing, configuring, and maintaining devices for interconnection, in accordance with the plans of the organization.

CE1.4 manage and address the impact of the service in accordance with the procedures and protocols defined by the company.

CE1.5 documenting the work performed in accordance with the requirements and business processes.

C2: Participate in the process of work of the company, following the rules and instructions set forth in the work center.

CE2.1 behave responsibly both in human relations and works to be carried out.

CE2.2 respect the procedures and rules of the workplace.

CE2.3 undertaken with diligence the tasks according to the instructions received trying to it adapt to the pace of work of the company.

CE2.4 integrated into the production processes of the work center.

CE2.5 use established communication channels.

CE2.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. The network connectivity of voice and departmental data of the company to public networks.

-The Organization hardware inventory.

-Operational specifications of the organization.

-The parts of work and other business documentation.

-Maintenance plan.

-Configuration of the network of telephone equipment.

-Criteria and procedures of quality in the organization.

-Tools used in the different business processes.

-Business procedures of implementation of public network access equipment.

-Business processes of configuration and maintenance of services in business telephone switching equipment.

-Connection procedures of departmental networks to public networks.

2. integration and communication in the workplace - responsible behaviour in the workplace.

-Respect to the procedures and rules of the Centre's work.

-Interpretation and execution with diligence the instructions received.

-Recognition of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. the trainers training modules required accreditation requirements * professional experience required in the field of competition with no accreditation MF0960_2 Accreditation Unit: implementation of public network access equipment.





● Bachelor, engineer, architect or the title of corresponding degree or other equivalent securities ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities ● technician of the professional family of computing and communications.

● Professionalism certificate of level 3 in the area of communications and communications professional of computer science family.





2 years 4 years MF0961_2: maintenance of telephone services.





● Bachelor, engineer, architect or the title of corresponding degree or other equivalent securities ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities ● technician of the professional family of computing and communications.

● Professionalism certificate of level 3 in the area of communications and communications professional of computer science family.





2 years 4 years MF0956_2: interconnection of private networks and public networks.





● Bachelor, engineer, architect or the title of corresponding degree or other equivalent securities ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities ● technician of the professional family of computing and communications.

● Professionalism certificate of level 3 in the area of communications and communications professional of computer science family.





2 years 4 years * in the last five.

V. requirements minimum of spaces, facilities and equipment space training surface m² 15 students






Area m² 25 students 60 75 computer room space training M1 M2 M3 classroom of computer X X X space training equipment Aula de Informática - PCs installed in network and Internet connection.

-Cabinet with panels of patched and connection to the departmental network and public network access devices.

-Base and network software.

-office software, internet tools.

-Antivirus and security software.

-Equipment of communications (modems, routers and FRAD (Frame Relay Access Device), among others).

-Equipment of transport and transmission of data.

-Computer for connectivity testing instruments.

-Equipment of switching phone.

-Instruments computer for programming PBX phone.

-Elements active in network.

-Wiring analyzers.

-Network management tools.

-Control of public lines of communications tools.

-Sniffers.

-Tools software for connectivity testing.

-Diagnostic tools.

-Incident management applications.

-Canon of projection.

-Flip charts.

-Slate.

-Classroom material.

-Table and Chair for the trainer.

-Tables and chairs for students.

-Auxiliary furniture for classroom equipment.

* Equipment and corresponding software must be updated.





Not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex V I. identification of the professionalism certificate denomination: maintenance of first level in radiocommunication systems.

Code: IFCM0210 family professional: computing and communications.

Professional area: communications.

Level of professional qualification: 2 professional qualification of reference: IFC362_2 maintenance of first level in radiocommunication systems. (Royal Decree 1701 / 2007, of December 14).

Relationship of competition units comprising professionalism certificate: UC1210_2: commissioning and maintain wireless local and metropolitan area networks.

UC1211_2: Set up and service radio of fixed and mobile network equipment.

UC1212_2: Maintain and resolve incidents of first level in fixed and mobile networks radiocommunication systems.

General competence: the processes of implementation of wireless local and metropolitan area networks, and installing the software, the configuration and commissioning of fixed and mobile networks radiocommunications equipment, carrying out preventive maintenance and the first level troubleshooting, following established procedures.

Professional environment: Professional: develops his professional activity in companies or public or private entities, of any size, both self-employed and self-employed, who have a network of communications infrastructure and to offer communications services.

Productive sectors: lies primarily in the communications sector, and primarily in the following types of companies: public bodies and companies in any productive sector which by its size and organization need to manage radio communications networks. Companies that provide services in installation, maintenance and technical assistance to radio communications networks. Operator communications and undertakings providing communications services.

Occupations and relevant jobs: operator of first level in radiocommunication equipment maintenance.

Operator's maintenance of first level in wireless communication networks.

Duration of associated training: 580 hours ratio of training modules and training units.

MF1210_2: Commissioning and maintenance of wireless local and metropolitan area networks. (180 hours).

● UF1847: commissioning of Wireless Local Area and metropolitan networks. (90 hours).

● UF1848: Supervision and maintenance of Wireless Local Area and metropolitan networks. (90 hours).

MF1211_2: Configuration and commissioning of equipment for radiocommunication in fixed and mobile networks. (150 hours).

● UF1849: putting into service of devices and radiocommunication networks fixed and mobile equipment. (90 hours).

● UF1850: verification of connection devices and fixed and mobile radio equipment. (60 hours).

MF1212_2: First level of equipment of radio of fixed and mobile networks. (210 hours).

● UF1851: maintenance of devices and equipment of radio of fixed and mobile networks. (80 hours).

● UF1852: management of alarms from devices and equipment of radio of fixed and mobile networks. (50 hours).

● UF1853: troubleshooting of devices and fixed and mobile radio equipment. (80 hours).

MP0392: Module not working professional practices of first level (40 hours) radiocommunication systems.

II. professional profile of the professionalism unit certificate of competence 1 name: put in service and maintain networks wireless for LOCAL and metropolitan AREA.

Level: 2 code: UC1210_2 realizations professionals and criteria of performance MOP1: configure devices and equipment that are part of the wireless local or metropolitan area network, to achieve optimal coverage, received specifications and complying with safety standards.

CR1.1 devices and wireless local area network equipment are positioned and oriented to achieve optimal coverage, starting with the base infrastructure, received specifications and meeting safety standards.

CR1.2 wireless network adapters are assembled and connected devices and computers on the wireless network, using drivers recognized for each operating system and guaranteeing the non-existence of conflict, following the procedures and in accordance with established security standards.

CR1.3 parameters in access points configuration is to enable communication between devices and computers on the wireless network and local area networks, following the established procedures.

CR1.4 the introduction of parameters in the indoor unit's subscriber of a fixed in metropolitan area networks link is made using configuration tools, following instructions and specifications reflected in high order.

CR1.5 inventory of devices and equipment, their configurations and software wireless local and metropolitan area networks-forming are manufactured and maintained to ensure their location and availability, according to the rules of the organization.

CR1.6 the configuration of devices and equipment testing to verify the connection to the access points or the metropolitan network base stations, according to established procedures and complying with safety regulations.

CR1.7 the activities carried out, as well as the detected incidents, documented format standard for later use, following the procedure established by the organization.

CR1.8 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Carry out testing procedures and verification of devices and computers on the wireless network of local and metropolitan area to ensure the functionality of the network and the quality of the service, according to established procedures and complying with safety regulations.

CR2.1 the access points and antennas, in inspection procedures prior to the implementation of the network, are located in the locations of test outlined by the project, supplying electricity to them setting up the basic parameters indicated, following the procedure laid down and in accordance with standards of safety.

CR2.2 the test and verification processes which may lead to alterations in the service are carried out at the times and mode that minimize the impact on the service, following established procedures.

CR2.3 connectivity and devices and computers on the wireless network status are verified to ensure the provision of services, following the established procedures and in compliance with the rules of the organization.


CR2.4 physical security systems and access restrictions to the installed equipment are checked, to prevent unauthorized manipulations that can alter the parameters of the service, following established procedures.

CR2.5 measures of exploration in estimated coverage areas are instrumentation and specific equipment, to verify that they have the quality of service required and comply with safety standards, according to established procedures and taking into account the existence of desired both as interfering radio channels.

CR.6 values of the samples taken are recorded along with other information enabling you to accurately determine the point and the moment in which there have been, according to specifications of the work order.

CR2.7 the activities carried out, as well as the detected incidents, documented format standard for later use, following the procedure established by the organization.

RP3: Meet and resolve incidents of first level produced in the devices and wireless local and metropolitan area network equipment to maintain the functionality, according to established protocols.

CR3.1 them systems of notification of incidents is observed to detect possible alarms according to those procedures operating and of security of the organization.

CR3.2 the location of the device and equipment of radio frequency in which occurs an incidence and nature of this is identified interpreting information obtained through user, functional testing and using the instrumentation of measurement and diagnostic.

CR3.3 measurements of signal intensity in the wireless environment in which are recorded incidences are in passive mode (receive only) using instrumentation and applications most appropriate to each case and applying safety standards.

CR3.4 the configuration of devices and fixed and/or mobile devices with problems to associate to the wireless network is checked to verify that it complies with the established parameters.

CR3.5 incidence detected and isolated is diagnosed and raises its solution by determining its exact location to restore interrupted services and following the established protocol.

CR3.6 incidence that has not been isolated or solve reports to the level of superior responsibility for its management according to protocols and procedures to contingencies of the organization.

CR3.7 repair of the incidence for rehabilitation services is done with specific tools and applying safety standards.

CR3.8 the activities are documented according to internal models established by the Organization, in order to record information for later use.

Media production equipment professional context. Equipment and wireless communications devices. Field meter. Computer for connectivity testing instruments. Office Tools. Adapters for network wireless. Tools for installation. Antennas, cables, connectors and accessories. Computer laptop with software of purpose specific to all the bands of frequency involved. Positioning GPS, camera's photos digital. Points of access, electronic in network and stations base of networks Metropolitan. Of Subscriber fixed indoor and outdoor units of Metropolitan networks. Mobile devices. Portable testers for wireless and wired networks. Elements of protection and safety. RF power meters.

Products and results properly configured wireless network devices. Functional parameters in external network connection devices configured. Equipment and devices of the network wireless de area local and metropolitan verified. Wireless data networks with coverage extended to the interior of buildings. Public access (hotspot) indoor and outdoor Wi-Fi networks. Wireless networks lattice in local and metropolitan areas. Wireless point to point (backhaul) on local and metropolitan area networks.

Measurements of scanning in electromagnetic fields. First level support for network services and devices of users.

Information used or generated technical documentation of configuration and test of elaborate equipment technical reports. Orders of work. Parts of incidents. Technical documentation of devices. Historical reports of incidents. Functional verification plans. Test protocols. Quality manuals. Standards and quality criteria defined by the organization. Electronic equipment installations safety regulations. And verification reports. Procedures of installation and basic configuration of parameters. IEEE 802.11, 802.15 and 802.16, 802.20 standard. Manual installation of access points and base stations. Information about the installation of equipment and communications software. With rules, regulations and standards (ISO, EIA, ITU-T, ETSI). Documentation on safety and occupational health standards. Documentation on WIFI security protocols.



Unit of competition 2 name: set up and put in service equipment of radio's networks fixed and mobile.

Level: 2 code: UC1211_2 realizations professionals and criteria of performance MOP1: check the installation of devices and equipment of radio of fixed and mobile networks, as well as its connection to the radiant associated system, in order to check if it conforms to the specifications received.

CR1.1 the specifications and technical documentation of equipment and devices of radiocommunication service to recognize and interpret in order to identify computers and devices to verify.

CR1.2 Installing the transceiver and the radiant system is checked in order to preserve them before any installation failures, using tools and useful specific, following established procedures and in accordance with standards of safety.

CR1.3 them connections of them different devices and equipment of radiocommunication with the system radiant is verified to ensure its installation and rear operation, using tools specific, following procedures established and fulfilling them standards of security.

CR1.4 them activities performed, as well as them incidents detected, is document in format standard for its use later, following the procedure established by the organization.

Rp2: install the software of them devices and equipment of radio of networks fixed and mobile for your put in service, following the procedures established.

CR2.1 the software of the devices and equipment of radiocommunication is installed for your operation using tools specific, following the procedure established.

CR2.2 the functionality of the different components hardware of them teams of radiocommunication is check using tools software specific, following procedures established.

CR2.3 devices and radiocommunication equipment software version is registered according to the established procedure, to keep the information of the version used on all devices.

CR2.4 them activities performed, as well as them incidents detected, is documented in format standard for keep registration and follow-up of works, following the procedure established by the organization.

CR2.5 the documentation technical specific associated, is interpreted, in his case, in the language foreign of use more frequent in the sector.

RP3: configure them devices and equipment of radio of networks fixed and mobile to enable the link of communications, following the procedures established.

CR3.1 them specifications and documentation technical of them equipment and devices of radiocommunication, is interpreted and consulting, for its later configuration and put in service, taking in has the functionality of each one.

CR3.2 the specific parameters of devices and radiocommunication in the fixed and mobile network equipment are configured to enable the communications link, using the specific software tools for loading parameters, following the instructions given in the work order.

CR3.3 the configuration of them devices is verifies using them tools and useful specified, to check its functionality, following them instructions indicated in the order of work, reinitializing the device for load the configuration if was necessary.

CR3.4 them activities performed, as well as them incidents detected, is document in format standard for its use later, following the procedure established by the organization.

CR3.5 the documentation technical specific associated, is interpreted, in his case, in the language foreign of use more frequent in the sector.

RP4: make them procedures of verification of the connection of them devices and equipment of radiocommunication fixed and mobile, to ensure the functionality of the network, following instructions specified in the Protocol of tests.

CR4.1 communication between fixed radiocommunication devices is verified, according to the procedures established by the Organization, using the tools appropriate, and in accordance with established security standards.


CR4.2 communication between mobile radiocommunication devices is verified, according to the procedures established by the Organization, using the tools appropriate, and in accordance with established security standards.

CR4.3 measures of exposure are carried out to verify that the radiation is not excessive, using instrumentation and equipment, following the procedure established by the Organization and in accordance with established security standards.

CR4.4 measures for the verification of the coverage area of the base station are carried out to verify the estimates made in the project and the areas which gives service, following the procedure established by the Organization and in accordance with established security standards.

CR4.5 them tests of integration of them devices and equipment in the network of radiocommunication is made for verify its functionality, following procedures established and taking in has them criteria of quality of the organization.

CR4.6 the activities carried out, as well as the detected incidents, documented format standard for later use, following the procedure established by the organization.

Media production equipment of radio of fixed and mobile networks professional context. Equipment for the measurement of specific parameters of radio of fixed and mobile networks. Specific software tools for the measurement and load in the equipment and system parameters. Tools for internal use for the documentation of the performed processes. Software installation tools. Network and services management software tools. Office Tools. Instrumentation and exposure measurement equipment. Elements of protection and safety. Laptops. Spectrum analyzers.

Products and results installation of the devices and equipment for radiocommunication verified. Equipment of radio's networks fixed and mobile with your software installed. Fixed and mobile networks radiocommunications equipment configured and verified.

Information used or generated project (or part of the project) of the system of radio communications. Specifications and requirements for installation of the teams of radiocommunication. Regulations and standards. Quality criteria of the organization. Setup procedures. Installation procedures. Test protocol. Documentation on safety and occupational health standards. Electronic equipment installations safety regulations. Manuals and technical specifications of the radio equipment. Reports of installation and verification. Reports of trials and errors. Measurement reports. Documentation on fixed and mobile network security protocols.

Competition 3 denomination unit: maintain and resolve incidents of first level in systems of RADIOCOMMUNICATION networks fixed and mobile level: 2 code: UC1212_2 realizations professionals and criteria of performance MOP1: perform periodic maintenance of devices and radio of fixed and mobile network equipment, in order to ensure the communications services within the quality parameters required by the Organization following established procedures.

CR1.1 preventive maintenance of various elements and equipment of the radiocommunication system procedures are interpreted, to identify the tasks required to maintain the functionality of the system, taking into account the technical specifications of the same.

CR1.2 Visual indicators of alarm summary presenting the radiocommunication equipment hardware are inspected to verify the correct operation of the same, according to the established procedure.

CR1.3 wiring between radiocommunication equipment and other systems of transmission, between them and power systems, as well as the associated radiant system is inspected visually to verify that they have not suffered damage that may cause failures in the system, according to the established procedure and complying with safety regulations.

CR1.4 visual inspection of the installation is performed to determine if there have been changes in the it environment that have given rise to the emergence of potential obstacles that can disturb the signal strength, according to the established procedure.

CR1.5 local radio communications equipment management software applications are used to make field measurements, checking if significant variations there respect the values reflected in the document of evidence of acceptance of the equipment in question, that might give evidence of a malfunction of any radiocommunication equipment module.

CR1.6 radiocommunication equipment ventilation units are cleaned or replaced to ensure the operation of the equipment in the climatic conditions suitable for operation, according to the established procedure and complying with the rules of safety.

CR1.7 batteries of the associated radio communications and power systems equipment equipment are checked or replaced to maintain its operation, according to the established procedures and complying with safety regulations.

CR1.8 radiocommunication equipment software updates are performed to correct errors or add new features, following the established procedures.

CR1.9 the activities carried out, as well as the detected incidents, documented format standard for later use, following the procedure established by the organization.

Rp2: Meet alarms presented by hardware devices and equipment of radio of fixed and mobile networks, and by their local management software, to detect the origin of the anomaly, according to specifications received.

CR2.1 the diagnosis of incidence is made in adequate time, using tools and specific instruments, following the procedures established, in accordance with standards of safety and taking into account the technical documentation of each team.

CR2.2 Visual indicators alarm presenting each module of radiocommunication equipment hardware, are inspected to try to refine modules that may be damaged, taking into account the critical aspects of alarm that present.

CR2.3 software applications of local management of fixed and mobile networks radiocommunications equipment are used, for more information about incidents that have different units that make up the teams, and showing an indication of failure or malfunction, according to specifications received.

CR2.4 software applications of local management of fixed and mobile networks radiocommunications equipment are used, make records of field allowing to check if the incidence presented by radiocommunication equipment corresponds with the actual breakdown of a unit, or by an anomalous propagation condition occurs.

CR2.5 the activities carried out, as well as the detected incidents, documented format standard for later use, collecting information for the update of the historical incidents, according to the procedure established by the organization.

CR2.6 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

RP3: Repair troubleshooting of devices and fixed and mobile radio equipment to maintain the functionality of the network, following established protocols and procedures.

CR3.1 the wiring associated with a unit of radiocommunication equipment is checked that it is properly labeled, and label if necessary, so that during the replacement of the faulty unit there are no mistakes in wiring, following the procedure laid down and in accordance with established security standards.

CR3.2 devices and equipment of radio presenting wrong operation are adjusted using specific tools to return to its optimum performance, with the precision required, following the established procedures and standards of safety.

CR3.3 the code of spare units is identified to verify that it is the same or that it is compatible with the unit being replaced, according to the indications of the technical documentation of the equipment.

CR3.4 the faulty drive hardware configuration is consulted if needed to be copied to the spare unit, following the established procedures.

CR3.5 the damaged units are replaced using specific tools that prevent the deterioration of the same in the process of replacing, according to the established procedure and in accordance with standards of safety.

CR3.6 operation of the equipment of radio, after the repair of the fault, is checked and verified that it fits the conditions reflected in acceptance testing of specific equipment, using indicators of alarms that presents the computer hardware and local management software applications, according to the established procedure.

CR3.7 inventory of existing units is kept updated after a breakdown, using local management of radiocommunication equipment software applications, following the procedure laid down.


CR3.8 activities, as well as the detected incidents, documented format standard for later use, collecting information for the update of the historical break-downs of the team, according to the procedure established by the organization.

Professional context media production tools for electrical and mechanical works. Instruments for measuring electrical quantities. Software and Hardware of diagnosis. Power meter. Software installation and utilities of radio communication equipment. Computers and peripherals. Multitest teams. Cameras. The specific programmes of local radio frequency management software. Installation-specific tools. Copper, fiber optic, coaxial and waveguide cables cables. Elements of protection and safety. Laptops.

Products and results fixed and mobile radio equipment maintained. Reports of damaged units. Files of inventory of units installed. Files of back-up of the configurations of the equipment of radio communication.

Information used or generated work orders. Description of troubleshooting parts. Information technical of devices. Manual technical of service of the equipment that is van to maintain and repair. Internal service leaves on breakdowns by team statistics. Historical incidents. Standards of personal safety and materials and equipment. Manuals of procedures. Maintenance plans. Technical documentation of the radiant systems and radio communications equipment manufacturers. Outcome document of the radiocommunication station acceptance testing protocol. Document of procedure of updating of software. Technical documentation of radio communication equipment. Technical documentation of power systems associated with radio communication equipment. Manual installation of radiocommunication equipment. Programs of local management of radiocommunications equipment manuals. With rules, regulations and standards (ITU-T, ITU-T, national table of frequency allocation, occupational hazards, radiation ICNIRP, ETSI, ISO, CE). Documentation on fixed and mobile network security protocols.

III. formation of professionalism certificate training module 1 name: commissioning and maintenance of wireless networks for LOCAL and metropolitan AREA.

Code: MF1210_2 professional skill level: 2 associated with the competition unit: UC1210_2: commissioning and maintain wireless local and metropolitan area networks.

Duration: 150 hours training unit 1 name: sunset in service of networks wireless AREA LOCAL and metropolitan.

Code: UF1847 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and criteria of evaluation C1: identify the functions and features of devices and PCs on a wireless network for local and metropolitan area for further configuration.

CE1.1 describe the main characteristics of the reference standards of wireless technologies based on the rate of data transfer, the scope of the coverage area and its typical application.

CE1.2 define the functions and features of the device / equipment in a wireless network of local or metropolitan area: access point, antennas, network adapter, indoor unit of Subscriber, router, among others, for its commissioning.

CE1.3 explain the basic techniques of placement and orientation of devices and a wireless local area network equipment to achieve optimum coverage.

CE1.4 describe the techniques of power over twisted pair (PoE) for access points and acknowledge the constraints imposed by this means.

CE1.5 describe the techniques and tools of inventory used in the net to register of devices and equipment that make it so as your settings and changes.

CE1.6 carry out the identification of devices and equipment that form a network of local and metropolitan area to categorize and describe its functionality, given technical specifications:-classify the devices according to their typology and functionality.

-Recognize the indicators and the State of operation of the devices according to instructions in the technical manual.

-Check the registry of devices in inventory.

-Identify the connections between the devices and equipment.

-Interpret the documentation technical associated, even if is edited in the language foreign of use more frequent in the sector, using it's help.

C2: apply them procedures of configuration of the equipment and devices of networks wireless of area local and metropolitan for his put in service, following specifications technical.

CE2.1 describe them parameters configurable of the computers and devices in a network wireless of area local and metropolitan.

CE2.2 interpret them procedures of configuration of the computers and devices in a network wireless of area local and metropolitan.

CE2.3 use tools software and assistants for the configuration of the devices and equipment depending on the specifications technical and functional.

CE2.4 set up a wireless network with a single point of access and local coverage in the interior of a building to enable communication in the same, according to given specifications:-locate elements on the map of the network and identify the roles played.

-Check that the location of the point of access and that them wiring of network and power comply with the requirements established.

-Determine from the information specified in the order of work and in the documentation technical of the point of access, as establish a session of configuration from a computer laptop.

-Established the session of configuration enter them parameters basic of settings (SSID, channel of radio, key and type of encryption), prioritizing in this work the use of menus assisted (Wizard).

-Save the configuration and restart the point of access.

-Create on a computer with a wireless network adapter, a network connection with the SSID of the configured access point, enter the key and the type of security encryption, verify that there is Association.

-Register the settings of the equipment in the inventory.

-Register the tasks carried out following indications of the guide of the procedure.

-Interpret the documentation technical associated, even if is edited in the language foreign of use more frequent in the sector, using it's help.

CE2.5 perform the integration of equipment computer and of communications in a network wireless in the inside of a building with several points of access already configured e installed to enable the communication between them teams and it network, following specifications given:-locate them elements in the map of the network e identify them functions that play.

-Classify available network adapters (PCI, PCMCIA, MiniPCI, and USB) among others adapting each to the installation and equipment requirements to join the wireless network.

-Collect all available information of network adapters and the necessary drivers for each operating system, as well as utilities software required for your installation.

-Install the wireless network adapter, observing established safety and security media and using the tools in each case.

-Insert by using the tools of the installed network adapter, or operating system software parameters that allow the Association to the appropriate access point and are reflected in the work order.

-Apply the functional and operational testing of the installed device procedures, verifying that equipment is correctly associated with the wireless network.

-Register the settings made and the software settings in inventory.

-Register the tasks performed, following signs to guide the procedure.

C3: Apply test and verification procedures to determine connectivity devices and wireless local and metropolitan area network equipment, according to given specifications.

CE3.1 describe the procedures of test and verification technical thereof applicable to each device and computer on the wireless network, according to the specifications.

CE3.2 distinguish physical security systems and access restrictions to devices and computers on your network for application in testing and verification procedures.

CE3.3 perform measures of exploration during an inspection process prior to the implementation of a local or metropolitan area network, according to given specifications:-identify the tools necessary to carry out the measures: laptop with wireless network adapter, network monitoring and software testing, among other access point.

-Locate Access configured for measures of exploration in the required location, point following the standard procedures.

-Take user defined areas and record the signal levels as well as the ratio / noise for each point indicated.


-Detected during the scan measures the existence of active channels used by adjacent access points other than the test scoring the busy channel and its level of signal for further analysis.

-Determine the approximate limits of the coverage area for the access point under test, according to the used standard and work order specifications.

-Locate, making, if I required photographs thereof, the construction or furniture elements that can hinder potential on the propagation of radio signals and are not covered in the operating instructions is the inspection process.

-Register values in the order and format described by the instructions on the inspection process.

CE3.4 Verify the connectivity of computers and devices in a wireless network already implemented local or metropolitan area to ensure its functionality, according to given specifications:-identify computers and network devices to verify.

-Recognize the test and applicable to each device or equipment verification procedure.

-Identify the impact in the service of the procedure of verification to apply.

-Test with the appropriate equipment.

-Register the tasks performed, following signs to guide the procedure.

Contents 1. Standards and components of wireless local and metropolitan area networks.

-Fundamental concepts of propagation and radio frequency.

-Data networks.

-Types of networks according to the geographical scope - scope of application of networks of Local and metropolitan.

-Network topologies.

-Access protocols.

-Wireless networks with wired networks.

-Wireless local area networks.

-Classification, reference standards.

-Standard 802.11: architecture, development and security.

-Devices and equipment of networks of area local, HW and SW:-adapters in network. Classification: PCI, PCMCIA, USB and MiniPCI, others.

-Access points, antennas, among others.

-Power electric on pair twisted (PoE). Limitations.

-Networking Wireless from area metropolitana.

-Classification, standards of reference.

-Standard 802.16.

-Devices and equipment of Wireless metropolitan area networks:-subscriber unit.

-Base stations.

-Antennas.

-Power.

-Techniques and inventory tools.

2. integration and configuration of equipment in wireless local and metropolitan area networks.

-The location.

-Installation requirements.

-Location of points of access - location of the elements of the network - location of energy sources.

-Wireless local area network configuration.

-Configuration of parameters at the point of access - configuration tools.

-Configuration of the protocols and security keys.

-Checking for connectivity from the access point.

-Integration of computers and communications.

-Adapters and drivers installation processes.

-The parameters of the network adapter configuration tools.

-Installed devices test procedure.

-Integration of computers into an existing network.

-Metropolitan wireless network configuration.

-Configuration of a metropolitan network parameters.

-Configuration tools.

-Testing the equipment.

-Tests of network connections.

-Location and orientation of the antennas.

-Resolution of conflicts.

-Peculiarities of settings for different systems operating.

3. operations of test and verification in networking wireless of area local and metropolitan-map of coverage.

-Procedures basic of measures of exploration and coverage.

-Evidence of connectivity between devices and equipment.

-Tests of security of the network.

-Supervision and monitoring of the network.

-Management of utilities and implementation specific.

-Identification of obstacles or elements that affect the spread.

-Documentation of the measures carried out and results obtained.

TRAINING unit 2 name: SUPERVISION and maintenance of wireless networks for LOCAL and metropolitan AREA.

Code: UF1848 duration: 90 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and C1 evaluation criteria: describe the types and characteristics of the effects of the devices and equipment of wireless local and metropolitan area networks, and proceed to your solution according to given specifications.

CE1.1 define the meaning of alarms and alerts of devices and equipment which form the wireless local and metropolitan area network and the types of incidents that occur in them, to ensure the provision of services.

CE1.2 describe the techniques and tools that are used to isolate and diagnose the causes that have produced an incidence, considering symptoms detected in the wireless network and the information reported by users for its solution.

CE1.3 select and apply the procedures of diagnosis and repair of the incidence in the network wireless depending on the device and equipment affected.

CE1.4 solve an incidence in which a team of user not can associate is to a network wireless, following some specifications given:-check from another team of reference if is possible make the Association to determine if the anomaly is produces in the end of user or in the of the point of access.

-Check the parameters basic of configuration for the connection of network selected in the team of user.

-Check that the system operating recognizes correctly the adapter wireless and that not there are conflicts with other devices hardware.

-Check that the network selected by the user connection is adequate and there are no other points of access or adjoining networks interfering with it.

-Check that them indicators bright of the point of access is found in the State right and that the unit is properly powered by the source of supply electric.

-Check that the orientation of the antennas is the adequate and that is found in good state.

-Establish a session's configuration using a connection wired direct and verify those parameters basic of configuration of the point of access.

-Restart the point of access before return to perform new tests in association with the same.

-Write down the symptoms and register the procedure used.

-Register the tasks carried out following indications of the guide of the procedure.

Contents 1. Diagnosis and resolution of faults in incidents of first level in networking wireless of area local and metropolitan.

-Procedures of diagnosis, localization and repair of breakdowns of first level.

-Diagnostic tools.

-Types of faults in networks of area local and metropolitan.

-Alarms and alerts.

-Association.

-Power.

-Orientation of antennas.

-Connection of equipment.

-Conflicts between devices-interference.

-Measures of protection and security.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance unit training 1-UF1847 90 50 unit training 2-UF1848 90 40 sequence: for access to the unit training 2 must have is exceeded it unit training 1.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.



TRAINING module 2 name: configuration and commissioning of equipment for RADIOCOMMUNICATION in fixed and mobile networks.

Code: MF1211_2 professional skill level: 2 associated with the competition unit: UC1211_2: set up and service radio of fixed and mobile network equipment.

Duration: 150 hours.

TRAINING unit 1 name: Commissioning of the devices and equipment of radio of fixed and mobile networks.

Code: UF1849 duration: 90 hours referrer of competition: this training unit corresponds to the RP1, RP2 and RP3 capabilities and C1 evaluation criteria: distinguish the functions of devices and equipment of radio of fixed and mobile networks as well as their connections, and conducting installation verification according to the given specifications.

CE1.1 list radio technologies employed in fixed and mobile radio networks, taking into account standards and associated protocols.

CE1.2 explain the functions of devices and equipment of radio of fixed and mobile networks as well as the interfaces that are used for the connection between them, and the same network backbone.

CE1.3 quote protocols that are used in networks of fixed and mobile, radio according to the technologies used in the connection.

CE1.4 list the standards applicable to interfaces for connection of radio, between themselves and with the core network devices, explaining its characteristics of data rate and functional.


CE1.5 describe the techniques and tools used in the process of verification of the installation of devices and the network of fixed and mobile radio equipment.

CE1.6 verify the installation of the equipment of a radiocommunication system, according to given specifications:-identify the computers and devices that make up the system to check.

-Identify the standards of safety to meet in the verification.

-Check the transceiver and the radiant system using specific tools and supplies.

-Check the connection between the devices and equipment and the radiant system using specific tools.

-Record the activities undertaken and the impact produced according to specified formats.

C2: Procedures of installation of the software and configuration of devices and equipment of radio of fixed and mobile networks for their commissioning according to given specifications.

CE2.1 describe the procedures to implement the software and load configurations on fixed and mobile networks radiocommunication devices.

CE2.2 explain the function and values of the main parameters involved in the configuration of devices of radiocommunication in fixed and mobile networks, taking into account the technical specifications of the same.

CE2.3 install the software of radiocommunication devices in fixed and mobile networks for its subsequent configuration, according to given specifications and following established procedures:-identify the software to be installed and the corresponding equipment.

-Install the software according to the established procedure using the specified tools.

-Register the software version to keep the record of the team.

-Verify the functionality of the team with the new software installed.

-Record the activities undertaken and the impact produced according to specified formats.

-Interpret the associated technical documentation, even if it is published in the foreign language most often used in the sector, using the help.

CE2.4 perform the configuration in a device of radio of networks fixed and mobile for the implementation of a service of communications, according to some specifications given and following them procedures established:-identify the team of the network radio to configure.

-Select the configuration to deploy using the means and tools specified.

-Perform the configuration according to the established procedure.

-Verify that the services of communication required are enabled.

-Register the activities carried out and the incident produced according to formats specified.

-Interpret the documentation technical associated, even if is edited in the language foreign of use more frequent in the sector, using it's help.

Contents 1. Fixed and mobile radio networks.

-Elements and technologies used in radiocommunication systems.

-Private mobile networks. Standards.

-Networks of mobile telephony, protocols, services, and technologies.

-Access via radio networks in terrestrial fixed systems, classification, and technologies.

-Related concepts.

-Channel up and down.

-Coverage.

-Transfer.

-Roaming.

2. components of fixed and mobile radio networks.

-Fixed radio networks architecture.

-Equipment and devices for fixed radio networks.

-Types.

-Features.

-Operation.

-Connections.

-Architecture of mobile radio networks.

-Equipment and devices of mobile radio networks.

-Types.

-Features.

-Operation.

-Connections.

3 putting into service of equipment in fixed and mobile radio networks.

-Commissioning procedures.

-Installation of the software on computers.

-Update of the inventory of software.

-Documentation of tasks, issues, and test results.

4. configuration of equipment in fixed and mobile radio networks.

-Parameters and tools of configuration in networks fixed, performance and features. Testing of functionality.

-Parameters and tools of configuration in networks mobile, performance and features. Testing of functionality.

-Document in the format specified them tasks made, of them incidents produced and of the results of the tests.

5. rules of safety applicable to it put in service of equipment of radio communications fixed and mobile.

-Measures of protection and security.

-Standards of security staff in the work.

-Regulations and recommendations relating to the exposure to radiation.

TRAINING unit 2 name: check the connection of the devices and equipment of radio of fixed and mobile networks.

Code: UF1850 duration: 60 hours reference of competition: this unit training is corresponds with the RP4.

Capabilities and criteria of assessment C1: apply procedures of test and verification in them devices and equipment of radio of networks fixed and mobile to ensure the functionality of them same, following specifications given.

CE1.1 identify the parameters to test, according to the implementation particular of them devices of radiocommunication of networks fixed and mobile used.

CE1.2 quote them techniques and tools of test that is used to verify them devices of radiocommunication of networks fixed and mobile implanted.

CE1.3 classify them procedures of test to apply to verify the communication between them devices of the network of radiocommunication, taking in has them teams involved and their features.

CE1.4 describe the processes and the tools that is used for the takes of measures both of exhibition as of exploration of the area of coverage.

CE1.5 quote the regulations and recommendations of security concerning them measures of exposure to radiation in systems of radiocommunication to meet in the environment of work.

CE1.6 verify the start-up of devices of radiocommunication networks, fixed and mobile, according to given specifications and following established procedures:-identify the teams involved in practical settings.

-Identify the features of them teams installed starting from their specifications, as well as the procedures of test applicable-discriminate them parameters and procedures of test, as well as the order of realization.

-Apply the standards of safety in the work.

-Carry out the tests.

-Interpret the results obtained.

-Register the activities carried out and the incident produced according to formats specified.

CE1.7 perform the measurements of exposure following some specifications received:-select them elements of measure to use.

-Identify and apply the measures of security in the work, as well as from exposure to fields electromagnetic.

-Carry out the measures of exposure.

-Register the results of the measures and scale them to the level top.

-Record the activities undertaken and the impact produced according to specified formats.

CE1.8 exploration of area of coverage measurement following received specifications:-select the measurement to use elements.

-Identify and apply safety measures at work and exposure.

-Measurements of exploration of the area of coverage.

-Record the results of the measurements and scale them to the top level.

-Record the activities undertaken and the impact produced according to specified formats.

Contents 1. Operations testing and verification in fixed and mobile radio networks.

-Identification of the computers and devices that make up the system - instrumentation, characteristics and application of measures, tools for verification of the operation of the equipment.

-Verification of the installation of devices and equipment.

-Instruments for measurements of electromagnetic fields.

-Measurements of parameters.

-Measurements on devices. Test procedures.

-Connection between the teams and the radiant system verification - verification of the installation of the transceiver and the radiant system.

-Record the results, tasks performed and occurrences produced according to specified formats.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 40 training unit 2 UF1849 - UF1850 60 20 sequence: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: first level of equipment of radio of fixed and mobile networks.

Code: MF1212_2 level of professional qualification: 3 associated to the unit's competition: UC1212_2 maintain and resolve incidents of first level in fixed and mobile networks radiocommunication systems.


Duration: 210 hours training unit 1 name: maintenance of the devices and equipment of RADIOCOMMUNICATION networks fixed and mobile.

Code: UF1851 duration: 80 hours referrer of competition: this training unit corresponds to the RP1.

Capabilities and criteria of evaluation C1: identify the physical structure of the equipment of radio of fixed and mobile networks, the modules and units that form them, to facilitate the work of maintenance and replacement of damaged units.

CE1.1 classify the types of networks fixed and mobile radio technology and standards used and the function performed.

CE1.2 perform the block diagram of the various teams of radiocommunications that are fixed and mobile networks.

CE1.3 explain the internal structure and the functional blocks of fixed and mobile networks radiocommunications equipment, listing and describing the different functional parts of the same, according to the technology and standards.

CE1.4 explain the technical characteristics and identify the parameters characteristic of each of the modules and units of a system radio of fixed and mobile networks, according to technical specifications.

CE1.5 describing the systems of protection service (redundant) against faults or potential problems of propagation which incorporates radio of fixed and mobile network equipment.

CE1.6 describe the type of installation of equipment of radio of fixed and mobile networks by identifying the subastidores and units that form it.

CE1.7 describe the structure physical of them teams of radiocommunication fixed and mobile starting from the documentation of them same:-describe them units of the different modules, relating them elements real with them symbols that appear in the scheme.

-Explain the type, features and functionality of the units.

-Quote the functional blocks, explaining its type and features.

-Describe the variation in them parameters, characteristic of the units that form them equipment, performing modifications in them same, explaining the relationship between them effects detected and them causes that them produce.

-Develop a report memory of them activities developed and results obtained, structuring them in those paragraphs needed for a proper documentation of them themselves.

-Interpret the documentation technical associated, even if is edited in the language foreign of use more frequent in the sector, using it's help.

C2: Apply preventive maintenance procedures to the equipment and auxiliary systems for fixed and mobile radio communications, to ensure its operation and minimize or avoid service cuts.

CE2.1 recognize the preventive maintenance procedures to be applied to the different teams of the fixed and mobile radio networks.

CE2.2 identify the systems of power supply and ventilation of radiocommunication equipment as well as other required auxiliary elements, taking into account its functionality.

CE2.3 preventive maintenance of a base station of a mobile network to maintain the service and the functionality of the system, following the established procedures:-identify the various equipment and items to keep.

-Comply with safety standards.

-Carry out visual inspection of the indicators of alarms, the wiring of power and connection, the radiant system.

-Check and clean the ventilation units, and if necessary replace them.

-Check the batteries of the equipment and power systems, and if necessary replace them.

-Perform software updates.

-Register the activities carried out and the incident produced according to formats specified.

CE2.4 perform preventative maintenance on a mobile radio network controller to maintain the service and the functionality of the system, following the established procedures:-identify the different elements to maintain.

-Comply with safety standards.

-Carry out visual inspection of the alarms, the wiring of power and connection indicators.

-Check and clean the ventilation units, and if necessary replace them.

-Check the batteries of the equipment and power systems, and if necessary replace them.

-Make backups of the configuration.

-Perform software updates.

-Check level of occupation of the hard drives, the lines of transmission, and the CPU occupation percentage.

-Record the activities undertaken and the impact produced according to specified formats.

CE2.5 perform preventative maintenance on a terminal of fixed radio network to maintain the service and the functionality of the system following the established procedures:-identify the different elements to maintain.

-Comply with safety standards.

-Carry out visual inspection of the alarms, the wiring of power and connection indicators.

-Check and clean the ventilation units, and if necessary replace them.

-Check the batteries of the teams, and if necessary replace them.

-Make backups of the configuration.

-Perform software updates.

-Record the activities undertaken and the impact produced according to specified formats.

CE2.6 interpret the technical associated documentation, even if it is published in the foreign language most often used in the sector, using the help.

Contents 1. Physical architecture of the fixed and mobile radio networks - physical fixed network radio system architecture. Characteristic parameters.

-Physical network mobile radiocommunication system architecture. Characteristic parameters.

-Networks of mobile radio base stations.

-Internal structure and functional blocks.

-Mounting types.

-Controlling of network radio mobile.

-Structure internal and blocks functional.

-Types of mounting.

-Terminals radio's network radio fixed.

-Structure internal and blocks functional.

-Units and modules that the form.

-Types of mounting.

-Antennas.

-Types of antennas (arrays, Omni-directional, satellite dishes).

-Concept of polarization antennas.

-Service (redundancy) protection systems.

1. operations of preventive maintenance of equipment and networks of fixed and mobile radio devices - preventative maintenance of the equipments and auxiliary systems.

-Instruments and equipment for Assembly and adjustment of radio communications equipment.

-Maintenance of the station base, network controller, Terminal radio and antennas:-preventive maintenance of a station base.

-Identification of the equipment and items.

-Visual inspection of the indicators of alarms, the wiring of power and connection, the radiant system.

-Checking and cleaning (in your case replacement) of the ventilation units.

-Check the battery of equipment and power systems, and where appropriate replace them.

-Software updates.

-Documentation of the process, tasks and incidents were found in the specified format.

-Preventive maintenance of a mobile radio controller:-identification of different elements to maintain.

-Visual inspection of the alarms, the wiring of power and connection indicators.

-Check and clean (if is necessary replace) those units of ventilation, and in your case replace them.

-Check the batteries of them equipment and of them systems of power, and in his case replace them.

-Copies of security of the configuration.

-Updates of software.

-Check level of occupation of them discs hard, percentage of occupation of the lines of transmission and of the CPU.

-Document the process, tasks undertaken to perform.

-Maintenance preventive of a terminal of network radio fixed.

-Identify the different elements to maintain.

-Perform the inspection visual of them indicators of alarms, the wiring of power and of connection.

-Check and clean the ventilation units, and if necessary replace them.

-Check the batteries of the teams, and if necessary replace them.

-Make backups of the configuration.

-Perform software updates.

-Record the activities undertaken and the impact produced according to specified formats.

-Systems of power (rectifiers, batteries and generators).

-Features and measures to be carried out.

-Electrotechnical regulations.

-Characteristics of circuit breakers and fuses.

-The system of power supply, grounding systems, wiring relays.

-Air conditioning systems.

-Streaming media:-coaxial Cables.

-Waveguide.

-Identification of types of cables and connectors.

-Waveguide pressurization systems.

-Instruments and procedures of measurement in the radiocommunication equipment.

-Conditions for correct operation.

-Maximum curvature.

-Influence of electromagnetic fields.

-Moisture.

2. safety standards applicable to the maintenance of fixed and mobile radio equipment - protective and security measures.

-Personal safety standards.

TRAINING unit 2 name: alarm devices management and equipment of radio of fixed and mobile networks.

Code: UF1852


Duration: 50 hours referrer of competition: this training unit corresponds to the RP2.

Capabilities and C1 evaluation criteria: identifying alarms, describe the types of incidences of devices and equipment of radio of fixed and mobile networks, according to given specifications.

CE1.1 classify first level alarms own devices and fixed and mobile radio equipment, to facilitate the diagnosis of incidents taking into account the technical specifications.

CE1.2 identify incidents that produced the first level alarms in devices and networks fixed and mobile radio equipment, related to each unit, in order to detect possible malfunctions.

CE1.3 explain the systematic troubleshooting and troubleshooting procedures to recover communications services interruption situations.

CE1.4 quote features of the applications software from local management to use in identification, treatment and resolution of alarms that have radio equipment.

CE1.5 perform the alarm detection and resolution, following received specifications and procedures:-inspect the Visual indicators presenting the radiocommunication equipment to locate the alarm.

-Interpret the documentation of the equipment, identifying the various blocks functional and parameters characteristic.

-Use them applications of management local to get information about the alarm and characterize it by the incidence that produces in the network.

-Measure and interpret the signals and parameters of radio communications equipment, making the necessary adjustments, in accordance with the documentation and using the appropriate instruments.

-Locate the device responsible of the breakdown, performing them modifications or substitutions necessary for such location with the quality prescribed, following procedures standardized, in a time suitable.

-Register the activities carried out and the incident produced according to formats specified.

CE1.6 interpret the documentation technical associated, even if is edited in the language foreign of use more frequent in the sector, using it's help.

Contents 1. Diagnosis of faults in incidents of first level in networks of radio fixed and mobile-types of alarms and incidents.

-Diagnostic procedures and troubleshooting for each type of device.

-Tools for diagnosis, treatment and resolution of alarms. Local and centralized network management systems.

-Documentation of the activities, the incidents and the results in the specified format.

TRAINING unit 3 name: troubleshooting of devices and equipment of radio of fixed and mobile networks.

Code: UF1853 duration: 80 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and C1 evaluation criteria: repair faults of first level of devices and equipment of radio of fixed and mobile networks, according to given specifications.

CE1.1 describe the connection and the type of input and output signals of the units that form the radiocommunication equipment to avoid errors during the repair of the fault.

CE1.2 classify typical faults in the equipment of radio of fixed and mobile networks that have to do with radio communications services.

CE1.3 explain the procedures systematic of resolution of incidents and repair of faults to recover situations of interruption of services of communications.

CE1.4 perform the replacement of a faulty unit, following the established procedure:-comply with safety standards.

-Determine whether it is necessary or not to cut the power of the unit to proceed to their replacement.

-Check the labelling of wiring to prevent errors of connection after the replacement.

-Select the right tools for the extraction of the cables connected to the unit as well as to remove the unit from the subastidor.

-Check the compatibility of the replacement of the faulty unit.

-Identify the configuration hardware unit to replace if necessary, to set up the spare drive - insert the new drive.

-Check the disappearance of alarms associated hardware, both at the level of local management software.

-Use local management applications to verify the operation and update the inventory of the units.

-Register the activities carried out and the incident produced according to formats specified.

CE1.1 interpret the technical associated documentation, even if it is published in the foreign language most often used in the sector, using the help.

Contents 1. Resolution of failure of first level in fixed and mobile radio networks - types of faults in radio of fixed and mobile network equipment.

-Troubleshooting and troubleshooting procedures.

-Local and centralized applications to identify, treat and solve the radiocommunication equipment alarms.

2 alarm detection and resolution of incidents.

-Inspect the Visual indicators to identify the type of alarm.

-Interpret the alarm using the technical documentation of equipment and local applications.

-Measure and interpret the signals and equipment parameters.

-Locate the device responsible for the breakdown.

-Modify or replace performing modifications necessary replacements following established protocol.

-Record activities and outcomes.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 80 40 training unit 2 UF1851 - UF1852 50 30 formative unit 3 - 80 40 sequence UF1853: formative units must be overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULES OF PROFESSIONAL PRACTICES OF FIRST LEVEL IN RADIOCOMMUNICATION SYSTEMS.

Code: MP0392 duration: 40 hours capacity and C1 evaluation criteria: participate in the commissioning and maintenance of networks wireless local and metropolitan area, as well as in the configuration and commissioning of radio of fixed and mobile networks and equipment maintenance and troubleshooting in such systems, in accordance with the procedures established in the company.

CE1.1 interpret the technical documentation associated with the equipment and systems of various types of networks.

CE1.2 collaborate on the commissioning and maintenance of wireless networks for local and metropolitan area according to the business processes.

CE1.3 participate in the configuration and commissioning of equipment for radiocommunication in fixed and mobile networks, as well as in the resolution of issues associated with such systems, in accordance with the procedures and plans of the organization.

CE1.4 work, at their level, in the maintenance and repair of devices and equipment of radio of fixed and mobile networks in accordance with the business plans.

CE1.5 documenting the work performed in accordance with the requirements and business processes.

C2: Participate in the process of work of the company, following the rules and instructions set forth in the work center.

CE2.1 behave responsibly both in human relations and works to be carried out.

CE2.2 respect the procedures and rules of the workplace.

CE2.3 undertaken with diligence the tasks according to the instructions received trying to it adapt to the pace of work of the company.

CE2.4 integrated into the production processes of the work center.

CE2.5 use established communication channels.

CE2.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Maintenance in radiocommunication systems.

-Inventory of radiocommunication systems and networks business.

-Operational specifications of the organization.

-The working parts, the parts of incidence and other business documentation.

-Maintenance plan.

-Standards and quality criteria defined by the organization.

-Tools used in the different business processes.

-Business processes for the commissioning and maintenance of wireless local and metropolitan area networks...

-Business processes of configuration and commissioning of fixed and mobile radio equipment.

-Procedures for maintenance, repair and management of alarms from devices and fixed and mobile radio equipment.

-Test protocols.

2. integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.


-Interpretation and execution with diligence the instructions received.

-Recognition of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. the trainers training modules required accreditation requirements * professional experience required in the field of competition with no accreditation MF1210_2 Accreditation Unit: commissioning and maintenance of wireless local and metropolitan area networks.





● Bachelor, engineer, architect or the title of corresponding degree or other equivalent securities ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities ● technician of the professional family of computing and communications.

● Professionalism certificate of level 3 in the area of communications and communications professional of computer science family.





2 years 4 years MF1211_2: configuration and commissioning of equipment for radiocommunication in fixed and mobile networks.





● Bachelor, engineer, architect or the title of corresponding degree or other equivalent securities ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities ● technician of the professional family of computing and communications.

● Professionalism certificate of level 3 in the area of communications and communications professional of computer science family.





2 years 4 years MF1212_2: maintenance of first level of equipment of radio's networks fixed and mobile.





● Bachelor, engineer, architect or the title of corresponding degree or other equivalent securities ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities ● technician of the professional family of computing and communications.

● Professionalism certificate of level 3 in the area of communications and communications professional of computer science family.





2 years 4 years * in the past five years.

V. requirements minimum of spaces, facilities and equipment space training surface m² 15 students surface m² 25 pupils classroom workshop of radio 80 90 space training M1 M2 M3 classroom workshop of radio X X X space training equipment classroom workshop radio - PCs installed in network and Internet connection.






 





-Cabinet with panels of patched and network connection devices: hubs, switches and routers.






 





-Base and network software.






 





-office software, internet tools.






 





-Antivirus and security software.






 





-Printer and peripherals.






 





-Laptop.






 





-Digital camera.






 





-Equipment and wireless communications devices.






 





-Field meter.






 





-Computer for connectivity testing instruments.






 





-Adapters for network wireless and antennas.






 





-Tools for installation.






 





-Software for specific purpose for all frequency bands involved (wireless local and metropolitan area networks).






 





-GPS Locator.






 





-Points of access, electronic in network and stations base of networks Metropolitan.






 





-Subscriber of fixed indoor and outdoor units of Metropolitan networks.






 





-Mobile devices.






 





-Portable testers for wireless and wired networks.






 





-RF power meters.






 





-Radio of fixed and mobile network equipment.






 





-Equipment for the measurement of specific parameters of radio of fixed and mobile networks.






 





-Specific software tools for the measurement and load in the equipment and system parameters.






 





-Software installation tools.






 





-Tools software of management of network and services.






 





-Instrumentation and measurement exhibition equipment.






 





-Spectrum analyzers.






 





-Instruments for measuring electrical quantities.






 





-Software and Hardware Diagnostics.






 





-Power meter.






 





-Software installation and utilities of radio communication equipment.






 





-Equipment multitest.






 





-Software with specific programs of local management of radiocommunications equipment.






 





-Counter.






 





-Installation-specific tools.






 





-Elements of protection and safety.






 





-Canon of projection.






 





-Flip chart.






 





-Slate.






 





-Classroom material.






 





-Table and Chair for the trainer.






 





-Tables and chairs for students.






 





-Auxiliary furniture for classroom equipment.





* Equipment and corresponding software must be updated.

Not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex VI I. identification of the certificate of professional designation: administration of database code: IFCT0310 professional family: computing and communications professional Area: systems and telematics level of professional qualification: 3 professional qualification of reference: IFC079_3 administration of databases (RD 295/2004 of 20 February and 16 September RD1087 2005 modifications) relationship of competition units comprising professionalism certificate : UC0223_3: Configure and exploit computer systems UC0224_3: Configure and manage a UC0225_3 database management system: Configure and manage the general competence database: manage a database system, interpreting its design and structure, and carrying out the adaptation of the model to the requirements of the management system (RDBMS) database, as well as the configuration and management of the physical and logical in order to ensure the integrity, availability and confidentiality of the information stored.

Professional environment: Professional develops his professional activity in the following areas:-enterprises or medium and large entities engaged in any productive sector, with information systems for the management of their business processes.

-Small companies, with the possibility of exercising as an autonomous professional.

-Companies that manage information systems for organizations.

Sectors production is developed in sectors where there are companies that carry out the following activities:-development of software.

-Outsourcing of it services.

-Technical information systems consultancy.


- And in general firms or entities that use computer systems for its management.

Occupations and relevant jobs Manager database technician in Data Mining (data mining) organic analyst duration of associated training: 650 hours of training modules and units training relationship: MF0223_3: operating systems and software applications (170 hours) ● UF1465: computers for database (60 hours) ● UF1466: storage (70 hours) ● UF1467 : Microinformaticas applications and Internet for consultation and documentation (40 hours) MF0224_3 generation: (200 hours) database management systems management ● UF1468: the introduction to the DBMS (50 hours) and storage ● UF1469: RDBMS and installation (70 hours) ● UF1470: Administration and monitoring of the DBMS (80 hours) MF0225_3: Management databases (200 hours) ● UF1471 : Relational databases and modelling of data (70 hours) ● UF1472: languages of definition and modification of data SQL (60 hours) ● UF1473: safeguard and security of data (70 hours) MP0313: module not working (80 hours) database management internship II. THE certificate of professional competence 1 denomination unit professional profile: Configure and EXPLOIT systems computer level: 3 code: UC0223_3 realizations professionals and criteria of performance MOP1: adapt the logical configuration of the system for exploitation, according to needs of use and within the policies of the organization.

CR1.1 the system parameters that affect the memory, processor and peripherals are in accordance with the needs of use.

CR1.2 the necessary devices and their control files are added or removed using operating system utilities.

CR1.3 the logical connections are configured to access remote services inside or outside the organization.

CR1.4 them parameters of the system that affect to the ergonomics or to the ease of use is fit to improve them conditions of work of the user, within them directives of the organization.

Rp2: Organize the information in the operating system file systems and maintain their properties to facilitate the use of resources and ensure compliance with the directives of the organization.

CR2.1 computer applications are organized with a structure and settings that allow its use in optimal conditions.

CR2.2 OS user information is maintained in structures organized in accordance with the possibilities of the system (files, directories, volumes, etc.) to facilitate access to such information and maintain uniformity in the various equipment of the organization.

CR2.3 structure and configuration of the file system are preserved in available to use to avoid accidental failures and share information.

CR2.4 storage space is kept free of useless or obsolete information to improve the performance of the system and increase its shelf life.

RP3: Develop and transfer documents through the use of general purpose applications.

CR3.1 office tools are used with the necessary skills to assist in the tasks of planning and documentation of the work.

CR3.2 Exchange of information with other people is done using the mail or electronic messaging systems to facilitate the flow of information and reduce costs and times when permitted by the nature of this exchange of information.

CR3.3 available on the Internet, or other network services, are obtained through the correct use of the tools (navigation, forums, ftp, etc. clients), to facilitate access to information necessary for the work.

RP4: Ensure the integrity, availability and confidentiality of information that it is responsible for and is stored in the file system.

CR4.1 stored information (software and data) may be returned to a State that allows its use at any time by, inter alia, backups.

CR4.2 access to information is protected through the use of passwords and other security measures established by the organization.

CR4.3 them media of protection facing disasters or access improper (antivirus, firewall, proxies, systems of management of changes, etc.) is implanted and used in the systems of which is is responsible.

CR4.4 the system is kept free of software not licensed.

CR4.5 the internal rules of the Organization and the current legislation on data protection are fulfilled in systems which it is responsible.

CR4.6 them incidents is reported to the administrator of systems to make them work appropriate.

Context professional means of production equipment computer and peripherals. Systems operating and parameters of configuration. Office Tools. File transfer and messaging services. Backup tools. Firewall, antivirus and proxy servers. Changes, incidents and configuration management tools.

Products and results computer system running with optimal performance and use of its resources. Connection network adequately within an organization. Operating system and applications configured and parameterized according to the needs. Files with information according to the nature of the activity professional developed (programs, scripts of consultations, documents of text, leaves of calculation, etc.) stored in support physical right. Backup copies of the information according to criteria of integrity, confidentiality and availability.

Information used or generated manuals of use and operation of computer systems. Manual operation of the associated software. Training material. Computer applications support systems. Supports technical assistance (telephone, Internet, messaging, forums, etc.)

Unit of competition 2 name: set up and manage a level database management system: 3 code: UC0224_3 realizations professionals and criteria of performance MOP1: install and initially parameterize the System Manager (DBMS) database to put underway, according to technical specifications and characteristics of subsequent exploitation.

CR1.1 the operating system adapts to the requirements of the DBMS according to the manufacturer's technical specifications.

CR1.2 devices, processes and physical space are configured according to the characteristics of the DBMS, operating system, hardware, storage needs and service requirements.

CR1.3 the data dictionary is created according to the specifications of the DBMS.

CR1.4 the cluster components, if applicable, are configured according to the DBMS, storage needs and availability of service policies.

CR1.5 utilities support additional (copies of security, loading and processing of data, etc.) are integrated into the existing operating environment.

CR1.6 the graphical administrative tools and command line interface are used both with skill, for installation and configuration tasks.

CR1.7 the responsibilities of local administrators are set individually in the case of multiple nodes.

CR1.8 in the case of distributed databases in which the DBMS is located on several nodes, the structure of each of the nodes is planned according to the database that is being considered to contain.

CR1.9 in the case of distributed databases are set the parameters required for distributed data management (time limits of transaction, number of distributed transactions, establishment of linkages between databases, etc.).

Rp2: Plan and perform administrative tasks of the management system of databases to allow optimum exploitation and according to established procedures.

CR2.1 the start and stop of the DBMS responds to the needs of the Organization's use and maintenance policies.

CR2.2 administrative tasks are planned according to the needs of the organization.

CR2.3 administrative tasks are encoded by sentences scripts or through the use of tools of the DBMS.

CR2.4 judgments scripts are tested in a controlled environment, verifying the results prior to implantation.

CR2.5 scripts for sentencing are scheduled for execution according to the needs of the Organization and interfering as little as possible in the operating system.

CR2.6 operating procedures are documented for use in production.

CR2.7 the data dictionary is used in those administrative tasks that require it, while maintaining its integrity.

CR2.8 data dictionary is updated after changes in the structure of the DBMS and its integrity preserved.

RP3: Monitoring the indicators of the System Manager of databases to assess the State of the system and the degree of compliance with the criteria of performance, making the necessary adjustments to their optimization.

CR3.1 database system performance criteria are established according to the general criteria of the Organization and those established for each database.

CR3.2 system is prepared for monitoring using trace tools, log files, performance, alert settings, and other elements of monitoring statistics.


CR3.3 system monitoring is conducted for the most suitable periods of time to draw conclusions about its performance.

CR3.4 the operating system and the physical devices conform to improve performance and correct operation anomalies detected in the database system.

The DBMS CR3.5 adapts to improve their performance or correct the detected malfunctions.

CR3.6 databases are adapted to improve its performance or correct the detected malfunctions.

CR3.7 monitoring systems information is used to analyze trends of behavior and anticipate issues and problems.

CR3.8 the documentation technical is interprets with correction both if is is edited in Castilian, in the language itself of it community autonomous or in the language technical of use usual.

RP4: Advising on the acquisition and updating of the logical and physical systems associated with the management system of databases that provide improvements in the performance of the system.

CR4.1 hardware and software are analysed and valued to make reports of necessity and feasibility on possible improvements and updates to the DBMS.

CR4.2 new versions, updates, tools, and alternatives are evaluated to determine the suitability of its implementation in the system.

CR4.3 the updates are planned and executed in cooperation with the affected areas and minimizing its effects on exploitation.

CR4.4 corrective maintenance of the DBMS and associated tools is carried out by applying the patches supplied by the manufacturer.

CR4.5 physical storage systems are configured and defined according to the needs and requirements of each DBMS.

Media production computer and peripheral equipment professional context. Operating systems and configuration parameters. (RAID, SAN, and NAS) storage systems. Cluster and support centers. Database design tools. Management of DBMS tools. Stands of copies of security. Tools office. Database management systems. Dictionaries of data (or catalogue, or tables of system). Languages of manipulation of data. Languages of control and definition of data. Management tools for log (log) files. Structured languages. Debugging tools. Change control tools. Planners of tasks. Performance monitors.

Products and results operating system and applications configured and parameterized according to the needs. Copies of security of the information according to criteria of integrity, confidentiality and availability. Consultations for the manipulation of the database in an interactive way. Applications that manipulate the database through embedded code. Logical connections are available to allow access to clients. Adequate mechanisms for the recovery of transactions. Commissioning and operating maintenance of DBMS network, either isolated execution or cluster. Programs for performing administrative tasks. Activation of controls for proper management of the security of the DBMS. Traces of system performance available for analysis.

Information used or generated manuals of administration and operation of the DBMS. Manual installation of the operating system. Manual operation of the operating system. Organigram of the organization. Knowledge of data communications networks. Standards of security (security plan) and quality of the organization. Legislation about data protection and confidentiality of the information. Manual of administrative tools. Online help manuals. Online technical support.

Competition 3 denomination unit: set up and manage the database level: 3 code: UC0225_3 realizations professionals and criteria of performance MOP1: make and modify the physical design of databases from the previous logical design, adjusting it to the requirements of exploitation of the database.

CR1.1 the design logical is valued and is adapts, if proceeds, to the features of the environment (number of users, volume of data, volatility, traffic of data dear, etc.) and to them standards of quality of the organization.

CR1.2 the tables, views, indexes and others objects own of a manager of database, is created using sentences DDL or tools administrative of the System Manager of databases (DBMS).

CR1.3 the allocation of space and them restrictions physical of the database is determined according to the features logical defined and to them requirements of exploitation.

CR1.4 in the case of distributed database information is fragmented according to the established structure of nodes and available fragmentation (vertical, horizontal or mixed) techniques.

CR1.5 for databases distributed is established them mechanisms necessary to maintain the synchronization between them, guaranteeing the integrity.

CR1.6 in the case of databases distributed, the scheme of distribution of them fragments in them nodes, is performs taking in has the Organization logical of the database, the location of them applications, their features of access and features of the system in each node.

CR1.7 in the case of databases distributed, the scheme of replication is sets ensuring the safety and efficiency of them consultations (databases fragmented, partially replicated and fully replicated).

CR1.8 the dictionary of data is used in those tasks of maintenance of the database that it required, keeping its integrity.

Rp2: Implement the policy of access control in database managers following the safety rules of the Organization and the legislation CR2.1 the access control policy and activity is applied according to the standards of security of the Organization and the current legislation.

CR2.2 security profiles are defined and maintained according to the security policy of the Organization, through sentences DCL and /or scripts administrative tools.

CR2.3 activity log is configured to carry out the monitoring of the activities performed by the users, and detect deficiencies in access control systems.

CR2.4 measures of implementation of the security policy document conforming to the standards of the organization.

RP3: Plan and perform backup copies, as well as the recovery of data if necessary, always subject to the Organization's security standards.

CR3.1 policy of backup and disaster recovery are defined and applied according to the Organization's security standards and the requirements of each database.

CR3.2 the DBMS in the backup center maintain updated information so that it can be recovered in case of disaster.

CR3.3 storage of the copies is monitored, noting that they will meet the standards of the Organization (fireproof cabinets, different physical location, etc.).

CR3.4 backup copies are retrieved at the request of the person in charge of the data according to the rules of the organization.

RP4: Enable access to the databases according to criteria of confidentiality, integrity and availability.

CR4.1 initial data loading is performed in the database, and the result is contrasted with the original information to ensure consistency.

CR4.2 the necessary connections for access from clients are enabled according to the networks and protocols available.

CR4.3 database has enabled the mechanisms of recovery of transactions that ensure the integrity of the information to perform operations on the data.

CR4.4 mechanisms to ensure the confidentiality and integrity of information that is obtained and that is stored in the database (cryptography, checksum algorithms of signature, etc.) available in the DBMS are enabled.

CR4.5 the implementation strategy and the optimization of queries are set to minimizing response times and transfers of data over the network.

CR4.6 restrictions on use of the database as specified and documented to ensure optimum performance.

CR4.7 data are imported and exported with available tools according to established procedures for the transfer of information between different databases or systems.

CR4.8 in the case of distributed databases are established the necessary mechanisms to maintain the synchronization between them, guaranteeing the integrity.

CR4.9 in the case of distributed databases are established information replication mechanisms.

CR4.10 in the case of distributed databases, the integrity of the same guarantees satisfying the properties of atomicity, consistency, isolation, and persistence of the transactions.

CR4.11 in the case of distributed databases, concurrency control is established to ensure the consistency of the databases in a multi-user environment.

Media production professional context


Computer and peripheral equipment. Operating systems and configuration parameters. Storage systems. Cluster and support centers. Database design tools. Management of DBMS tools. Backup media. Office Tools. Database management systems. Dictionaries of data (or catalogue, or system tables). Data manipulation languages. Control and data definition languages. Tools for management of files of log. Languages structured. Change control tools. Planners of tasks. Monitors for performance. Tools for debugging. Query optimizers.

Products and results databases available for use. According to the planning backups. Activity in the database records. Access profiles according to planning. Connections on clients to access the database. Setting up mechanisms for recovery of transactions. Copies of the database in the backup center. Procedures of import and export of data. Strategy of execution of queries efficient that minimize the times of response. Consultations for the manipulation of the database in an interactive way. Logical connections are available to allow access to clients. Adequate mechanisms for the recovery of transactions. Commissioning and operating maintenance of DBMS network, either isolated execution or cluster. Programs for performing administrative tasks. Traces of system performance available for analysis.

Information used or generated manuals of administration and operation of the DBMS. Manual installation of the operating system. Manual operation of the operating system. Organigram of the organization. Standards of security (security plan) and quality of the organization. Legislation about data protection and confidentiality of the information. Manual of administrative tools. Online help manuals. Online technical support. Knowledge of data communications networks. Logical and physical database designs. Backups record book. Manual operation of the existing databases.

III. formation of the certificate of professionalism module training 1 name: operating systems and applications computer code: MF0223_3 level of professional qualification: 3 associated to the competition unit: UC0223_3: Configure and exploit computer systems duration: 170 hours training unit 1 name: computers for database code: UF1465 duration: 60 hours referrer of competition: this training unit corresponds to the RP1 capabilities and C1 evaluation criteria : Differentiate the main components of a computer showing its features and specifications.

CE1.1 explain the main components of a computer or server for general purpose on the basis of its function and utility.

CE1.2 list and describe the elements of the plate a computer base recognizing its main functions.

CE1.3 classify the types of main processors according to their technological family, historical evolution and most relevant features.

CE1.4 classify and explain the peripherals and components of a computer input/output main signaling function in the whole of the system.

CE1.5 list and classify the main commands of the instruction set of low level of processor on the basis of the function running.

CE1.6 in a series of practical cases of configuration of systems with properly characterized by diagram of connections and technical documentation:-identify the base plate and recognize: the processor, the memory banks, locate the disks and floppy disk and CD drives / DVD, locate the /salida input connectors and classify them by type.

C2: Analyze the main functions of an operating system multi-user and multi-tasking, recognizing and classifying the different types of existing operating systems.

CE2.1 explain the concepts of core, virtual core and an operating system command interpreter.

CE2.2 explain modes of address and store files and filesystems from an operating system and structured reading and editing permissions.

CE2.3 analyse the role of memory in the process of computer tasks and identify concepts related to it: central and expanded memory, virtual memory and paging and Exchange.

CE2.4 list the different policies of cast time of processor implemented in operating systems, identifying the impact of each of these types of processes.

CE2.5 recognize and explain the changes of context, traffic lights, work scheduler functions and handlers of interruptions in the functioning of the multiuser and multitasking operating systems.

CE2.6 explain the different mechanisms of input/output that runs an operating system based on resource management.

CE2.7 classify operating systems and architectures for different forms that historically have been used.

CE2.8 from a practical course of a computer system configuration multiuser and multiprocessor:-install different operating systems on the machine by identifying the milestones of the process.

-Configure the paging and memory Exchange areas and recognize its impact on the system.

-Create and interpret resource locks and their impact on the behavior of the system.

-Create and organize files and file systems.

C3: Differentiate and analyze the operating system configuration variables, specifying their effect on the behavior of the system.

CE3.1 list and explain the different types of logic devices used for the installation of applications and services.

CE3.2 recognize and explain the main parameters of configuration of the kernel of an operating system and its impact on the behavior of the system.

CE3.3 analyze the main services that run on an operating system and its influence and competence in the management of resources.

CE3.4 describe the different ways to monitor and adjust the components of an operating system, and analyze trends from the State of charge.

CE3.5 correlate alarms sent by the previously implemented monitoring system and define events for its resolution.

CE3.6 from a practical course for technical documentation of the installation and configuration of the operating system:-make the structure of files and file with user permissions.

-Detailed processes started on the machine.

-Detailing the State of charge: occupation on disk, memory usage, identify the networks defined in the system, install and compile different handlers components hardware device, boot the system monitors and analyze data in real time and in aggregate mode.

Contents 1. Definition and identification of the structure and main components of a general-purpose according to their function and utility - PC processor:-identifying the different types of processors (CISC and RISC), as well as their different parts (Set of instructions, registers, counter, Unidaitmetico-logic, interruptions).

-Enumeration and classification of main family 8086 processor instruction sets.

-Advantages and disadvantages of CISC and RISC models.

-RAM memories and xPROM:-description of the current RAM memories and DDR, SDRAM differences models.

-Description of models of xPROM memories.

-Definition of memory caches.

-Levels of cache.

-Determination of its importance in the performance of the system.

-Assessment of the memories for speed and cost of storage unit.

-Input/output interfaces: – external devices.

-General of common interface types enumeration.

-Disc:-definition and description.

-Identification and location of the parts of mechanical drives.

-Classification of disks by its input/output interface.

-Advantages and disadvantages of the different types of disks.

-Analysis of the SCSI disk and its interface.

-Analysis of the solid state disk and its advantages and disadvantages as a means of replacement mechanical disk storage.

-Analysis of the SATA drive and compared to PATA drives.

-Families and types of processors:-classification of the families of those processors based is in its compatibility with the microprocessor 8086 of Intel (CISC and RISC).

-Classification and models of processor of 64 bits.

-Advantages and disadvantages of different solutions from the leading manufacturers.

-History of Intel processor from the 8086 model the Pentium family.

-Comparison with AMD.

-Processor Power. Advantages and types of peripherals.

-Classification by peripheral input or output.

-Introduction to Assembly language.

-Development of a practical course of identification and Assembly of a computer, according to the guidelines indicated.

-Operating systems.

2. functions and objectives of operating systems and memory management - the operating system and user interface / computed.

-The operating system as a resource manager.

-Ease of evolution of an operating system.

-Requirements of the memory management (relocation, protection, sharing, physical and logical organization).


-Virtual memory concept.

-Concept of pagination.

-Incidence of paging in the performance of the system.

-Description of memory management in Linux, Windows or solar systems.

3. file systems - files.

-Directories.

-Implementation of file systems.

-Examples and comparison of file systems.

-Journaling file systems.

-Security of the file system.

4 identification and description of the concepts of multithread and multiuser.

-Multi-processor hardware.

-Types of operating systems to multiprocessor.

-Multicomputer.

-Explanation of the Organization's users. Description of the different models of organization.

5. logical partitioning and virtual cores.

-Concept of virtualization.

-History of it virtualization.

-Description and comparison of the different implementations of virtualization.

(full virtualization, paravirtualiacion...).

6. application of the techniques of configuration and adjustment of systems - systems performance. Enumeration, description and interpretation of the major tools for observing the consumption of resources in memory, CPU and disk on Windows, Linux and Solaris systems.

-Examples of resolution of situations of high consumption of resources and expertise in Windows, Linux and Solaris systems.

-Enumeration and description the main processes of services that run on Windows, Linux and Solaris operating systems and their effect on the whole system.

-Description of different accounting systems allowing to establish predictive models and analysis of trends in operating systems Windows, Linux, and Solaris.

-Pre-production test plans. Description of different tools to perform load tests involving CPU, memory, and input/output on the operating systems Windows, Linux, and Solaris.

-Elaboration of a plan of tests for the operating system.

TRAINING unit 2 name: storage systems, code: UF1466 duration: 70horas referent of competition: this training unit corresponds to the RP2 and RP4 capabilities and C1 evaluation criteria: recognize and describe coding and nomenclature of computer elements according to the most widespread standardization criteria.

CE1.1 describe and apply the regulations concerning the nomenclature and classification of files and their containers required to facilitate the safeguarding and management of data in the system.

CE1.2 describe and use regulations of standardized nomenclature of machines, services and applications required to facilitate management tasks.

CE1.3 recognize and implement migration policies and archiving of files that should be used in the management of storage from the system according to your need posterior process and the efficiency of resource use.

CE1.4 on several assumptions and case studies adequately characterized from servers connected to different networks of TCP/IP communications: - generate a map of IP addresses of servers and networks - define and implement a nameserver (DNS) CE1.5 from a conveniently characterized practical course of file system architecture:-to analyze and explain the implemented structure.

-Identify the dates of creation, validity and a set of files was last modified.

-Identify authorized users to open and modify a set of files.

-Apply different policies on migration of data analyzing their influence on the availability of space and process execution time.

C2: Distinguish the different types of storage used in multiuser operating systems indicating its structure, features and modes of operation.

CE2.1 list and classify the different systems of storage according to its capacity, performance and compatibility with the most widespread operating systems features.

CE2.2 describe and classify the mechanisms of protection and physical retrieval of information according to its mode of operation and performance.

CE2.3 list and analyze groups of volumes, logical volumes, and types that are defined and implemented in each operating system and management of volumes.

CE2.4 choose and employ management tools of logical volumes that are used for storage management on the basis of their mode of operation and for its compatibility with different operating systems.

CE2.5 explain how it works, and that value provides for operating system access in parallel to multiple physical volumes.

CE2.6 list in tape and cartridge storage systems and classify them by type of support, for manual or automatic management and use in operating systems and applications.

CE2.7 on several assumptions and duly marked case studies of systems with external and internal storage and tape libraries:-documenting a physical map / logical capabilities that define: physical volumes with their capacity, address and mode of access, tape drives and their labels, protections implemented parity and number of accesses to each volume.

-Define logical volumes and filesystems with different sizes and structure.

-Install and configure a fault-tolerant access balancing system.

-Define parallel access to file systems and analyze the impact on the performance of the systems using the operating system monitoring tools.

-To implement the logical volume Manager volume mirroring software and analyze its usefulness for the recovery of the operating system.

C3: Apply techniques and procedures related to security systems, communications and data networks.

CE3.1 explain the fundamental concepts of policies of security and data protection and its relationship in the recovery and continuity of services and applications.

CE3.2 explain the differences between backups physical and logical and its influence on operating systems, filesystems and databases.

CE3.3 identify main architectures for high availability systems and components and analyze strengths and weaknesses depending on each case.

CE3.4 explain the mode of operation of firewalls, antivirus, and proxies in the architecture of communications networks.

CE3.5 recognize the techniques and operating procedures used to ensure the security of user access to applications and services with special interest in Internet-related architectures.

CE3.6 on several assumptions and duly marked case studies of computer systems connected to communication networks:-implement backup copies of files and databases.

-Retrieve applications that use databases from physical and incremental backup and continuity of the same specifications.

-Install and configure firewalls on servers that only allow access from clients and protocols specified.

Contents 1. Organization and management of information - file systems:-nomenclature and coding.

-Storage hierarchies.

-Migration and archiving data.

-Logical and physical volumes:-concept of partitioning.

-Concept of MBR and partition table.

-Description of NAS and SAN storage systems. Comparison and applications. Comparison of systems SAN iSCSI, FC and FCoE.

-Logical volume management. The LVM volume management system. Basic Guide to LVM use.

-Parallel access.

-Protection RAID. Comparison of the different levels of RAID protection. Mention of the RAID controllers option software or hardware: RAID 0, RAID 1, RAID 5 (recovery of large RAID 5 disks), RAID 6.

-Analysis of safeguard policies:-the single points of failure, concept and identification.

-Types of backups and backup scheduling.

-Safeguarding physical and logical.

-Safeguard block and file level.

-Concepts of high availability. Differences between cluster, grid and load balancing.

-Data integrity and recovery of service. Guide minimum to develop a business continuity plan. Concepts of RTO (Recovery Point Objective) and RTO (Recovery Time Objective).

-Custody of security files. Problems of safeguarding and storage of sensitive data. Some implications of the organic law of data protection (LOPD).

-Analysis of security policies:-access restricted by user accounts. The information property.

-Unique identifier for access. Single Sign On (SSO) systems.

-Virus protection.

-Security audits.

2 development of different assumptions practical, properly characterized, in which analysis - the effect of partitioning and disk access possible decisions as well as the implementation of a policy of backups.

-The nomenclature of the different systems policy and the development of a network map to document it.

-Different file systems to study the selected nomenclature and data access and modification of the files, as well as the permissions of users of access to them.

-Migration of data between different systems.

TRAINING UNIT 3


Name: Applications MICROINFORMATICAS E INTERNET for inquiry and generation of documentation code: UF1467 duration: 40horas referent of competition: this training unit corresponds with the RP3 capabilities and C1 evaluation criteria: use the main types of computer tools and services and applications associated with the Internet.

CE1.1 list and explain the main functions of the word processors, spreadsheets and editing of presentations.

CE1.2 relate the main services associated with Internet and classify them based on their function and specificity.

CE1.3 apply the functions of the computer tools and Internet services to the elaboration of technical documentation properly structured and standardized to facilitate understanding and version control.

CE1.4 use file transfer services for the exchange of information with the support services that manufacturers of technologies of the information published on the Internet.

CE1.5 from a conveniently characterized practical course of microcomputer system with possibility of connection to the Internet:-develop text documents, spreadsheets and presentations from a number of models delivered and which require the use of different features of the tools in increasing difficulty.

-Configure the team for their access to Internet from the specifications of the supplier of services.

-Find and extract documentation technical and applications of different suppliers of services in Internet from a relationship of situations raised.

Contents 1. Microinformaticas applications and Internet - text processors, spreadsheets of calculation and publication of presentations:-handling and user-level knowledge.

-Elaboration of technical documentation techniques.

-Standard document formats. Structure of information and metadata in documents.

-The Wiki as a tool for collaborative writing.

-Use of the Internet:-knowledge of www. Browsers.

-Systems of email, chat and forums. Rules of conduct apply in forums, chat, and email.

-File transfer. Explanation of the techniques of user-level file transfers and discriminating against which provide security features for identification as encrypted.

-Projects of free software on the web. Identification of sites to find them, where to get the software and how to contact the community.

-Version control systems.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1465 60 50 unit training 2 - 3 70 60 training unit UF1466 - UF1467 40 30 sequence: to access the formative drive UF2 UF1 training unit should have been overcome.

UF3 training unit can be programmed independently.



Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: administration of systems managers of database code: MF0224_3 level of professional qualification: 3 associated to the unit's competition: UC0224_3: Configure and manage a duration data bases management system: 200 hours training unit 1 name: storage of the information and introduction to the DBMS code: UF1468 duration: 50 hours referrer of competition : This training unit corresponds to RP4 capacities and C1 evaluation criteria: describe the fundamental storage systems and determine the environments in which their implementation is suitable.

CE1.1 describe the fundamental logical storage systems. (Flat files, indexed files, files of direct access, database management systems, XML files)

CE1.2 distinguish other advanced structured storage mechanisms: directories (LDAP), XML.

CE1.3 distinguish the different existing DBMS types: hierarchical, network, relational, object, documentaries CE1.4 explain the main functions that should be performed a DBMS-oriented.

CE1.5 describe the levels of organization in the standard architecture of a DBMS CE1.6 describe the major functional components that are part of a DBMS, both at the level of processes and data structures.

CE1.7 distinguish the characteristics that differentiate each of the commercial DBMS types that exist (centralized, client/server, parallel, distributed) CE1.8 describe the types of user who may need access to the DBMS: (Administrator of the database, users of data, users of applications, network administrators).

Contents 1. Types of storage - analysis and exemplification of the different models of storage in files:-sequential-access files.

-Direct access files.

-Indexed access files.

-Access by routing calculated (hash) files.

2. storage in DBMS - definition of DBMS.

-Identification of different DBMS on the market, from the oriented for Personal use to practitioners.

-Brief description of the different user roles that use the DBMS as a general rule.

-Description of the functional elements of the DBMS.

-Enumeration of the characteristics and functions of a DBMS.

-Analysis of advantages and disadvantages of storing information in files in a DBMS.

-Classification of the DBMS based on the model of the data:-relational.

-Object-oriented.

-Hierarchical.

-In red or CODASYL DBTG.

3. other types of stores of information - XML:-definition of XML.

-Comparison of the XML storage with the flat file storage.

-Directory (LDAP) services:-definition of LDAP.

-Comparison of the storage of information in an LDAP against a RDBMS.

TRAINING unit 2 name: RDBMS and installation code: UF1469 duration: 70 hours referrer of competition: this training unit corresponds to the RP1 capabilities and C1 evaluation criteria: install database system, determining and applying the settings on the DBMS to the proposed performance requirements.

CE1.1 describe the fundamental components of logical and physical structure of the DBMS distinguishing different components as well as their physical location in the object of the installation machine.

CE1.2 describe the logical components optional and/or auxiliary, as well as the existing dependencies between them and that condition your installation.

CE1.3 describe the process to be followed to perform the installation of the DBMS, identifying the tools involved in that process.

CE1.4 list and describe the different uses of support that can be integrated into the DBMS environment.

CE1.5 explain the configuration parameters involved in the setting up of a DBMS.

CE1.6 explain the configuration parameters specific of a distributed DBMS (data distribution, schema replication, local structure of local administration of each node, each node) CE1.7 in a practical course of installation and configuration of a DBMS, given performance requirements to meet:-interpret the associated technical documentation provided by the manufacturer of the DBMS by identifying the same configuration parameters.

-The technical documentation is interpreted with correction so much if it is edited in Spanish, the language of the autonomous community or in the technical language of habitual use.

-Identify all the parameters and features of the operating system that affect the operation of the DBMS and configure them properly (change of variables, recompilation, etc.).

-Determine the appropriate values of the configuration of the DBMS to optimize performance according to the proposed performance requirements.

-Installing the DBMS and implement certain configurations.

-Configure the physical space according to the characteristics of the DBMS and storage needs.

-Integrate the appropriate support tools, depending on the requirements.

-Create and initially configure the dictionary of data, depending on the requirements.

-Configure the remote access to the database, both from customers and from other processes run on the same server.

-Document the process of installation and configuration settings applied.

CE1.8 in a practical course of installation and configuration of a DBMS distributed and given a few performance requirements to meet, should pay special attention to: - establish the structure for each of the nodes that contain a fragment of the database, depending on the fragmentation scheme used and the design requirements.

-Establish the parameters of local administration for each node, depending on the design requirements.

-Set up the parameters relating to the distributed management of data for distributed transactions.


-Set up mechanisms for the interconnection of the different nodes contents 1. Database management systems - introduction to the history and evolution of the DBMS.

-Enumeration and description of the DBMS functions.

-Classification of the DBMS serving a:-model of data.

-Number of users to which gives service: single-user and multi-user.

-Number of sites in which this distributed DB: centralized and distributed.

-Management of those processes: multiprocessing and multithreading.

-Definition of the architecture of a DBMS according to the model of three layers proposed by the Committee ANSI-SPARC:-concept of level inner or physical.

-Concept of the level external or of vision.

-Concept of the conceptual level.

2. data dictionary - concept.

-Analysis of their structure.

-Justification of its importance as a fundamental element in the installation and maintenance of the database.

3. analysis of the functional structure of the DBMS - processes of the DBMS.

-File Manager.

-Processor and compiler of the DML.

-Compiler of the DDL.

-Management of the BD.

-Management of the connections and network.

4. installation of a DBMS - determination of a DBMS installed according to requirements outlined in a so-called.

-Interpretation of the license of the DBMS documentation.

-Identification of the sources of technical documentation. Interpretation of the documentation required for the installation.

-Identification and verification of the computer requirements for the installation as well as the operating system.

-Description of configuration parameters required for the start-up of the DBMS at the level of the own DBMS as the environment in which it is installed.

-Selection of additional logical components that may be useful depending on the course of installation.

-Determination of location and ideal distribution of the software, data and indices within the computer.

-If the DBMS supports multiple operating systems and computer architectures, identify the advantages and disadvantages of selecting one or the other.

-Identification of the possible character sets and most common elements of internationalization as well as the potential problems associated with these.

-Realization of a practical course of installation of a DBMS (and documentation of the process) in which matching clear relationships between logical parts of the DBMS and the physical architecture of the computer.

5. Description of the communication mechanisms of the DBMS - configuration of the remote access to the database on at least one DBMS on the market.

-Description of client/server communication with the DBMS.

-Identification of the means of access client/server differences: Sockets, shared memory, TCP/IP, etc.

-Identification of the main elements that provide interoperability to the RDBMS: ODBC, JDBC, etc.

TRAINING unit 3 name: management and monitoring of the DBMS code: UF1470 duration: 80horas referent of competition: this training unit corresponds to the RP2 and RP3 capacities and C1 evaluation criteria: perform and adequately plan administrative tasks, operating with the DBMS tools.

CE1.1 list and describe common in a DBMS administrative tasks: preservation and recovery, creation and maintenance of data bases, management of users and permissions of access, physical space, management of the cluster, partitioning management, management of databases distributed, management processes, starts and stops manuals and programmed, etc.)

CE1.2 list and describe the graphic tools available, according to the DBMS, to perform administrative tasks.

CE1.3 list and describe the commands available, according to the DBMS, to perform administrative tasks in text mode.

CE1.4 describe the techniques of planning tasks and queue management CE1.5 identify the tools available in the DBMS for scheduling tasks.

CE1.6 explain existing commands in the DBMS for scheduling tasks.

CE1.7 a collection of so-called practical that meet the most common needs of database management and Protec-tion of safety plan and rules of the Organization:-establish a plan of execution of administrative tasks which meets the needs of the organization.

-Obtain from the data dictionary information, those administrative tasks that require it.

-Start and stop the DBMS according to the needs of the Organization and policies of maintenance use.

-Carry out the administrative tasks required to meet the needs of the Organization, through the use of graphical tools available or user commands, according to the rules of the Organization and trying to interfere as little as possible in the operation of the system.

-Verify the results of execution of administrative tasks, before its final implementation, tests in a controlled environment.

-Modify the established administrative tasks to meet new requirements or to correct possible malfunctions.

-Documenting the established administrative tasks, the execution plan of the same and the results produced.

C2: Build sentences scripts to automate administrative tasks.

CE2.1 differentiate the kinds of scripts that can develop in the system databases CE2.2 list of programming resources available in the system for coding, debugging, and scripts of statements (script languages available, compilers and/or interpreters, development environments).

CE2.3 describe the syntax for different aspects of a script for encoding language scripts of statements, CE2.4 describing the basics of structured development design: diagrams of structures of pictures, CE2.5 describe the types of evidence to CE2.6 describe the existing tools for code testing as well as functionality that provide: trace, debugging, execution plan ,...

CE2.7 a collection of so-called practical that meet the most common needs of database management and Protec-tion of safety plan and rules of the Organization:-justifiably select language of script best suited for the automation of administrative tasks.

-Designing the necessary modules and each module tests - schedule the judgments necessary scripts to meet the administrative tasks that require them, according to the Organization's needs and following the corresponding programming techniques.

-Check the results of the execution of the scripts, before its final implementation, tests in a controlled environment.

-Modify the scripts to meet new requirements or to correct possible malfunctions.

-Include the scripts developed in the plan of implementation of administrative tasks.

-Document the encoded scripts, indicating the administrative tasks that automate and results produced.

C3: Apply techniques of monitoring and optimization of the performance of the system.

CE3.1 list and describe the different techniques for system monitoring.

CE3.2 list and describe the tools available, according to the DBMS, for system monitoring.

CE3.3 describe the mechanisms available in the DBMS for automatic query optimization and identify their advantages and disadvantages (available SQL optimizers, configuration parameters to identify data bases query or update, creation of indexes, caches, etc.).

CE3.4 the usual parameters set as the goal of the optimization of the system.

CE3.5 describe the main techniques for the optimization of queries in DBMS.

CE3.6 in a practical course of monitoring of a DBMS, where he will be artificially introduced a series of problems of detection and correction, and provided the security plan and rules of the Organization:-establish performance criteria of the system of databases according to the general criteria of the Organization and those established for each database.

-Prepare the system for monitoring, determining the appropriate technique to use in each particular case.

-Assess the State of the system based on the results of monitoring and the degree of compliance with the performance criteria.

-Carry out the necessary adaptations of the DBMS to improve performance or for the correction of faults detected during monitoring.

-Make the adjustments of the operating system and involved physical devices to improve performance or correct operating abnormalities detected during monitoring of the DBMS.

-Discover the trends of behavior based on the information from the monitoring systems, establishing the administrative tasks required to anticipate incidents and problems.

-Documented performance criteria and other contents 1 parameters. Administration of the DBMS (all points should be at least with two classified DBMS in a different way) - analysis of the functions of the administrator of the SGB.


-Identification of the different types of users that is related with the DBMS as well as the main demands of these users.

-Identification of the tasks administrative more common to perform.

-Application in at least two DBMS current rated of form different:-creation of a BD.

-Boot and stops.

-Analysis of the plan's execution of queries and their possible optimizations.

-Management of queues and processes.

-Identification and selection of administrative tools that allow the most common administrative tasks.

-Enumeration and description of the available administrative tools according to the DBMS.

-Development of a so-called practical which apply the administrative tasks previously seen from different management tools.

-Identification and location of mechanisms that provide the selected DBMS to schedule administrative tasks:-definition of the different techniques of planning tasks.

-Use of the planning of the DBMS tools to perform some of the most common management tasks.

-Development of a so-called practical that the most common administrative tasks according to the needs of the Organization are planned.

2. construction of scripts for it administration of the DBMS and them DB-classification of them types and determination of its advantages and disadvantages as well as its use normal of application of scripts:-scripts simple.

-Stored procedures.

-Triggers.

-Determination of available programming languages that enable the construction of administrative scripts for the DBMS.

-Selection of a language of programming and realization of some administrative scripts that make clear the data types, control structures and functional structures of the selected language.

-Identification and location of the basic libraries available for various programming languages available. Employment in some administrative script.

-Development of a series of so-called practical involving from the selection of the language, from script development to testing, commissioning and documentation of the scripts to perform some of the administrative tasks previously seen.

3 monitoring and performance tuning of the DBMS - identification of factors and parameters which influence the performance.

-Selection of tools that allow the monitoring of the DBMS:-log files.

-Triggers of alerts.

-Other elements of monitoring of the DBMS.

-Optimization of the availability of physical memory for the computer according to the requirements of load of the DBMS.

-Optimization of queries SQL and plans of execution.

-Optimization of the access to disc and distribution of them data in one or several disks physical depending on the requirements of the load of the SGB.

-Anticipation of possible scenarios based on data observed in the monitoring and listing possible corrective actions:-development of a practical course to set a non-optimized DBMS and its underlying elements to fit the criteria of the organization.

4. Description of the distributed DBMS - concept of distributed DBMS.

-Main advantages and disadvantages.

-Features expected in a distributed DBMS.

-Classification of the distributed DBMS according to the criteria:-distribution of data.

-The local DBMS type.

-Autonomy of the nodes.

-Description of the components:-local processors.

-Distributed processors.

-Global dictionary.

-Enumeration and explanation of rules of date for distributed DBMS.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance unit training 1-UF1468 50 40 unit training 2-UF1469 70 60 unit training 3-UF1470 80 70 sequence: for access to the unit formative UF2 must have is exceeded it unit formative UF1.

UF3 training unit can be programmed independently.



Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 denomination: management code databases: MF0225_3 level of professional qualification: 3 associated to the competition unit: UC0225_3: Configuring and managing database duration: 200 hours training unit 1 name: databases RELATIONAL and modeling of data code: UF1471 duration: 70 hours referrer of competition: this training unit corresponds to the RP1 regarding the modeling of data capabilities and C1 evaluation criteria : Master the conceptual foundations and techniques of relational databases.

CE1.1 describe the concepts of the relational model.

CE1.2 describe the basic operations of relational algebra.

CE1.3 identify common data modeling techniques.

CE1.4 correctly identify the elements that make up an entity/relationship model as well as those present in the extensions of the model.

CE1.5 describe the common normal forms.

CE1.6 describe the possible degrees of normalization for a database, specifying procedures standardization and the advantages and disadvantages posed.

CE1.7 describe the main elements and objects of the physical schema in a relational database.

CE1.8 describe the mechanisms present in the physical model to ensure the integrity of the database: assertions, triggers, referential integrity, unique, foreign key...

CE1.9 describe the basic syntax of a data (DML) query language and its relationship with the relational algebra CE1.10 in a practical course in which arises a logical design:-identify the entities that may be considered weak.

-Identify the degree of standardization of the design, indicating which parts of it are in third normal form and what parts do not, as well as the particular degree of each party.

-Identify elements in fourth and fifth normal form or that are likely to be modified to achieve such normal forms.

CE1.11 in a practical course in which arises a logical design completely desnormalizado with one description of the elements present:-performing normalization first normal form.

-Perform normalization to second normal form.

-Perform normalization to the third normal form.

-Perform normalization to the fourth normal form.

-Perform normalization to the fifth normal form.

CE1.12 in a so-called practical where a physical database with known information is available:-operations of extraction of information from a textual description of the information to get and using the query language of the data base and known concepts of relational algebra.

-Operations of updating information from a textual description of the operation to perform.

Contents 1. Relational databases - relational database concept.

-Exemplification.

-Concept of data models. Functions and sublenguajes (DDL and DML).

-Sorting different types of data based on the abstraction level models:-conceptual data models.

-Logical data models.

-Physical data models.

-Enumeration of Codd's rules for a relational system.

2. analysis of the relational model and the elements that compose it - concept of relationships and their properties.

-Keys in the relational model concept.

-Notions of relational algebra.

-Notions of tuple relational calculus to solve basic practical exercises.

-Notions of calculating relational domains.

-Theory of normalization and its objectives:-concept of functional dependencies.

-Analysis and application of the various normal forms: 1st, 2nd, 3rd, 4th and 5th normal shape and the obstacle-Codd normal form.

-Advantages and disadvantages that justify a denormalization of tables evaluation in different practical cases.

-Development of different practical assumptions for Standardization of data including proposals of denormalization of data.

3 description and application of the entity-relationship model for data modeling - the process of realization of entity-relationship diagrams and know it applied.

-Elements:-entity.

-Attribute.

-Relations.

-Entity relationship diagram understood as elements to resolve the shortcomings of simple entity-relationship diagrams.

-Elements:-strong and weak institutions.

-Cardinality of relations.

-Attributes in relations.

-Inheritance.

-Aggregation.

-Development of various practical assumptions of modelling using entity relationship diagrams.

4. object - oriented model contextualization model into UML modeling object-oriented.

-Comparison of the model of sorts with the modelo-entidad relationship.

-Diagram of objects as a special case of the class diagram.


5. distributed model and approaches for the design - enumeration of the advantages and disadvantages with respect to other models.

-Concept of fragmentation and its different types:-Vertical.

-Horizontal.

-Mixed.

-Enumeration of the rules of correctness of fragmentation.

-Enumeration of data distribution rules.

-Description of mapping and data replication schemes.

TRAINING unit 2 name: languages of definition and modification of data SQL code: UF1472 duration: 60 hours referrer of competition: this training unit corresponds to the RP1 regarding the inclusion, modification and query of data and the RP4 regarding management of transactions.

Capabilities and criteria of evaluation C1: perform the design physical of them databases according to the specifications of the design CE1.1 explain them elements, objects and structures of storage physical available in a DBMS concrete (each DBMS has of concepts specific for them structures physical of storage: volumes, files, spaces of table, files of data, blocks, segments, etc.) to organize the information of the same in them resources of storage of the system operating.

CE1.2 explain the relationship of the elements mentioned in the previous point with the elements of the physical schema: tables, views, indexes.

CE1.3 explain the practical consequences of establishing different organizations of physical storage structures.

CE1.4 explain the different replication schedules information, characteristics and forms of implementation.

CE1.5 detailing various methods of fragmentation (vertical, horizontal or mixed) information for distributed databases.

CE1.6 describe the structure of the data dictionary for the DBMS that contains the information from the database.

CE1.7 in a practical course of preparation of the physical design of a database and on the basis of the logical design of the same:-Verify that the logical design conforms to the degree of standardization required according to the established types of use, the rules of the Organization and the resources available, adapting it if necessary.

-Sizing the storage needs of the system and physical restrictions according to the specifications of the logical design (number and characteristics of the expected users, initial volume of data, the forecasts for growth, volatility and expected data traffic)-if necessary, select and apply the most suitable according to the needs of the organization system of information replication.

-Choose and implement the methods of synchronization and recovery of transactions most suitable according to the needs of the Organization and the requirements of the logical design.

-Set the concurrency control mechanisms more appropriate to the needs of the Organization and the requirements of the logical design.

-In the case of distributed databases:-select and apply more appropriate schema of fragmentation in the nodes.

-To the features logic of the database, established nodes structure, the location of applications, access characteristics and features of the system in each node.

-Establish the necessary mechanisms to maintain synchronization between them, guaranteeing the integrity of the entire database.

-To establish the scheme of replication according to the needs of the Organization (fragmented, partially replicated and databases fully replicated - create tables, views, indexes, and other objects from the database using DDL statements and/or administrative the DBMS tools - document the resulting physical design as well as actions taken to obtain.)

Contents 1. Analysis of the objects and structures of storage of the information for different DBMS-relationship of these elements with tables, views and indexes.

-Consequences practice selecting different storage objects.

-Different methods of fragmentation of the information especially for databases distributed.

2. languages of definition, manipulation and control-concepts Basic, concepts and standards.

-Language of definition of data (DDL SQL) and application in DBMS today.

-Discrimination of existing items in the SQL-92 standard of other existing elements in commercial databases.

-Judgments of creation: CREATE:-databases.

-Tables.

-Views.

-Trigger or Triggers.

-Procedures.

-Modification statements: ALTER:-databases.

-Tables.

-Views.

-Trigger or Triggers.

-Procedures.

-Deleting sentences: DROP, TRUNCATE:-databases.

-Tables.

-Views.

-Trigger or Triggers.

-Procedures.

-(DML SQL) data manipulation language.

-Query: SELECT.

-Data insertion: INSERT.

-Modification of data: UPDATE.

-Elimination of data: DELETE.

-Other elements for data manipulation:-DO.

-REPLACE.

-Other elements.

-Aggregation of data for query sets: JOIN, UNION.

-Subqueries.

-Handling of the dictionary of data.

-Notions about the storage of objects in the database relational.

-Notions on storage and retrieval of XML in the database relational:-introduction of the standard SQL-2006.

3. transactional and competition-concepts fundamental.

-Identification of the problems of the competition:-updates lost.

-Readings not repeatable.

-Reads fictitious.

-Notions about the Concurrency Control:-optimistic.

-Pessimistic.

-Knowledge of the fundamental properties of transactions.

-ACID:-atomicity.

-Consistency.

-Isolation (Isolation).

-Durability.

-Analysis of the levels of isolation:-reading confirmed.

-Repeatable read.

-Serializable.

-Development of a practical course that gets revealed the relationship and implications between logical access and definition of data model and physical model of data storage.

UNIT training 3 denomination: safeguard and security of them data code: UF1473 duration: 70 hours reference of competition: this unit training is corresponds with the RP2, RP3 and RP4 respect to them copies of security and encryption.

Capabilities and criteria of evaluation C1: keep the security of them access to the databases ensuring the confidentiality.

CE1.1 explain them methods for the definition of profiles of access CE1.2 explain them concepts available in the DBMS to the application of the political of security (roles, login, users, groups, permissions, privileges,...)

CE1.3 describe the legislation of protection of data current and the mechanisms of the DBMS that allow ensure the compliance of the same.

CE1.4 describe the principles on data protection CE1.5 describe the rights of persons CE1.6 identify the tools to carry out the monitoring of the activity of users CE1.7 list possible mechanisms of encryption available in the DBMS: data in the database and communications CE1.8 describe the two large groups of cryptographic techniques : for key public and of key private (asymmetric or symmetric).

CE1.9 list them problems that you can resolve using technical cryptographic: authentication, confidentiality, integrity, not repudiation.

CE1.10 in a so-called practical with a scheme of database defined and a specification of their use, determine them obligations in relation to the normative current:-recognize the type of content according to the normative existing (ownership public or private, type of information...).

-Determine if the information is adjusted to the end.

-Determine what are the obligations to meet according to the information available.

CE1.11 in a practical course on a DB operation, and on the basis of the security plan and rules of the Organization:-establish the necessary database access profiles according to application characteristics given in the logical design, with the Organization's security standards and respecting the rule of law.

-Create and maintain the profiles of safety defined through sentences DCL and and/or tools administrative.

-Create the users of the database adapting them to the profiles of security established.

-Set the record of activity for carry to out the follow-up of the activities made by them users and detect deficiencies in them systems of control of access.

-Document them measures of implementation of the policy of security level of user.

C2: ensure the safeguard and recovery of the information stored in them databases according to the needs of each an of them.

CE2.1 describe the main possible failures in a database: any physical support, logical failures failure: internal fault database, aborted processes, transaction cancelled...).

CE2.2 describe major media which provides the DBMS for the recovery of the logical flaws and what is its usefulness in the context of a logical failure: safeguards and types available, transactions, rollback space log files...

CE2.3 detail the main characteristics and forms of access to secondary storage media.


CE2.4 list and describe the different techniques of preparation of backups (incremental, cumulative, and complete).

CE2.5 identify the current legal regulations applicable to the planning systems of backup, depending on the different types of stored content.

CE2.6 explain the functioning of the mechanisms of connection with remote server of safeguard for realization of backup copies.

CE2.7 in a practical course on a DB operation, and on the basis of the security plan and rules of the Organization:-define backup and recovery policy a disaster according to the Organization's security standards, to the requirements of each database and the current legal regulations.

-Planning the completion of backups, calculating their cost, according to the standards of the Organization (characteristics, timing, storage, windows of time for execution by lots, etc.).

-Calculate the resources needed to execute the planning established on a given database - have proper procedures to implement planning copies through scripts commands and/or administrative tools.

-In case of there is a backup of the database Center, carry out the operations required to keep the information that contains updated: linked to the remote server, export and import of data, etc.

-Recover in terms of integrity the copies of security.

-Document made implementation of the plan of backups, involved devices and procedures before disaster recovery.

C3: Export and import data of the database ensuring their integrity CE3.1 explain the mechanisms of import and export of data possible (direct export of physical resources - transportable tablespaces, files, etc. - that make up the database to another similar DBMS, export and direct import by linking of databases, export and import of data through an intermediate structure).

CE3.2 describe the tools available in the particular DBMS import and export by specifying the advantages and disadvantages of each of them, when it is appropriate use taking into account the considerations of performance of each of them, the possibility of automation, the flexibility in terms of recognized data and power in the transformation of data formats.

CE3.3 describe the structure of a database integrity check tools available in the DBMS.

CE3.4 describe the possible consequences on the realization of imports and exports of non-registration of log data taking into account the existing opposition between considerations of performance and recovery before a failure.

CE3.5 describe the mechanisms for setting character sets and others relating to the internationalization of the system, to avoid problems in the fields of type load character, numeric with and without decimal point, of type date.

CE3.6 in a practical course on a configured database and a set of flat files and other databases with known structures:-determine the procedure of initial load of data in the database for each set of data. Establish the tools to use and the mechanisms of initial creation of indexes.

-Perform initial data load ensuring the integrity of the data.

-If it is necessary to import data to the database (from another database or other source of information), select the most appropriate method to perform according to the requirements and standards of the organization.

-If it is necessary to export data from the database (to another database or another destination of information), select the most appropriate method and transformations of data needed to perform according to the requirements and standards of the organization.

-Perform data transfer (import / export) according to the selected method and guaranteeing the integrity of the information.

-Conduct operations basic of high, low modification and consultation manual on a database in operation.

Contents 1. Safeguard and recovery of data-description of them different faults possible (both physical as logical) that is can pose around a database.

-Enumeration and description of the elements of failover logical contributing the main DBMS studied.

-Distinction of them different types of support used for the safeguard of data and their advantages and disadvantages in an environment of backup.

-Concept of RAID and levels more commonly used in the business:-RAID5, RAID6.

-Classification of the levels RAID by their times of reconstruction.

-Remote server backups.

-Design and justification of a safeguard plan and a protocol for recovery of data for a course of business environment.

-Types of safeguards of data:-complete.

-Incremental.

-Differential.

-Definition of the concept of RPO (Recovery Point Objective) and RTO (Recovery Time Objective).

-Use of the mechanisms of verification of the integrity of the backup.

2 databases distributed from a point of view focused on the distribution of the data and execution of queries - definition of distributed DBMS. Main advantages and disadvantages.

-Features expected in a distributed DBMS.

-Classification of the distributed DBMS according to the criteria:-distribution of data.

-The local DBMS type.

-Autonomy of the nodes.

-Enumeration and explanation of rules of date for distributed DBMS.

-Replication of information in distributed databases.

-Processing of queries.

-Decomposition of queries and location data.

3. data security - data security concepts: confidentiality, integrity and availability.

-Current legislation over data:-the right to privacy and personal data.

-Laws of first, second and third generation.

-Law on protection of personal data.

-The data protection agency.

-General registry of data protection.

-Argumentation from a legal point of view the possible legal implications that have to take into account an administrator of databases in their daily work.

-Types of security threats:-accidental: human error, software/hardware failures.

-Intentional: direct and indirect attacks.

-Security policies associated with DB:-user profiles.

-User privileges.

-User views.

-Data encryption.

-DCL data control language.

-Enumeration of roles most common DBMS users.

-At least 2 RDBMS implementation.

-Monitoring the activity of users:-enumeration of the various tools available to track the activity of active users.

-Enumeration of the various tools and methods to trace the activity of users from a forensic point of view.

-Employment of a tool or method to find out the activity of a user from a time determined.

-Employment of a tool or method to find out a user starting from certain activity in the database.

-Argumentation of the possible implications legal at the time of monitor the activity of those users.

-Introduction basic to the Cryptography:-techniques of key private or symmetrical.

-Techniques of key public or asymmetrical.

-The Cryptography applied a: the authentication, confidentiality, integrity and non-repudiation.

-Mechanisms of cryptography available in the DBMS to its use in the database.

-Description of the mechanisms cryptographic that allow verify the integrity of the data.

-Description of them mechanisms cryptographic that allow ensuring the confidentiality of the data.

-Methods of connection to the database cryptographic-based.

-Development of one or several so-called practical in which is applied the elements of security seen with previously.

4. transfer of data-description of the tools to import and export data:-importance of the integrity of data in the export and import.

-Classification of the tools:-Backups in hot.

-Backups in cold.

-Shows of an example of execution of an export and import of data.

-Migration of data between different DBMS:-assessment of the possible disadvantages that can find at the time of transfer data between different DBMS and propose solutions with formats of data intermediate u others methods.

-Employment of some of the mechanisms of verification of the transfer of data.

-Interconnection with other databases.

-Configuration of the access remote at it database:-enumeration of the methods available.

-Enumeration of the advantages and disadvantages.

Guidelines methodological training to distance: units training duration total in hours of the units training No. of hours maximum susceptible of training to distance unit training 1-UF1471 70 60 unit training 2-UF1472 60 50 unit training 3-UF1473 70






40. sequence: The formative units corresponding to this module can be programmed independently.



Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

PROFESSIONAL practices module code database management: MP0313 duration: 80 hours capabilities and C1 evaluation criteria: providing technical support in tares management database system and its surroundings CE1.1 make an inventory of the major equipment related to database management system both at the hardware and software level.

CE1.2 reviewing the procedures of connection between the different departments in relation to the data base management system.

CE1.3 provide technical support in the steering committees that appropriate.

CE1.4 protection and data recovery procedures.

CE1.5 review different database schemes applied as well as the activity of the management system.

C2: Analyse the adequacy of the database administration practices.

CE2.1 analyze and verify the optimization of the systems underlying to the Manager of database as well as propose possible improvements.

CE2.2 analyze and verify the operation of the System Manager of database and propose possible optimizations adapted to the needs of the center of work CE2.3 evaluate and qualify the plan of safeguard and recovery of data.

C3: Differentiate and analyze the operating system configuration variables, specifying their effect on the behavior of the system.

CE3.1 description of the different ways of monitor and adjust them components of a system operating analyze the trends from the State of load.

CE3.2 correlation of alarms sent by the system of monitoring previously implemented and definition of events for its resolution.

CE3.3 realization of different functions related with installation and configuration of the system operating.

C4: Recognize and describe coding and nomenclature of computer elements according to the most widespread standardization criteria.

CE4.1 recognition and implementation of migration policies and archiving of files that should be used in the management of storage from the system.

CE4.2 mapping of IP addresses of networks and servers, and definition and implementation of a name server.

CE4.3 different assumptions related to the architecture of file systems.

C5: Distinguish the different types of storage used in multiuser operating systems indicating its structure, features and modes of operation, with respect to the characterization of storage systems.

CE5.1 apply techniques and procedures related to security systems, networks and data communications, with respect to the application of techniques and procedures related to information security.

CE5.2 install the database system, determining and applying the settings on the DBMS to the raised performance requirements, with respect to the installation and configuration of a DBMS.

CE5.3 perform and adequately plan administrative tasks, operating with the tools of the DBMS, concerning the preparation and planning of administrative tasks from the DBMS tools.

CE5.4 apply techniques of monitoring and optimization of the performance of the system, with respect to the optimization of the performance of the DBMS.

CE5.5 perform the design physical of them databases according to the specifications of the design logical, respect to the realization of the design physical of a database starting from the design logical of the same.

C6: Participate in the company's work processes, following standards and instructions laid down in the workplace CE6.1 behave responsibly both in human relations and work to be carried out.

CE6.2 comply with the procedures and rules of the workplace.

CE6.3 undertaken with diligence the tasks according to the instructions received, trying to of adapt to the pace of work of the company.

CE6.4 integrated into the production processes of the work center.

CE6.5 use established communication channels.

CE6.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Inventory of items related to the database management system - hardware and software inventory of the database server.

-Inventory of data SAN storage systems.

-Inventory of safeguarding and data recovery systems.

-Inventory of client management system of database systems.

-Inventory of the communication system.

2 review of documents from operation of the company in relation to other departments - review of documentation relating to the area of systems.

-Review of the documentation relating to the area of development.

-Review of the documentation relating to the area of exploitation of data customers.

3. analysis of data recovery and protection plans - review and study of safeguarding plans.

-Review and study of the business continuity plan.

-Contrast and proposal of optimisation of protection and continuity plans.

4 monitoring and analysis of the operation of the database management system and the underlying operating system - monitoring of transactions in the system from the operational point of view.

-Supervision of transactions in the system from the point of view of safety.

-Proposal for actions to improve the performance of the management system.

5 integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules in the workplace.

-Interpretation and execution with diligence of the instructions received.

-Recognition of the productive process of the organization.

-Use of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks of occupational health and environmental protection regulations.

IV. requirements of the trainers training modules required accreditation expertise required in the field of competition MF0223_3 unit: operating systems and applications ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





1 year MF0224_3: administration of management systems of databases ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





2 years MF0225_3: management of data bases ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





2 years V. spaces, facilities and equipment space training surface minimum requirements m2 15 students surface m2 25 pupils classroom computer 45 60 workshop space training M1 M2 M3 classroom computer X X X space training equipment classroom workshop workshop of Informatics - audiovisual equipment - PCs installed in network, projector and Internet - specific Software of the specialty - slates to write with pen - flipchart - classroom Material - table and Chair for trainer - tables and chairs for students - Tools for mounting / dismantling teams not must interpret is that them different spaces training identified must differentiate is necessarily through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex VII I. identification of the certificate of professionalism Description: management of networks of voice and data.

Code: IFCM0310 family professional: computing and communications.

Area professional: communications.


Level of professional qualification: 3 professional qualification of reference: IFC302_3 management of voice and data networking (Royal Decree 1201 / 2007 of 14 September).

Relationship of competition units comprising professionalism certificate: UC0228_3: telematic network infrastructure design.

UC0962_3: Integrated services of voice, data and multimedia.

UC0963_3: Manage and provide communication services to users.

General competence: define and monitor the procedures of installation, configuration and maintenance of a communications network resources to provide services of voice, data and multimedia users and make the integration of the resources offered by transmission and switching systems.

Professional environment: Professional: Professional operates both self-employed and employed in companies or public or private entities of any size, with a network infrastructure of communications with integrated voice and data services, in the Department of networks and communications.

Productive sectors: is located mostly in the service sector, and mainly in the following types of companies: companies that aim at business marketing services of voice and data communications; companies or entities that use systems and transmission and switching to their management teams.

Occupations and jobs of work relevant: administrator of services of communications.

Support for transmission and switching systems technician.

Duration of associated training: 610 hours ratio of training modules and training units.

MF0228_3: (Transverse) design of telematic networks (200 hours) ● UF1869: analysis of the market of communications products. (90 hours) ● UF1870: development of the telematics network project. (80 hours) ● UF1871: preparation of the technical documentation. (30 hours)

MF0962_3: Integration of voice communications, data and multimedia services. (180 hours) ● UF1872: implementation and configuration of gateways. (90 hours) ● UF1873 implantation and maintenance of communications systems for multimedia services and incident management. (90 hours)

MF0963_3: Management of communications for users. (150 hours) ● UF1874: maintenance of the communications network infrastructure. (30 hours) ● UF1875: management of resources, services and the communications network. (90 hours) ● UF1876: attention to users and installation of applications client. (30 hours)

MP0395: Module not working professional practices of management of voice and data networking (80 hours).

II. profile professional of the certificate of professionalism unit of competition 1 name: designing the infrastructure of network telematics.

Level: 3 code: UC0228_3 realizations professional and criteria of realization: RP1: determine the configuration topological of interconnection of equipment in network that responds properly to the needs of the project CR1.1 them specifications of the system collected with precision them requirements and benefits functional, technical and of costs.

CR1.2 the topology of the system is determines by the choice of a model of reference standard that meets them requirements of them applications that is van to use (time of response, quality of service, scheme of addressing, volume of data to transfer, distances, access to other networks, etc).

CR1.3 the elements of communication are evaluated taking into account the existing infrastructure and the State of technology in the present as well as its possible evolution in the short and medium term CR1.4 topology and network elements are chosen in accordance with the requirements of accessibility, confidentiality, and integrity required by the user and the regulations in force.

Rp2: Analyze the possibilities for connectivity of market communications equipment in order to integrate them in a telematic network infrastructure project CR2.1 the features and specifications of communications equipment are identified to determine their suitability for the design of networks CR2.2 technical documentation is interpreted with correction both if it is edited in Spanish in the language of the autonomous community, or in the technical language of habitual use.

CR2.3 different physical transmission media are differentiated by their technical characteristics and suitability for use for the different types of network CR2.4 environmental requirements for communications equipment (footprint, power consumption, heat dissipation, etc.) contrasted with the possibilities of the installation.

CR2.5 conditions of recruitment and service of means of basic access to public networks offered by telecommunications operators are reviewed and included in CR2.6 network design specifications the performance and characteristics of the products communications hardware and software products similar (routers, hubs, switches, servers, VPN - networks virtual private-, firewall, etc.) are known and compared with a view to its inclusion in the design of the network.

CR2.7 the implementation of communications software products is evaluated on different platforms and operating systems.

RP3: Determine the physical configuration of interconnection of networked computers by selecting most appropriate project CR3.1 equipment location needs equipment, devices and software and network devices takes into account the conditions of ergonomics, safety and use of the space.

CR3.2 them components software of it infrastructure of network is choose in accordance with the requirements of the system and with them benefits required by the applications and specified previously.

CR3.3 cabling system and the type of support used for the local network is determined in function of the distances between the different nodes of the system, the speed needed for the data transmission and the environmental conditions.

CR3.4 computers and network devices are selected according to the following criteria:-the condition of approval of the same, both internally and externally, proposing those elements whose use is essential for internal approval.

-Compliance with prescribed technical and economic conditions.

-The security of supply and availability within the agreed deadlines.

CR3.5 drawings and system block diagrams accurately reflect the structure of the system and the various elements that compose it.

RP4: Prepare or supervise the preparation of the technical documentation necessary for the execution of the installation of the network of data and its subsequent maintenance.

CR4.1 the descriptive report of the installation explains precisely the features and scope of application of the same.

CR4.2 the technical documentation includes schemes and overall and detailed drawings, using standardized symbols and presentation.

CR4.3 the relationship of materials, equipment and devices is performed using the standard coding and guaranteeing their acquisition internal and / or external.

CR4.4 the construction drawings of the installation collected with sufficient precision the characteristics of equipment for its implementation (physical dimensions, location of devices and cards, coded identification of E / S and wiring, etc.).

CR4.5 network software and system communication programs are sufficiently documented and allow the implementation and the subsequent maintenance of the functions thereof.

CR4.6 technical documentation conforms to the standards of the Organization and contains the necessary chapters for the installation and maintenance of the system, including:-process to be followed in the implementation in service.

-Tests and adjustments that must be made in the process of setting up system.

-Parameters that must be checked and adjusted.

-Stable operating margins.

-Guidelines for the realization of preventive maintenance of the system.

Context professional media production tools for the realization of schemes of installations (programs of CAD / CAM / CAE). Technical documentation of manufacturers, in printed or electronic support. Project planning tools. Communications operators services configurators.

Products and results network design: planes and block diagrams. Memory components. Network infrastructure maintenance guidelines. Guidelines for verification and testing of components and equipment.

Information used or generated security policy of communications infrastructure. Manual installation, reference and use of communications equipment. Information on local area networks and wide area and public and private communication systems. Information about equipment and communications software. With rules, regulations and standards (ISO, EIA, RFC-IETF, ITU-T). Technical documentation of communications facilities and projects. Manuals times and prices for communications.



Competition 2 name unit: integrated services of voice data and MULTIMEDIA.

Level: 3 code: UC0962_3 realizations professionals and criteria of performance MOP1: define and apply the procedures of implementation of gateways, which allow the integration of services to support features according to the same specifications.


CR1.1 analysis of maps of lines and nodes of transmission of voice and IP addresses, is performed to verify the conditions of installation of the gateway according to technical specifications of the system and description of the services to integrate.

CR1.2 the characteristics of the lines of communications, power supply and environmental requirements, are determined to ensure the functioning of the system according to standards of signaling and digitization, technical specifications of devices and environmental regulations.

CR1.3 them procedures of installation of the hardware and the software that will be the gateway, is defined and documented for your rear execution according to specifications and criteria functional and technical.

CR1.4 gateway is configured to ensure the provision of the services that will be supported by it, according to specific needs of the same and instructions of the organization.

CR1.5 structural and functional tests are conducted on the catwalk, to ensure the provision of the services specified according to the Organization's needs.

CR1.6 them parameters of security of it gateway, is set for verify the access to them resources of the same and that is made by them users default, according to the needs of the organization.

CR1.7 documentation of tasks that have been carried out, is performed according to the protocols of the Organization to fill the needs of registration.

CR1.8 the documentation technical specific associated, is interpreted, in his case, in the language foreign of use more frequent in the sector.

Rp2: Manage the issues produced in the integration of voice and data services, for continuity in the provision of the same, according to quality specifications and criticality of the service conditions.

CR2.1 incidence detection channels, are determined and are enabled the means of detection and communication of them to those responsible for their care and management, to proceed with its solution according to protocols established by the organization.

CR2.2 procedures for the isolation and detection of incidents-producing causes set forth in the plan of action against contingencies, to provide references to the persons responsible for the management of problems at the gateway according to the protocols of the organization.

CR2.3 incident management is organized by indicating the tools to be used and procedures to be followed, as well as the system of escalation of incidents, to ensure the intervention of support with criteria of speed and quality according to the rules of the organization.

CR2.4 bulletins of incidents and the associated documentation are made, to control and manage the processes of intervention and solution according to the protocols of the organization.

RP3: Define and apply procedures for the implementation and maintenance of communications systems for multimedia services, according to the Organization and the multimedia service quality specifications.

CR3.1 items that make up the system of communications for multimedia services, identified according to the requirements specified for the establishment of services.

CR3.2 them parameters of the lines of communications, are identified according to the needs specified for the establishment of them services multimedia.

CR3.3 the configuration of specific media streaming protocols, is planned for implementation in devices of communication according to technical specifications and needs of your organization.

CR3.4 them procedures of installation and maintenance of the hardware and the software that will make up the system of communications for services multimedia, is defined and documented for your rear execution according to specifications and criteria functional and technical.

CR3.5 the functional parameters of the teams that form the system of communications for multimedia services, are defined and configured to ensure the quality of services according to specific needs of the same and instructions of the organization.

CR3.6 functional and structural tests are conducted on computers of the multimedia communications system, to ensure the provision of the services specified according to the Organization's needs.

Professional context production technical documentation of manufacturers, support printed or electronic media. Configuration and parameterization of the manufacturer services tools. Tools of internal management, registration and management of incidents. Computer and peripheral equipment. Communications equipment. Office Tools. Testing and monitoring tools. Instruments of action. Tools / monitoring and management applications. Lines of communication. Test terminals, telephones and computers to test the service. Telephone switching equipment. «Call Managers».

Products and results network services of communication of voice, data and multimedia configured and running. Implementation of gateways and multimedia services defined procedures. Defined periodic testing and verification guidelines. Parameters configured on the lines of communications. Incidences managed and resolved.

Information used or generated maps IP addresses of lines and nodes of voice transmission. Specification of services that support the catwalks. Parameters of quality employed by the client. Rules of the organization. Technical specifications of devices and manufacturers recommendations. Signage and digitization standards and environmental regulations. Manuals of use and operation of the runways. The associated software manuals. Technical documentation of manufacturers, in printed or electronic support. The configuration information of the operator's network which connects the gateway. IP information. Manual installation, reference and use of communications equipment. Test plan. Scaling procedure internal. Scaling procedure agreed with the client. With rules, regulations and standards (ISO, EIA, RFC-IETF, ITU-T). Report of result of installation. Performance reports. Act of acceptance by the customer. Newsletters of incidents. Report of result of functional and structural testing. A list of the parameters configured in the lines of communications. Listing and interpretation of configured alarms. Safety report with the users default by the organization. Action plan contingencies and escalation levels.

Competition 3 denomination unit: manage and provide services of communication to users.

Level: 3 code: UC0963_3 realizations professional and criteria of realization RP1: apply procedures of maintenance and update in the network to provide and provision new services of communications, taking in has the specifications received.

CR1.1 map of the communications network is interpreted and the nodes in the same, are identified to assess the State of the existing infrastructure and resources according to procedures of the organization.

CR1.2 updates hardware and software are performed to keep up to date communications infrastructure, following the established procedures.

CR1.3 made updates are checked and updated functional testing, are conducted to ensure the provision of services according to specifications of the organization.

CR1.4 modifications and updates performed are documented and reported, to fill the needs of registration following the established procedures.

Rp2: Provide and manage communications services to meet the needs of the users, as per specifications received and quality criteria for the organization.

CR2.1 communications and resources for its delivery, services are to cater to requests made according to the procedures established in the organization.

CR2.2 communications resources are assigned to users, for the implementation of the services requested according to technical specifications and procedures stipulated in the organization.

CR2.3 resources are assigned using specific software tools for the management and delivery of services, according to specifications of the organization.

CR2.4 communications services monitoring processes are defined and executed, to check the level of quality in the provision of the same specifications of the organization.

CR2.5 the operational resources allocated to services, testing for quality assurance in the provision of the same according to the rules of the organization.

CR2.6 documentation of executed processes is performed, to fill the needs of registration using the tools and procedures established by the organization.

RP3: Manage voice communications and data resources to ensure their functionality according to quality specifications.

CR3.1 performance management systems are configured to analyze performance and continuity of the services provided, according to the parameters of service contracted by the customer and the quality criteria of the organization.


CR3.2 monitoring tools are configured to play alerts and alarm indicator of failure or deterioration in the performance of the services of the runway, according to the services contracted by the client and the specifications of quality of the organization.

CR3.3 them updates of software and firmware of them devices is performed to improve the yields and solve problems of operation, according to specifications technical of them devices e indications of them manufacturers.

CR3.4 them processes of verification periodic is defined and performed, to ensure the functionality and it security in it provision of them services according to specifications of the organization.

CR3.5 the information of the use of them resources of the system of communications, is records and analyzes to detect future deficiencies and problems of management of them services in quality or quantity according to the normative of quality of the organization.

CR3.6 documentation of tasks undertaken for the maintenance of the runway, is performed according to the protocols of the organization.

RP4: Meet and manage incidents and claims for provided communications services for users, in order to guarantee their performance.

CR4.1 incidents and complaints received by the use of communications resources, are checked for their solution according to procedures of the organization.

CR4.2 incidents whose identification or solution can not be made, are communicated to the higher levels of responsibility for its resolution according to procedures of the organization.

CR4.3 the documentation of incidents, your checking and corrective actions taken, are reflected in the bulletin for registration and subsequent treatment according to regulations of the organization.

RP5: Install and configure applications in client terminal equipment to provide specific communications services, received specifications and criteria of the organization.

CR5.1 discusses the features of the application to be installed to ensure the functionality of the services that will be supported by it, according to specifications of the application, terminal and quality criteria for the organization.

CR5.2 client application is installed and is tested to verify its functionality, according to the documentation from the supplier of the application and of the manufacturer of the terminal.

CR5.3 the installed application is tested to ensure the provision of the service, as specified by the service provider.

CR5.4 them evidence is documented and is reported with them errors of installation or mismatches concerning them specifications, to complete them needs of registration according to procedures established by the organization.

CR5.5 the installation process is documented and report installation errors, in order to fill the needs of registration, according to procedures established by the organization.

CR5.6 the application user's Guide was drawn up for distribution, following the style of the supplier of the service guide.

CR5.7 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Media production tools professional context specific software for the management and provision of services. Tools for internal use for the documentation of the performed processes. Terminal with the appropriate operating system. Voice and data line. Network and services management software tools. Incident management software tools. Office Tools. Communications equipment.

Products and results network, services and resources that are maintained and updated. Incidents and claims managed and cared for. Applications in terminals installed and configured.

Information used or generated map of the communications network. Specifications of the service provider. Procedures of the Organization for the registration of changes and updates. Policy of quality of the organization. Regulations and guidelines of the organization with regard to procedures and tools to use. Regulations and procedures for management of incidents and attention of claims. Specifications and requirements for installation of the application. Criteria of quality of the organization. Guides for installation of the application and guide of user of the terminal. Profiles of services and subscribers. Work orders. Documentation of network. Manual configuration of services and provision. Inventory hardware / software of the network of communications. Procedures operating in the organization. Regulations and standards. Newsletters of incidents. Reports of benefits. Reports of installation and verification. Reports of trials and errors. Guide of user of the application. Reports of result of update. Inventory of services available and assigned profiles. Register for updates.

III. formation of professionalism certificate training module 1 name: TELEMATIC network design.

Code: MF0228_3 level of qualification professional: 3 associated to the unit of competition: UC0228_3: designing the infrastructure of the network telematics.

Duration: 200 hours unit training 1 name: analysis of the market of products of communications.

Code: UF1869 duration: 90 hours reference of competition: this unit training is corresponds with the RP2.

Capabilities and criteria of evaluation C1: differentiate the characteristics of them media of transmission existing in the market CE1.1 explain reasonably the relationship between width of band and speed of transmission.

CE1.2 identify the features of a product starting from their specifications CE1.3 describe the problematic of installation of a given medium of transmission.

CE1.4 classify them means of transmission according to the features technical of its use in installations of network.

CE1.5 detail the influence of each medium of transmission on the benefits global of the network.

CE1.6 to properly interpret the symbols and coding used commercially for different means of transmission.

CE1.7 from a practical course of network design:-study the market of communications products necessary for the design, consulting documentation on the Web, journals, catalogues of manufacturers, etc.

-Make proposals on the basis of criteria of economy and performance.

C2: Explain the levels existing in the TCP/IP protocol suite.

CE2.1 interpret the OSI reference model.

CE2.2 describe the functions and services of each level of the OSI reference model.

CE2.3 explain the TCP/IP architecture.

CE2.4 correctly establish correspondences between TCP/IP architecture and the OSI reference model.

CE2.5 associate correctly functions and services at each level of the TCP/IP architecture.

CE2.6 describe the IP addressing system.

CE2.7 apply the IP addressing system in the creation of subnets.

CE2.8 describe the different protocols for routing in IP networks: BGP, OSPF.

CE2.9 describe the TCP/IP architecture application level protocols: ftp, http, SMTP, telnet, SNMP, etc.

C3: Explain the technical characteristics and operation of the various teams of interconnection network.

CE3.1 classifying the operation of network with respect to the OSI reference model.

CE3.2 describe the functions of the different interconnect devices.

CE3.3 detail the technical characteristics of the interconnection equipment to determine its influence on the performance of the network.

CE3.4 analyze the different alternative software products communications equivalent hardware.

CE3.5 describe the architecture of interconnection through the use of VPN (Virtual Private Network, virtual private networks).

CE3.6 properly interpret the information that appears in catalogs of communications products.

Contents 1. Introduction to communications and computer networks.

-Tasks of a telecommunications system.

-Communication over networks.

-Classification of networks:-local area (LAN) networks.

-(MAN) metropolitan area networks.

-Wide area (WAN) networks.

-Protocols and architecture of protocols.

-Definition and characteristics.

-Functions of the protocols.

-The OSI reference model. Functions and services.

-The TCP/IP protocol architecture. Functions and services.

-Correspondence between OSI and TCP/IP.

-Regulation and standardization bodies. IETF. ISO. ITU. ICT.

2. principles of data transmission.

-Concepts.

-Flow of data: simplex, half duplex and duplex.

-Addressing.

-Modes of transmission: series, parallel.

-Analog and digital transmission.

-Definition data, signals and transmission.

-Acoustic spectrum.

-Analog and digital signals. Advantages and disadvantages.

-Data and signals.

-Analog and digital transmission characteristics.

-Advantages of digital transmission.

-Disturbances in the transmission.

-Attenuation and distortion of the attenuation.

-Delay distortion.

-Thermal noise.

-Noise intermodulation, crosstalk and impulse noise.

-Effects of noise on a digital signal.

-Decibel and signal strength. Signal to noise ratio.

-Capacity of the channel bandwidth of a signal, baud rate, rate of error.

-Data encryption.


-Digital data encryption techniques.

-Techniques of coding of data analog.

-Multiplexing.

-Concept.

-(FDM) frequency-division multiplexing.

-Multiplexing by division in the time (TDM).

-Multiplexing by division of length of wave (WDM).

-Switching.

3 guided transmission media.

-Twisted pair.

-Construction features.

-Transmission characteristics.

-Applications.

-Types of cables and categories. Bandwidth.

-Advantages and disadvantages - coaxial cable.

-Features constructive.

-Transmission characteristics.

-Applications.

-Advantages and disadvantages.

-Optical fiber.

-The optical transmission system.

-Construction features.

-Transmission characteristics.

-Applications. Use of frequencies.

-Types of joint. Advantages and disadvantages.

-Streaming media catalogs.

4. wireless transmission means.

-The non-guided transmission characteristics.

-Wireless transmission frequencies.

-Antennas.

-Microwave terrestrial and satellite.

-Link point to point satellite.

-Multicast via satellite.

-Radio.

-Infrared.

-Forms of Wireless propagation.

5. data link control.

-Functions of the data link control.

-Types of protocols.

-Methods of control of line.

-Treatment of errors.

-Flow control.

6 protocols - internetwork protocols. IP protocol.

-Internet and their organizations.

-Addressing IPv4 and IPv6. Creation of subnets.

-Routing.

-Classification of routing methods.

-BGP (Border Gateway Protocol).

-OSPF (Open Shortest Path First).

-Transport Protocol. TCP/UDP protocols.

-Protocol: TCP (Transmission Control Protocol).

-Protocol UDP (User Datagram Protocol).

-Ports.

-NAT (Network Address Translation). Addressing.

-Network security.

-General concepts.

-Properties of a secure communication.

-Cryptography. Types.

-Authentication.

-Integrity.

-Distribution of keys and certification.

-Applications.

-SSL (Secure Sockets Layer).

-SSH (Secure Shell).

-IPsec.

-Firewall.

-Application-level protocols.

-The client-server architecture.

-Client/server applications.

-HTTP (Hypertext Transfer Protocol).

-FTP (File Transfer Protocol).

-SMTP (Simple Mail Transfer Protocol).

-TELNET (TELecommunication NETwork).

-SNMP (Simple Network Management Protocol).

-Others.

7. network interconnection equipment.

-Internetwork devices.

-Functions and OSI reference model.

-Benefits and features.

-Routers. Level 3 switches.

-Concentrators.

-Switches.

-VPN (virtual private network) servers.

-Firewall.

-Influence on the performance of the network.

-Environmental requirements of communications equipment.

-Equipment for the interconnection of network products catalogues.

-Hiring of access basic to networks public.

UNIT training 2 name: development of the project of the network telematics.

Code: UF1870 duration: 80 hours reference of competition: this unit training is corresponds with the RP1 and RP3.

Capabilities and criteria of evaluation C1: analyze the characteristics and requirements of a project of network telematics starting from the needs of the customer.

CE1.1 identify the sources of information.

CE1.2 apply techniques of interviews and of collection of information.

CE1.3 explain the problems of the study of feasibility of a project.

CE1.4 develop a document of requirements of the user.

CE1.5 synthesize the information collected.

CE1.6 from a so-called practical:-simulate an interview.

-Carry out a document's requirements.

-Carry out a study of feasibility technical-economical.

C2: select a determined team of interconnection for an infrastructure of network CE2.1 justify the choice of the equipment of interconnection according to criteria of performance and economy.

CE2.2 describe the problematic of the interconnection of networks of area local.

CE2.3 describe the problematic of the interconnection network of area local-red of area wide.

CE2.4 justify the choice between a solution hardware and other software in accordance with criteria of performance, economy, complexity and ease of administration.

CE2.5 explain the influence of the domains of collision and domains IP in the performance of the network.

C3: design the topology of network, including them media of transmission and them teams of communications more appropriate to them specifications received CE3.1 on a so-called practical of design of a network:-draw the topology that meets the specifications on performance, costs and quality of the service expected.

-Choose the most appropriate means of transmission for the design of the network according to the expected quality and cost criteria.

-Locate on the design teams of interconnection so that the established quality criteria are met.

-Set the mode of addressing and configuration, including subnets that were necessary.

-Select the interconnection system with wide area according to the chosen topology network and meeting agreed criteria of cost and efficiency.

-Establish lines of support if necessary.

-Use simulation programs allowing to verify the operation of the retrieved design.

CE3.1 make the logical connection of equipment taking into account their function and their requirements for security and location.

Contents 1. Communications networks - classification of networks.

-Switching networks.

-Circuit-switched. Features.

-Switching of packets. Features.

-ATM and Frame Relay.

-Networks of diffusion.

-Networks in bus.

-Networks in ring.

-Networks in Star.

2. networks of area local (LAN).

-Definition and characteristics of a network of area local.

-Topologies.

-Architecture of protocols LAN.

-Physical level.

-Level of link.

-Sublevel MAC (Medium Access Control).

-Sublevel LLC (Logical Link Control).

-Standards IEEE 802 for LAN.

-Redes de area local in Star. Hubs switched.

-Interconnection LAN-LAN.

-Interconnection LAN-WAN.

-Issues of design.

-Transmission medium.

-Characteristics of a product from its specifications.

-Selection of the means of transmission.

-Installation of medium of transmission. Problematic.

-Influence of each medium of transmission on the benefits global of the network.

-Symbols and coding business.

-The market of the products of communications.

-Equipment of connection.

-Location in the designed of the equipment of interconnection.

-Set the mode of addressing and configuration, including subnets.

-Select the interconnection with the wide area network system - support lines.

-Network cards.

3. wiring systems structured.

-General.

-Concept of system wiring structured.

-Advantages of standardization.

-Objectives of a wiring system structured.

-Regulations.

-Description of a wiring system structured.

-Cabling subsystems.

-Functional elements.

-Campus subsystem.

-Wiring subsystem vertical.

-Wiring subsystem horizontal.

-Wiring job.

-A wiring system interfaces.

-Categories and classes.

-Categories: definition and characteristics.

-Link classes and channels: definitions and characteristics.

-Classification of links and channels.

-Maximum lengths of canals and permanent links.

-General recommendations on the subsystems.

-Maximum distances of each subsystem.

-Types of cables and recommended applications.

-Distributors of floor panels.

-User Sockets in the work area.

-Backbone cabling campus and buildings.

-Closets and equipment rooms. Main active elements.

-Rush of public and private networks in buildings.

-Electromagnetic compatibility.

4. the telematic project.

-Definition and objectives.

-The general structure of a telematic project.

-Interview and information gathering techniques.

-The technical and economic feasibility study.

-The diagnostic report. Phases.

-Collection of information. The user requirements document.

-Information about the organization.

-Inventory of hardware equipment and telecommunication services.

-Network systems.

-Computer security.

-Wiring system.

-Technical proposal.

-Computer system and telecommunication services.

-The center of process data and network systems (relocations, installations, etc.).

-Information security policy.

-Guidelines for quality and its relationship with the company's telematic systems.

-Proposal for the wiring system.

-Number of jobs (people) to be considered in the system.

-Services to provide each of the jobs (voice, data and video conferencing...).

-Types and characteristics of the cable to be used. Normative references.

-Level of performance required to wiring. Normative references.

-Safety requirements.

-Wiring and installation costs. Time manuals and accessories.

-Maintenance procedures to be applied.

-Plan of action.


-Conditions of execution and start up of the system.

-Terms of execution of the tasks to perform to set up system. GANTT diagrams.

-Plan of operation of the system.

-References to procedures for installing and configuring the system.

-Complete documentation requirement: design specifications, drawings, diagrams, guides for installation and Setup, guarantees and technical support.

-Resources available on the system.

-System security plan: access to the system, backup policies.

-Users of the system (access rights, areas of work and available resources).

-Information about installed applications.

-Development of the telematic project.

-Hardware and normative references on: structured cabling, electromagnetic compatibility, protection against fires.

-Level physical and link (OSI 1 and 2) and normative reference for data transmission.

-Internetworking (OSI 3 and 4) and references policy.

-Systems and architectures (OSI 5, 6 and 7).

-Services: transmission of voice, video conferencing and imaging in the band base. Normative references.

5. Tools software.

-Tools for the simulation of networks.

-Tools for planning of projects.

TRAINING unit 3 name: preparation of the technical documentation.

Code: UF1871 duration: 30 hours reference of competition: this training unit corresponds with the RP4.

Capabilities and C1 evaluation criteria: prepare the documentation necessary for the execution of the project CE1.1 identify the sections that apply to the process of design of networks CE1.2 analyze a process related to the activity of design identifying or establishing clearly in the standard of quality in force:-input to the process data.

-Function associated to the process.

-Data or documentation generated in the process.

-Records and evidence generated.

-Relationship with other processes.

-Metrics that can be applied and possible points of improvement.

CE1.1 splitting of an existing project technical documentation:-identify the location of the equipment.

-Identify the means of transmission used.

-Identify the network addresses used.

-Interpret coding used networking equipment.

CE1.1 describe and differentiate the sections that make up a project, according to telecommunications legislation.

CE1.2, from the made specifications, make a map of network containing:-the location of the equipment.

-The medium used transmission.

-Network addresses used.

-Coding of interconnection equipment.

Contents 1. Quality management standard.

-Introduction to the quality.

-Standards and certifications.

-ISO 9001/2000 standard or equivalent.

-The quality system of a company.

-Processes and procedures.

-Quality plans.

-Records and evidence.

-Metrics.

-Audits.

-Improvement and prevention of problems.

2. implementation of a telematics network.

-Regulation of telecommunications.

-R.D. 401/2003.

-Order CTE/1296/2003.

-Technical implementation of a telematics network project.

-Structure and content.

-Memory.

-Background.

-Study alternatives.

-Justification solution adopted.

-Calculations and critical points.

-Planes.

-Specification.

-General terms and conditions.

-Technical requirements.

-Conditions for performance.

-Conditions of certification.

-Administrative economic conditions.

-Budget.

-Implementation and management of work.

-Final certification.

3. elaboration of technical project documentation.

-CAD/CAM/CAE programs.

-Preparation of diagrams and drawings.

-Relationship of materials, equipment and devices.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1869 90 50 unit training 2 - 3 80 40 training unit UF1870 - UF1871 30 20 sequence: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: integration of voice communications services, data and MULTIMEDIA.

Code: MF0962_3 level of professional qualification: 3 associated to the competition unit: UC0962_3: integrated services of voice, data and multimedia.

Duration: 180 hours training unit 1 name: deployment and configuration of GATEWAYS.

Code: UF1872 duration: 90 hours referrer of competition: this training unit corresponds to the RP1.

Capabilities and C1 evaluation criteria: analyze the communications network infrastructure by identifying the elements that compose it for the provision of voice and data services, according to functional and technical specifications.

CE1.1 identify and describe the architectures of networks of voice and data available, to select the elements of communications to provide voice and data services, according to specifications of the own architectures and bodies of standardization and standardization of communications services.

CE1.2 classified techniques of transmission and multiplexing of voice channels and data on high speed links for the provision of communications services, according to specifications of communications operators and agencies of normalization and standardization of communications services.

CE1.3 explain signalling and digitization of voice and data services, technologies to identify features of the systems of communications according to technical specifications for such services.

CE1.4 describe the processes and elements of network communications that are subject to legal regulations and requirements that should be applied according to this regulation.

CE1.5 analyze an infrastructure of communications, counting with specifications technical and functional of them needs of communications of voice and data of an organization and infrastructure of lines and devices of interconnection for the provision of services of communications, according to some specifications mentioned:-identify them elements of the network: equipment and lines of communication.

-Identify them access to networks public.

-Carry out a scheme of the map's network and synthesize the information.

-Apply the legal regulations of communications processes and elements that are subject to it.

C2: Configure communications gateways to implement services for transmission and transport of voice and data, according to a functional specifications and the requirements of the services.

CE2.1 distinguish the transmission and transport of voice and data services by identifying parameters configuration according to a given functional specifications.

CE2.2 identify and describe the types and functions of communications gateways, to implement the integration of voice and data services according to technical specifications of services and communications infrastructure.

CE2.3 sort of voice services and data integration technologies in order to identify their specific functions according to given functional specifications.

CE2.4 identify mechanisms for encoding and encryption of the information, to implement a system of security in the transmission and transport of data according to criteria and safety regulation given.

CE2.5 configure the gateways using specific tools (terminal emulators, remote desktops, specific configuration programs, among others) according to a given technical specifications.

CE2.6 implementing a gateway that supports the integration of transportation and transmission of voice and data for the provision of such services, according to given functional specifications:-differentiate services to be implemented according to the needs communicated.

-Interpret the associated technical documentation, even if it is published in the foreign language most often used in the sector, using the aid in the installation.

-Configure the protocols to provide the service.

-Perform tests to ensure the operation of the services implemented.

-Document the processes performed according to specifications.

CE2.7 identify them actors that participate in the provision of services of communications, to the allocation of responsibilities functional and legal of each one of them, taking in has the structure and operation of the market of them telecommunications.

CE2.8 classify them services of communications of field business offered in the market of telecommunications, evaluating their characteristics functional according to some specifications techniques given.

Contents 1. Networks of communications of voice and data-elements of a network of communications.

-Level functional of a network of telecommunications.

-Network of access.

-Network backbone of transportation.

-Distribution network.

-Multiplexing.

-Multiplexers.

-Multiplexing techniques.

-Frequency division multiplexing.


-Time-division multiplexing.

-Statistical or asynchronous multiplexing.

-Switching, transport and signalling functions.

2. architecture of networks of voice and data - access networks: guided and non-guided.

-Access via copper networks: xDSL.

-Access via radio networks: WLL, MMDS and LMDS.

-Access via fiber optic networks: HFCs, PON and CWDM.

-Networks stem:-MTA (mode of transfer asynchronous-ATM).

-JDP (Digital hierarchy Plesiochronous - PDH).

-JDS (Digital hierarchy synchronous - SDH).

-Structure of the plot.

-Speeds.

-Advantages and disadvantages regarding PDH.

-Mechanisms for encoding and encryption of the information.

-Safety in the transportation of data systems.

3. communication services - voice services.

-Corporate and intelligent network services.

-Data, IP services services. IP telephony.

-Telematic and interactive services.

-Other services of value added.

-Criteria of quality of service (QoS).

-Delays and congestion control.

4. implementation and configuration of gateways-types and functions of gateways. Services that support.

-Procedures of installation of the hardware and software that make up a catwalk.

-Installation of the runway conditions.

-Analysis of the maps of IP addresses.

-Analysis of lines and nodes of voice transmission.

-Configuration parameters.

-Services configuration parameters.

-Security settings.

-Information about the network configuration of the operator.

-Tools for configuration.

-Management protocols.

-Quality of service parameters.

-Functional and structural tests.

-Maintenance and troubleshooting commands.

-Environmental legislation and standards of signaling and digitization.

5. telephone switching equipment. «Call Managers».

6. telecommunications market - situation of telecommunications. Legal framework and standards bodies.

-Main services in the market.

-Agents in the telecommunications market.

-Manufacturers and suppliers.

-Service providers.

-Operators.

-Profiles of the operators.

-Users. Rights of the users of telecommunications.

UNIT training 2 name: implementation and maintenance of systems of communications for services MULTIMEDIA and management of incidents.

Code: UF1873 duration: 90 hours reference of competition: this unit training is corresponds with the RP2 and RP3.

Capabilities and criteria of evaluation C1: implement and maintain services of communications media depending on the specifications functional received.

CE1.1 distinguish those elements and functions that integrate it architecture for the implementation of services of communications multimedia, to a design of implementation of services given.

CE1.2 evaluate them features technical of them equipment and of them lines of communications that configured the system multimedia, to determine the degree of compliance of them specifications of needs of communication given, taking in has them technologies of communications of data multimedia.

CE1.3 identify them parameters of configuration of them protocols for its implementation in equipment of communication of contained multimedia, according to specifications functional and of quality of the services to provide.

CE1.4 implement a system of communications for support services multimedia according to some specifications received:-evaluate them devices, lines and protocols that are used for the implementation of the system according to needs given.

-Define configuration parameters and processes of installation of devices and protocols of the system hardware and software to ensure the functionality of the same.

-Describe the procedures of system tests to verify the functionality of the services provided.

-Document the processes performed according to specifications.

CE1.5 develop the procedures for maintenance of the hardware and software of multimedia communication systems, taking into account the functional and technical specifications of devices, lines and services to maintain.

C2: Define the procedures for detection and incident management services communications of voice, data and multimedia to quality specifications.

CE2.1 describe features and functionality of the tools used for detection and incident management, taking into account service delivery specifications.

CE2.2 classify incidents and establish the levels of severity, depending on the results of the diagnostic procedures performed using specific tools, for the establishment of a plan of response to contingencies in communications, according to specifications of services given.

CE2.3 develop action plans before planned incidents, to provide a systematic solution to the staff responsible for the same according to given specifications for the provision of services.

CE2.4 define them procedures of performance before different types of incidents in them teams of communications of them services of voice, data and multimedia, for make them tasks of detection and notification of them same according to ones plans of contingency specified:-use the tools specific for the detection of them incidents.

-Isolate and diagnose the incident through the use of tools and processes defined previously.

-Proceed to the solution or scaling of the incidence according to them results of the diagnoses made.

-Identify them actors involved in the provision of those services and the responsibility of each one of them.

-Document the processes carried out.

Contents 1. Services of communications media-definition of multimedia.

-Structure of a system multimedia.

-Standard multimedia.

-Architecture and elements of a system of services multimedia: applications server and application client.

2. underlying technologies.

-TV digital.

-Standards of coding.: MPEG-1, 2, 4-standards of broadcasting of video digital: DVD-C for networks of cable,-S,-T-elements that make up the chain of TV digital.

-The header.

-Medium of transmission: satellite, network of cable, TV land, network IP...-decoder.

-ADSL for services multimedia.

-Video over IP.

-IP multicast.

-Packages IGMP.

-DVB-IPI (standardization of video over IP).

-Video on demand.

-Standard RTSP (Real Time Streaming Protocol). The streaming.

-Technologies Web.

3. architecture of a service of video low demand.

-Servers of video.

-System of distribution of content (SDC.)

-The system of management of contents.

4. Protocols used in the transmission of streams of video.

-UDP and TCP-RTP(Real Time Protocol) and RTCP (Real Time Control Protocol).

-MPEG-2 Transport Stream.

-RTSP (Real Time streaming Protocol).

5 implementation and maintenance of communications systems for multimedia services.

-Installation and maintenance of the hardware and software procedures.

-The lines of communications parameters.

-Definition and configuration of the functional parameters of the equipment.

-Configuration of specific protocols.

-Types of testing: functional and structural.

6. incident management - types and features.

-Isolation and detection procedures.

-Tools of internal management, registration and management of incidents - monitoring tools and tests.

-Action instruments.

-Tools / monitoring and management applications.

-Alarms. Interpretation.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 40 training unit 2 UF1872 - 90 40 sequence UF1873: to access the training unit 2 training unit 1 should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: administration of communications to users.

Code: MF0963_3 level of professional qualification: 3 associated to the unit's competition: UC0963_3 manage and provide communication services to users.

Duration: 150 hours training unit 1 name: maintenance of the infrastructure of the network communications.

Code: UF1874 duration: 30 hours reference of competition: this training unit corresponds to the RP1.

Capabilities and C1 evaluation criteria: keep the communications network infrastructure, both hardware and software, taking into account the functional and technical specifications of the elements that form the network.

CE1.1 describe the properties and characteristics of the elements of switching and transmission of communications network, to identify the needs of maintenance according to technical specifications.


CE1.2 distinguish functions and features of the hardware elements that form the network, to proceed with according to specified needs updating.

CE1.3 distinguish the functions and features of the software of computers on the network, to proceed with the update.

CE1.4 describe the tools of access to the elements of the communications infrastructure, to perform software update and configuration of functional parameters according to the technical specifications of the equipment and the geographical possibility of access.

CE1.5 sorting methods, techniques and tools used for the realization of procedures of corrective and preventive maintenance in the communications network, according to details technical elements and lines of communications.

CE1.6 update and configure elements of it infrastructure of switching and transmission of the network communications to ensure the provision of them services of the system, following some specifications technical given:-locate them elements of switching and transmission in the map of the network of communications for identify their features.

-Identify those elements hardware on which is van to make the procedures of update.

-Perform the update and software configuration using tools of management and remote control of the elements of the communications network.

-Discriminate them procedures of test to apply depending on them operations of update and configuration made in them elements of the network of communications to verify the compatibility of them components and the reliability in the provision of them services.

-Document the processes carried out.

Contents 1. Infrastructure of the network of communications.

-Elements of switching and transmission of the network.

-Functions and features of the hardware elements.

-Functions and features of the software elements.

2 maintenance and updating of elements of switching and transmission of communications network - access and remote tools features.

-Corrective and preventive maintenance.

TRAINING unit 2 name: management of resources, services and the communications network.

Code: UF1875 duration: 90 hours referrer of competition: this training unit corresponds to the RP2 and RP3.

Capabilities and C1 evaluation criteria: specify the procedures of maintenance and management services for voice and data communications, according to a given technical and functional specifications.

CE1.1 distinguish the performance parameters of the voice and data services, to ensure the continuity and quality of the service provided, according to specifications of the communications infrastructure.

CE1.2 identify the features of the management tools of communication network, for the monitoring of the voice and data services in regards to your configuration, use, performance, security and management of fault according to the needs in the management of voice and data services.

CE1.3 describe them features of them protocols of management of network for its use in the configuration and monitoring of equipment of communications, according to criteria of quality and continuity in the provision of them services of voice and data.

CE1.4 analyze the use and integration of resources of communications by voice and data services, to carry out the proposals of resizing them according to the quantity and quality of communications services provided.

CE1.5 in a practical course, properly characterized, the tasks of maintenance of voice communications and data resources to guarantee its functionality and service delivery:-identify management tools to gauge effectiveness and performance parameters of the services according to criteria of quality and continuity of provision.

-Perform remote management tasks on communications equipment using the corresponding network management tools.

-Perform tasks of updating hardware and software communications equipment according to specifications of the network elements.

-Check the compatibility and absence of conflicts between devices and components updated to ensure the provision of the service in optimum conditions of quality and continuity.

-Document the processes carried out.

-The plan of periodic equipment maintenance of communications according to a given functional specifications.

C2: Planning processes of performance monitoring of resources and communications, according to a given technical specifications.

CE2.1 classify systems of measurement of consumption and yields of the resources and services of the communications system, according to standards and existing standardization systems.

CE2.2 identify the performance parameters of the services offered on the network, to guarantee quality levels preset in the provision thereof in given functional specifications.

CE2.3 distinguish and use specific tools and monitors that allow the evaluation of the performance of communications services, according to levels of quality and continuity of the given service.

CE2.4 monitoring yields resources and communications services to evaluate the criteria of quality and continuity in the provision of the same plan:-determine the metrics to be used in the collection of information.

-Define the parameters of consumption and performance analysis.

-Use monitoring tools to verify that the consumption and yields are within limits.

-Document the processes carried out.

C3: Allocate communications resources to users, to attend the services requested according to given specifications.

CE3.1 classify services that can provide the communications network to identify capabilities that can offer to users, taking into account the type and the architecture of the network.

CE3.2 identify the relationship between communications resources and the availability of a service, to ensure the provision of the same according to technical specifications of the elements and lines of communications and functional details of the configuration of the service network to provide.

CE3.3 evaluate the availability of sufficient resources to provide the service to users, according to criteria of quality and continuity in the provision of the service.

CE3.4 resources and empower services users using specific tools and differentiating their capabilities, according to the technical information of own tools.

CE3.5 document the allocation of resources and services enabling agreement made users given specifications.

Contents 1. Management of resources and services of the communications network - map of the communications network.

-Quality of service.

-Network management, design and involved Resources Center.

-Relationship between resources and services.

-Tools for resource allocation: types and features.

-Monitoring and performance of services and resources.

-Classification of the systems of measurement of consumption and yields.

-Parameters of performance of the services offered on the network.

2. management of networks of communications-aspects functional of the management of the network.

-Protocols for management of network.

-Tools for the management of the network.

-Monitoring of a network of communications: types of incidences in the provision of services, tools of notification of alerts and alarms.

-Management centralized and distributed.

-Systems of management in operators of telecommunication.

-The process of detection and diagnosis of incidents: tools specific.

-Updates of software.

-Contingency plans.

TRAINING unit 3 name: attention to users and application installation client.

Code: UF1876 duration: 30 hours reference of competition: this training unit corresponds with the RP4 RP5.

Capabilities and C1 evaluation criteria: meet the effects produced in the allocation and use of the services and resources of communications, according to a given specification.

CE1.1 identify the meaning of alarms and alerts of the elements that form the communications network infrastructure, to ensure the provision of services according to specifications of the same quality.

CE1.2 identify and isolate the incidence from the symptoms detected in the communications network and the information reported by users, to make the diagnosis using specific and technical incident detection tools in communications systems.

CE1.3 the procedures for diagnosis and repair of the incidence in the communications network, by following some instructions.

CE1.4 distinguish between the types of incidents in order to identify the causes that produce them, whether liability on the operator, user or the supplier of the service, taking into account the characteristics of the services and resources provided.


CE1.5 meet and resolve alarms in a system in which is simulate different types of incidents in the network of communications for interrupt total or partially a service of communications, that responds to specifications functional given:-interpret them alarms produced by the elements of communications.

-Isolate the causes that produce the incidence and diagnose possible solutions.

-Perform solution or scaling the incidence according to the procedure given.

-Document the processes carried out.

C2: Define procedures for installing communications applications in Terminal according to technical specifications and functional equipment.

CE2.1 identify specific communications services for terminals that offer the operators of communications, according to the infrastructure used.

CE2.2 classify the types of terminals in order to evaluate their performance, taking into account its capabilities, services that support and technical characteristics of the same taking into account the needs, requirements, and specifications of the services to implement them.

CE2.3 implement and configure applications in terminals to enable specific services according to functional specifications given.

CE2.4 Verify that functionality in the service of communications occur in the terminal client, to ensure quality levels.

CE2.5 applications and enabling specific services in Terminal of communications for the definition of the corresponding procedures according to technical specifications of terminals and applications:-use simulators of Terminal client to perform previous tests for the implementation and configuration of applications and services.

-Interpret the associated technical documentation, even if it is published in the foreign language most often used in the sector, using the help.

-Define the processes of implementation of applications as well as the instructions for configuring the service.

-Testing of applications and services in different communications client terminals to determine parameters of compatibility and ensure levels of quality in the provision of services.

-Document the processes carried out.

Contents 1. Incidents in the allocation and use of the services and communications resources.

-Alarms and alerts. Meaning.

-Specific and technical tools for detection of incidents in communications systems.

-Procedures for diagnosis and repair of the incidence.

-Types of incidents.

-Liability of the operator.

-User incidences.

-Impact of the service provider.

2. installation of communications applications on terminal equipment.

-Communications terminals - types and features.

-Operating systems and programming languages specific to terminals.

-Specific services for terminals.

-Customer, management and configuration applications.

-Implementation and configuration of applications in terminals.

-Testing of the installed services and applications.

-Drafting of user guides.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1874 30 10 unit training 2 - 3 90 30 training unit UF1875 - UF1876 30 10 sequence: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULES OF PROFESSIONAL PRACTICES MANAGEMENT OF VOICE AND DATA NETWORKS.

Code: MP0395 duration: 80 hours capabilities and C1 evaluation criteria: collaborate in telematic networks infrastructure design in the integration of voice, data and multimedia services and, in the administration of communications services for users, in accordance with the procedures established in the company.

CE1.1 interpret the business technical documentation associated with the management of voice and data networking.

CE1.2 designing the infrastructure of telematic networks in accordance with the procedures of the organization.

CE1.3 integrated services of voice, data and multimedia according to established business procedures.

CE1.4 manage and provide communication services to users in accordance with the requirements adopted by the organisation.

CE1.5 documenting the work performed in accordance with the requirements and business processes.

C2: Participate in the process of work of the company, following the rules and instructions set forth in the work center.

CE2.1 behave responsibly both in human relations and works to be carried out.

CE2.2 respect the procedures and rules of the workplace.

CE2.3 undertaken with diligence the tasks according to the instructions received trying to it adapt to the pace of work of the company.

CE2.4 integrated into the production processes of the work center.

CE2.5 use established communication channels.

CE2.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Management and voice networks and data - communications infrastructure security policy.

-Management of systems of communications systems.

-The map of network communications systems.

-Equipment and business tools for checking services.

-Inventory of services and connections.

-Standards and quality criteria defined by the organization.

-Tools used in the different business processes.

-Telematics network infrastructure design business processes.

-Business processes on the integration of voice communications, data and multimedia services.

-Business procedures on administration and provision of communications services to the users.

2. integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.

-Interpretation and execution with diligence the instructions received.

-Recognition of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. the trainers training modules required accreditation requirements * professional experience required within the scope of the unit's competition MF0228_3: telematic network design.





● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree other equivalent titles.





2 years MF0962_3: integration of voice communications, data and multimedia services.





● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree other equivalent titles.





2 years MF0963_3: management of communications for users.





● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree other equivalent titles.





2 years * in the past five years.

V. requirements minimum of spaces, facilities and equipment space training surface m² 15 students surface m² 25 students 60 75 computer room space training M1 M2 M3 classroom of computer X X X space training equipment Aula de Informática - PCs installed in network and Internet connection.






-Cabinet with panels of patched and network connection devices: hubs, switches and routers.






-Base and network software.






-office software, internet tools.






-Antivirus and security software.






-Printer and peripherals.






-Software for the realisation of schemes of installations (programs of CAD / CAM / CAE).






-Project planning tools.






-Communications operators services configurators.






-Configuration and parameterization of the manufacturer services tools.







-Tools of management internal, of registration and administration of those incidents.






-Equipment of communications.






-Tools of monitoring and testing.






-Action instruments.






-Tools / monitoring and management applications.






-Test terminals, telephones and computers to test the service.






-Telephone switching equipment.






-«Call Managers».






-Specific software tools for the management and provision of services.






-Network and services management software tools.






-Incident management software tools.






-Canon of projection.






-Flip chart.






-Slate.






-Classroom material.






-Table and Chair for the trainer.






-Tables and chairs for students.






-Auxiliary furniture for classroom equipment.





* Equipment and corresponding software must be updated.

Not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex VIII I. identification of the certificate of professional designation: developing applications with web technologies code: IFCD0210 professional family: computing and communications professional Area: development level of professional qualification: 3 professional qualification of reference: IFC154_3: developing applications with web technologies (Rd. 1087 / 2005, of 16 September) relationship of competition units comprising professionalism certificate: UC0491_3 : Develop software elements in the customer environment.

UC0492_3: Develop software items in the server environment.

UC0493_3: Implement, verify and document web applications across internet, intranet and extranet.

General competence: develop documents and software components that constitute computer applications in distributed environments using web technologies, based on a technical design already drafted, performing, in addition, verification, documentation and implementation of them.

Professional environment: Professional: develops his professional activity in companies or entities public or deprived of any size that have network infrastructure intranet, extranet, or internet in the area of development of Software Engineering Department performing his work both self-employed and employed.

Sectors productive: is present mostly in the sector services, however is located in all them sectors productive since it activity has as objective the distribute information both of form internal as external to the Organization in which is is playing it activity, also is located in them following types of companies: companies of development of software with technologies web.

Companies that have as objective of business the marketing of services of analysis, design and construction of applications software for infrastructure of networks intranet, internet and extranet.

Companies or entities that use computer systems for its management.

Related jobs or occupations: 3820.1017 technical 3814.1010 computer application programmers of web developer web.

Multimedia programmer.

Duration of associated training: 590 hours ratio of training modules and training units: MF0491_3: web programming in the customer environment. (180 hours) ● UF1841: development of web documents using markup languages. (60 hours) ● UF1842: development and re-use of software components and multimedia using script languages. (90 hours) ● UF1843: application of techniques of usability and accessibility in the environment (30 hours) MF0492_3 client: web programming in the server environment. (240 hours) ● UF1844: development of web applications in the server environment. (90 hours) ● UF1845: data access in web applications in the server environment. (90 hours) ● UF1846: development of distributed web applications. (60 hours)

MF0493_3: Implementation of web applications across internet, intranet and extranet. (90 hours)

MP0391: module of practical professional not labor of development of applications with technology web. (80 hours)

II. professional profile of the professionalism unit certificate of competence 1 name: develop elements SOFTWARE in the environment client level: 3 code: UC0491_3 realizations professionals and criteria of performance MOP1: develop dynamic and static documents with tools of programming software to be processed at the customer according to the specified design environment.

CR1.1 static and dynamic to make documents are developed according to the specifications of the design.

CR1.2 encoding of the documents is carried out taking into account different development techniques, with markup languages and software development standards.

CR1.3 programming software tools are used to get the coding of the documents without errors and the documents to be processed in the customer environment.

CR1.4 made documents errors are detected and corrected using the debugging tools.

CR1.5 the documents developed are tested to verify that they meet the features specified in the design.

CR1.6 documentation is carried out according to patterns, rules and procedures set forth in the design.

CR1.7 the technical documentation of the software tools is interpreted both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

Rp2: Develop software components in the environment client that will meet the objectives of the design according to the given specifications.

CR2.1 the development of the component are performed according to the specifications received from the design.

CR2.2 the application logic is interpreted correctly identifying the elements required to encode components.

CR2.3 coding of components is performed by using different techniques of structured programming and software development standards.

CR2.4 the code of the component software is developed by providing an interface in terms of usability, accessibility and ergonomics according to design specifications and with the rules of the organization.

CR2.5 errors in the made components are detected and corrected using debugging tools.

CR2.6 developed components are tested to verify that they meet the objectives specified in the design.

CR2.7 documentation of manufactured components is made by following patterns, with rules and procedures established by the organization.

CR2.8 the technical documentation of the software tools is interpreted both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

RP3: Develop multimedia components with specific languages and tools to increase the functionality of the elements of the environment client according to design specifications.

CR3.1 audio and video components are arranged according to the environment that will be inserted, adjusting the output to digital formats standards and taking into account performance specifications.

CR3.2 the graphic elements, illustrations or photographs, are retouched and adjusted for output in a standard format using specific tools and according to specifications received.

CR3.3 animations that incorporate multimedia elements are configured using script languages and other specific tools to meet design specifications given.

CR3.4 develops the interactivity of multimedia elements with script languages and other specific tools according to instructions received.

CR3.5 developed component conforms to the criteria of accessibility, usability and ergonomics established by current regulations and the specifications of the Organization and in accordance with legislation concerning intellectual property and copyright.

CR3.6 the integration of multimedia elements in the customer environment is verified to ensure the parameters of quality of the product in accordance with the rules of the organization.

RP4: Use components already developed software in the customer environment to include specific functionality in documents in development according to the legislation in force.

CR4.1 processed components are used as elements integrators in the development of new components, according to the technical design.


CR4.2 the documents are built using components software already developed according to the design specified and in accordance with the legislation existing on property intellectual.

CR4.3 the software component is configured through its properties and methods to adapt its functionality to the needs of the user and the chosen customer's environment.

CR4.4 testing and documentation on software components already made, to adhere to the standards defined in the technical design.

CR4.5 the use of software components already made, should ensure the integrity of the system.

CR4.6 the system parameters that affect the ergonomics or usability are adjusted to improve the working conditions of the user, within the policies of the organization.

Media production computer and peripheral equipment professional context. Operating systems and configuration parameters. Office Tools. Tools: rapid development, layout, graphics and animation. Virtual machines. Browsers today, and new technological concept. Markup languages. Script languages. Structured languages. Languages oriented to objects. Protocols of communication. Object-oriented development tools. Tools multimedia. Tools for debugging and testing.

Components software already developed and/or distributed by business computer. Web servers. Security systems. Database engines for use in test environment.

Products and results dynamic and static documents whose content is source code to be interpreted. Graphic user interfaces. Documentation associated with developed components.

Information used or generated design and specifications of the application. Global view of the system make, deliver and explode. Manuals of use and operation of computer systems. The software operation manuals. Manuals the development tools used. Documentation of training courses. Documentation of exploitation of the customer environment. Technical support for assistance. Current legislation on intellectual property and copyright (Copyright). Documentation associated with developed components. Usability manuals. Job templates. Corporate graphic design specifications.

Unit of competition 2 name: develop elements SOFTWARE in the environment server level: 3 code: UC0492_3 realizations professionals and criteria of performance MOP1: develop software components in the server environment that will meet the objectives of the design according to the given specifications.

CR1.1 the code of the component software is developed using languages that allow the attainment of the functions indicated in the specifications of development.

CR1.2 component is coded using standards development techniques using design patterns to obtain, if possible, reusable items and seeking maximum portability according to the rules of the organization.

CR1.3 component is encoded with tools, format and documentation of the code indicated in the rules of programming.

CR1.4 the component interface is defined and documented clearly, ensuring the integration in the system.

CR1.5 developed component is subjected to batteries of tests required in a runtime environment that is standardized with the appropriate debugging tools to ensure its functioning according to the specifications of safety and quality of the organization.

Rp2: Handle interfaces of access to information stored in databases or other structures to integrate content into the logic of the web application according to the given specifications.

CR2.1 components are developed including functions in connection with databases or other structures according to the given specifications and using patterns of development for possible reuse.

CR2.2 data are handled through the tools provided by the system according to design specifications.

CR2.3 query and data manipulation is done using data manipulation and definition language standards according to the stipulations of design.

CR2.4 connections with the management systems of databases are configured according to the guidelines provided by the organization.

CR2.5 developed components are tested to verify the functionality described in the design specifications and to ensure the integration of these with the components of the system and other applications installed in accordance with the rules of the organization.

CR2.6 testing and documentation on software components already made, to adhere to the standards defined in the technical design.

RP3: Use of services distributed in other settings to integrate functions of development according to the established standards of the market.

CR3.1 integration of other web services in the web application is used through the use of standard technologies in the market allowing to exchange information in quick, easy and transparent way with the web application.

CR3.2 the management of the exchange of information between the web application on the server environment and the other web service is done through the corresponding access interfaces depending on the technology used.

CR3.3 searches for services are performed to get the features appropriate to the design specifications and integrate them into the web application.

CR3.4 the technical documentation of the used web service is interpreted both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

Media production computer and peripheral equipment professional context. Operating systems and configuration parameters. Office Tools. Development and debugging tools. Third-party components. Managers of protocols. Lines of communications. Web servers. Application servers. Database management systems. (Synchronization of contents) file transfer tools. Virtual machines. Browsers today, and new technological concept. Security systems. Change control tools.

Products and results code source of software components. Executable code of the software components. Static and dynamic documents whose content is source code to be interpreted. Own server layer components. Made development documentation.

Information used or generated overview of the system, deliver and exploit. Manuals of use and operation of computer systems. The software operation manuals. Manual of the programming languages used. Training materials. Technical support for assistance. Defined technical design. Technical support for assistance. Job templates. Development carried out components documents.

Unit 3 name competition: implement, verify and document applications WEB environments of INTERNET, INTRANET and EXTRANET level: 3 code: UC0493_3 realizations professionals and criteria of performance MOP1: deliver and distribute your web application to be used by users according to established quality standards and implementation plans.

CR1.1 installation of the accomplished development requirements, regarding client a part and a server part, clearly expressed with regard to management of the file system and management needs according to the Organization's applications installation parameters.

CR1.2 the levels of safety of users of the application are configured for a proper use of the same according to the origin: internet, intranet or extranet.

CR1.3 installation packages are created and configured properly for distribution according to the rules of implementation of the organization.

CR1.4 processes and application installation scripts are created and configured according to the specifications of the implementation of the organization.

CR1.5 the documentation of them packages and scripts of installation of the application is performed according to the parameters of it organization.

CR1.6 installation processes are checked and verified its functioning according to the rules of the organization.

Rp2: Establish and maintain documentation of web application developed using established documentation, according to quality standards.

CR2.1 documentation is drawn up in accordance with the rules and documentation tools and attending to the quality specifications set forth in the Organization and taking appropriate ergonomics specifications.

CR2.2 documentation generation tools are used to obtain suitable products according to standards of documentation and quality of the organization.

CR2.3 documentation is developed taking into account version control and its subsequent update and maintenance according to the design specifications and standards of enterprise development ensuring understanding.

RP3: Testing to verify the correct functioning of the elements developed software to ensure quality levels according to the design specifications that will integrate the server and client in the system environment.


CR3.1 tests games and their settings are arranged and controlled for the realization of the same specifications of design components and rules of the organization.

CR3.2 structural and functional tests of the components are made with the sets of data and scenarios prepared according to specifications of the design of the component and rules of the organization.

CR3.3 integration testing of the component and the access to data and other services are performed according to functional specifications and standards of quality of the organization.

CR3.4 it documentation of them tests, both in what affects to the preparation, execution and result of them same, is performed according to the specifications of development and normative of quality of it organization.

CR3.5 tests are performed according to versioning of components in verification and own tests.

Context professional means of production equipment computer and peripherals. Systems operating and parameters of configuration. Office Tools. Web of content. Structured languages. Object-oriented languages. Development tools. Web servers. Debugging and test tools. Component software distributed by computer companies. Documentation tools.

Products and results of test programmes. Test games. Documents of testing, certification, quality control, delivery and implementation among others. Application in production.

Information used or generated overview of the system, deliver and exploit. Manual of use and operation of the systems computer. Manual of operation of the software. Manuals the development tools used. Documentation of courses of training. Documentation of exploitation of the environment server, and from integration. Supports technical of assistance. Job templates.

III. formation of the certificate of professionalism module training 1 denomination: WEB programming in environment customer code: MF0491_3 level of professional qualification: 3 associated to the unit's competition: UC0491_3 elements software developing environment customer duration: 180 hours training unit 1 name: elaboration of documents WEB through languages of brands code: UF1841 duration: 60 hours referrer of competition : This training unit corresponds to the RP1 capabilities and C1 evaluation criteria: prepare documents using markup languages and standards of software development.

CE1.1 determine the different parts of a document created with markup language used for its implementation.

CE1.2 recognize the different techniques of software development in the market for better integration in the system and elaboration of documents according to the specified design.

CE1.3 use appropriate marks to generate internal documents in the development of design specifications.

CE1.4 in a practical course, where he is asked to make documents with a markup language that allow interaction with the user having given specifications:-write marks that allow changing the attributes of the text used.

-Write marks which permit the change of color and the background image of the document.

-Create tables and lists brands.

-Create links to other documents concerning trademarks.

-Integrate brands enabling the inclusion of static or dynamic images, sounds and videos.

-Integrating frameworks concerning trademarks to relate various documents.

-Integrate brands that allow the execution of programs and client controls.

-Build forms to collect and validate user information.

-Designing interactive maps to facilitate the accessibility of the user.

-Plan special effects to be applied in documents to prepare.

CE1.5 enunciating general features concerning 'style sheets' to be applied in documents to develop according to specified design.

CE1.6 use brands to provide different styles to documents developed according to specified design.

CE1.7 build documents using markup languages to allow the user the use of mobile devices and specific means of accessibility.

Contents 1. Web design - web design principles.

-User-oriented design.

-Objective-oriented design.

-Implementation-oriented design.

-The web design process.

-Structure of a web site and seaworthiness.

-Structure and composition of pages.

-Compatibility with browsers.

-Differences between design oriented to presentation and printing.

2. languages of marked General-origin of the languages of marked General: SGML and XML.

-Features General of those languages of marking.

-Structure general of a document with language of marked.

-Metadata and instructions of process.

-Encoding of characters. Character special (exhaust).

-Labels or brands.

-Elements.

-Attributes.

-Comments.

-Documents valid and well formed. Schemes.

3. languages of marking for presentation of web pages-history of HTML and XHTML. Differences between versions.

-Structure of a document.

-Versions.

-Elements of the header.

-Elements of the body of the document.

-Color.

-Color coding.

-Color type.

-Color safe.

-Text.

-Headers. Hierarchy and structure of the content of a document.

-Paragraphs.

-Alignment, spacing and bleeding of text.

-Features of lyric: types, sizes and colors.

-Text separator.

-Specific tags for text markup. Logical styles.

-Hypertext links.

-Structure of a link: the internet address or URL.

-Links styles.

-Differences between absolute and relative links.

-Internal links.

-Special links: email. Download links.

-Specific attributes: title, destination, shortcuts, keyboard, etc.

-Images.

-Image formats.

-Features image: size, title, alternative texts.

-Links on images.

-Background images.

-Lists.

-Features.

-Management of lists.

-Nesting lists.

-Other types of lists: lists of definition.

-Tables.

-Basic structure.

-Format of tables: borders, alignment, size, etc.

-Format of the contents of cells.

-Grouping of rows and columns.

-Nested tables.

-Good practices in the use of tables.

-Frames (frames).

-Creation of frames.

-Advantages and disadvantages in the use of frames.

-Support of browsers.

-Formatted frames.

-Links between content of frames.

-Marcos nested.

-Frames (iFrames) embedded.

-Forms.

-General description and use of forms.

-Elements of a form: text, buttons, etc.

-Processing of forms.

-Formatted forms: shortcuts keyboard, order editing, groups, labels, etc.

-Specific elements for mobile technologies.

-Selection of the language of brands for mobile technologies.

-Mobile style sheets.

-Disused (deprecated) elements.

-Blinking text.

-Canopies.

-Alignments.

-Other elements into disuse.

4 sheets web style - types of style sheets: static and dynamic.

-Elements and structure of a style sheet.

-Creation of style sheets.

-Application of styles.

-Inheritance of styles and application in cascade.

-Formatted pages using styles.

-Structure of pages using styles.

-Design of styles for different devices.

-Good practices in the use of style sheets.

TRAINING unit 2 name: development and reuse of components SOFTWARE and MULTIMEDIA through language of script code: UF1842 duration: 90 hours referrer of competition: this training unit corresponds to the RP2 and RP3 capabilities and C1 evaluation criteria: create software using tools components and script languages using formal development techniques.

CE1.1 in a practical course, which calls for creating and maintaining software components in the environment of the client by using script languages and development tools provided with detailed design documentation:-create and archive software components.

-Modify and delete software components.

-Debug and verify the elaborate software components.

CE1.2 relate the functionality of the component software to develop the techniques of structured development standards to meet the functionality of the software component.

CE1.3 formulate structures of data and control flow through languages script according to the functionality of the software component to develop.

CE1.4 create proper functionality of the component software to develop procedures and functions using script languages.

CE1.5 document component software developed according to design specifications.

C2: Create and manipulate multimedia components using script languages and specific tools.

CE2.1 identify the formats standards of distribution and use of multimedia components, audio, video, illustrations, photographs, among others for inclusion in documents of the customer environment.

CE2.2 develop animations and Interactivities in multimedia components using script languages specific to given specifications.


CE2.3 create or manipulate multimedia components using specific tools to adapt the content to the formats indicated in the specifications received.

CE2.4 in a practical course in which it has a web document, multimedia components and the final product design specifications:-analyze the formats of the original multimedia components.

-Make adjustments in formats of multimedia components to achieve the performance required in the specifications parameters.

-Develop the interactivity processes defined in the specifications.

-Integrate those components multimedia in the document of the environment customer.

-Check the integration and functionality of components according to the design specifications.

C3: Select software components already developed according to their functionality to integrate them into documents.

CE3.1 analyze software requirements for use of components to be used by the document in the customer's environment.

CE3.2 Insert software components of client application that will be used for the document in the customer's environment.

CE3.3 in practical cases, which calls for select software components already developed to integrate them into documents development tools and script languages on the basis of detailed design documentation:-integrate software components oriented techniques of management of files on the server.

-Integrate software components that enable error handling.

-Integrate software components for storing dictionary type information.

-Integrate software components for control and validate the information entered by the user.

-Integrated software components to display information relating to the filesystem on the server.

-Integrated software components to allow for dynamic effects associated with the document or device used.

-Integrated software components to use other features in the developed document.

-Check the capabilities provided by the component to coincide with the expected and that conflicts with the rest of the system components do not occur.

Contents 1. Architectures of applications web-scheme general.

-Architecture in layers.

-Interaction between the client and server.

-Architecture of the layer client.

2. browsers web-architecture of a browser.

-Interface for user.

-Scanning engine.

-Presentation engine.

-Auxiliary modules: persistence, network interface, interpreter of scripts and presentation infrastructure.

-Commonly used browsers. Comparative.

-Security in browsers.

-Integration of applications in browsers. Adapters (plug-ins).

-Common adapters in different browsers.

-Configuration of the types of files and adapters.

-Conformity with standards.

3. creation of dynamic web content - fundamentals of programming.

-Constants, variables. Simple and structured data types.

-Expressions and statements. Basic operators.

-Flow control: sequential, loops and conditionals.

-Subprograms: procedures and functions. Libraries.

-Types of parameters.

-Function calls. Recursion.

-Notions of object-orientation: classes and objects. Heritage.

-Major programming methodologies.

-Languages for the development of dynamic content.

-Script languages. General characteristics.

-Comparison of script languages. Criteria for the selection of a script language.

-Virtual machines across browsers. Applets (applets).

-Other languages for the development of rich web applications (RIA).

4. script for general purpose languages - integration of languages of script in web browsers.

-Comparative and compatibility with browsers.

-Differences between versions.

-Structure of a program in a script language.

-Variables and data types.

-Operators.

-Objects.

-Sentences. Nesting.

-Structures of control and conditional.

-Loops.

-Reviews.

-Features.

-Parameters.

-Variable local and global.

-Libraries of functions.

-Manipulation of text.

-Basic functions for the manipulation of text.

-Introduction and validation of text.

-Lists (arrays).

-Creation of arrays Basic.

-Arrays multi-dimensional.

-Treatment of arrays using loops.

-Formats standard of storage of data in languages of script.

-Comparative.

-Treatment of formats standard.

-Dictionaries of data.

-Objects.

-Creation of objects: methods and data structures.

-Object libraries.

-The model of web document.

-Document structure.

-Navigation through the properties of a document.

-Change of properties by using script languages.

-Management of events.

-Types of events.

-Techniques for handling events using script languages.

-Event handlers.

-Events of load initial.

-Delegation and propagation of events.

-Management of errors.

-Handling of error ' not languages of script enabled» (no script).

-Checking of errors in functions.

-Captures of errors.

-Use of points of rupture.

-Uses specific of languages of script.

-Integrating multimedia using languages of script.

-Animations.

-Special effects in graphical elements and text.

-Grid of data.

-Management of channels of subscription (RSS).

-Description of the techniques of access asynchronous (AJAX).

-Use of languages of script in devices mobile.

-Environments integrated (Frameworks) for the development with languages of script.

-Characteristics of the environments of use common. Comparative.

-Editors advanced.

-Features of validation and debugging code.

-Techniques for the documentation of the code.

-Utilities additional for the realization of content dynamic. Extensions useful for browsers.

-Environments of development specific: development on devices mobile.

5. content multimedia-definition of multimedia. Types of resource media.

-Inclusion of content multimedia on web pages.

-Adapters for resources multimedia.

-Link to various resources from web pages.

-Embedding of multimedia content.

-Web file formats. The MIME standard.

-Types of reproduction. Streaming and progressive loading.

-Comparison of the treatment of multimedia content in different versions of markup languages pages.

-Multimedia graphics.

-Graphic formats. Comparative.

-Repository of images.

-Types of graphics: photographs, vectorized images and icons.

-Tools for graphic treatment. Filters and image processing - Conversion of graphic formats.

-Audio.

-Audio formats. Comparative.

-Audio players. Inclusion in web browsers.

-Link or inclusion of audio channels.

-Conversion of audio formats.

-Tools for the treatment of sound. Fragments of audio editing.

-Video.

-Video formats. Video quality and comparative.

-Video repositories.

-Video player. Inclusion in web browsers.

-Link or inclusion of video channels.

-Conversion of video formats. Optimization.

-Video editing tools. Creation of effects and compositing.

-Multimedia animations.

-Principles of animation.

-Tools for the creation of animations.

-Animations formats.

-Inclusion in web pages.

-Good practices in the use of animations.

-Interactive elements.

-Creation of interactive elements.

-Interactive maps.

-Fields of use.

TRAINING unit 3 name: application of techniques of usability and accessibility in the environment customer code: UF1843 duration: 30 hours reference of competition: this training unit corresponds with the RP4.

Capabilities and C1 evaluation criteria: applying usability and accessibility techniques in the development of user interfaces.

CE1.1 distinguish and explain patterns of accessibility to the content in the documents produced to allow better navigation and understanding of users.

CE1.2 distinguish and explain patterns of usability to the content in the documents produced to allow better quality, effectiveness and user satisfaction.

CE1.3 in a practical course, which calls for creating and maintaining components software and documents apply standards of accessibility and usability to improve its use.

Contents 1. Web accessibility - definition of web accessibility.

-Advantages and difficulties in the implementation of web accessibility.

-Regulations and standards on web accessibility.

-Web accessibility regulatory agencies.

-Comparison of norms and standards.

-Guidelines for compliance with regulations and standards.

-Description of the main guidelines (images, links, video, etc.).

-Guidelines for accessible navigation.

-Description of the process of conformity in web accessibility.

-Technologies where accessibility is applicable.

-(X) HTML.

-CSS.

-Javascript.

-Flash.

-PDF.

XML/XSL.

-Media playback.

-Other technologies.

-Tools for the validation of accessibility.

-Browser-based.

-By desktop applications.

-Using external web services.

-Evolution of accessibility. New trends.

2. usability web


-Definition of usability.

-Importance of user-centered web design.

-Differences between usability and accessibility.

-Advantages and problems in the combination of accessibility and usability.

-Advantages and difficulties in the implementation of web sites usable.

-Usability methods.

-Analysis of user requirements.

-Principles of the conceptual design. Creation of prototypes geared to the user.

-Guidelines for the creation of web sites usable.

-Evaluation of usability.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance unit training 1-UF1841 60 55 unit training 2-UF1842 90 85 unit formative 3-UF1843 30 25 sequence: for access to the unit formative 2 must have is exceeded it unit formative 1 and for access to it unit formative 3 must have is exceeded them units training 1 and 2.



Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULE training 2 name: programming WEB in the environment server code: MF0492_3 level of qualification professional: 3 associated to it unit of competition: UC0492_3 develop elements software in the environment Server duration: 240 hours unit training 1 denomination: development of applications WEB in the environment server code: UF1844 duration: 90 hours reference of competition: this unit training is corresponds with the RP1 capabilities and criteria of evaluation C1 : Create components software with technologies of development oriented to objects.

CE1.1 in a practical course which calls for managing software components in the server environment using development tools and programming languages having detailed design documentation:-create and archive software components.

-Modify and delete software components.

-Debug and verify the elaborate software components.

CE1.2 create objects, classes, and methods appropriate to the functionality of the software component to be developed using object-oriented programming languages.

CE1.3 formulate structures of data and control flow through programming languages to develop objects according to the functionality of the software component-oriented.

CE1.4 document component software developed.

CE1.5 in a so-called practical which calls for components of software using development tools and programming languages oriented objects from detailed design documentation:-integrate software components from controlling the content of the documents located on the server to be used in the customer type servlet environment.

-Integrated file management in the software component to develop.

-Integrated error handling in the software component to develop.

-Use variables of server in the component software to develop to provide access to the properties of the server.

-Integrated tracking of user sessions and web application to develop the software component to build.

-Create software components with the functionality of the client application to be used in the customer environment type applet.

-Create software components that can deliver its functionality to other components the same server or other servers on the network software.

Contents 1. The process of software development - software life cycle models.

-In Cascade (waterfall).

-Iterative.

-Incremental.

-At V.

-Based on components (CBSE).

-Rapid development (RAD).

-Advantages and disadvantages. Guidelines for the selection of the most appropriate methodology.

-Analysis and requirements specification.

-Types of requirements.

-Models for the analysis of requirements.

-Documentation requirements.

-Validation of requirements.

-Management of requirements.

-Design.

-Models for the design of systems.

-Design diagrams. The UML standard.

-Documentation.

-Implementation. General concepts of software development.

-Principles Basic for the development of software.

-Techniques of development of software.

-Validation and verification of systems.

-Planning.

-Formal verification methods.

-Automated analysis methods.

-Software testing.

-Types.

-Functional test (BBT).

-Structural testing (WBT).

-Comparative. Patterns of use.

-Test design.

-Scope of application.

-System testing.

-Component testing.

-Test automation. Tools.

-Standards on software testing.

-Software quality.

-Software quality principles.

-Metrics and software quality.

-Concept of metric and its importance in the measurement of the quality.

-Main metric in the phases of the cycle of life software.

-Standards for the description of the factors of quality.

-ISO-9126.

-Other standards. Comparative.

-Tools of use common to the development of software-editors oriented to languages of programming.

-Compilers and linkers.

-Generators of programs.

-Scrubbers.

-For testing and validation of software.

-Code optimizers.

-Packers.

-Software documentation generators.

-Managers and package repositories. Versioning and control units.

-For software distribution.

-Software update managers.

-For version control.

-Integrated environments (IDE) development of common use.

-Management of software development projects.

-Project planning.

-Control of projects.

-Implementation of projects.

-Common tools for project management.

2. the object-oriented - object-oriented principles. Comparison with structured programming.

-Concealment of information (information hiding).

-The abstract type of data (ADT). Encapsulated data.

-Message passing.

-Classes of objects.

-Attributes, class variables and state variables.

-Methods. Requirements and invariants.

-Management of exceptions.

-Aggregation of kinds.

-Objects.

-Creation and destruction of objects.

-Call to methods of an object.

-Visibility and use of the state variables.

-References to objects.

-Persistence of objects.

-Optimization of memory and garbage (garbage collection).

-Inheritance.

-Concept of inheritance. Superclasses and subclasses.

-Multiple inheritance.

-Abstract classes.

-Types of inheritance.

-Polymorphism and dynamic binding (dynamic binding).

-Guidelines for the proper use of inheritance.

-Modularity.

-Libraries of classes. Scope of use of names.

-Advantages of the use of modules or packages.

-Genericity and overload.

-Concept of genericity.

-Concept of overload. Types of overload.

-Comparison of genericity and overload.

-Object oriented development.

-Development of common object-oriented languages.

-Development tools.

-Languages of modeling in object-oriented development.

-Use of the unified language (UML) modeling in object-oriented development.

-Diagrams for modeling object-oriented systems.

3. web architectures - concept of web architecture.

-Layers model.

-Platforms for Server development in layers.

-Oriented web application server development tools.

-Types of tools.

-Extensibility. Installation of modules.

-Techniques for configuration of development, pre-production and production environments.

-Debugging features.

4 programming languages of server-side web applications - features of the web server programming languages.

-Types and features of the language in common use.

-Interpreted server-oriented.

-Client languages interpreted on server.

-Compiled languages.

-Criteria in the choice of a web server programming language. Advantages and disadvantages.

-General characteristics.

-Data types.

-Classes.

-Basic operators. Manipulation of character strings.

-Control structures. Loops and conditionals.

-Modules or packages.

-Inheritance.

-Management of libraries (libraries).

-Configuration management.

-Configuration descriptors.

-Configuration files.

-Security management.

-Concepts of identification, authentication, and authorization.

-Techniques for session management.

-Error handling.

-Error recovery techniques.

-Programming of exceptions.

-Transactions and persistence.

-Access to databases. Connectors.

-Standards for access to databases.

-Management of the configuration of access to databases.

-Access to directories and other data sources.

-Programming of transactions.

-Server components. Advantages and disadvantages in the use of containers of components.

-Models of development. The model view controller.


-Model: data access programming.

-Vista: Development of client applications. Events and user interface.

-Programming of the controller.

-Documentation of the software. Inclusion in source code. Documentation generators.

UNIT training 2 denomination: access to data in applications WEB of the environment server code: UF1845 duration: 90 hours reference of competition: this unit training is corresponds with the RP2 capabilities and criteria of evaluation C1: develop components that allow the access and the manipulation of them information supported in databases and other structures.

CE1.1 create components software using objects or components of connectivity for specific for access to information stored in databases and other structures.

CE1.2 integrate SQL statements into software components to access and manipulate the information in databases.

CE1.3 in a so-called practical in which is requests build components of software that access to data supported in databases or other structures of storage, is requests:-identify them elements and structures contained in a database.

-Use them objects, connectors and middleware needed in the construction of the component to make them access to them data supported in the database u others structures according to specifications given.

-Carry out operations of definition and manipulation of information supported in databases using the language SQL.

CE1.4 determine the main features of a standard markup language extended to share information between software components and databases or other structures.

CE1.5 integrate features of a standard markup language extended in the development of software components to share information supported by databases or other structures.

Contents 1. Data models - concept of data. Data lifecycle.

-Data types.

-Basic.

-Records.

-Dynamic.

-Definition of a conceptual model.

-Patterns.

-Generic model.

-The relational model.

-Description.

-Entities and entity types.

-Data elements. Attributes.

-Relations. Types, subtypes. Cardinality.

-Keys. Types of keys.

-Standardization. Normal forms.

-Construction of the logical data model.

-Specification of tables.

-Definition of columns.

-Specification of keys.

-Conversion to normal forms. Dependencies.

-The physical data model. Data files.

-Description of the data files.

-Types of files.

-Access modes.

-Organization of files.

-Transformation of a logical model into a physical data model.

-Tools for the realization of models of data.

2 management of databases (DBMS) - definition of DBMS systems.

-Components of a RDBMS. Structure.

-Storage management.

-Management of queries.

-Rules engine.

-RDBMS terminology.

-Administration of a RDBMS.

-The role of the DBA.

-Management of indexes.

-Security.

-Backups and replication of databases.

-Management of transactions in a DBMS.

-Definition of transaction...

-Components of a system of transactions.

-Types of protocols of control of the concurrency.

-Recovery of transactions.

-Solutions of DBMS.

-Distributed.

-Oriented to objects.

-Structured (XML) data oriented.

-Storage of data (data warehouse).

-Criteria for the selection of DBMS business.

3. database management languages. Standard SQL - description of the SQL standard.

-Creation of databases.

-Creation of tables. Types of data.

-Definition and creation of indexes. Primary external key.

-Links between databases.

-Management of records in tables.

-Insertion.

-Modification.

-Deleted.

-Consultations.

-The general structure of a query.

-Selection of columns. Obtainment of unique values.

-Selection of tables. Links between tables.

-Conditions. Useful functions in the definition of conditions.

-Meaning and use of the null value.

-Management of the result of a query.

-Conversion, generation and manipulation of data.

-Functions for string manipulation.

-Functions for the manipulation of numbers.

-Date and time functions.

-Data conversion functions.

-Multiple queries. Unions (joins).

-Definition of Cartesian product applied to tables.

-Unions of tables (joins). Types: inner, outer, self, equi, etc.

-Subqueries.

-Groups.

-Concepts of pooling the data.

-For group functions.

-Grouping multicolumn.

-Grouping via expressions.

-Group filter conditions.

-Views.

-Click view concept.

-Criteria for the use of views.

-Creation, modification and deletion of views.

-Updatable views.

-Advanced functions.

-Restrictions. Integrity of databases.

-Triggers.

-Management of permissions on tables.

-Query optimization.

4 markup languages in common use in server-side - origin and history of the markup languages. The XML standard.

-Characteristics of XML.

-Parts of an XML document: elements, attributes, brands, etc.

-Syntax and semantics of XML documents: valid and well-formed documents.

-XML structure.

-XML schemas: DTD and XML Schema.

-Sheets of style XML: the standard XSLT and XSL.

-Links: XLL.

-User agents: XUA.

-XML-based standards.

-Page layout: XHMTL.

-Selection of XML elements: Xpath and XQuery.

-Electronic signature: XML-Signature and Xades.

-Encryption: XML-Encryption.

-Other standards in common use.

-XML parsing.

-Tools and utilities for analysis.

-XML parsing using languages in Server programming.

-Use of XML in information exchange.

-Coding parameters.

-XML-based configuration files.

TRAINING unit 3 name: development of applications WEB distributed code: UF1846 duration: 60 hours referrer of competition: this training unit corresponds with the RP3 capabilities and C1 evaluation criteria: select and use services delivered for integration into your web application.

CE1.1 identify the possibilities offered by the distributed web services for integration into the application to develop.

CE1.2 specify the characteristics of the protocols the market standards to use web services in application development.

CE1.3 select and use the most appropriate web services to be used in the web application based on the specified design.

Contents 1. Distributed service-oriented architectures - General characteristics of the architectures of distributed services - policy conceptual model of the service - based on message - based resource - oriented architectures and service - aspects of security in service-oriented architectures - contracts - messaging security - data security access Control. RBAC - communications security model. Secure protocols - oriented services using web technologies - architectures implementation specifications of commonly used web services: SOAP, REST, etc.

-Definition of services languages: standard WSDL - web services security standards: SAML, XACML, WS-Security, etc.

-Implementation of safety - basic concepts of cryptography - services-oriented architectures, types of cryptography - certification bodies - digital certificates. -Identification and digital signature using digital certificates - features encryption of data - services directories - directory - advantages and disadvantages - concept distributed directories - directories of services standards: UDDI 2. Programming of web services across distributed - component software for access to distributed services - definition of services - automatic generation of services - programming of different types of access to services - based publish/subscribe services.

-Based repositories - services accessible from user agents - services providers and consumers of services in setting server - tools for web services programming - comparative - libraries and integrated environments (frameworks) in common use.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1844 90 85 unit training 2 - 3 90 85 formative unit UF1845 - 60 55 sequence UF1846: to access the training unit 2 training unit 1 should have been overcome and to access the training unit 3 training units 1 and 2 must have been overcome.



Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING MODULE 3


Name: Implementation of WEB applications in INTERNET, INTRANET and EXTRANET environments.

Code: MF0493_3 level of professional qualification: 3 associated to the unit's competition: UC0493_3 implement, verify and document web applications across internet, intranet and extranet duration: 90 hours capacity and criteria of evaluation C1: establish the processes of installation and distribution of the application in different areas of implementation.

CE1.1 different phases, processes, and technologies involved in the installation and distribution of the web application.

CE1.2 in alleged practical, in which is requests install and distribute the application web in the areas of internet, intranet and extranet:-establish them requirements of installation and distribution of it application.

-Define the structure of directories in the server environment to locate documents and software developed in the web application components.

-Identify the resources affected by accomplished development.

-Indicate the necessary services in the server environment to run the web application.

-Specify settings appropriate parameters in the environment of the server and client.

-Set the security settings for the web application.

-Create and configure installation packages properly.

-Check the good operation of the process of installation and distribution.

C2: Establish and maintain documentation web application using documentation generation tools and controlling versions.

CE2.1 identify different tools for documentation and control of existing versions.

CE2.2 in a practical course which calls for develop and maintain web application documentation to assess that:-the documents and software components have been documented according to the standards of documentation and quality of the organization.

-Documentation is developed and updated taking into account the version control.

-The documentation has been using documentation tools in the business organization.

C3: select and use methods and games of tests to verify them features and the specifications of performance of the application web.

CE3.1 classify them different methods to use to verify the good functioning of the application web developed.

CE3.2 in a practical course where he is asked to verify functionality and performance of the web application specifications using gaming tests, the following elements:-the documents developed using markup languages in the customer environment.

-The components software developed in the environment client using languages of script.

-The usability and accessibility in the development of interfaces of user in the environment customer.

-The integration of components software already developed in the application web.

-The software components developed in the environment server using object-oriented programming languages.

-The access to database software components or other structures.

-The use of web services for the web application.

-The performance of the server according to your web application and the number of users who use the application at any given time.

-Optimization of the web application on the basis of the parameters obtained in the validation of the tests.

Contents 1. Internet - brief history and origin of Internet.

-Major services offered by Internet.

-World Wide Web.

-Email.

-Transferring files (ftp).

-Other services.

-Internet technology.

-TCP/IP architecture. Comparison with OSI.

-Internet protocols: TCP, UDP, SMNP, SMTP, etc.

-The HTTP protocol.

-TCP/IP networks.

-IP addressing. Evolution.

-Domains. Hierarchy of domains.

-Identification of domains services: DNS.

-Scopes: Intranet, Internet, and Extranet. Security considerations. Firewall.

2. la World Wide Web - a brief history of the World Wide Web.

-General architecture of the Web.

-Principles for the design of web systems.

-The basic components of a web system.

-Division into layers.

-The customer web.

-Hardware basic. Devices fixed and mobile.

-Systems operating of use common e Internet.

-Browsers. Characteristics and comparative.

-Features advanced: extensions, application specific, etc.

-Web servers.

-Commonly used web servers.

-Features basic of a server web.

-Configuration of servers web.

-Safety in servers web.

-Features advanced: extensions, Server virtual, etc.

-Servers of applications.

-Concept of server's applications.

-Characteristics of the servers of applications.

-Comparison of servers of applications of use common.

-Configuration of an application server.

-Security in application servers.

-Advanced features: concepts of scalability, load balancing, high availability, etc.

-Database servers.

-Database servers for Internet in common use.

-Basic features of a database server.

-Advanced features: concepts of scalability, high availability, etc.

-Additional servers in a web architecture.

-Mail servers. Features.

-Address (DNS) servers. Features.

-Proxies.

-Directory servers. Features of LDAP.

-Messaging servers.

-Server of antivirus, content filtering, etc.

-Other additional servers.

-Infrastructure hardware and software for Internet servers.

-Cloud (Cloud) services.

-Types of services: infrastructure as service, platform as service and application as a service.

-Advantages and disadvantages of cloud infrastructure services.

-Comparison of the infrastructure in the cloud of commonly used services.

3. web applications - evolution and types of computer applications.

-Terminal applications. Virtual Terminal servers.

-Desktop applications.

-Client/server applications.

-Web applications.

-Advantages and disadvantages of the types of applications. Comparative.

-Application development technologies.

-Characteristics by type of application.

-Comparison according to the type of application.

-Specific technologies for web development.

-Internet portals. Features.

-Content management systems: servers, portals and documentaries.

-Multi-device content servers.

-Basic components in web portals. Portlets and other commonly used components.

-Characteristics and comparison of commonly used web portals.

4. development and deployment of web applications - basic models of web application development. The vista-controlador model (MVC).

-Common web development tools.

-Features.

-Comparative.

-Policies of development and testing of web applications.

-Development environment.

-Pre-production or testing environment.

-Production environment.

-Organization of resources in a web application.

-Programs.

-Style sheets.

-Configuration files.

-Images.

-Documents.

-Libraries of components (libraries).

-Other files.

-Safety in a web application.

-Levels of security. Standards.

-Concepts and techniques of identification, authentication and authorization or access control.

-Identification and advanced authentication. Digital certificates.

-Concept of session. Conservation of sessions.

-Systems of common use for the conservation of sessions in web applications. Single Sign-on and Single Sign out.

-Deployment of web applications.

-Characteristics of the deployment process.

-Definition of the process of deployment of web applications. Verification.

5. verification of web applications - features of a testing process.

-Types of evidence.

-Functional.

-Structural.

-Of integration with systems external.

-Usability and accessibility.

-For detection of errors. Evidence of box black.

-Of security. Evaluation of the protection against the attacks more common.

-Of performance. Load or stress tests. Statistics.

-Of data integrity.

-Design and planning of tests. Strategies in common use...

-Confidentiality considerations. Tests with personal data.

-Test automation. Tools.

6. version control - definition.

-General characteristics.

-Types of version control.

-Centralized.

-Distributed.

-Version control mechanisms - repositories. Management and administration.

-Publication of changes ("check-in" or "commit»). Operations atomic-types of checkout, deployment or ' check-out ': exclusive and collaborative.

-Branching («branching»).

-Mergers ("merging").

-Labelling ("tagging").

-Baselines ("baseline").

-Updates.

-Freezes.

-Conflict management.

-Good practice in version control.

-Common versioning tools.

-Features.

-Comparative.

-Integration of versioning tools in common use.

7. documentation of web applications - General characteristics of the documentation. Importance in the software life cycle


-Organization and basic structure of documents - document version management - types of documentation.

-In requirements.

-Of architecture and design.

-Technique.

-From user: tutorials, themes and glossaries.

-Commercial.

-Formats of documentation.

-Documents.

-Documentation in applications. Help formats.

-Online documentation. Wikis.

-Documentation standards.

-Documentation tools.

-Automatic generation of technical documentation.

-Code documentation.

-Best practices in documentation.

-Documentation updates.

-Collaborative documentation using wikis.

-Use of multimedia tools. Video tutorials.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance module training MF0493_3 90 40 criteria of access to them students will be them established in the article 4 of the Real Decree that regulates the certificate of professionalism of the family professional to which accompanies this annex.

MODULE of practices professional not labor of development of applications with technologies WEB code: MP0391 duration: 80 hours capacity and criteria of assessment C1: participate in the analysis, design and development of systems made with technologies web.

CE1.1 collaborate on the analysis of the specifications for development of web applications in environments client and server.

CE1.2 evaluate the conformity of the systems web concerning them requirements established by the company.

CE1.3 validate the use of technologies and standards in the realization of those systems web corporate.

CE1.4 collaborate on the development and maintenance of the applications web.

CE1.5 participate in the preparation of the different types of documentation (technical, user, tutorials, etc.)

CE1.6 analyze the possibility of using new tools that will help to improve the process of developing web applications CE1.7 participate in the definition and improvement of an organizational environment that facilitates coordination among the different working groups of design, development and management of web applications C2: collaborate in the evaluation of usability and accessibility of web systems CE2.1 investigate the use of new tools and services that facilitate the evaluation of usability and accessibility of web systems CE2.2 collaborate in the definition of the Organization of working groups responsible for the ongoing maintenance of the usability and accessibility of systems.

CE2.3 participate in audits of usability and accessibility in accordance with the certification objectives established by the company.

C3: Participate in the company's work processes, following the rules and instructions set forth in the work center.

CE3.1 behave responsibly both in human relations and works to be carried out.

CE3.2 respect the procedures and rules of the workplace.

CE3.3 undertaken with diligence the tasks according to the instructions received, trying to it adapt to the pace of work of the company.

CE3.4 integrated into the production processes of the work center.

CE3.5 use established communication channels.

CE3.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Process of analysis, design and development of web systems - specification of web systems.

-Methods and tools for the analysis and design of web systems.

-Criteria for selection of languages and analysis tools and web design.

-Tools and web development environments corporate.

2 usability and accessibility into enterprise web environments - tools and services of the usability and web accessibility.

-Certification of usability and accessibility.

-Definition of conformity assessment.

-Organization of working groups for the maintenance of standards of usability and accessibility.

-Scorecards of usability and accessibility.

3. documentation of web systems - company documentation standards.

-Corporate compliance documentation processes.

-New tools in the preparation of documentation: documentation collaborative environments.

4 integration and communication in the workplace - responsible behaviour in the workplace.

-Respect to the procedures and rules of the Centre's work.

-Interpretation and execution with diligence the instructions received.

-Recognition of the productive process of the organization.

-Use of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. requirements of the trainers training modules required accreditation expertise required in the field of competition MF0491_3 unit: web programming in the environment client ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





1 year MF0492_3: web programming in the server environment ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





1 year MF0493_3: implementation of web applications across internet, intranet and extranet ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





1 year V. spaces, facilities and equipment space training surface minimum requirements m2 15 students surface m2 25 pupils 45 60 management classroom space training M1 M2 M3 classroom management X X X space training equipment classroom management - audiovisual equipment - PCs installed on network, canon with projection and Internet - Server - specific specialty Software - PC slates to write with pen - flipchart - classroom - table and Chair - Material for trainer tables and chairs for students not should interpret is that them various spaces training identified need to differentiate is necessarily through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

He number of units that is must have of them utensils, machines and tools that is specified in the equipment of them spaces training, will be the enough for a minimum of 15 students and must increase is, in his case, to attend to number top.

In the case that the training is direct to people with disability is held them adaptations and them settings reasonable to ensure its participation in conditions of equality.

Annex IX I. identification of the certificate of professionalism Description: management and monitoring of alarms in networks of communications.

Code: IFCM0410 family professional: computing and communications.

Area professional: communications.

Level of professional qualification: 3 professional qualification of reference: IFC364_3 management and monitoring of alarms in communication networks (Royal Decree 1701 / 2007, of December 14) relationship of competition units comprising professionalism certificate: UC1216_3: monitor the State and the availability of the network of communications and the implemented services.

UC1217_3: perform operations of configuration and of control of the network of communications.

UC1218_3: manage the quality of the services supported on the network of communications.

Competition general: monitor and manage the network of communications, solving incidents in them systems of communications, reprogramming the routing of traffic and keeping the quality in them services, following the specifications established by the organization.

Environment professional: field professional: develops its activity professional in companies or entities public or private, both by has own as by has alien, of any size, that have of infrastructure of network of communications and offer services of communications, in the departments of supervision of networks and support to customers.

Productive sectors:


It is located primarily in the communications sector, and primarily in the following types of companies: public or private companies that aim to provide communications services. Communications operators. Companies that provide services of maintenance and monitoring of communications networks.

Occupations and relevant jobs: incidences of Communications Manager.

Supervisor of communications networks.

Supervisor of quality of communication networks.

Duration of associated training: 680 hours ratio of training modules and training units.

MF1216_3: Monitoring of the communications network and resolution of incidents. (240 hours) ● UF1854: monitoring of network and resolution of incidents. (90 hours) ● UF1855: warning user claims resolution. (70 hours) ● UF1856: monitoring and control of incidents. (80 hours)

MF1217_3: reconfiguration and coordination of work on the network's communications. (240 hours) ● UF1857: configuration of the network of communications. (90 hours) ● UF1858: Network Inventory Control. (80 hours) ● UF1859: monitoring and control of work in network. (70 hours)

MF1218_3: management of the quality of the services supported by the network of communications. (120 hours) ● UF1860: monitoring of the performance of the network and quality of those services. (40 hours) ● UF1861: administration of the performance management system. (40 hours) ● UF1862: reports of quality of network and services supported. (40 hours)

MP0393: Module not working professional practices of management and monitoring of alarms in communications (80 hours).

II. professional profile of the professionalism unit certificate of competence 1 name: monitor the State and the availability of the network of communications and of LOS services implemented.

Level: 3 code: UC1216_3 realizations professionals and completion criteria: RP1: monitor the network through visualization and treatment of alarms that have communications equipment and transmission lines, to view your State and locate malfunctions, according to procedures established by the organization.

CR1.1 map of the communications network is interpreted and the elements in it, are identified to assess their condition following procedures established by the organization.

CR1.2 the integration of communications on the map of the network equipment is performed to check them and monitor them, making the list of the types of equipment and platforms of existing communications, as well as specific to each system management tools that are necessary, taking into account the communications systems that make up the network.

CR1.3 communications network monitoring processes are defined and executed, to verify the State and availability in the delivery of services, taking into account the computers on the network and according to specifications of the organization.

CR1.4 the results of the implementation of the monitoring processes are analyzed in order to identify the communications system that presents the alarm, according to operating procedures established by the organization.

CR1.5 them tools of monitoring is used to locate them alarms in the system of communications and identify them teams of communications or lines of transmission affected, following procedures established by the organization.

CR1.6 the processes carried out in the detection and identification of incidents derived from alarms are documented for later use, following the procedures established by the organization.

CR1.7 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Apply corrective procedures to resolve issues arising from alarms presented by communications equipment and transmission lines, according to the procedures established by the organization.

CR2.1 monitoring tools remote and centralized the different communications systems that make up the network, are used to obtain information from the failure or fault in the operation of communications equipment and transmission lines that make up the system, taking into account the technical documentation of the same.

CR2.2 incidences in communications equipment and transmission lines are diagnosed indicating the cause of the alarm and there is your solution to restore interrupted services, following procedures established by the organization.

CR2.3 the gravity of the fault or fault is assessed to determine the impact on the provision of services, taking into account affected communications equipment, the services supported by it and compliance with the level of service (SLAs) agreements established by the organization with customers.

CR2.4 service-level agreements (SLAs) established by the Organization are known and decisions on the actions to implement to solve the problem, having as purpose the implementation of these agreements, following procedures established by the organization.

CR2.5 incidents detected in communications equipment and transmission lines are resolved by systematically applying the procedures established by the Organization, minimizing the impact on the provision of other services, and climbing to the level of superior responsibility those who are have failed to solve, according to standards set by the organization.

CR2.6 tools or remote and central configuration systems that manage the communication equipment and transmission lines affected, are used to resolve the incidents, according to procedures established by the organization.

CR2.7 correction of the impact on communications equipment or transmission line is checked by the tests recommended by the Organization and verification of the disappearance of the alarm panel monitoring, according to procedures established by the organization.

CR2.8 the processes followed in the incidence resolution are documented for later use, following the procedures established by the organization.

CR2.9 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

RP3: Meet users complaints received through the channels of customer service related communications services provided by the Organization, according to the established procedure.

CR3.1 complaints that have to do with communications services, received through the customer care center, will cater and are registered for treatment through the channels provided by the organization.

CR3.2 permissions and authorized access to the services by the client corresponding to the incident or claim, are tested in order to confirm that it is an organization and a service contracted by the same customer, and avoid that they seek to access not allowed customers, taking into account the rules of the Organization regarding data protection.

CR3.3 received complaints from users are checked to see if they have any relationship with any alarm detected on the network, assign it and continue your diagnosis, following established procedures.

CR3.4 claims that do not match any network alarm are diagnosed and analyzed, to know its type and proceed to its resolution using diagnostic tools and analysis of incidents, following the procedures established by the organization.

CR3.5 the resolution of the claim of the user is systematically applying the procedures established by the Organization, climbing to the level of superior responsibility those whose identification or solution is unable to perform, following the protocols established by the organization.

CR3.6 information claims, your checking and corrective actions taken are documented for further treatment, according to the procedures established by the organization.

RP4: Tracking of incidents detected in the network and communications services, to have control of them, according to the procedures established by the organization.

CR4.1 the organizational structure and the functions of each of the departments of the Organization are known to be able to assign the incidence to the appropriate departments and which carry out its solution, taking into account the rules of the organization.

CR4.2 incident management tool is configured and is maintained, so that it can be accessible by the departments of the Organization and by external companies, according to the operating procedures of the organization.

CR4.3 tools for recording and tracking incidents, are used to perform control and allocation to the appropriate departments, notification procedures established by the organization.

CR4.4 (SLAs) service-level agreements established by the Organization are known and their compliance is monitored through control of the incident resolution times, in order to obtain the satisfaction of customers, taking into account rules of the organization.


CR4.5 regular alarms and detected claims incident reports and parts are made to assess the volume of the network troubleshooting, resolution time and the time of dedication from each of the departments involved in the processes of resolution and detection of repeated failures, according to the periodicity marked by the organization.

CR4.6 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Media production and communication systems management systems professional context. Videowall network map in which all communications systems are integrated. Equipment and tools for checking services. Inventory of services system. Tools for internal use for the documentation of the performed processes. Tools software of management of incidents. Alarm monitoring tools. Workflow for alarm monitoring tools. Office Tools. Computer equipment.

Products and results integrated in the corresponding management system communication teams. The availability of the monitored network. Services supervised. Carried out monitoring of alarms and incidents. Claims of clients served. Failures and breakdowns in communications equipment determined. Maintained incident management tool.

Information used or generated technical specifications for communications equipment. Documentation on the architecture of the network. Rules, regulations and standards. Criteria of quality of the organization. The Organization (SLAs) service level agreements. Procedures of detection and isolation of problems or failures. Documentation technical of the systems of management of network and of the tools of monitoring. Information about the configuration of the network. Technical documentation of incidents and flow alarms management tools. Legislation on data protection. Periodic reports of incidents of alarms and claims. Registry actions to detect, isolate, assess and resolve failures and faults.



Unit of competition 2 name: perform operations of configuration and CONTROL of the network of communications.

Level: 3 code: UC1217_3 realizations professionals and criteria of performance MOP1: transient changes in the configuration of equipment and systems of the communications network, to continue to provide the service to any detected incident, following procedures established by the organization.

CR1.1 received incidence is isolated and determined the necessary work to be carried out on equipment and communications systems of the network to continue to provide the service concerned, taking into account the rules of the organization.

CR1.2 them actions or performances established to continue paying the service is run following procedures defined by the Organization, ensuring that the rest of services not are affected by these actions made temporarily.

CR1.3 changes of equipment, communications systems or transmission lines are temporarily for the restoration of the service concerned, returning to original architectures and configurations once solved the incidence, according to the procedure established by the organization.

CR1.4 performance on the network and configuration software tools are used remotely to resolve incidents and make changes to the configuration of the communications equipment, verifying the computer system processes that support the software of these, according to the specifications set forth by the organization.

CR1.5 carried out actions are checked and functional tests of your changes, are conducted to ensure the provision of services, according to procedures established by the organization.

CR1.6 actions on computers that require local travel for work, communicate to first level maintenance departments so they move to the site of the affected computer, following the procedures established by the organization.

CR1.7 actions and the works are documented and reported to the manager responsible for the incidence to fill the needs of registration and follow-up, according to procedures established by the organization.

CR1.8 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Rp2: Control and review the inventory of connections between systems and communications equipment on which services are offered to customers, to maintain updated data of the equipment, systems and connections, according to procedures established by the organization.

CR2.1 inventory of network and communications services system is configured and maintained to ensure its availability, according to procedures established by the organization.

CR2.2 users and profiles are created to allow access to and use of the inventory system to the different departments of the Organization, following established procedures.

CR2.3 data interfaces, card, channels and lines, which are implemented the services offered to clients by the Organization, are recorded in the inventory of connections for its control, following established procedures.

CR2.4 data from the new implemented services are checked that they have been registered in the inventory of the company system, to provide that information in a centralized manner, following procedures established.

CR2.5 inventory is kept updated by recording all modifications and updates made on the communications equipment that serve to fill the needs of registration and following the procedures established by the organization.

CR2.6 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

RP3: Monitoring and coordination of the actions and work carried out by other departments about the communications network, in order to ensure the quality and availability of the services offered by the Organization, according to established procedures.

CR3.1 update works carried out on the communications network hardware and software are analyzed in order to identify the part of network and services affected before the performance, taking into account the technical specifications of the same.

CR3.2 the work of updating hardware and software to carry out, on the communications network are co-ordinated and authorize, in order to minimize the impact of service during the same cuts, following the procedures established by the organization.

CR3.3 coordination of the works is done using specific software tools so that they are all registered works, according to the specifications of the organization.

CR3.4 contingency plans are interpreted and are reviewed to ensure the rapid restoration of service fault in works on the network, according to the operating procedures of the organization.

CR3.5 them people that made them works on the network is authorize following them procedures established by the Organization, so them works are executed fulfilling them standards of safety established.

CR3.6 them notifications of failure sent by them teams of network is disabled in the own element in order to not report alarms to those systems of monitoring, according to specifications technical established.

CR3.7 them processes of verification of the recovery of the service is performed to ensure the provision of them themselves, following them procedures established by the organization.

Context professional means of production systems of management of those systems of communications. Equipment and tools for the verification of services. System of inventory of those services. Inventory of connections. Tools of control of work in network. Tools of use internal to the documentation of those processes carried out. Incident management software tools. Office Tools. Operating systems. Computer equipment.

Products and results changes of architecture and of configuration to continue providing the service. Actions carried out to restore the service documented and recorded. System of inventory maintained and updated. Monitoring and coordination of actions on the network performed. Authorization of the works of changes software and hardware made.

Information used or generated documentation of the work and procedures to perform. Specifications of the equipment of communications. Information about the configuration of the network. Communications equipment inventories. Documentation on the architecture of the network. With rules, regulations and standards. Quality criteria of the organization. Service level agreements for the organization. Technical management systems documentation. Policy of quality of work on the network. Organization contingency plans. User manuals for the operating system.

Unit of competency 3 designation: managing the quality of the services supported on the network communications.

Level: 3 code: UC1218_3 realizations professional and criteria of realization


RP1: Monitoring the performance of communications network to ensure the quality of services, following established procedures.

CR1.1 network services monitoring processes are defined and executed to verify the level of quality in the provision of the same, according to specifications of the organization.

CR1.2 receipt of statistical counters that make up quality metrics and consistency of these monitors, so that they are available in the system of performance management, technical specifications.

CR1.3 performance management systems configured according to requirements of the Organization are used to check and monitor quality metrics.

CR1.4 quality metrics are checked to ensure that they are within the functional limits to verify the absence of traffic congestion or, otherwise, scale up to the level of superior responsibility, according to procedures established by the organization.

CR1.5 detection of the values of the metrics of quality above the values established by the Organization are reported to the departments concerned, according to procedures established by the organization.

CR1.6 the use of the communications network information is documented and analyzed using specific tools to detect future deficiencies and problems of management of services in quality or quantity, following procedures established by the organization.

Rp2: Administer performance management tools to ensure the processing of the data collected from the elements of the communications network, according to procedures established by the organization.

CR2.1 performance management systems are used to set the reception of the statistical counters, and are configured to analyze performance and continuity of the services provided, according to the parameters of service contracted by the customer and the quality criteria of the organization.

CR2.2 them counters of them teams of communications that make up the metric of quality is activated in them equipment so are sent, through files of format preset and with it periodicity scheduled, to the system of management of performance, following procedures established by the organization.

CR2.3 them metric of quality defined by them departments is interpreted and is configured in the system of management of performance, starting from them counters or statistics collected from them elements of the network, according to the specifications of it organization marked in the identification of them metric.

CR2.4 management of performance and alarm systems are configured to generate alerts indicator of deterioration in the provision of services, according to the services contracted by the customer and quality specifications.

CR2.5 the documentation of them metric of quality implemented is performed for its use later, following procedures established by the organization.

CR2.6 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

RP3: make reports of the quality of the network of communications and of them services supported to attend to all them areas of the organization that it request, using tools specific of the system of management.

CR3.1 them tools and scripts of consultation provided by the system of management of performance is selected and is used to extract the information contained in them themselves, according to specifications of the technology and of the manufacturer of the system of communications.

CR3.2 query languages provided by performance management systems are used to adapt the procedures for filtering and extracting information, according to the tech specs and according to the established procedure.

CR3.3 data processing tools are used to extract statistics from the network service, according to technical specifications and needs of your organization.

CR3.4 the content of the reports is designed jointly with the requesting Department to have the information necessary to evaluate the quality of the network or that part of the network that interests you, taking into account rules of the organization.

CR3.5 reports are obtained with the tools of presentation of data and development of graphics available by the Organization, to meet the needs of the requesting Department, taking into account rules of the organization.

CR3.6 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Media production and communication systems management systems professional context. Performance and alarm management software tools. Tools and languages for consultation of the performance management system. Tools of treatment of statistics at the level of network communications equipment. Tools of use internal of processing of reports of quality. Programming software tools. Tools for internal use for the documentation of the performed processes. Office Tools. Computer equipment.

Products and results monitoring of the availability of communications equipment from statistics. Monitoring of the metrics of quality of the organization.

Information used or generated technical specifications for communications equipment. Technical documentation of communications equipment available counters. Documentation on the architecture of the network. With rules, regulations and standards. Quality criteria of the organization. The Organization (SLAs) service level agreements. Technical management systems documentation. Technical documentation of statistical treatment tools. Query language manuals. Network quality reports.

III. formation of professionalism certificate training module 1 name: communications network monitoring and troubleshooting.

Code: MF1216_3 level of professional qualification: 3 associated to the competition unit: UC1216_3: monitor the State and the availability of the network of communications and the implemented services.

Duration: 240 hours training unit 1 name: monitoring of network and resolution of incidents.

Code: UF1854 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and RP2.

Capabilities and C1 evaluation criteria: describe the topologies of different communications networks and the elements that form the network map for the processes of monitoring and maintenance.

CE1.1 explain the different types of communications depending on the technology and used standard networks.

CE1.2 explain the communications systems that make up each of the networks detailing the Mission of each of them.

CE1.3 describe them equipment of communications and the different interconnections between them identifying the function of each one of them, taking in has them specifications technical of them themselves.

CE1.4 describe them protocols of communications between the different teams identifying the Mission of each one of them, according to specifications technical of them themselves.

CE1.5 interpret a scheme of a network of communications formed by several systems and interconnected with other networks in order to is identify each one of them teams e interconnections that it make up.

C2: identify them technical and tools of monitoring and integrate them teams of communications in the map of the network, to monitor its State and detect possible alarms, following them procedures established.

CE2.1 classify them different tools of monitoring of the network existing for each one of them systems of communications depending on its scope of supervision.

CE2.2 describe the techniques and protocols used to integrate the equipment and/or systems of communications in the network maps, to check its functionality.

CE2.3 classify the different types of alarms that can occur in the network communications systems, taking into account the communications equipment that make up and services offered.

CE2.4 describe the types of filters and correlation rules to apply to communications equipment alarms so that alarms that interest, taking into account technical specifications and technologies to be represented in the network map.

CE2.5 describe the techniques used to perform the processes of monitoring network and the services it offers.

CE2.6 integrate a team of communication in the network map provided by the Organization to carry out monitoring of equipment in the system:-the position of the map which should occupy depending on their geographic location and functional characteristics.

-Identify the communication equipment of the map showing their interconnection should be rendered.

-Perform the tasks of definition of the team on the map, using applications software of creation of new elements, available by the platform in which resides the map.

-Set the alarms that will be sent from the communications team to map, and choose the severity or seriousness of these - generate the updated list of the types of equipment and platforms, and the system management tools.


-Document the teams on the map to be taken into account in the monitoring process.

CE2.7 monitor the communications network in which the computers are integrated in the network map, following procedures established by the Organization:-use monitoring tools.

-Identify the elements of the system that appear in the graphical interface of the monitoring tool.

-Run processes of checking to verify the State of the network and the availability of services.

-To analyze the result of the check to identify possible anomalies.

-Document the processes carried out.

CE2.8 interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

C3: describe them technical and procedures of resolution of incidences of the network and of them systems of communications, and resolve them to ensure its operation, taking in has specifications technical.

CE3.1 describe the functionalities and features of them tools of monitoring remote and centralized of them different systems and equipment of communications that form the network.

CE3.2 classify the different types of alarms that can occur in communications based on components, technology and standard equipment.

CE3.3 describe them technical and processes used to make the diagnosis of the incidence that produces the alarm in them equipment and services that offers the network of communications.

CE3.4 describe them technical and processes used to resolve the incidents in them teams of communications, identifying them means physical or tools referenced in the process of resolution.

CE3.5 interpret alarms simulated in networks or systems of communications, according to some specifications given:-select the tool of monitoring specific of the system of communications affected to obtain information of the nature of the alarm.

-Access to the monitoring tool.

-Manage a list of alarms: sorting alarms by category, by date, by item type.

-Interpret alarm reported by the monitoring tool.

-Identify the severity of the incidence depending on the service concerned and of the type of communications equipment.

-Enter comments about the alarms in the tool.

-Make filters to the list of alarms (single or chained).

CE3.6 solve an incidence for an alarm on a team of communications or transmission line, according to given specifications:-identify the causes of the occurrence: (if it has been by failure of some component hardware, due to power, failed software, filled with database/file systems, among others).

-Check whether service level agreements can be breach with the new incidence.

-Manage file systems of «log» of equipment of communications or of these equipment management system.

-Recreate again the alarm so that the identification of the cause is the correct.

-Locate the element or physical device or logical cause of the alarm.

-Identify the physical means and tools necessary for its resolution.

-Resolve the incident, pre-established procedures.

-Perform tests to verify the correctness of the decision.

-Check that the alarm disappears from the monitoring pane.

-Report of the cause in which record the actions to take to prevent it from happening again.

-Register the incidence and the process of resolution employee.

Contents 1. Communications networks.

-Streaming media.

-Pair cables.

-Coaxial cables.

-Radio links.

-Optical fibers.

-Equipment of communications.

-Description and function.

-Interconnection.

-Transmission networks.

-Transmission PDH and SDH networks.

-WDM networks and optical rings.

-Synchronization network.

-Fixed telephony circuit-switched networks.

-Circuit switching techniques.

-Temporal and spatial switching matrices.

-Network architecture.

-Fixed telephony network topology.

-Telephonic traffic.

-Signalling of the networks of telephony.

-Flat of user and of application.

-ISDN. Access Basic and access primary.

-Network intelligent and of services.

-Cellular mobile networks.

-Network architecture.

-Frequency bands used by each of the technologies.

-General characteristics of the system radio, physical and logical, channel access protocols and radio.

-Architecture of the core network, phases of evolution, interconnection with other networks and interoperability.

-Signalling and protocols implemented network architecture.

-Private mobile networks: network architecture.

-Access radio (LMDS, MMDS, UMTS and WIMAX) networks.

-Architecture.

-Classification.

-Frequency bands.

-Operation.

-Packet switching networks (Frame relay, ATM, IP, MPLS).

-Packet switching techniques.

-Packet networks topology.

-Tower of protocols.

-HDLC protocols.

-Protocols LAN (Ethernet).

-Network and Protocol Frame relay.

-Network and Protocol ATM.

-Network and Protocol IP.

-Network and Protocol MPLS.

-VoIP.

-Plan of addressing in the different networks.

-Networks of band wide.

-Access ADSL and VDSL.

-FTTX access.

2. network management systems - aspects that integrate the management of network (ISO).

-Fault management.

-Accounting management.

-Configuration management.

-Performance management.

-Security management.

-Elements of a management system:-agents.

-Manager.

-Managed objects.

-Database management (MIB).

-Management protocols.

-Management systems architecture.

-OSI management model.

-Internet management model.

-TMN architecture.

-Network management models:-centralized.

-Distributed.

-Dynamic.

-Interfaces and communication protocols between the management system and teams of the communications system that is responsible for managing.

-Characteristic of the data communications network (DCN) and standard protocols.

-SNMP.

-CMIP.

-CORBA.

-Contributions from network management systems to the areas of maintenance, monitoring, operation, provision, planning, pricing and fraud.

-Requirements for a system of management on the basis of the communications system.

-Number of managed network elements.

-Number of alarms which is able to treat.

-Potential of the event.

-Graphic capabilities of representation of the network and network elements.

-Response time.

-Fault management module.

-Fault detection and alarm generation, - cancellation of alarms.

-Alarms correlation and network monitoring applications.

3. monitoring in communications techniques - procedures of monitoring depending on the type of network.

-Probes.

-SNMP probes.

-RMON probes.

-Mark to the network elements.

-Intrusive.

-Non-intrusive.

-Mode command.

-By the network manager.

-Types of alarms presented by communications systems.

-Links fault alarms.

-Equipment failure alarms.

-Alarm failure of process.

-Temperature alarms.

-Permanent alarm.

-Sporadic alarms.

-Alarms correlation rules.

-Filtering.

-Grouping of alarms.

-Rooting of alarms to cause root.

-Types of network maps and methods of interconnection of management tools of fault of each of the systems with network maps.

-Network topological representation - representation of network equipment and the elements that compose it.

-Interfaces and agents standardized management systems interconnect.

4. procedures for diagnosing and troubleshooting of alarms in networks and communications services - types of frequent alarms presented by communications equipment.

-Related to the transmission parts.

-Related switching elements.

-Related with the applications.

-Techniques of diagnosis, of location and of cause of the alarms.

-Tools of monitoring of alarms in the systems of management.

-Commercial tools.

-Customer-specific tools.

-Configuration tools of communication in management systems and other possible tools teams.

-Automatic discovery of the network topology.

-Inventory management and configuration of the network.

-Management of MIBs.

-Management of network addresses.

-Specific tools:-Protocol Analyzer.

-Traceador calls.

-Remote monitoring probes.

-Development of procedures for resolution of issues on the basis of the presented alarms.

-Identification of the incidence:-collection of events produced, prioritized by categories, date, type of item, severity, affected service.

-Determination of the severity of the impact.

-Filtering of information.

-Determination of the symptoms.

-Presented alarms correlation.

-Identification of the failure.

-Action procedure.

-Actions on the network elements.

-Generation of reports of incidence.


-Climb to the unit responsible for resolution end.

-Isolation of the fault.

-Resolution of the bug.

-Verification of the validity of the solution in all major subsystems on the network.

-Registration and documentation of incidence, with data from the detection and resolution of the problem.

TRAINING unit 2 name: ATENCIONY user claims resolution.

Code: UF1855 duration: 70 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and C1 evaluation criteria: resolve incidents and complaints of users relating to the service provided by the Organization, according to given specifications.

CE1.1 identify the systems in which they are stored the data of users of the Organization, and the services hired to verify its existence.

CE1.2 distinguish whether the incidence or the user claim is by failure in the network or configuration of the terminal or your access to the service, taking into account the technical specifications of the same.

CE1.3 classify the various claims that it can report a user, taking into account the services that can be offered.

CE1.4 describe the features and functionality of the terminals for access to the services provided by the communications networks.

CE1.5 treatment of an incident or claim of a service offered to customers, according to given specifications:-record the incidence or claim to proceed with treatment.

-Verify that the customer has the Service contracted.

-Check the possible relationship between the incidence or claim and the alarms presented in the network.

-Resolve the incident established procedures.

-Document the process of resolution.

Contents 1. Supervision of the service in networks of communications-types of service offered by the operator depending on the network of communications and of the technology.

-Services of voice.

-Data services.

-Global architecture for the provision of services according to the type of network.

-Equipment used in the provision of services.

-Service platforms.

-Elements of management and administration of the services.

-Supervision of the service model.

-Components of the physical architecture.

-Operation systems (OS).

-(DCN) data communication networks.

-Workstations (WS).

-Devices of mediation (MD).

-Elements of network (NE).

-Adapters (QA).

-Types of monitoring of networks.

-Monitoring proactive.

-Monitoring test.

2. care of claims and queries from customers.

-Management and treatment of incidents or complaints of a service offered to customers.

-Register.

-Verification.

-Correlation with network alarms.

-Resolution of the incident or claim.

-Documentation of the resolution process.

-Correlation of clients claims procedures with alarms in the communications network.

-Determination of cause root.

-Hierarchical rooting of claims.

3. Tools for the management of incidents and claims.

-Contracted services and customer data management tools.

-Architecture.

-Configuration.

-Inventory and mapping data management tools.

-Inventory databases.

-Configuration databases.

-Types and models of terminals for access to the services provided over the network.

-Operating system.

-Performance.

TRAINING unit 3 name: monitoring and CONTROL of incidents.

Code: UF1856 duration: 80 hours referrer of competition: this training unit corresponds with the RP4.

Capabilities and C1 evaluation criteria: incident management tools to describe and track incidents of alarms and claims, according to given specifications.

CE1.1 explain the features and functionality of the tools of management and follow-up of incidents as a means to register and delegate incidents arising from alarms and claims, and monitor service-level agreements.

CE1.2 describe the procedures for configuration and maintenance tools of monitoring of incidents derived from alarms and claims, taking into account technical specifications of the tool.

CE1.3 recognize the information that can be extracted from this tool in order to be able to monitor incidents and call time dedicated to each of them.

CE1.4 explain the roles of each of the departments that exist in the communications company to assign the incidence caused the network to the appropriate Department.

CE1.5 track of incidents detected in the communications network, according to given specifications:-identify and access the incident management tool.

-Configure the tool for access.

-Register the incidence, with the information that will be available on a first analysis.

-Assign the action to the Department responsible.

-Change of status of the incidence, in order to check the different States that can be a registered alarm (open, verification, attention, rejected, resolved, rock climbing, closed...).

-Identify and monitor SLAs by using the tool.

-Obtain reports and periodicals on the volume of the network troubleshooting, parts resolution time, the time of dedication from each of the departments involved in the processes of resolution and repetitive failure detection.

CE1.6 interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

Contents 1. Follow-up procedures of incidents of alarms and claims in communication networks - incident management tools.

-Opening of an incident or complaint procedure.

-Procedure of allocation of unit responsible for resolution.

-Procedure for closing of an incident or claim.

-Tools that will allow the coordination of tasks between departments - procedure of consultation of the status of each one of the open problems.

-Procedure for reassignment of unit responsible for the passage of responsibility of care for the problem to another Department.

2. procedures of follow-up reporting enabling you to collect the time resolution of alarms and claims.

-Concept of service level agreement (SLA).

-Types of SLAs.

-Monitoring of an SLA parameters.

-Procedures for allocation of time for a resolution to the departments involved.

-Procedure for obtaining reports of compliance with SLAs.

-Types of reports - periodicity of the reports.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF1854 - UF1855 70 40 formative unit 3 - 80 40 sequence UF1856: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: RECONFIGURATION and coordination of work on the communications network.

Code: MF1217_3 level of professional qualification: 3 associated to the competition unit: UC1217_3: perform configuration and control of the communications network.

Duration: 240 hours training unit 1 name: configuration of the communications network.

Code: UF1857 duration: 90 hours referrer of competition: this training unit corresponds to the RP1.

Capabilities and criteria of evaluation C1: identify the services supported by communications networks to evaluate impacts to works and performances that occur in it.

CE1.1 describe the hierarchical and functional structure of communications depending on the scope of application, infrastructure, technology, and used standards.

CE1.2 explain the characteristics of each one of the systems of communications and the elements of which they consist, taking into account existing technologies in the market.

CE1.3 describe the types of access, switching and transmission subsystems, and explain its operation taking into account the technology employed.

CE1.4 describe the functions of signalling in communications according to existing standard systems and standards.

CE1.5 describe the services which can supply a network of communications on the basis of existing technologies and communication systems from which it is composed.

CE1.6 link communications systems with the services provided to ensure the provision of the same, according to technical specifications for communications equipment and transmission lines, and the functional details of the services provided.


C2: handle the utilities software provided by the system of management that allow connect is to them equipment of communications of the network to perform actions on them, following specifications given.

CE2.1 identify the operating system commands that allow you to run scripts or tools, systems of access to communications equipment, as well as those commands that allow programming tasks and the connection to the network elements.

CE2.2 explain the transmission technology the management network, the type of addressing and scope to the network element test procedure to ensure the remote connection to the affected teams.

CE2.3 connect with the management system and perform operations of execution of scripts and compilation of files sent by communications equipment, using operating system tools and commands to resolve incidents:-connect and open session on the machine of the management system and to recognize the shell or user interface.

-Navigate directories system, identifying and managing user and group permissions and creation and operations management of directories and files from the user directory.

-Releasing processes in background (background) execution mode.

-Set the deferred execution of tasks (crontable).

-Track the processes of the management system through files sent by communications equipment.

-Generate new scripts by copying others and adapting them to the task required using an editor.

-Open session on other computers by using remote connection through the TCP/IP protocol.

-Perform tests of connectivity with other machines using those commands and tools of TCP / IP.

CE2.4 interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

C3: Identifying the parameters and the restoration of communications service techniques, and apply configuration changes and connection systems in order to continue to provide the service, according to technical specifications.

CE3.1 identify the configuration parameters of the communications equipment that have to do with the continuity of the service and its restoration taking into account the technical specifications of the service and equipment.

CE3.2 describe procedures for the restoration of communications services by identifying the equipment, systems and transmission lines involved, according to technical specifications.

CE3.3 explain the protection systems of communications (redundant) network traffic.

CE3.4 describe the functionality of the tools access to communications equipment software to make changes in the configuration of functional parameters and connection according to the technical specifications of the equipment and the geographical possibility of access.

CE3.5 make configuration changes to restore the service provided over the net before simulated malfunction of any equipment or any of its components, according to given specifications:-identify modifications to be performed on the architecture, wiring and configuration parameters for communications equipment.

-Identify the tools of access to the affected teams to make changes in the configuration.

-Identify corresponding maintenance departments and the actions to perform if the changes require displacement.

-Make the modifications identified procedures indicated by the technical documentation for each of these actions.

-Conducting the restoration of service verification and check possible interactions with other services by changes made to the network.

-Document the operations carried out and the changes made on the initial configuration according to specified formats.

Contents 1. Networks and services of the networks of communications-networks of communications.

-Types.

-Topologies.

-Features and benefits.

-Services offered by the networks of communications.

-Services of network.

-Services of customer.

-Operation of each an of the networks depending on those standards and of the technology.

-Establishment of calls.

-Establishment of contexts.

-Establishment of connections of data.

-Circuits virtual.

-Circuits permanent.

-Services end and applications deployed on each an of the networks.

-Services of voice.

-Data services.

-Global architecture for the provision of the service:-operation.

-Addressing.

-Architecture of security.

-Provision of the service.

-Service in roaming.

-Modes of handover.

-Modes of tariffing.

1. management of the configuration of the network of communications-the system of management of network.

-Features and functionality in the management of the configuration.

-Module of management of the configuration:-changes of parameters.

-Collection of data on the configuration.

-Consistency of the configuration data.

-The network upgrade.

-Remote software loading.

-Support to change hardware applications.

-Task management and exploration of the network.

-Automated collection of data on inventory and State of the network:-version software and hardware teams.

-Versions applications software - storage of configuration data.

-Inventory databases.

-Configuration databases.

-Management network.

-Architecture.

-Types.

-Addressing.

-TCP/IP protocol stack.

-Protocols SNMP, CMIP and CORBA standards.

2 utilities UNIX in the network management system - connection and user in Unix operating system environment.

-Unix file system.

-Management of files and directories commands.

-User permissions and groups.

-Execution of programs, modes: - execution of background (background), - programming of delayed tasks (cron table).

-Adaptation of scripts using a text editor (vi).

-TCP/IP protocol in Unix machines:-IP addressing.

-Ports.

-Commands.

-Protocol Telnet, FTP.

3. communications network equipment configuration - configuration of communications equipment:-functional scheme.

-Architecture.

-The equipment configuration procedures.

-Configuration of the transport network.

-Configuration of the signaling equipment.

-Circuit-switched equipment configuration - configuration of the packet network.

-Configuration of the connection interfaces between the different teams that make up the communications network.

-Measurement of signal interfaces, buses, cables and connectors.

-Theory of queues for load-sharing.

-Configuration tools in management systems communications equipment.

-Redundant systems.

-Restoration of the affected services of communications procedures.

-Management of the availability.

-Change in the configuration of resources.

-Storage of configuration data.

-Inventory databases.

-Configuration databases.

TRAINING unit 2 name: network inventory CONTROL.

Code: UF1858 duration: 80 hours referrer of competition: this training unit corresponds to the RP2.

Capabilities and criteria of evaluation C1: identify the inventory system of the network and of the services offered, and maintaining it using own inventory management tools, technical and functional specifications.

CE1.1 describe the features and characteristics of a system of network inventory in order to recognize the registration procedures.

CE1.2 different data network and services who wish to register with different fields of record containing the system, and the actions that you can perform with each of them.

CE1.3 define the rules for access of users to the inventory system to ensure safety in the treatment of the data according to the given specifications.

CE1.4 interpret the procedures of registration and verification of the data in the inventory system with the object that the information contained in it is reliable and updatable.

CE1.5 perform maintenance on the system information of inventory to have updated data, according to given specifications:-configure your inventory according to the established procedure.

-Create profiles and access to the system users.

-Register in the inventory data concerning connections: interfaces, card, channels and lines.

-Record the data of the services implemented in the network.

-Record all the modifications that are done on the computers on the network that provide services.

-Check that the data contained in the inventory system are updated.

-Document tasks performed according to specified formats.

CE1.6 interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

Contents 1. Inventory of services of communications techniques - tools software inventory.

-Architecture.


-The storage system, - user access.

-Access to the tool profiles.

-Maintenance and backup mechanisms.

-Procedures of registration of those services and of them components of the network on which is implemented.

TRAINING unit 3 name: monitoring and CONTROL of network works.

Code: UF1859 duration: 70 hours reference of competition: this unit training is corresponds with the RP3.

Capabilities and criteria of evaluation C1: identify them specifications, details and scope of them works and performances on the network of communications, and perform its coordination and follow-up of agreement some specifications given.

CE1.1 describe the types of works and actions to perform on the network of communications of form scheduled.

CE1.2 identify the services affected before the carrying out of works or performances in order to assess the impact of the work.

CE1.3 plan the order of business when they coincide in time in order to avoid inconsistencies and problems in the network.

CE1.4 describe the functionalities and features of tools registration software and planning of work in network, according to their technical specifications.

CE1.5 coordinate the execution of works on the network, according to given specifications:-identify the elements and services affected at work to run.

-Use the tools work on the network planning software.

-Interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

-Authorize the execution of the works.

-Apply them plans of contingencies planned before situations of failure-disable them notifications of failures of those teams affected.

-Carry out the processes of recovery of the service once executed the work.

-Documenting the tasks performed according to formats specified.

Contents 1. Work on the communications network control procedures - classification of works and performances realised on communications systems.

-Determination of the risk of the work.

-Degree of severity of the work assignment.

-By the degree of difficulty.

-By the number of services and potential clients be affected.

-By stop of the equipment or impairment of service time.

-Planning of time and phases of the work relationship.

-Works in series.

-Works in parallel.

-Contingency plans.

-Partial contingency plan.

-Total contingency plan.

-Monitoring of the execution of the works.

-Control points.

-Determination of the time of completion of the work.

-Procedure of March back in the event of failure to guarantee service.

2. registration and the job scheduling software tools.

-Architecture and functionality of the registration of the works tools.

-Architecture and functionality of the registration of the works tools.

-Management of works.

-Creation of a new register of scheduled work.

-A record of work scheduled closing.

-Modification and cancellation of a scheduled job.

-Verification of backups, restoration mechanisms.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 90 50 training unit 2 UF1857 - 80 30 formative unit 3 UF1858 - UF1859 70 30 sequence: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: management of the quality of the services supported by the communications network.

Code: MF1218_3 level of professional qualification: 3 associated to the unit's competition: UC1218_3 manage the quality of the services supported on the communications network.

Duration: 120 hours training unit 1 name: monitoring of the performance of the network and quality of services.

Code: UF1860 duration: 40 hours referrer of competition: this training unit corresponds to the RP1.

Capabilities and criteria of evaluation C1: identify the parameters of measurement performance of a communications network, and monitor the quality level of the services provided technical and functional specifications.

CE1.1 explain the basics of the measurement of the performance of the network in order to carry out a monitoring of the quality of the services provided on the network.

CE1.2 describe the systems and tools of measurement of the performance of a communications network, to classify the quality metrics available, taking into account technical specifications.

CE1.3 explain the techniques of monitoring and measurement carried out by systems or performance management tools, to know the State of use of the network and services.

CE1.4 describe the procedures of monitoring of the performance of the network based on the technology and standard communications systems.

CE1.5 describe the different types of format of file of statistics in order to apply the method or most appropriate procedure to refer to it.

CE1.6 link quality metrics used to measure the performance of the network with systems that are based on communications network.

CE1.7 interpret information from performance management systems to evaluate quality levels.

CE1.8 monitor the quality of the services of a communications network to ensure its performance, according to given specifications:-identify quality metrics to apply.

-Use the performance management tool to check the metrics.

-Monitor the statistical counters that make up quality metrics.

-Report on the results of the check to the corresponding departments in case of values above those laid down, in order that the circumstances that occurred to have those values do not return to play.

-Interpret information from systems of performance management in its use in the monitoring of the quality.

-Document the processes performed according to specified formats.

CE1.1 interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

Contents 1. Procedures for monitoring the performance of a communications network - types of counters available in communications equipment.

-Measures of quality.

-Parametrosde level of service end to end.

-General Service-level parameters.

-Acuerdosde level of service (ANS).

-Objectives (informative).

-Measures of traffic.

-Meaning and types of metrics of quality standard for the measurement of quality of a communications network.

-Metrics related to the care center to the client (TSC).

-Time between waiting.

-Time average response.

-Average time dispatch/resolution.

-Number of calls answered by the service.

-Number of announcements open for service and kind (provision or replacement).

-Number of announcements closed by service and kind (provision or replacement).

-Ratio tickets / calls for service.

-Calls issued by service.

-Abandoned calls.

-Calls answered within 10 seconds.

-Reports of CAC service delivery time.

-Completed interactions in CAC.

-Maximum time to call the user with the status of incidents.

-Supplies/replacements with formal closure and information at maximum 2 hours after the solution.

-Metrics related to the operation of network:-number of replenishments served (from CAC).

-Number of replenishments attended (not from CAC).

-Number of provisions served (from CAC).

-Number of provisions addressed (not from CAC).

-Percentage of replacements/provisions open and closed in the current month.

-Calls issued by service.

-Completed operation interactions.

-Interactions properly put in operation.

-Critical incidents detected proactively.

-Repeated incidents (ten most repeated incidences) per service.

-Number of problems detected and reported for service.

-Repeated service problems (ten more repeatable problems).

-The number of changes recorded by service.

-Rejected for service changes.

-% of changes implemented according to planning.

-Services stops caused by changes.

-% of assets inventoried in the system.

-% Elements monitored.

-Number of incidents associated with lack of capacity.

-% of critical services that is tracking the availability - reiteration of incidents.

-Delivery time for reports of the service operation.

-Metrics related to quality Control and Control of services.

-ANS reports deadline.


-Delivery of reports of operation time.

-Updating operational documentation.

-Continuous updating of the inventory.

-Frequency of update of the operational documentation library.

-Delivery time for activity tracking reports.

-Metrics related to the perceived quality and customer satisfaction.

-Degree of satisfaction of the responsible of the service.

-Degree of satisfaction of clients internal.

-Level of satisfaction of end customers.

-Procedures of monitoring of the quality of the network.

-Contracts and agreements of level of service and standards of quality of the sector.

-Formats of files of statistics.

TRAINING unit 2 name: administration of the performance management system.

Code: UF1861 duration: 40 hours referrer of competition: this training unit corresponds to the RP2.

Capabilities and C1 evaluation criteria: procedures for Administration of the tool or system of performance management in order to collect, treat and store quality metrics and statistical counters communications, according to a given technical and functional specification equipment.

CE1.1 explain the features and characteristics of a system of performance management based on technology, network type and the geographical area covered.

CE1.2 identify the types of management systems performance based on technology, the collection method statistical counters of the communications and the method of storage of these counters and metrics of quality teams.

CE1.3 identify the performance management system configuration parameters to set the statistical counters reception, treatment and storage.

CE1.4 classify different types of counters that can be activated in the teams depending on the system of communications and technology.

CE1.5 relate the performance parameters that make up the quality metrics with the counters available in communications technology-based equipment, in order to activate them.

CE1.6 manage the tools of performance management to ensure the processing of data of the elements of the network, according to a given specification:-set up the parameters for the reception and treatment of statistical counters.

-Activate the counters statistical in the equipment of communications corresponding.

-Set the metrics of quality.

-Configure the system to generate possible alerts of deterioration in the provision of the service.

-Document the processes performed according to specified formats.

-Interpret the documentation inherent to the performance management system to allow its configuration and the treatment of counters, even if it is published in the foreign language most often used in the sector, using the help.

C2: Implementing filtering procedures and information extraction using query languages and specific tools provided by the system of performance management, to generate statistics that evaluating the level of quality of services.

CE2.1 explain the features and functionality of the query and extraction of information from the performance management system tools.

CE2.2 describe the characteristics of the language which provides the management system in order to adapt existing information extractions, generating further consultations that enhance the functionality of the performance management system.

CE2.3 extract and view information using tools and performance management system-specific query languages:-select the tool to be used.

-Identify sentences of the query language to be used in the extraction of information.

-Identify the sources of information for the creation of the query and extraction procedures.

-Create procedures enabling copy and adapt queries for retrieving the information.

-Retrieve and archive queries and extraction procedures previously established to exploit the system information.

-Document the processes performed according to specified formats.

CE2.4 interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

Contents 1. System of performance management - performance management system architecture.

-A system of network performance management requirements.

-A system of network performance management requirements.

-Establishment of objective of QoS performance.

-Verification of performance of QoS.

-Establishment of objectives of performance of network.

-Verification of performance of network.

-Criteria of quality of service of the client.

-Verification of performance of elements of network.

-Verification of integrity of data.

-Interfaces for interconnection with systems of management of performance associated to those systems of communications.

-Activation and deactivation of counters.

-Tools available and methods used.

-Methods of compilation of measures.

-Transfer of measures.

-Formats of the files of measures.

-Concepts of granularity, numbers of measures in files, time of collection of the data statistical.

-Storage of measurements.

-Procedures of management for the processing and storage of the measures.

-Tools commercial available for the management of the performance.

2. methods of extraction of information statistics in the system of management of performance-storage of the data.

-Languages of consultation of the system of management of performance.

-Tools graphic of consultation of information statistics.

TRAINING unit 3 name: reports of network and services supported.

Code: UF1862 duration: 40 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and criteria of evaluation C1: identify the tools software creation and publication of reports specific to the management system, and prepare and publish reports of quality of the network and services, according to specified needs.

CE1.1 identify the sources of data available in performance depending on the communications technology management systems.

CE1.2 determine the extraction of information media available in the management system and its correlation with information from external sources for the preparation of the reports requested.

CE1.3 describe the functions of specific reports tools for the communication of the same according to functional specifications.

CE1.4 identify the procedures for publication and report management according to the format and type of information to allow their distribution according to specified design.

CE1.5 reporting quality of the network and services according to given specifications:-relate the information requested with data sources available in performance depending on the technology management systems.

-Select the tool for data extraction.

-Extract and combine data using the treatment of statistics.

-Undertake the design of report using data presentation and elaboration of graphics tools.

-Publish the report using the specified tools.

-Document the processes performed according to specified formats.

CE1.6 interpret the documentation inherent to the tools, even if it is published in the foreign language most often used in the sector, using the help.

Contents 1. Reports of quality of communications network - designing reports.

-Reporting methods.

-Web reports: access, update.

-Reports traffic of voice, signage, transportation traffic monitoring.

-Reports of use of services.

-Interpretation of the results of the reports, according to external events.

-Publication of reporting tools.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 40 20 2 training unit UF1860 - UF1861 40 20 formative unit 3 - 40 20 sequence UF1862: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULE OF PRACTICE MANAGEMENT PROFESSIONALS AND MONITORING OF ALARMS IN COMMUNICATIONS NETWORKS.

Code: MP0393 duration: 80 hours capabilities and C1 evaluation criteria: participate in the monitoring of the implemented services and communications networks, as well as operations of configuration and control of such networks and managing the quality of supported services, in accordance with the procedures established in the company.


CE1.1 interpret, among others, a: associated business technical documentation technical specifications of communications equipment; the network architecture; with rules, regulations and standards; quality criteria of the Organization; the Organization (SLAs) service level agreements; monitoring tools and network management systems; network configuration; tools for management of incidents and flow alarms.

CE1.2 monitor the network communications and services implemented in accordance with the established business procedures.

CE1.3 collaborate on the operations of configuration and control of the communications network, following the procedures established by the organization.

CE1.4 manage the quality of the services supported by the network, according to the established business procedures.

CE1.5 documenting the work performed in accordance with the requirements and business processes.

C2: participate in the process of work of the company, following them rules and instructions established in the center of work.

CE2.1 behave responsibly both in human relations and works to be carried out.

CE2.2 respect the procedures and rules of the workplace.

CE2.3 undertake with diligence the tasks according to the instructions received trying to of that is adapted to the rhythm of work of the company.

CE2.4 integrate is in the processes of production of the Centre's work.

CE2.5 use the channels of communication established.

CE2.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Management and monitoring of alarms in communications networks.

-Management systems of the communications systems used by the company.

-The map of network communications systems.

-Equipment and business tools for checking services.

-Inventory of services and connections.

-Standards and quality criteria defined by the organization.

-Tools used in the different business processes.

-Monitoring of the network of communications and services implemented business processes.

-Procedures business of configuration and control of the network of communications.

-Business management procedures of the quality of the services supported by the communications network.

2. integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.

-Interpretation and execution with diligence the instructions received.

-Recognition of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. the trainers training modules required accreditation requirements * professional experience required in the field of competition MF1216_3 unit: monitoring of network communication and resolution of incidents ● Bachelor, engineer, architect or corresponding degree or other equivalent titles ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent titles 2 years MF1217_3 : Reconfiguration and coordination of work on the communications network.





● Bachelor, engineer, architect or the title of the corresponding degree or other equivalent titles ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent titles 2 years MF1218_3: monitoring of the performance of the network and quality of services.





● Bachelor, engineer, architect or the title of the corresponding degree or other equivalent titles ● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent titles 2 years * in the past five years.

V. requirements minimum of spaces, facilities and equipment space training surface m² 15 students surface m² 25 students 60 75 computer room space training M1 M2 M3 classroom of computer X X X space training equipment Aula de Informática - PCs installed in network and Internet connection.

-Cabinet with panels of patched and network connection devices: hubs, switches, routers, etc.

-Software of base and of network.

-Operating system Unix.

-office software, internet tools.

-Antivirus and security software.

-Communications systems management system.

-Equipment and tools for checking services.

-Inventory tools.

-Incident management software tools. Alarm monitoring tools. Workflow for alarm monitoring tools.

-Control of network tools.

-Incident management software tools.

-Software of management of alarms and performance tools.

-Tools and languages for consultation of the performance management system.

-Tools for treatment of statistics at the level of network communications equipment.

-Reporting of quality tools.

-Programming software tools.

-Canon of projection.

-Flip chart.

-Slate.

-Classroom material.

-Table and Chair for the trainer.

-Tables and chairs for students.

-Auxiliary furniture for classroom equipment.

* Equipment and corresponding software must be updated.





Not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex X I. identification of the certificate of professional designation: code departmental networks design and management: IFCT0410 professional family: information technology and communications professional Area: systems and telematics level of professional qualification: 3 professional qualification of reference: IFC081_3 administration and design of departmental networks (RD 295/2004 of 20 February) relationship of competition units comprising professionalism certificate : UC0228_3: telematic network infrastructure design. UC0229_3: To coordinate the implementation of telematic network infrastructure. UC0230_3: Manage network telematics infrastructure.

General competition: design the architecture of an environment of complexity communications medium or low, monitor its implementation according to the project and manage the resulting system, providing the necessary technical assistance environment professional: Professional: develops his professional activity in the following areas:-small and medium-sized companies who design and install telematic networks.

-For its own account in the design and installation of telematic networks.

-In firms or institutions medium-sized or large, as part of the team of management and maintenance of corporate networks.

Productive sectors: is present in areas where processes are developed for: design and development of communication systems and associated facilities.

-Telematic networks maintenance.

-Installation of telematic networks.

-Use of a corporate network to support business process in any business sector.

Related jobs or occupations: 2723.1014 network 2721.1018 Designer Network telematic system administrator system administrator. Manager of networks and communications. Technician of local networks and telematics. Supervisor of network installation. Technical design of telematic networks.

Duration of associated training: 610 hours ratio of training modules and training units: MF0228_3: (transverse) design of telematic networks (200 hours) ● UF1869: analysis of the market of communications (90 hours) ● UF1870: development of the project of the network telematics (80 hours) ● UF1871: elaboration of technical documentation (30 hours) MF0229_3: management of the implementation of telematic networks (120 hours)


● UF1877: telematic network (50 hours) infrastructure deployment project planning ● UF1878: implementation of telematic networks (70 hours) MF0230_3 infrastructure projects: management of telematic networks (210 hours) ● UF1879: interconnection equipment and services network (70 hours) ● UF1880: management of telematic networks (90 hours) ● UF1881: Troubleshooting in telematic networks (50 hours) MP0396 : Module not working practices of departmental networks (80 hours) design and management II. THE certificate of professional competence 1 denomination unit professional profile: designing the telematics network infrastructure.

Level: 3 code: UC0228_3 realizations professionals and criteria of performance MOP1: determine the topology configuration for the interconnection of equipment in network that responds adequately to the needs of the project.

CR1.1 system specifications included with precision requirements and functional, technical performance and cost.

CR1.2 topology of the system is determined by the choice of a reference model standard that meets the requirements of the applications being used (response time, quality of service, addressing scheme, amount of data transferred, distances, access to other networks, etc.).

CR1.3 the elements of communication are evaluated taking into account the existing infrastructure and the State of technology in the present as well as its possible evolution in the short and medium term.

CR1.4 the topology and elements of the network is choose in accordance with them requirements of accessibility, confidentiality and integrity required by the user and the normative current.

Rp2: Analyze the possibilities for connectivity of market communications equipment in order to integrate them in a telematic network infrastructure project.

CR2.1 features and specifications of communications equipment are identified to determine their suitability for the design of networks.

CR2.2 technical documentation is interpreted with correction both if it is edited in Spanish, the language of the autonomous community or in the technical language of habitual use.

CR2.3 different physical transmission media are differentiated by its technical characteristics and suitability for use for the different types of networks.

CR2.4 environmental requirements for communications equipment (footprint, power consumption, heat dissipation, etc.) contrasted with the possibilities of the installation.

CR2.5 conditions of recruitment and service of means of basic access to public networks offered by telecommunications operators are reviewed and included in the network design specifications.

CR2.6 benefits and features of the communications hardware products and software products like routers, hubs, switches, servers - virtual private networks - vpn, firewall, etc.) known and compare face to its inclusion in the design of the network.

CR2.7 the implementation of communications software products is evaluated on different platforms and operating systems.

RP3: Determine the physical configuration of interconnection of networked computers by selecting most appropriate to the needs of the project equipment, devices, and software.

CR3.1 the location of computers and network devices takes into account the conditions of ergonomics, safety and use of the space.

CR3.2 network infrastructure software components are chosen in accordance with the system requirements and benefits required by applications and specified previously.

CR3.3 the system of wiring and the type of support used for the network local is determines depending on the distances existing between them different nodes of the system, the speed required for the transmission of them data and them conditions environmental.

CR3.4 them equipment and devices of the network is selected in accordance with them following criteria:-the condition of approval of them themselves, both internal as externally, proposing to its approval internal those elements whose use is essential.

-Compliance with prescribed technical and economic conditions.

-The warranty of supply and its availability in them deadlines concerted CR3.5 them sketches and diagrams of blocks of the system reflect with precision the structure of the system and them different elements that it make up.

RP4: develop or monitor the elaboration of the documentation technical necessary for the execution of it installation of it network of data and its rear maintenance.

CR4.1 it memory descriptive of it installation explains with precision the characteristics and scope of application of the same.

CR4.2 the technical documentation includes schemes and overall and detailed drawings, using standardized symbols and presentation.

CR4.3 the relationship of materials, equipment and devices is performed using the standard coding and guaranteeing their acquisition internal and / or external.

CR4.4 the construction drawings of the installation collected with sufficient precision the characteristics of equipment for its implementation (physical dimensions, location of devices and cards, coded identification of e / s and wiring, etc.).

CR4.5 network software and system communication programs are sufficiently documented and allow the implementation and the subsequent maintenance of the functions thereof.

CR4.6 technical documentation conforms to the standards of the Organization and contains the necessary chapters for the installation and maintenance of the system, including:-process to be followed in the implementation in service.

-Tests and adjustments that must be made in the process of setting up system.

-Parameters that must be checked and adjusted.

-Margins stable in operation.

-Guidelines for the realization of preventive maintenance of the system context professional media production tools for the realization of schemes of installations (programs of CAD / CAM / CAE). Technical documentation of manufacturers, in printed or electronic support. Project planning tools. Communications operators services configurators.

Products and results network design: planes and block diagrams. Memory components. Network infrastructure maintenance guidelines. Guidelines for verification and testing of components and equipment.

Information used or generated security policy of communications infrastructure. Manual installation, reference and use of communications equipment. Information on local area networks and wide area and public and private communication systems. Information about equipment and communications software. With rules, regulations and standards (ISO, EIA, RFC-IETF, ITU-T). Technical documentation of projects and communication facilities. Manuals times and prices for communications.

Unit of competition 2 name: coordinate the implementation of telematic network infrastructure.

Level: 3 code: UC0229_3 realizations professionals and criteria of performance MOP1: control the implementation and maintenance of data networks by checking compliance with planning and the conditions laid down in the general implementation plan.

CR1.1 the proposals included in the drafting of test protocols and systems tests, ensure the adequacy of the same specifications of the project and the electrotechnical regulations in force, with the following control parameters:-drivers are of appropriate type, insulation, and section.

-The identification of drivers is the standard.

-The type and characteristics of pipelines conforms to as indicated in the project.

-Power protection and signaling and control equipment are approved.

-The resistance of implementations to ground is within the set margins.

-The voltage drops are the admissible.

-Tripping protections fault potential is the prescribed CR1.2 different controls that are applied during the execution of the installation conform in time and form to the general plan of execution.

CR1.3 measurement and test equipment calibration is done to set them within the admissible limits, ensuring the reliability of the results obtained.

CR1.4 the procedure to be applied in the process of monitoring and control of the execution of the works is clearly set out.

CR1.5 taking of precise data on the State of the Assembly or maintenance of the system allows you to assess the progress of the work and its alignment with the established planning.

CR1.6 incidents and deviations arising during the process communicate with sufficient haste and explains the causes of them.

CR1.7 changes in the implementation of the system are proposed to improve the operation of the same or the resolution of contingencies.

CR1.8 improvements and/or amendments are accompanied by a technical and economic evaluation of them provided an adequate decision making.

CR1.9 responses to incidents that may arise about the personnel and materials, are provided for in a contingency plan.


CR1.10 the parts of work are collected daily, ensuring that they collected in the form and content of the data necessary to track the planning.

CR1.11 modifications that need to be performed in the planning of the implementation or maintenance of the system are permanently reflected in production charts drawn up in this respect.

Rp2: Supervise the installation of wiring and the certification of it according to your Setup project and complying with established quality criteria.

CR2.1 materials used in the installation conform to the specifications of the project.

CR2.2 tools used in the installation are suited in each case to meet the established quality criteria.

CR2.3 necessary pipelines are carried out in accordance with provisions in the draft and in the Assembly plan.

CR2.4 the wiring and connections are carried out in accordance with schemes and plans, solving the contingencies that may arise.

CR2.5 identification codes (numerical and / or colour) of the cables and connectors are the standard.

CR2.6 the conditions of security personal and of them media and materials used is respected in all time, taking them measures appropriate in case of incidents.

CR2.7 modification program that has to be drawn up at the right time, reporting and taking appropriate measures according to the standard or most appropriate procedure, optimizing resources and reducing cutting times and / or delay.

CR2.8 modifications during installation are recorded in drawings and schemes to keep up to date the installation documentation.

CR2.9 preventive maintenance operations are carried out in accordance with established procedures.

CR2.10 (measurements, checks, etc.) necessary operations for fault detection, fault and/or incorrect operation of the system allow to diagnose and pinpoint the causes of the situation at an appropriate time.

CR2.11 changes and improvements proposed in a system failover repeated the same provide a safe and reliable operation.

CR2.12 the periodic reports and the daily parties collected accurately developed work, incidents that have arisen, and the solutions adopted, allowing the updating and monitoring of information on the implementation of the system.

CR2.13 cables are labeled in both ends by correctly identifying its origins and type.

CR2.14 training and personnel responsible information about quality required in the execution of the work is carried out continuously, giving instructions and / or undertaking the necessary actions to do so.

RP3: Supervise the installation of the equipment and devices according to your Setup project and complying with established quality criteria.

CR3.1 the location of the equipment corresponds to the plans of the installation and it respects the criteria of ergonomics, safety and use of CR3.2 space of the equipment to the power supply is connected according to the criteria of security and with the rules in force.

CR3.3 the installation of network equipment is made, if it is possible, through its placement in frames respecting the specifications of manufacturers and maintaining proper ventilation CR3.4 fastening and connecting wires of the equipment is done according to functional criteria, maintaining proper labelling and allowing the later handling CR3.5 implantation is performed according to the regulations and the manufacturer's recommendations , and plans of the installation of the organization.

CR3.6 the documentation technical is interprets with correction both if is is edited in Castilian, in the language itself of it community autonomous or in the language technical of use usual.

CR3.7 the handling of them equipment in production is carried out in them schedules and of the mode that minimize the impact in the service.

CR3.8 installation will be delivered through the elaboration of a document that includes all of the significant detail.

CR3.9 the training and information of the personal to its charge on it quality required in the execution of them works is performs of form continued, giving them instructions and / or undertaking them actions necessary to such end.

RP4: perform and / or monitor the tests necessary for the checking of the operation basic of them equipment and devices.

CR4.1 them tests functional of the installation physical of the system of communications ensure the conformity of the same with them requirements established in the documentation of the implementation.

CR4.2 tests will be carried out according to the manufacturer's recommendations and the organization test plan.

CR4.3 technical documentation is interpreted with correction both if it is edited in Spanish, the language of the autonomous community or in the technical language of habitual use.

CR4.4 anomalies or malfunction of part or all of the network equipment are detailed in reports that refer to manufacturer CR4.5 anomalies or malfunction of part or all of the network equipment brings about their repair or replacement by another component or equipment CR4.6 verification of the characteristics of the materials used ensures the adequacy thereof with respect to the specifications of the project.

CR4.7 trials and testing the equipment are performed according to the Protocol or established standard.

CR4.8 the results of the tests and trials of equipment and materials are reflected in corresponding quality leaves, are evaluated in the first instance, the report is issued and informing responsible for the system in the established manner.

CR4.9 connection and functional tests (at rest and activity) are conducted according to established protocol, and the necessary adjustments to achieve the prescribed specifications are carried out.

RP5: Develop the technical closure of project documentation and enable the management team to assume the management of the installed infrastructure.

CR5.1 the report of verification and put in service of the system of communication collects with precision them results global of the tests carried out and the acceptance of the same by the customer.

CR5.2 prepared documentation allows the management team set up and operate systems for the results expected and suitable to the requirements.

CR5.3 closing documentation includes the following sections:-the installation schematics and diagrams.

-Reports of anomalies of components and equipment.

-Detailed each of the components maintenance plan.

-Manual of operation of the equipment.

CR5.4 the training plan is prepared with the aim of facilitating the administration of network elements.

CR5.5 training actions are taught about the installation itself and with an emphasis on the practical component.

Media production programs of project management professional context. Tools office. Presentation graphics of reports. Certification of wiring. Network analyzers. Hand tools for installation of communications infrastructure. Communications infrastructure equipment. Media communications software support. Copper and fiber optic wiring. Parts of the work. Racks of communications products and results installed data networks. Documents of planning and control of the implementation of communications facilities. Monitoring reports and proposals / modifications to facilities. Parts of work registered. Wiring installed and tagged. Technical documentation of closure. Training plan. Communications infrastructure equipment installed. Communications software installed. Individual executed tests.

Information used or generated manuals installation, reference and use of communications equipment. Information on local area networks and wide area and public and private communication systems. With rules, regulations and standards (ISO, EIA, RFC-IETF, ITU-T). Information on local area networks and wide area and public and private communication systems. Information about equipment and communications software. Technical documentation of projects and communication facilities. Manuals times and prices for communications. Rates and conditions of services of communications operators.

Competition 3 denomination unit: manage the telematics network infrastructure.

Level: 3 code: UC0230_3 realizations professionals and criteria of performance MOP1: configure computers and devices of the network infrastructure of data according to the design established for its implementation in exploitation.

CR1.1 configuration parameters and definitions in the data network infrastructure equipment is carried out individually with the values set in the design.

CR1.2 the sequence of actions of setting on the equipment is carried out in order and mode which the manufacturer determines.

CR1.3 technical documentation is interpreted with correction both if it is edited in Spanish, the language of the autonomous community or in the technical language of habitual use.

CR1.4 the safety and traceability of the parameters and definitions of configuration is guaranteed through the use of user and appropriate profiles or other means of identification.


CR1.5 sensitive parameters that depend on the stability and availability of components and networking equipment are protected using appropriate security measures.

CR1.6 them names of user and passwords of them teams of network is choose following them criteria established in the political of security, are stored using applications and / or procedures that ensure its confidentiality and is delivered to them administrators of it infrastructure of network of data through a channel safe.

CR1.7 the access remote to them teams of it infrastructure of network of data is performed by means of applications that ensure the security of the system facing access improper.

CR1.8 network access control settings can only be modified from the authorized points.

CR1.9 the documentation of configuration should include all those values implanted and the definitions topological implied in mode of scheme graphic.

Rp2: verify and test of way comprehensive them elements of the infrastructure of network of data.

CR2.1 them tools and techniques of verification and tests is used of the mode suitable for check the operation integrated of the infrastructure of network.

CR2.2 checks are carried out on what was planned at the design stage and must include the following checks:-continuity of network tests end-to-end.

-Testing of applications out of the network infrastructure.

-Functional checks.

-Load tests.

CR2.3 network software is verified together with the equipment and using appropriate tools and techniques.

CR2.4 final verification and test documentation includes the activities carried out and the results obtained.

RP3: Define and implement the procedures of monitoring of the elements of the network infrastructure of data for the exploitation phase, as well as do your capacity planning.

CR3.1 monitoring and capacity planning processes allow:-to assess the performance of the system.

-Estimate your performance in the medium term.

-Determine what elements of the system must expand is or replace is before causing a degradation of the performance of the system.

CR3.2 the processes and components that will be monitored are selected criteria of availability and State of charge.

CR3.3 thresholds of processes and components that will be monitored are selected in accordance with the level of service required and the specifications of the manufacturer.

CR3.4 technical documentation is interpreted with correction so much if it is published in Spanish, the language of the autonomous community, or in the technical language of habitual use CR3.5 scheduled alarms should be interconnected to facilitate analysis operators.

CR3.6 monitors of various network elements that configure a particular service will be grouped logically to facilitate understanding by the network operators.

CR3.7 events are scheduled on the basis of alarms or groups of alarms and run automatically whenever possible.

CR3.8 alarms and events should be recorded in such a way that they can be analyzed later.

RP4: Monitor and / or perform maintenance on the data network adapting preventive plans established to the particularities of the installation.

CR4.1 preventive maintenance of the system is carried out by applying the procedure standard and with the frequency established in the design stage.

CR4.2 physical transmission systems are minimizing the levels of loss of signal and maintaining continuity.

CR4.3 maintenance actions are planned and performed minimizing the impact in the production by selecting suitable of procedures and schedules.

CR4.4 tests after each action maintenance ensures the correct operation of the data network infrastructure.

CR4.5 the maintenance takes place according to criteria that facilitate consultation and the traceability of incidents.

RP5: Attend the incidences, diagnosing the causes of dysfunction of the system and adopting, at its level, appropriate measures for the fast and reliable restoration of the operational capacity of the same.

CR5.1 the incidence test allows you to verify the symptoms collected in the part of fault and specify the effect of the same.

CR5.2 diagnosis and localization of the fault of the system is performed using the technical documentation of the network and equipment, tools, software of diagnostics specialist, protocol analyzers, management tools that can incorporate the system (SNMP, RMON, etc.) and applying the corresponding procedure in adequate time.

CR5.3 technical documentation is interpreted with correction both if it is edited in Spanish, the language of the autonomous community or in the technical language of habitual use.

CR5.4 the settings of devices and / or replaced equipment are carried out according to the established design, with the required precision, according to documented procedures.

CR5.5 functional tests, final adjustments, reconfiguration of the parameters, load the software and, if necessary, the recommended reliability tests, are conducted systematically, following the procedure specified in the documentation for the system.

CR5.6 repair of breakdowns or incidents report is standard format allowing to collect information for the update of the repository of incidents.

Media production configuration software tools professional context. Networks addressing plan. Troubleshooting software. Corporate office applications. Graphical presentation of reports. Network analyzers. Equipment of infrastructure of communications. Media communications software support. Copper and fiber optic wiring. Monitoring tools. Applications of incident management / help desk. Applications for storage and / or secure transmission of information. Random password generators. Programs for remote configuration of communications equipment.

Products and results communication infrastructure configured according to the customer's specifications. User assistance. Reports of performance and improvement proposals. Installed data networks. Documents of planning and control of the implementation of communications facilities. Monitoring reports and proposals / modifications to facilities. Communications infrastructure equipment installed. Communications software installed. Integrated tests executed. Networks monitored with alarms and events.

Information used or generated communications system implementation Plan. Communications equipment installation manuals. House rules on customer service. Quality guide. Maintenance plan. Manual installation, reference and use of communications equipment. Information on local area networks and wide area and public and private communication systems. Information about equipment and communications software. Technical documentation of projects and communication facilities. Regulation of telecommunications monitoring reports.

III. formation of professionalism certificate training module 1 name: TELEMATIC network design.

Code: MF0228_3 level of professional qualification: 3 associated to the competition unit: UC0228_3: design of the telematics network infrastructure.

Duration: 200 hours training unit 1 name: analysis of the market of products of communications.

Code: UF1869 duration: 90 hours referrer of competition: this training unit corresponds to the RP2.

Capabilities and C1 evaluation criteria: differentiating the characteristics of the means of transmission on the market CE1.1 reasonably explain the relationship between bandwidth and transmission speed.

CE1.2 identify the characteristics of a product from its specifications CE1.3 describe the problems of installation of a specific means of transmission.

CE1.4 classified media according to the technical characteristics of its use in network installations.

CE1.5 detailing the influence of each means of transmission on the overall performance of the network.

CE1.6 to properly interpret the symbols and coding used commercially for different means of transmission.

CE1.7 from a practical course of network design:-study the market of communications products necessary for the design, consulting documentation on the Web, journals, catalogues of manufacturers, etc.

-Make proposals on the basis of criteria of economy and performance.

C2: Explain the levels existing in the suite of Protocols TCP/IP CE2.1 interpret CE2.2 describe OSI reference model functions and services of each layer of the model of reference OSI CE2.3 explain architecture TCP/IP CE2.4 set correctly correspondences between TCP/IP architecture and the OSI reference model.

CE2.5 associate correctly functions and services at every level of the TCP/IP CE2.6 describe architecture system addressing IP CE2.7 apply the system of IP addressing in the creation of subnets CE2.8 describe protocols for routing in IP networks: BGP, OSPF.

CE2.9 describe the TCP/IP architecture application level protocols: ftp, http, SMTP, telnet, SNMP, etc.


C3: Explain the technical characteristics and operation of the various teams of interconnection network.

CE3.1 classify the operation of them teams of network with respect to the model of reference OSI CE3.2 describe them functions of the different devices of interconnection.

CE3.3 detail the technical characteristics of the interconnection equipment to determine its influence on the performance of the network CE3.4 analyze the different alternative software products communications equivalent hardware.

CE3.5 describe the architecture of interconnection through the use of VPN (Virtual Private Network, virtual private networks).

CE3.6 properly interpret the information that appears in catalogs of communications products.

Contents 1. Introduction to communications and computer networks.

-Tasks of a telecommunications system.

-Communication over networks.

-Classification of networks:-local area (LAN) networks.

-(MAN) metropolitan area networks.

-Wide area (WAN) networks.

-Protocols and architecture of protocols.

-Definition and characteristics.

-Functions of the protocols.

-The model of reference OSI. Functions and services.

-The TCP/IP protocol architecture. Functions and services.

-Correspondence between TCP / IP and OSI.

-Regulation and organisms of standardization. IETF. ISO. ITU. ICT.

2. principles of data transmission.

-Concepts.

-Data flow: simplicity, half-duplex and duplex.

-Addressing.

-Modes of transmission: series, parallel.

-Analog and digital transmission.

-Definition data, signals and transmission.

-Acoustic spectrum.

-Analog and digital signals. Advantages and disadvantages.

-Data and signals.

-Analog and digital transmission characteristics.

-Advantages of digital transmission.

-Disturbances in the transmission.

-Attenuation and distortion of the attenuation.

-Delay distortion.

-Thermal noise.

-Noise intermodulation, crosstalk and impulse noise.

-Effects of noise on a digital signal.

-Decibel and signal strength. Signal to noise ratio.

-Capacity of the channel bandwidth of a signal, baud rate, rate of error.

-Data encryption.

-Digital data encryption techniques.

-Analog data encryption techniques.

-Multiplexing.

-Concept.

-(FDM) frequency-division multiplexing.

-(TDM) time-division multiplexing.

-(WDM) wavelength division multiplexing.

-Switching.

3 guided transmission media.

-Twisted pair.

-Construction features.

-Transmission characteristics.

-Applications.

-Types of cables and categories. Bandwidth.

-Advantages and disadvantages - coaxial cable.

-Construction features.

-Transmission characteristics.

-Applications.

-Advantages and disadvantages.

-Optical fiber.

-The optical transmission system.

-Construction features.

-Transmission characteristics.

-Applications. Use of frequencies.

-Types of joint. Advantages and disadvantages.

-Streaming media catalogs.

4. wireless transmission means.

-The non-guided transmission characteristics.

-Wireless transmission frequencies.

-Antennas.

-Microwave terrestrial and satellite.

-Link point to point satellite.

-Multicast via satellite.

-Radio.

-Infrared.

-Forms of Wireless propagation.

5. data link control.

-Functions of the data link control.

-Types of protocols.

-Methods of line control.

-Treatment of errors.

-Flow control.

6. Protocols.

-Internetwork protocols. IP protocol.

-Internet and their organizations.

-Addressing IPv4 and IPv6. Creation of subnets.

-Routing.

-Classification of routing methods.

-BGP (Border Gateway Protocol).

-OSPF (Open Shortest Path First).

-Transport Protocol. TCP/UDP protocols.

-Protocol: TCP (Transmission Control Protocol).

-Protocol UDP (User Datagram Protocol).

-Ports.

-NAT (Network Address Translation). Addressing.

-Network security.

-General concepts.

-Properties of a secure communication.

-Cryptography. Types.

-Authentication.

-Integrity.

-Distribution of keys and certification.

-Applications.

-SSL (Secure Sockets Layer).

-SSH (Secure Shell).

-IPsec.

-Firewall.

-Protocols of the level of application.

-The client-server architecture.

-Client/server applications.

-HTTP (Hypertext Transfer Protocol).

-FTP (File Transfer Protocol).

-SMTP (Simple Mail Transfer Protocol).

-TELNET (TELecommunication NETwork).

-SNMP (Simple Network Management Protocol).

-Other.

7. network interconnection equipment.

-Internetwork devices.

-Functions and OSI reference model.

-Benefits and features.

-Routers. Level 3 switches.

-Concentrators.

-Switches.

-VPN (virtual private network) servers.

-Firewall.

-Influence on the performance of the network.

-Environmental requirements of communications equipment.

-Catalogs of products for equipment of interconnection of network.

-Hiring of access basic to networks public.

UNIT training 2 name: development of the project of the network telematics.

Code: UF1870 duration: 80 hours reference of competition: this unit training is corresponds with the RP1 and RP3.

Capabilities and criteria of evaluation C1: analyze the characteristics and requirements of a project of network telematics starting from the needs of the customer.

CE1.1 identify the sources of information.

CE1.2 apply techniques of interviews and of collection of information.

CE1.3 explain the problems of the study of feasibility of a project.

CE1.4 develop a document of requirements of the user.

CE1.5 to synthesize the information collected.

CE1.6 from a practical course:-simulate an interview.

-Carry out a requirements document.

-Carry out a techno-economic feasibility study.

C2: Select a specific computer of interconnection for network infrastructure CE2.1 justify the choice of equipment of interconnection according to criteria of performance and economy.

CE2.2 describe the problems of the interconnection of local area networks.

CE2.3 describe the problem of interconnection area network wide area local-red.

CE2.4 justify the choice between a hardware solution and other software according to criteria of performance, economy, complexity, and ease of management.

CE2.5 explain the influence of collision domains and IP domains in the performance of the network.

C3: Design the network topology, including the means of transmission and communications equipment suited to the specifications received CE3.1 on a practical course of network design:-draw the topology that meets the specifications on performance, cost and quality of service expected.

-Choose the most appropriate means of transmission for the design of the network according to the expected quality and cost criteria.

-Locate on the design teams of interconnection so that the established quality criteria are met.

-Set the mode of addressing and configuration, including subnets that were necessary.

-Select the interconnection system with wide area according to the chosen topology network and meeting agreed criteria of cost and efficiency.

-Establish lines of support if necessary.

-Use simulation programs allowing to verify the operation of the retrieved design.

CE3.2 make the logical connection of equipment taking into account their function and their requirements for security and location.

Contents 1. Communications networks - classification of networks.

-Switching networks.

-Circuit-switched. Features.

-Packet switching. Features.

-ATM and Frame Relay.

-Broadcasting networks.

-Bus networks.

-Ring networks.

-Star networks.

2. local area (LAN) networks.

-Definition and characteristics of a local area network.

-Topologies.

-Architecture of LAN protocols.

-Physical level.

-Link level.

-Sublevel MAC (Medium Access Control).

-Sublevel LLC (Logical Link Control).

-IEEE 802 LAN standards.

-Star local area networks. Switched hubs.

-LAN-LAN interconnection.

-LAN-WAN interconnection.

-Design issues.

-Transmission medium.

-Characteristics of a product from its specifications.

-Selection of the means of transmission.

-Installation of transmission medium. Problematic.

-Influence of each means of transmission on the overall performance of the network.

-Symbols and commercial coding.

-The market of communications products.

-Connection equipment.

-Location in the designed interconnection equipment.

-Set the mode of addressing and configuration, including subnets.

-Select the interconnection with the wide area network system - support lines.

-Network cards.

3. wiring systems structured.

-General.

-Concept of system wiring structured.

-Advantages of standardization.

-Objectives of a wiring system structured.

-Regulations.


-Description of a wiring system structured.

-Subsystems of wiring.

-Functional elements.

-Campus subsystem.

-Wiring subsystem vertical.

-Wiring subsystem horizontal.

-Wiring job.

-A wiring system interfaces.

-Categories and classes.

-Categories: definition and characteristics.

-Link classes and channels: definitions and characteristics.

-Classification of links and channels.

-Maximum lengths of canals and permanent links.

-General recommendations on the subsystems.

-Distances maximum of each subsystem.

-Types of cables and uses recommended.

-Distributors of floor panels.

-Tomas of user in the area of work.

-Cabling backbone of campus and buildings.

-Cabinets and rooms of computers. Main active elements.

-Rush of public and private networks in buildings.

-Electromagnetic compatibility.

4. the telematic project - definition and objectives - general structure of a telematic project.

-Interview and information gathering techniques.

-The technical and economic feasibility study.

-The diagnostic report. Phases.

-Collection of information. The user requirements document.

-Information about the organization.

-Inventory of hardware equipment and telecommunication services.

-Network systems.

-Computer security.

-Wiring system.

-Technical proposal:-computer system and telecommunication services.

-The center of process data and network systems (relocations, installations, etc.).

-Information security policy.

-Guidelines for quality and its relationship with the company's telematic systems.

-Proposal for the wiring system.

-Number of jobs (people) to be considered in the system.

-Services to provide each of the jobs (voice, data and video conferencing...).

-Types and characteristics of the cable to be used. Normative references.

-Level of performance required to wiring. Normative references.

-Safety requirements.

-Wiring and installation costs. Time manuals and accessories.

-Maintenance procedures to be applied.

-Plan of action:-conditions of execution and commissioning underway system.

-Terms of execution of the tasks to perform to set up system. GANTT diagrams.

-Plan of operation of the system.

-References to procedures for installing and configuring the system.

-Complete documentation requirement: design specifications, drawings, diagrams, guides for installation and Setup, guarantees and technical support.

-Resources available on the system.

-System security plan: access to the system, backup policies.

-Users of the system (access rights, areas of work and available resources).

-Information about installed applications.

-Development of a telematic project - hardware and normative references on: structured cabling, electromagnetic compatibility, protection against fires.

-Level physical and link (OSI 1 and 2) and normative reference for data transmission.

-Internetworking (OSI 3 and 4) and regulatory references.

-Systems and architectures (OSI 5, 6 and 7).

-Services: transmission of voice, video conferencing and imaging in the band base. Normative references.

5. software tools.

-Tools for simulation of networks.

-Project planning tools.

TRAINING unit 3 name: preparation of the technical documentation.

Code: UF1871 duration: 30 hours reference of competition: this training unit corresponds with the RP4.

Capabilities and C1 evaluation criteria: prepare the documentation necessary for the execution of the project CE1.1 identify the standard of quality in force the sections that apply to the network design process.

CE1.2 analyze a process related to the activity of design identifying or establishing clearly:-input to the process data.

-Function associated to the process.

-Data or documentation generated in the process.

-Records and evidence generated.

-Relationship with other processes.

-Metrics that can be applied and possible points of improvement.

CE1.3 splitting of an existing project technical documentation:-identify the location of the equipment.

-Identify the means of transmission used.

-Identify the network addresses used.

-Interpret coding used networking equipment.

CE1.4 describe and differentiate the sections that make up a project, according to telecommunications legislation.

CE1.5, from the made specifications, make a map of network containing:-the location of the equipment.

-The medium used transmission.

-Network addresses used.

-Coding of interconnection equipment.

Contents 1. Quality management standard.

-Introduction to the quality.

-Standards and certifications.

-ISO 9001/2000 standard or equivalent.

-The quality system of a company.

-Processes and procedures.

-Quality plans.

-Records and evidence.

-Metrics.

-Audits.

-Improvement and prevention of problems.

2. implementation of a telematics network.

-Regulation of telecommunications.

-R.D. 401/2003.

-Order CTE/1296/2003.

-Technical implementation of a telematics network project.

-Structure and content.

-Memory.

-Background.

-Study alternatives.

-Justification solution adopted.

-Calculations and critical points.

-Planes.

-Specification.

-General terms and conditions.

-Technical requirements.

-Conditions for performance.

-Conditions of certification.

-Administrative economic conditions.

-Budget.

-Implementation and management of work - final certification.

3. elaboration of technical project documentation.

-CAD/CAM/CAE programs.

-Preparation of diagrams and drawings - relationship of materials, equipment and devices.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1869 90 50 training unit 2 - 2 80 40 training unit UF1870 - UF1871 30 20 sequence: formative units must overcome correlatively.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: management of the implementation of network TELEMATIC code: MF0229_3 level of professional qualification: 3 associated to the unit's competition: UC0229_3 coordinate the implementation of telematic network infrastructure.

Duration: 120 hours training unit 1 name: planning of projects of IMPLANTATION of infrastructures of network TELEMATIC.

Code: UF1877 duration: 50 hours referrer of competition: this training unit corresponds to the RP1 and RP3 with regard to planning.

Capabilities and C1 evaluation criteria: analyzing technical documentation of projects for the implementation and maintenance of networks, identifying the information needed to plan the processes required.

CE1.1 describe the documentation technical that is includes in the projects of mounting and maintenance of networks, describing the information that contains.

CE1.2 indicate the different types of flat or schemes that make up the documentation graphic of a project.

CE1.3 identify and interpret the normative and regulation that is has of used in the planning of them projects of networks.

CE1.4 explain them parts, equipment and elements that make up the networks (network of wiring, networks wireless, equipment of communication telematics, PBX private of telephony, terminals, and others).

CE1.5 in a so-called practical, starting from the documentation technical that defines the project's implementation and maintenance of a network, properly characterized, identify and describe:-the location of them teams of communications of voice and data.

-The media and tools necessary for applying those processes.

-Power distribution system and protection elements.

-Envelopes, boxes, cabinets and elements of the wiring.

-Forced ventilation and special power systems.

-The type of pipes and their distribution in plants, horizontal and vertical distribution.

-The characteristics of the wirings and connection of the elements.

-The systems of identification and marking of conductors, connectors, user and present in the plant equipment.

C2: Apply techniques of planning, programming and monitoring in the process of implementation and maintenance of networks.

CE2.1 explain different techniques and tools of planning and scheduling of projects (GANTT, PERT and CPM), rules that must be meet to implement them and indicate the usefulness of each of them.

CE2.2 analyze the different components that make up the cost of the processes of implementation and maintenance of networks.


CE2.3 from a practical course, conveniently characterized by technical documentation that establishes the necessary specifications:-establish the phases of the process of implementation and/or maintenance.

-Break down each of the phases in different operations that compose it.

-To determine the equipment and facilities necessary to execute the process.

-Calculate the times of each operation.

-Identify and describe the critical points of the process.

-Represent the task sequences using Gantt charts and network diagrams.

-To determine human resources and appropriate materials.

-Carry out the estimation of costs.

CE2.4 explain how establishing a graph of workloads, analyzing the allocation of resources and time.

CE2.5 list and describe the most relevant job scheduling techniques.

CE2.6 describe the concept of work unit and explain the procedure for its definition.

CE2.7 starting from a so-called practical of implementation and/or maintenance of a network, enough characterized by documentation technical that include, at least, them flat and schemes of the same, them dates of home and completion, them processes used, them resources human and media of production available, as well as the calendar labor, the timing of the maintenance and of the supply of products and equipment :-Determine milestones of each an of the main phases of the work.

-Set the workload in different jobs, balancing the loads.

-Identify, by the name or code standard, them materials, products, components, tools and equipment required to undertake them different operations that involve the implementation or maintenance of the system.

-Generate the information that set: them supplies, them media, tooling and tools and the «stocks» intermediate required.

Contents 1. Concepts basic and aspects organizational of the development of projects-definition and characterization of project.

-Identification and description of the concepts involved (client, objectives, scope, time, quality, cost, risk, team, project manager, users...).

-Short description of tasks them and objectives of the different phases of the life cycle of a project.

-Approval.

-Definition.

-Planning.

-Execution.

-Close.

-Identification of those factors critical for success.

-Description and comparison of different models of business organization.

-Organization functional.

-Organization for projects.

-Matrix organization.

-Organization of HRD in project groups.

-Explanation of the figure of the project manager.

-Description and comparison of different models of leadership exercised by the project manager.

-Identification and description of the characteristics of a high performance team.

2 tools and management in the development of projects - word processing, spreadsheets and presentations editors.

-Identification of commercial and open source layout of utilities.

-Identification of computing open source and commercial tools for project management.

-Elaboration of technical documentation techniques.

-Preparation of reports and operating manuals.

-Structure of the information to be transmitted.

-Elaboration of textual and Visual guides for operating manuals...

-General recommendations on identification, file organization and management of their versions.

3. the implementation of network telematic infrastructure project documentation - explanation of the purpose of the documents that make up a project.

-Identification of common to all project documents.

-Reference to the standard UNE 157001 'General criteria for the elaboration of projects'.

-Memory.

-Description and purpose of memory.

-Analysis of contents and structure.

-Exemplification of different types of documents to the memory.

-Planes.

-Description and purpose of the planes.

-Identification and description of the different types of planes and their characteristics.

-Specification.

-Description and purpose of the specification.

-Analysis of its legal and contractual significance.

-Description and characterization of the different types of sheets: general terms and conditions, specific technical provisions and particular administrative clauses.

-Budget.

-Identification and description of the sections of the budget: measurements, unit prices, decomposed and budget prices.

-Development of a practical course where from the technical documentation that defines the project's implementation and maintenance of a network, properly characterized, identify and describe:-the location of the voice and data communications equipment.

-The means and tools needed to implement the processes.

-Power distribution system and protection elements.

-Envelopes, boxes, cabinets and elements of the wiring.

-Forced ventilation and special power systems.

-The type of pipes and their distribution in plants, horizontal and vertical distribution.

-The characteristics of the wirings and connection of the elements.

-The systems of identification and marking of conductors, connectors, user and present in the plant equipment.

4. definition of the scope: identification of phases and tasks of a telematics network infrastructure implementation project - definition of objectives of the project - scope.

-Term.

-Quality.

-Cost.

-Description of different methods to obtain information about the work.

-Analysis of the project documentation.

-Individual and group interviews.

-Meetings with experts.

-Techniques of defining the scope: work breakdown structure (WBS).

-Explanation of the concept and purpose of the EDT.

-Description of its hierarchical structure.

-Exemplification of document models of EDT.

-Characterization of the work packages.

-Identification and comparison of descending, ascending development and brainstorming strategies.

-Exemplification of various types of documents that collect the scope the scope of a telematics network infrastructure implementation project.

5 techniques of planning and project management - Gantt chart - description analysis.

-Analysis of its advantages and limitations.

-Indication of the type of projects for which it is suitable.

-Critical path method (CPM) and the technique of review and evaluation of programs (PERT) analysis.

-Description and features.

-Comparison between the 2 methods.

-Advantages of techniques based on graph theory.

-Explanation of the basic principles.

-Construction of the graph.

-Allocating deterministic and probabilistic of durations of tasks.

-Calculation of times.

-Calculation of SAGs and critical path.

-Schedule.

-Optimization of time and costs.

-Planning of a telematics network infrastructure implementation project.

-Decomposition in tasks.

-Explanation of the objectives of the process of decomposition in tasks.

-Description of the process.

-Identification of techniques of analysis of tasks: tables of decision, diagrams of connectivity, diagram of flow of decisions, diagram of bars...-recommendations of good practices.

-Model exemplification of documents: list of tasks, a task description... - task sequencing.

-Identification and comparison of the different types of dependency between tasks: primary, secondary and external.

-Identification of the different types of relations of precedence between tasks.

-Definition of the concept of milestone.

-Description of different techniques of sequencing: Gantt diagram techniques based on graph theory: (technical review and evaluation of programs) PERT and CPM (critical path method).

-Estimation of durations.

-Definition of a task's duration.

-Recommendations on estimating durations.

-Identification of estimation procedures.

-Exemplification of documents result of estimating durations - estimation and allocation of resources.

-Definition and illustration of different types of human and material resources.

-Description of problems and solutions in the allocation of resources.

-Exemplification of documents result of the allocation of resources.

-Cost estimate.

-Exemplification of different types of costs.

-Explanation of the relationship away between duration and cost.

-Exemplification of documents result from the estimation of costs.

-Programming.

-Explanation of the concept and objectives of the programming.

-Description of different techniques of programming: diagram of Gantt and technical based in theory of graphs: PERT (technical of review and evaluation of programs) and CPM (method of the route critical).

-Identification and description of the phases of the process of programming: construction of the diagram of times, analysis of costs and verification and adjustment.

-Description of different types of settings: duration of the tasks, duration of the project, assignment of resources, costs for task...


-Development of a practical course conveniently characterized by technical documentation that establishes the necessary specifications, which are:-establish the phases of the process of implementation and/or maintenance.

-Break down each of the phases in different operations that compose it.

-To determine the equipment and facilities necessary to execute the process - calculate the times of each operation.

-Identify and describe the critical points of the process - represent sequences of tasks using Gantt charts and network diagrams - determined human resources and appropriate materials - made the estimate of costs - development of a so-called practical implementation of a network of conveniently characterized by technical documentation that includes, at least, plans and schemes of the same, start and end dates , used processes, human resources and available means of production, as well as the work schedule, planning of the supply of products and equipment, which are: - determine milestones for each of the major phases of work - set the workload in different jobs, balancing the loads.

-Identify, by name or standard code, materials, products, components, tools and equipment required to carry out the various operations involving the implementation or maintenance of the system.

-Generate the information that set: them supplies, them media, tooling and tools and the «stocks» intermediate required.

TRAINING unit 2 name: TELEMATIC network infrastructure deployment projects.

Code: UF1878 duration: 70 hours referrer of competition: this training unit corresponds to the RP1, RP2 and RP3 with regard to execution and with the RP4 RP5.

Capabilities and C1 evaluation criteria: develop / modify protocols of intervention for the commissioning and maintenance of networks.

CE1.1 in several practical cases, properly characterized, for the elaboration of protocols of commissioning and maintenance of networks, achieve that:-the problems detected in the application of the procedure that needs to develop / modify are justified and explained sufficiently in the standard document.

-The definition of the solution of the new procedure is preceded by the trials and tests necessary to ensure the most suitable solution according to the procedure that needs to be improved.

-The result procedure takes into account the optimization of human and material resources for its implementation.

-Proposals for changes to be performed are clearly justified and specified in the relevant document, solving satisfactorily the deficiencies of the procedure.

-The new procedure collects, in the standard format, the most relevant aspects for implementation, among others:-phases to be followed in the application of the procedure.

-Required textual and graphic description.

-Tests and adjustments that must be made.

-The means to be used.

-Parameters that must be controlled.

-Standards of security personal and of the equipment and materials that there is that apply.

-Results expected or predictable.

-People who should intervene.

-Document standard that there is that complete.

C2: perform, with precision and safety, measures in the different elements that compose them networks, using them instruments and them elements auxiliary appropriate and applying the procedure more suitable in each case.

CE2.1 explain them features more relevant, the typology and procedures of use of them instruments of measure used in the field of them networks, depending on the nature of the magnitudes that is should measure and of the type of technology employed.

CE2.2 apply measurement procedures suitable for the measurement of parameters (crosstalk, attenuation, return loss, and others) required for the certification of wiring structured copper and optical fiber in the different categories and standard classes.

CE2.3 apply the procedures of measurement suitable for measurement of electrical quantities required in the implementation and maintenance of networks (voltages and electrical currents, impedance, Earth resistance and others.)

CE2.4 analysis and various practical measures in networks simulated case study, which involved various elements of different type and depending on the nature of the signals that should be measured:-select the measuring instrument and most appropriate auxiliary elements depending on the type and nature of the quantities will be measure and required precision.

-Properly connect the different devices of measure depending on the quantities being measured.

-Measuring signals and States own the equipment and devices used, properly operating instruments and by applying, with the required safety, standard operating procedures.

-Interpret the measures carried out, linking States and values of the measured quantities with the corresponding reference, noting the differences obtained and justifying the results.

-Elaborate a report memory of the activities carried out and results obtained, structuring paragraphs necessary for adequate documentation thereof (description of the process followed, media used, schemes and plans, functional explanation, measures...).

C3: diagnose faults in them networks, identifying the nature of the fault (physical or logical), applying them procedures and technical more appropriate in each case.

CE3.1 classify and explain the typology and characteristics of the faults of a physical nature that arise in networks.

CE3.2 classify and explain the types and characteristics of faults in logical nature which arise in networks.

CE3.3 describe the General techniques and the technical necessary specific means for the troubleshooting of physical nature in the networks.

CE3.4 describe the General techniques and the technical necessary specific means for the troubleshooting of logical nature in networks.

CE3.5 describe the general process used for Diagnostics and troubleshooting of physical and/or logical nature in networks.

CE3.6 in several cases and/or case studies simulated, properly characterized, diagnosis and troubleshooting in a network:-interpret the system documentation, identifying the various functional blocks and components specific that compose it.

-Identify the symptoms of the fault to characterize it by the effects it produces.

-Make at least one hypothesis of possible cause that can produce breakdown, linking it with symptoms (physical or logical) that presents the system.

-Carry out an intervention plan in the system to determine the cause or causes that produce fault.

-Locate the responsible fault (physical or logical) item and perform the replacement (using similar or equivalent components) or modification of the element, configuration and program, applying the procedures required and at an appropriate time.

-Perform checks, modifications and adjustments of the system parameters according to the technical documentation of the same specifications, using the appropriate tools, that allow its commissioning in each case.

-Elaborate a report memory of the activities carried out and results obtained, structuring paragraphs necessary for adequate documentation thereof (description of the process followed, media used, measures, functional explanation and diagrams).

C4: Apply techniques and procedures to ensure the safety and quality in the process of implementation and maintenance of networks.

CE4.1 identify the contents of a quality plan relating it with the product or process and with the rules and standards in force.

CE4.2 describe the criteria for the evaluation of the characteristics of control.

CE4.3 explain the structure and content of the guidelines and inspection reports.

CE4.4 from a practical course of implementation and/or maintenance of a network, defined by their technical specifications, process, technical means and human resources, timing:-analyze the system specifications to determine the characteristics of quality control.

-Establish the phases of control of the implementation of the system.

-Apply the patterns of control, determining the procedures, devices and instruments required.

-Develop the information and chips of tomas's data that is should use.

-Write reports of non compliance in accordance with the procedures established.

CE4.5 identify them content of a plan of safety, relating them with the product or process and with the rules and regulation of security force.

CE4.6 starting from certain number of alleged in which is described different environments of work related with the implementation and maintenance of networks:-determine the specifications of them media and teams of security and protection.

-Develop documentation technical in which appears the location of equipment of emergency, them signals, the alarms and them points of exit in case of emergency, adjusting is to it legislation existing.


-Develop procedures and guidelines that there is that continue to act with the security adequate.

-Draw up reports of non-compliance in accordance with established procedures.

C5: develop and deliver plans of training on procedures of implementation, maintenance and administration of networks.

CE5.1 define with precision the elements that must contain a plan of training technical for a team's work.

CE5.2 list and explain different technical for the diagnosis of needs of training of contents technical of a group of people CE5.3 explain with precision the differences that exist between them different types of content that must appear in a plan of training technical: conceptual, procedural and attitudinal.

CE5.4 describe different techniques and training methods for the training of groups of people.

CE5.5 in a practical course properly characterized for the training of a group of people in a technique, procedure or specific equipment, prepare a multimedia presentation that serves as support for the display of content; It must at least contain the following elements:-the presentation script, properly structured.

-Graphic elements of adequate quality.

-Annexes explanatory graphics.

-Suitable to the sequence of presentation effects.

-Aesthetic care of the contents.

-Multimedia presentation support elements.

CE5.6 in a practical course properly characterized for the training of a group of people in a technique, procedure or specific equipment, develop and teach, shape simulated in the learning environment, a training program, at least, with the following characteristics:-completion of the diagnosis and individualized learning needs registration.

-Making accurate of them goals to achieve in the time established.

-Selection of contents and type of agreement with the objectives and the nature of the same.

-Preparation of activities of teaching and learning in the proper format, including the operating process, the resources and methodology to be used.

-Establishment of the sequencing in the development of contents and activities.

-Preparation of the activities, procedures and instruments for the assessment of learning outcomes.

-Development of the teaching model in time and form, explaining in detail the actions that supposedly would be carried out in real situation.

Contents 1. Monitoring and control of the project - explanation of concepts monitoring and control.

-Comparison of planned, actual and scheduled plans.

-Analysis and description of the activities of monitoring and control.

-Detailed allocation of tasks.

-Communication to the project team.

-Tracking of tasks.

-Incident management: analysis of the impact, proposed solution, the incidence.

-Management of changes in those requirements: request of change, analysis of the request, approval of it solution, estimate of the effort and planning of it solution, registration of the change.

-Follow-up of costs.

-Exemplification of various types of product tracking and control documents.

2. elaboration of protocols of intervention in the implementation and maintenance of networks - description and characterization of the concept of standard operating procedure.

-Identification and brief description of the various phases of the elaboration of procedures.

-Preparation of documentation.

-List of necessary activities and their sequence.

-Preparation of the flowchart.

-Development of the document.

-Review and verification.

-Approval.

-Identification.

-Registry.

-Distribution.

-Training.

-Description and exemplification of operating procedures format patterns.

-Analysis of types and features of procedures for the implementation of networks.

-Analysis of types and characteristics of network commissioning procedures: tests, checks and records.

-Analysis of types and characteristics of network maintenance procedures: preventive and corrective.

-Exemplification of different protocols of intervention in the implementation and maintenance of networks.

3. power supply systems. Characteristics, quantities and measures - identification and characterization of the different types of power supply facilities.

-Measures of electrical quantities.

-Definition and measurement of the most common electrical quantities: voltage, current, impedance, Earth resistance.

-Description of different devices.

-Description and comparison of various elements of electrical protection:-fuse.

-Circuit breaker.

-Differential switch.

-Earth connection.

-Uninterruptible power supply (UPS) systems.

-Common disturbances in the power supply.

-Comparison and selection criteria for different types of UPS systems technologies: offline/standby, interactive, double conversion/online, ferro-resonant.

-Eletrotecnico of low voltage regulations.

4. procedures of certification of local area networks - regulatory references:-structured wiring: ISO 11801 and UNITES in 50173.

-Electromagnetic compatibility (EMC): UNE EN 50081 and 50082.

-Fire protection: IEC 331, 332 IEC, IEC 754, IEC 1034.

-IEC 61935: wiring certification.

-Wiring system structured.

-Description of its hierarchical structure: horizontal cabling and wiring vertical.

-Identification and coding of panels and rosettes.

-Analysis of the characteristic parameters of a transmission medium.

-Map of wiring (wire map).

-Length (length).

-Attenuation (insertion loss).

-Loss of return (return loss).

-Propagation (propagation delay) delay.

-Parameters related to the cross-talk (cross-talk): NEXT, FEXT, PS NEXT, PS FEXT.

-Parameters related to the relationship signal noise (SNR): ELFEXT, PS-ACR, ACR, PS-ELFEXT.

-Analysis of the rules of certification of wiring.

-Characterization of the different categories/classes.

-Description of the functionality and use of measuring instruments criteria.

-Distinction between permanent link and channel.

-Tester.

-Certifiers.

-Analysis of the certification procedure.

-Standards to take into account.

-The certification instrument calibration.

-Parameters to be certified.

-Documentation of the results.

-Brief description of ICT (common infrastructures of telecommunications) Regulation.

-Development of practical assumptions of measurements where is:-select the measuring instrument and most appropriate auxiliary elements depending on the type and nature of the quantities will be measure and required precision.

-Properly connect the different devices of measure depending on the quantities being measured.

-Measuring signals and States own the equipment and devices used.

-Properly operate the instruments and by applying, with the required safety, standard operating procedures.

-Interpret the measures carried out, linking States and values of the measured quantities with the corresponding reference, noting the differences obtained and justifying the results.

-Draw up a report of the activities carried out and results obtained, memory structuring in the required sections for appropriate documentation of the same (description of the process followed, media used, schemes and plans, functional explanation, measures...).

5 diagnosis and solution of physical and logical faults in the network infrastructure - the physical troubleshooting.

-Description and characterization of the different types.

-General techniques and specific technical means used in your location.

-Analysis of the logical faults.

-Description and characterization of the different types.

-General techniques and specific technical means used in your location.

-Identification and analysis of the different phases of the process of diagnosis and troubleshooting.

-Definition of the problem.

-Description of the problem.

-Establishment of possible causes.

-Proof of the most likely causes.

-Verification of the real cause.

-Planning of interventions.

-Verification of the repair.

-Documentation.

-Description and exemplification of the use of diagrams of cause / effect (Ishikawa) in the solution of problems.

-Description of the functionality and tools hardware diagnostic criteria.

-Digital meter.

-Wiring Tester.

-Generator and locator tones.

-Time domain reflectometer.

-Certification of wiring.

-Description of the functionality, criteria for use and exemplification of diagnostic software tools.

-Network monitor.

-Protocol Analyzer.

-TCP/IP utilities: ping, traceroute, arp, netstat.

-Development of assumptions or case studies simulated, properly characterized, for diagnosing and troubleshooting a network, that is:-interpret the system documentation, identifying the various functional blocks and components specific that compose it.


-Identify the symptoms of the fault, characterizing it by the effects it produces.

-Make at least one hypothesis of possible cause that can produce breakdown, linking it with symptoms (physical or logical) that presents the system.

-Perform an intervention plan in the system to determine the cause or causes that produce fault.

-Locate the (physical or logical) responsible for the fault element and perform the substitution (using similar or equivalent components) or modification of the element, configuration and program, applying the procedures required and at an appropriate time.

-Perform checks, modifications and adjustments of the system parameters according to the technical documentation of the same specifications, using the appropriate tools, that allow its commissioning in each case.

-Draw up a report of the activities carried out and results obtained, memory structuring in the required sections for appropriate documentation of the same (description of the process followed, media used, measures, functional explanation and diagrams).

6. the quality of the project management - definition and characterization of quality.

-Reference to the current quality standards.

-Management of the project.

-From the product of the project.

-Identification and description in the processes involved.

-The quality planning.

-Quality assurance.

-Quality control.

-Quality control techniques.

-Inspection.

-Control diagrams.

-Histograms (Pareto diagrams).

-Identification of tools for quality management.

-Quality plan.

-Definition and objectives.

-Reference to the safety regulations in force.

-Distinction between plan of quality and system of quality.

-Criteria to adopt to guarantee the quality.

-Preparation, review, acceptance, and updating of the quality plan.

-Identification of the contents of the quality plan.

-Description of the criteria of assessment of the characteristics of control.

-Simplified examples of formats for the presentation of quality plans.

-Development of a practical course of implementation and/or maintenance of a network, properly characterized by its technical specifications, process, technical means and human resources and planning, which are:-to analyze the system specifications to determine the characteristics of quality control.

-Establish the phases of control of the implementation of the system.

-Apply the control guidelines, procedures, devices and instruments required.

-Develop information and chips shots of data to be used.

-Drafting reports of non-compliance in accordance with established procedures.

7. the security plan in the execution of the telematics network infrastructure implementation projects - definition and objectives.

-Reference to the safety regulations in force.

-Criteria to adopt to ensure her safety.

-Identification of the contents of the security plan.

-Identification of computer tools for the implementation and monitoring of a safety plan.

-Development of assumptions that describe different work environments related to the implementation and maintenance of networks which are:-determine the specifications of media and equipment safety and protection.

-Prepare technical documentation that shows the location of emergency equipment, signals, alarms and points of exit in case of emergency, according to the legislation in force.

-Develop procedures and guidelines to be followed to act with adequate security.

-Drafting reports of non-compliance in accordance with established procedures.

-Identification and description of techniques and tools for the diagnosis of training needs.

-Job analysis.

-Analysis of tasks.

-Inventory of skills.

-Performance evaluation.

-Direct observation in the post.

-Surveys.

-Structured or open interviews.

-Using different techniques of guided discussion: rain of ideas, Forum, roundtables, panels... - testing techniques for certain competitions.

-Analysis of the development of training objectives.

-Characterization of the training goals: observable, achievable, specific and measurable.

-Basic description of the competency-based training model.

-Identification of criteria to be considered in the development of objectives.

-Exemplification of competency-based training goals.

-Identification and analysis of the phases of the process of elaboration of contents.

-Analysis of capabilities.

-Selection of contents: conceptual, procedural and attitudinal.

-Types of formats and content.

-Organization of content.

-Description of competence-based teaching and learning methodologies.

-Characterization of competency-based teaching and learning.

-Exemplification of methodologies.

-Description of techniques of presentation and display of content.

-Description of techniques of multimedia presentations.

-Analysis of the evaluation of learning.

-Formulation of evidence of performance.

-Identification of performance criteria.

-Identification and description of different types of formats and content.

-Identification of different records of monitoring of the training process.

-Development of a properly characterized practical course for the training of a group of people in a technique, procedure or specific equipment, which develop a multimedia presentation that serves as support for the display of content, including at least the following elements:-the presentation script, properly structured.

-Graphic elements of adequate quality.

-Annexes explanatory graphics.

-Suitable to the sequence of presentation effects.

-Aesthetic care of the contents.

-Multimedia presentation support elements.

-Development of a practical course properly characterized for the training of a group of people in a technique, procedure or specific team, which is drawn up and given form in the environment of learning, a training program, which are:-perform the diagnosis and individualized learning needs registration.

-Develop of form accurate them goals to achieve in the time established-select them contained and its typology in accordance with them objectives and with the nature of them same.

-Prepare activities of teaching and learning in the format right, including the process operating, the resources and the methodology to use.

-Set the sequencing in the development of content and activities-prepare them activities, procedures and instruments for the evaluation of them learning.

-Develop it teaching simulated in time and form, explaining with detail the actions that supposedly is lead to out in situation real.

-Identification and description of the phases of the process of reception of network telematic infrastructures.

-Receiving interim and term of warranty.

-Reception final.

-Clearance of the project.

-Identification and description of tasks of the closure of the project.

-Transfer of knowledge.

-Statement of completion formal of the project.

-Report on costs and closing economic.

-Archive of the documentation of management of the project.

-Inclusion in the inventory of projects.

-Valuation of the project: lessons learned.

-Exemplification of various types of documents used in the closure of the project.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - 50 50 2 training unit UF1877 - UF1878 70 40 sequence: to access the formative drive UF2 UF1 training unit should have been overcome.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 name: administration of network TELEMATIC code: MF0230_3 level of professional qualification: 3 associated to the unit's competition: UC0230_3 manage telematics network infrastructure.

Duration: 210 hours training unit 1 name: teams of interconnection and network services.

Code: UF1879 duration: 70 hours referrer of competition: this training unit corresponds to the RP1 and RP2 capabilities and C1 evaluation criteria: implement correctly and effectively products communications software on different platforms CE1.1 explain the function of DNS and DHCP services and their components.

CE1.2 explain the functions of a proxy server and its common commercial implementations, especially if it offers services of firewall, NAT, or cache.

CE1.3 describe the advantages and disadvantages of using a router software facing a router hardware CE1.4 on a case practical:


-Install and configure a service DNS, including DNS dynamic and the service DHCP for DNS.

-Install the service DHCP, creating a scope and setting up ranges of addresses and of reserves.

-Check the operation of the installed services.

CE1.5 in a case study:-install a proxy server.

-Configure options: NAT, cache, firewall.

CE1.6 in a case study:-install and configure using a computer.

-Check the operation of the router according to the requirements of routing equipment.

C2: Set the configuration of interconnection best suited to the needs of the installation.

CE2.1 explain the different configurations that can be done with stackable hubs.

CE2.2 explain the different ways to isolate traffic of level 2 and 3 of the model OSI between different LANs.

CE2.3 describe the problems of the emergence of loops to interconnect LANs using bridges.

CE2.4 explain the operation of the algorithm Spanning Tree.

CE2.5 explain the different ways to configure a VLAN.

CE2.6 on a practical course:-Configure a VLAN group of ports on a single switch.

-Configure a VLAN group of ports on two switches.

-Configure a VLAN by grouping of MAC addresses.

-Check if defined VLANs are raised-compliant CE2.7 on a practical course:-Configure the routing table on a router.

-Check if the routing tables are correct for the required routing.

-Define the access control list.

-Set the DHCP configuration, if the router allows it.

Contents 1. TCP/IP protocol.

-TCP/IP architecture. Description and functions of different levels:-physical level.

-Level of network access.

-Level of Internet.

-Level of transportation.

-Application level.

-Analysis of the transmission of data: encapsulation and decapsulation.

-Correspondence between the reference model (OSI) open systems interconnection and TCP/IP architecture.

-Definition of IP network.

-Exemplification of implementations of demonstrative of the great variety of the same TCP/IP networks.

-Description and characterization the IP Protocol: offline, not reliable.

-Analysis of the IP datagram format.

-Description and characterization the TCP protocol: reliable, connection-oriented.

-Analysis of the TCP segment format.

-Enumeration and exemplification of addressing different levels: physical, logical addresses, ports, specific app (URL, email).

-Analysis of the IPv4 address.

-Structure of an address IP.

-Classes of IP addresses.

-Masks.

-Notations.

-Public and private addresses.

-Addresses reserved and restricted.

-Problems of addressing and subnets.

-(VLSM) variable length subnet masks.

-Mention of IPv6 as an evolution of IPv4.

-Explanation of the use of ports and sockets as mechanism of multiplexing...

-Description and operation of the physical address ARP resolution protocol.

-Explanation of its purpose and operation.

-Types of ARP messages.

-ARP table.

-Protocol address resolution inverse (RARP) and BOOTP.

-Exemplification of ARP commands in Windows and Linux systems.

-Description and operation of ICMP.

-Explanation of their objectives.

-Types of ICMP messages.

-Exemplification of ICMP commands on Windows and Linux systems.

-Description and operation of the network address translation protocol.

-Explanation of its objectives and operation.

-Exemplification of usage of NAT scenarios.

-NAT types: static and dynamic.

-NAT reverse or destination (DNAT).

-(PAT) port address translation.

-Exemplification of setup NAT with iptables Linux systems.

-Description and uses of UDP.

-Comparison between UDP and TCP.

-Short description and function of some application-level protocols: SNMP, DNS, NTP, BGP, Telnet, FTP, TFTP, SMTP, HTTP, and NFS.

2. application-level services.

-Analysis of the Protocol service (DNS) domain names.

-Exemplification of addressing different levels: physical, logical addresses, ports, specific app (URL, email).

-Need, objectives and characteristics of DNS.

-Description of the structure hierarchical of DNS.

-Types of servers: primary, secondary and cache.

-Explanation of the delegation of authority. Subdomains.

-Enumeration of the types of records SOA, NS, A, CNAME and MX.

-Illustration of the process of resolution of names.

-Description and elements of the architecture client / server from DNS.

-Resolution inverse (reverse DNS lookup).

-Exemplification of command DNS in systems Windows and Linux.

-Implementation of the (DNS) domain name service.

-Development of a so-called practical where is show the installation and configuration of a server DNS in a system Linux using BIND (Berkeley Internet Name Domain), creating a scope and setting ranges of addresses and of reserves.

-Configuration of equipment customers for the resolution of names.

-Description and operation of the Protocol's configuration dynamic of hosts (DHCP).

-Objectives and performance.

-Description and elements of the architecture client / server from DHCP.

-Description of the methods of allocation of addresses IP: static, automatic and dynamic.

-Concepts of ranges, exclusions, concessions and reservations...

-Enumeration of those parameters configurable by DHCP.

-Illustration of the process of assignment of configuration with DHCP.

-Comparison between DHCP and BOOTP protocols.

-Dynamic configuration of hosts (DHCP) protocol implementation.

-Installation of a DNS server on a Linux system.

-Development of a practical course is displayed where the installation and configuration of a DNS server on a Windows System.

-Development of a so-called practical where display the installation and configuration of a DNS server on a Windows system, including dynamic DNS and DHCP for DNS service.

-Equipment configuration DHCP clients.

-Description and function of a proxy server.

-Explanation of the generic concept of proxy.

-Analysis of the advantages and disadvantages of the use of proxy servers.

-Concept of transparent proxy.

-Description and a web cache proxy server performance.

-Proxy reverse.

-Enumeration of servers proxy for other services: NAT, SMTP, FTP.

-Comparison of mode of operation and performance between a server proxy and a firewall.

-Identification and comparison of servers proxy commercial and of code open, stressing if offer services of firewall, NAT or cache.

-Implementation of a service proxy.

-Development of a so-called practical where is shows the installation of a proxy cache, configuring them different options: NAT, cache, firewall.

3. configuration of equipment of interconnection.

-Repeaters (Hubs).

-Analysis of their influence in the domains of collision and of broadcast.

-Enumeration of different uses.

-Explanation of the technique of segmentation and of its advantages.

-Bridges (Bridges).

-Analysis of their influence in the domains of collision and of broadcast.

-Enumeration of different applications.

-Exemplification of bridges by interconnecting networks 802.x equal or different.

-Characterization of a bridge transparent and description of the Protocol Spanning Tree.

-Characterization of a bridge remote.

-Switches (Switches).

-Analysis of their influence in the domains of collision and of broadcast.

-Comparison of different types of switching: Cut-Through and Store-and-Forward, Fragment-free Switching...

-Comparison between switches and bridges.

-Mention at the switching of level 3 and 4.

-Enumeration of different applications.

-Redes de area local virtual (VLAN).

-Explanation of the concept and operation.

-Concept of VLAN trunking.

-Analysis of their influence in the domains of collision and of broadcast.

-Analyze the advantages of the use of VLANS.

-Description and comparison of VLAN static and dynamic.

-Description and comparison of the techniques of definition of VLANs port grouping and grouping of MACs.

-Description of the link aggregation (Link trunk) and labelling.

-Enumeration of different uses recommended and not recommended.

-Wireless access points.

-Identification and comparison of different 802.11 standards.

-Description and comparison of modes of operation infrastructure and ad-hoc.

-Identification and description of the main security risks.

-Explanation of technologies and recommendations of good practices of security in wireless networks.

-Development of a so-called practical where to manifest.

-Various forms of connection to the switch for your configuration...

-Techniques of definition of VLANs by ports (on one or more switches) grouping and grouping of MACs.

-Routers (Routers).

-Exemplification of routable and non-routable protocols.

-Analysis of its influence on the collision and broadcast domains.

-Structure of the routing table.

-Comparison of different modes of construction of routing tables: Hardware state, static and dynamic.


-To analyze the advantages and limitations of the static routing.

-Description of CIDR as improvement in the management of IP addresses.

-Comparison between the two basic techniques of routing: distance vector and link state.

-Definition of administrative distance metric and convergence.

-Enumeration of the objectives of the routing protocols.

-Description of the characteristics and comparison of the types inside and outside of routing protocols.

-Explanation of the characteristics and criteria of use of different routing protocols: RIP, IGRP, EIGRP, OSPF, BGP.

-Explanation of the concepts of unicast, broadcast and multicast.

-Installation and configuration of a router on a Linux system using a product open source software.

-Description of the advantages and disadvantages of use a router software to a hardware router.

-Development of a so-called practical properly characterized where is show the following technical basic of configuration and administration of routers:.

-Different forms of connection to the router for your Setup initial.

-Static routing, and default route configuration.

-Definition of lists of control of access (ACL).

-Establishment of the configuration of DHCP, if the router it allows.

UNIT training 2 denomination: management of networks TELEMATIC code: UF1880 duration: 90 hours reference of competition: this unit training is corresponds with the RP3 and RP4 capabilities and criteria of assessment C1: implement procedures of monitoring and alarms for the maintenance and improves of the performance of the network.

CE1.1 explain the function of management messages exchange protocols...

CE1.2 associated with the parameters that define the operation of a component of a procedure for monitoring network to measure their values.

CE1.3 distinguish the susceptible equipment be monitored according to their operational importance.

CE1.4 plan of monitoring procedures to have the lowest incidence in the operation of the network.

CE1.5 use management and monitoring (SNMP/RMON) protocols to determine the operating status and the load of each element in the network.

CE1.6 use programs to monitor active services in the network elements.

CE1.7 translate the values of the parameters of a network component in the level of benefits that the component is offering.

CE1.8 from a practical course:-use the profiles of traffic and network utilization to determine how it will develop the use of the network.

-Analyze the results of monitoring in order to propose amendments.

C2: apply procedures of maintenance preventive defined in the documentation technical CE2.1 interpret a manual of operation of a manufacturer of components of network to perform its correct maintenance.

CE2.2 in a practical course:-distinguish those computers that can upgrade your firmware.

-Locate the appropriate firmware update.

-Perform the firmware update.

-Check the operation of the upgraded computer.

CE2.3 draw up a calendar of maintenance according to established maintenance plans graphically.

CE2.4 implement the quality plan established for the conduct of the audit of quality.

CE2.5 in a practical course:-take a picture of traffic using a traffic Analyzer.

-Analyze the catch made and determine the variations with respect to the normal operating parameters.

-Propose, if necessary, a solution, justifying the answer.

Contents 1. Life cycle of the networks - explanation of the life cycle of a network using PDIOO as a reference model.

-Description of the tasks and objectives of different phases.

-Schedule.

-Design.

-Implement.

-Operate.

-Optimize.

2. network management - explanation of the concept of administration of networks as a set of phases operate and optimize PDIOO model.

-Basic recommendations of good practices.

-Maintain a (NOC) Organization held responsible with the administration of the network.

-Monitor the network to ensure levels of service in the present and the future.

-Check, analyze, test and record changes in the network.

-Maintain and ensure the safety of the network.

-Keep a record of incidents and requests.

-Overview and understood processes.

-Configuration management...

-Management of the availability.

-Capacity management.

-Security management.

-Incident management.

-Network operations center.

-Explanation of its functions.

-Configuration management...

-Explanation of the objectives.

-Enumeration of activities.

-Identification and commercial and open source tool comparison.

-Management of the availability.

-Explanation of the objectives.

-Enumeration of activities.

-Capacity management.

-Explanation of the objectives.

-Enumeration of activities.

-Security management.

-Characterization of the information security as the guarantee of availability, integrity and confidentiality.

-Explanation of the safety management objectives.

-Reference and explanation of control objectives including 10.6 of the ISO27002 standard control.

-Enumeration of activities.

-Basic recommendations of good practices.

-NIDS (Nessus, SNORT) intrusion detection systems.

-Identification and commercial and open source tool comparison.

-Incident management.

-Explanation of the objectives.

-Enumeration of activities.

3. network management protocols - explanation of the conceptual framework.

-Bodies involved in the management.

-Used data structures.

-Communication protocols.

-Components of the infrastructure and architecture.

-Managing entity.

-Managed devices.

-Management protocols.

-Groups of standards.

OSI CMISE/CMIP.

-TCP/IP SNMP.

4. analysis of the simple network management protocol - objectives and features of SNMP.

-Description of the architecture.

-Managed devices.

-Agents.

-Management system.

-Basic commands.

-Reading.

-Writing.

-Notification.

-Operations cross.

-Base of information from Administration (MIB).

-Explanation of the concept.

-Organization hierarchical.

-Explanation of the concept of TRAP.

-Comparison of the versions.

-Exemplification of applications.

5. analysis of the specification of monitoring remote's network (RMON)-explanation of the limitations of SNMP and of the need of monitoring remote in networks.

-Characterization of RMON.

-Explanation of the benefits provided.

-Description of the client-server architecture in which it operates.

-Comparison of versions indicating the layers of the TCP/IP model in which each operates.

-Exemplification of applications.

6. network monitoring - classification and exemplification of the types of monitoring tools.

-Diagnosis.

-Active monitoring of availability: SNMP.

-Passive monitoring of availability: NetFlow and Nagios:-performance monitoring: cricket, mrtg, cacti.

-Criteria for the identification of services to be monitored.

-Criteria for planning monitoring procedures so that they have the lowest incidence in the operation of the network.

-Network management protocols.

-Illustration and comparison of tool trade and of code open.

7. analysis of the performance of networks-planning of the analysis of the performance.

-Purpose.

-Recipients of the information.

-Scope.

-Indicators and metric.

-Explanation of those concepts.

-Identification of indicators of performance of the network.

-Capacity nominal and effective of the channel.

-Use of the channel.

-End-to-end delay.

-Dispersion of delay (jitter).

-Loss of packets and errors.

-Identification of systems performance indicators.

-Availability.

-Memory utilization and CPU load.

-Use of input/output devices.

-Identification of performance indicators of services.

-Availability.

-Response time.

-Load.

-Examples of measurements.

-Analysis of trends and corrective measures.

-Development of a so-called practical where shown.

-The use of traffic and network utilization profiles to determine how it will evolve its use.

-The analysis of the results of monitoring in order to propose amendments.

8. preventive maintenance - definition and objectives of preventive maintenance.

-Management of maintenance stops.

-Periodicity.

-Analysis of the need.

-Planning and agreement of maintenance windows.

-Accomplishment reports.

-Explanation of the relationship between preventive maintenance and quality plans.

-Exemplification of peacekeeping operations indicated in the specifications of the manufacturer of various types of communications devices.

-The firmware of communications devices.

-Definition of the concept of firmware.

-Explanation of the need to update.


-Identification and description of the phases of the firmware update process.

-Basic recommendations of good practices.

-Development of practical assumptions of resolution of incidents where gets revealed.

-The application of the criteria for selection of computers that can upgrade your firmware.

-The location of the updated versions of the firmware.

-The update of the firmware.

-The verification of the correct operation of the equipment updated.

TRAINING unit 3 name: resolution of INCIDENCES in network TELEMATIC code: UF1881 duration: 50 hours referrer of competition: this training unit corresponds with the RP5 capabilities and C1 evaluation criteria: resolve incidents that occur performing the troubleshooting and effecting repairs at the appropriate time and with expected levels of quality.

CE1.1 define a sequence of operations to perform to resolve a problem CE1.2 identify the tools available in the protocol used according to its purpose (ping, traceroute, etc).

CE1.3 choose the tools specific of diagnosis depending on the operation to perform.

CE1.4 use analyzers of traffic to detect anomalies in the service of communications.

CE1.5 discover the network nodes intermediates through specific applications.

CE1.6 using the procedures established by the manufacturer to determine the cause of the malfunction of a computer.

CE1.7 discriminate faults that arise in the network infrastructure by differentiating which belong to the local area network or wide area network.

CE1.8 in a practical case of impact:.

-Interpret the technical documentation of the involved teams.

-Interpret the technical documentation of the project.

-Choose the tools of diagnosis on the basis of the problem.

-Estimate the magnitude of the problem to define the action.

Contents 1. Incident management - definition of the concept of incidence.

-Enumeration of the objectives of the management of incidents.

-Identification and description of activities.

-Identification.

-Registry.

-Classification.

-Prioritization.

-Initial diagnosis.

-Scaled.

-Research and diagnosis.

-Resolution and recovery.

-Close.

-Explanation and illustration of the process flow.

-Exemplification of indicators and metrics.

-Basic recommendations of good practices.

-Incident management systems.

-Description of the features.

-Illustration and comparison shopping tools and open source.

2 Troubleshooting - identification and analysis of the different phases of the process of resolution of incidents.

-Definition of the problem.

-Description of the problem.

-Establishment of possible causes.

-Proof of the most likely causes.

-Verification of the real cause.

-Planning of interventions.

-Verification of the repair.

-Documentation.

-Description and exemplification of the use of diagrams of cause / effect (Ishikawa) in the solution of problems.

-Description of the functionality and tools hardware diagnostic criteria.

-Digital meter.

-Wiring Tester.

-Generator and locator tones.

-Time domain reflectometer.

-Certification of wiring.

-Description of the functionality, criteria of use and exemplification of tools software of diagnosis.

-Monitor of network.

-Analyzer of protocols.

-Utilities TCP / IP: ping, traceroute, arp, netstat.

-Development of so-called practical of resolution of incidences where are put of manifest.

-The interpretation of the documentation technical of the teams involved.

-The interpretation of the documentation technical of the project.

-The choice of the tools of diagnosis depending on the problem.

-The estimate of the magnitude of the problem to define the action.

-Development of practical assumptions of resolution of incidences where a traffic capture is made using a traffic Analyzer.

-Analyze the captures made and determine them variations with respect to the parameters of operation normal.

-Propose, if is necessary, a solution justified.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance unit training 1-UF1879 70 40 unit training 2-UF1880 90 50 unit training 3-UF1881 50 20 sequence: for access to the unit formative UF2 must have is exceeded it unit formative UF1. For access to the unit training UF3 must have is exceeded the unit training UF2.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

MODULE of practices professional not labour of administration and design of networks departmental code: MP0396 duration: 80 hours capabilities and criteria of evaluation C1: collaborate in the design of networks telematic departmental, including them means of transmission and them teams of communications more adequate to the specifications received.

CE1.1 be present at the interview of takes of requirements on the client.

CE1.2 make a proposal of document of requirements.

CE1.3 make a proposal for a study of technical and economic feasibility CE1.4 make a proposal of network topology that meets the specifications on performance, cost and quality of service expected.

CE1.5 propose the most appropriate means of transmission for the design of the network according to the expected quality and cost criteria.

CE1.6 propose the location of interconnection equipment so that the established quality criteria are met.

CE1.7 collaborate on the establishment of the mode of addressing and configuration, including subnets that were necessary.

CE1.8 participate in the selection of the interconnection system with wide area according to the chosen topology network and meeting agreed criteria of cost and efficiency.

CE1.9 study the desirability of establishing lines of support.

C2: Analyze the technical documentation of the project implementation or maintenance of a departmental telematics network, identifying the information needed to participate in the planning of the processes that are required.

CE2.1 identify and describe:-the location of the voice and data communications equipment.

-The means and tools needed to implement the processes.

-Power distribution system and protection elements.

-Envelopes, boxes, cabinets and elements of the wiring.

-The systems of ventilation forced and of food special.

-The type of pipes and their distribution in plants, distribution horizontal and vertical.

-The characteristics of them wired and connection of the elements.

-The systems of identification and signage of drivers, connectors, tomas of user and equipment present in the installation.

C3: develop proposed for the planning, programming and monitoring of the implementation and/or maintenance of a network telematics departmental starting from the documentation technical of the project that sets them specifications necessary.

CE3.1 propose the phases of the process of implementation or maintenance.

CE3.2 perform a proposed of decomposition of each an of the phases in the different operations that it make up.

CE3.3 propose the equipment and facilities necessary to run the process.

CE3.4 propose the times of each operation.

CE3.5 identify and describe the critical points of the process.

CE3.6 propose the sequencing of tasks using diagrams of Gantt charts and diagrams of network.

CE3.7 propose the resources human and material appropriate.

CE3.8 make a proposal of the estimation of costs.

CE3.9 determine milestones of each an of the main phases of the work.

CE3.10 propose the load of work in them different jobs of work, balancing the loads.

CE3.11 identify, by the name or code standard, them materials, products, components, tools and equipment required to undertake them different operations that involve the implementation or maintenance of the system.

CE3.12 generate the information that set: them supplies, them media, tooling and tools and the «stocks» intermediate required.

C4: diagnose and locate faults in a network.

CE4.1 interpret the documentation technical of the project and of the teams involved.

CE4.2 identify the symptoms of the fault, characterizing it by the effects it produces.

CE4.3 propose hypothesis of the cause possible that can produce the breakdown, relating it with those symptoms (physical or logical) that presents the system.

CE4.4 propose a plan of intervention in the system to determine the cause or causes that produce the breakdown.

CE4.5 trying to locate the element (physical or logical) responsible of the breakdown and collaborate in the replacement (through the use of components similar or equivalent) or modification of the element, configuration and/or program, applying them procedures required and in a time suitable.


CE4.6 collaborate on the checks, modifications and adjustments of the parameters of the system according to the specifications of the technical documentation of the same, using the appropriate tools, enabling its implementation to point in each case.

CE4.7 develop a proposed of report memory of them activities developed and results obtained, structuring it in those paragraphs needed for a proper documentation of them same (description of the process followed, media used, measures, explanation functional and schemes).

C5: apply techniques and procedures to guarantee the quality in the process of implementation and maintenance of networks.

CE5.1 analyze the system specifications to propose the features of quality control.

CE5.2 propose the phases of control of the implementation of the system.

CE5.3 collaborate in the application of the patterns of control, proposing them procedures, devices and instruments required.

CE5.4 develop drafts of reports and proposals of chips of tomas's data that is should use.

CE5.5 write drafts of reports of non-compliance in accordance with established procedures.

C6: Assist in the configuration of network interconnection.

CE6.1 check VLAN configurations. Detect the type of grouping: by ports on one switch, ports on two switches, by grouping of MAC addresses.

CE6.2 check if defined VLANs are raised-compliant CE6.3 collaborate on the configuration of the routing table on a router.

CE6.4 check if the routing tables are correct for the required routing.

CE6.5 propose collaborating CE6.6 access control list in the DHCP configuration, if the router allows it.

C7: Develop proposals for evolution of the network according to the needs.

CE7.1 use the profiles of traffic and network utilization to determine how it will develop the use of the network.

CE7.2 analyze the results obtained by the monitoring to propose modifications.

C8: Participate in the company's work processes, following the rules and instructions set forth in the work center.

CE8.1 behave responsibly both in human relations and works to be carried out.

CE8.2 comply with the procedures and rules of the workplace.

CE8.3 undertaken with diligence the tasks according to the instructions received, trying to it adapt to the pace of work of the company.

CE8.4 integrated into the production processes of the work center.

CE8.5 use established communication channels.

CE8.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Design of departmental telematic networks.

-Draft requirements document.

-Drafting of technical and economic feasibility study.

-Design of network topology.

-Selection of the means of transmission.

-Location of interconnection equipment.

-Definition of the addressing mode.

-Selection of the interconnection with the wide area network system.

2. planning, programming and monitoring in the implementation and maintenance of departmental telematic networks.

-Elaboration of the stages of the process.

-Work breakdown structure.

-Estimate of the times of each operation.

-Identification and description of the critical points of the process.

-Sequencing of tasks using Gantt charts and network diagrams.

-Selection of appropriate materials and human resources.

-Cost estimate.

-Determination of milestones for each of the major phases.

-Allocation of the workload.

-Naming standard for materials, products, components, tools and equipment.

-Definition of procurement, media, tooling and tools and necessary «stocks».

3. measurement in the elements of departmental telematic networks.

-Selection and connection of the measuring instrument.

-Realization of measurements.

-Interpretation of the measures carried out.

-Preparation of reports of the results.

4 Diagnostics and troubleshooting in a network.

-Identification of symptoms of faults.

-Formulation of hypotheses regarding possible causes of faults in relation to the symptoms observed.

-Determination of the causes.

-Identification and replacement of elements responsible for faults.

-Adjustment of settings and/or responsible for troubleshooting programs.

-Preparation of reports of intervention.

5. quality in the process of implementation and maintenance of networks.

-Analysis of quality plans - determination of the characteristics of quality control.

-Phases of control of the implementation of the system.

-Drafting of reports of non-compliance.

6. configuration of network interconnection equipment.

-Configuration of VLANs.

-Configuration of routes and routers access control lists tables.

7. safety in the process of implementation and maintenance of networks.

-Respect of the regulations and specific regulation of safety and hygiene.

-Identification of risks in facilities and activities.

-Use of media and safety and personal protective equipment.

-Use of the means and procedures for the protection of equipment, instruments and components.

8 integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.

-Interpretation and execution with diligence the instructions received.

-Recognition of the productive process of the organization.

-Use of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. requirements of the trainers training modules required accreditation expertise required in the field of competition MF0228_3 unit: design of telematic networks ● Bachelor, engineer, architect or corresponding degree or other equivalent titles.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities 2 years MF0229_3: management of the implementation of telematic networks ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities 2 years MF0230_3: administration of telematic networks ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities V. 2 years minimum of spaces, facilities and equipment space training surface requirements m2 15 students surface m2 25 pupils classroom computer 60 75 workshop space training M1 M2 M3 classroom computer X X X space training equipment classroom workshop workshop of Informatics - audiovisual equipment - PCs in network , canon of projection and internet - slates to write with pen - flipchart - classroom Material - table and Chair for trainer - tables and chairs for students - office - network simulation Software - applications computers and network devices: switches, routers, wireless access points,... - streaming media.

-Testers, certifiers,... - mounted equipment cabinets - teams type PC with windows and linux operating systems - No network services Software must be interpreted that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex XI I. identification of the certificate of professional designation: systems computer code management: IFCT0510 professional family: information technology and communications professional Area: systems and telematics level of professional qualification: 3 professional qualification of reference: IFC152_3 management of information systems (Rd. 1087 / 2005, 16 September)


Relationship of competition units comprising professionalism certificate: UC0484_3 manage system hardware devices.

UC0485_3 install, configure and administer the software from base and of application of the system.

UC0486_3 ensure computers general competence: configure, manage, and maintain a computer system at the level of hardware and software, ensuring the availability, optimal performance, functionality and integrity of the services and resources of the system.

Professional environment: Professional: develops his professional activity in companies or entities public or proprietary of any size in the area of the Department of computer science systems.

Productive sectors: offers accommodation in all sectors of the business given its characteristic of transectorialidad that ensues from the need for the organizations treat and manage your information are in the sector that they are. It is also present in the following types of companies: companies or entities of any size using computer systems to manage and that can be framed in any productive sector.

Companies engaged in the sale of computer equipment.

Companies that provide computer technical support services.

Related jobs or occupations: 2721.1018 networks system administrator system administrator.

Responsible for data processing.

Duration of associated training: 500 hours.

Relationship of training modules and training units: MF0484_3: management hardware of a computer system (120 hours).

● UF1891: size, install, and optimize the hardware (70 hours) ● UF1892: manage the growth and environmental conditions (50 hours) MF0485_3: management software of a computer system (210 hours) ● UF1893: installation and parameterization of software (90 hours) ● UF1894: (70 hours) software maintenance ● UF1895: audits and continuity of business (50 hours) MF0486_3: (transverse) security on computers (90 hours).

MP0398: Module not working professional practices of management of information systems (80 hours) II. PROFILE professional of the certificate of professionalism unit of competition 1 name: manage the devices HARDWARE of the system.

Level: 3 code: UC0484_3 realizations professional and criteria of realization RP1: develop and maintain inventories of them components physical of the system for ensure your location and availability according to the standards of the organization.

CR1.1 hardware and the physical components of the system are identified correctly and exhaustively listed for their current availability.

CR1.2 the inventory hardware is describes in detail to inform of them features, configuration current, situation exact and State of each device according to the rules of the organization.

CR1.3 the new acquisitions, changes produced in the hardware or in its configuration is modified in the inventory to keep it updated.

CR1.4 the documentation for the installation of the hardware is details and reference in the documentation generated and is saved conveniently for its use later.

CR1.5 technical documentation is interpreted correctly both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

Rp2: Analyze and parameterize the hardware devices, monitoring and evaluating its performance to optimize the functioning of the system and propose, where appropriate, modifications or improvements to existing functional needs.

CR2.1 techniques or to use monitoring tools are selected according to the characteristics of the system to optimize its performance.

CR2.2 selected monitoring tools or techniques are used with skill preparing system for monitoring, obtaining statistics of performance, alert settings, and other elements of monitoring.

CR2.3 system performance criteria are established according to the General provisions laid down by the manufacturer, and individuals established by the Organization to obtain a proper monitoring.

CR2.4 produced the monitoring data are collected and presented in a clear and concise manner through the use of techniques of representation.

CR2.5 representation of the performance of the system generated by monitoring, analysed to locate potential loss or degradation of performance and propose necessary amendments.

CR2.6 the physical devices are parameterized to improve performance and correct operation anomalies detected in the system.

CR2.7 technical documentation is interpreted correctly both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

RP3: Deploy and optimize high-availability hardware solutions to guarantee and ensure the protection and recovery of the system in unforeseen situations according to the planned contingency plan.

CR3.1 incidences of installation and configuration of hardware are resolved by referring to technical documentation and technical assistance services.

CR3.2 verification of the installation and configuration of the physical devices and their drivers for the mass storage and backups. It is so that you can see according to standards and standards of quality and safety set by the organization.

CR3.3 the management of the repair or replacement of defective hardware components is carried out in accordance with the technical specifications of the system and follow the installation procedure in the technical documentation provided by the manufacturer and the implementation of the organization plans.

CR3.4 replaced components checks are performed to ensure proper operation according to the standards and safety standards established by the organization.

CR3.5 the integrity of the information and the continuity in the functioning of the system are guaranteed during the resolution of problems or imbalances, taking the necessary preventive security measures and activating possible alternative operating procedures.

CR3.6 the original information, and backups are restored and updated, so the system back into operation following established safety protocol.

CR3.7 storage of the copies is monitored, noting that the safety standards established by the Organization met.

CR3.8 redundant servers and other high availability systems are implemented correctly according to the manufacturer's specifications and rules of the organization.

CR3.9 technical documentation is interpreted correctly both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

RP4: Planning upgrades and system growth by proposing new configurations to take on future increases in the load of users according to the needs of exploitation or work.

CR4.1 hardware analyzes and evaluates to make reports of possible future needs, as well as the feasibility of possible improvements and updates.

CR4.2 reports of the organization about future increases in the burden of work or number of users are analyzed properly using techniques adapted to the situation.

CR4.3 the system is represented using mathematical tools and analytical modeling to analyze the new loads added.

CR4.4 the data obtained through the mathematical modeling and simulation of the system are analyzed to determine if new charges are acceptable.

CR4.5 physical devices available on the market are evaluated to propose the most suitable to the system and ensure the absorption of the workload posed.

CR4.6 the implementation of new devices is planned and run minimizing its effects on the operation of the system, optimizing the same yields and adapting the technology according to the evolution of the market.

RP5: Define the environmental and safety conditions appropriate to avoid interruptions in the provision of the system according to the manufacturer's specifications and the Organization's security plan.

CR5.1 the technical specifications of the devices and the general plan of the Organization's security are known and interpreted properly to the adequacy of the system.

CR5.2 environmental requirements and conditions of power supply to the physical devices are established and contrast with the possibilities of the installation to avoid incidents and interruptions in the service.

CR5.3 conditions of ergonomics, safety, and use of the space is set for the correct location of the equipment and physical devices.

Media production professional context


Equipment computer and peripherals. Systems operating and parameters of configuration. Software for inventory control tools. Tools software of Diagnostics. Devices physical for storage mass and copies of security (RAID, SAN and NAS). Stands for copies of security. Management tools for log (log) files. Diagnosis, safety and restoration software. Technical documentation. Backup tools. Changes, incidents and configuration management tools. Monitors performance, power systems without interruption. Analytical modeling tools. System performance analysis tools.

Products and results inventory and descriptive record of the physical devices of the system and its configuration. Computer system running with optimal performance and use of its resources. Proper connection of the system to a network within an organization. Reports of expansion and growth of the system.

Information used or generated hardware inventory. Technical specifications for the installation of devices. Technical data of the equipment. Documentation or manuals of use and operation of the system. Documentation on setting up safety regulations for the installation. Maintenance plan. Relation of incidences. Maintenance of manufacturers and supports technical assistance recommendations. Catalogues of products hardware, suppliers and prices. Legislation on data protection and intellectual property, regulatory business on confidentiality of data. Safety and hygiene standards.

Competition 2 name unit: install, configure and manage the SOFTWARE of BASE and implementation of the system.

Level: 3 code: UC0485_3 realizations professionals and criteria of performance MOP1: install and configure the server operating system to ensure the functionality of the system according to the needs of the organization.

CR1.1 the system operating of the server is installed according to the procedures and it indicated in the documentation technical.

CR1.2 verification of the components of the operating system and device drivers is made by testing start and stop, and the use of verification and diagnostic software tools, so you can check that components are recognized and enabled and do not appear conflicts pursuant to the organization.

CR1.3 the operating system parameters are configured to ensure the integrity and reliability of the system in accordance with the Organization's security plan.

CR1.4 the configuration of network parameters is set to connect the server according to the design of network system and standards and standards of safety and quality of the organization.

CR1.5 different groups and users are created to allow the use of the system according to the needs of the Organization and the system security plan.

CR1.6 the necessary updates of the operating system of the server are conducted effectively, ensuring the integrity of the system, the adequacy of these and following the rules of the Organization's security.

CR1.7 the relevant installation details, as well as the incidents during the process, are reflected in the documentation, according to the procedure established by the organization.

CR1.8 technical documentation is interpreted correctly both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

Rp2: Establish and maintain inventories of the system software to ensure your location and availability according to the rules of the organization.

CR2.1 software and their versions are listed exhaustively to maintain an inventory of applications and operating systems available in the system.

CR2.2 the current configuration of the base and application software is recorded and documented in clear and complete way to facilitate the work of recovery in case of failure.

CR2.3 installed software information is listed on each user to allow control of facilities not allowed applications.

CR2.4 the number of facilities, their location and identification are controlled by each software product to carry out an exhaustive control of licences serving the current legislation on intellectual property.

CR2.5 them privileges of access of the users of the system to resources software is recorded for the control of access, according to the plan of security of the system and the laws of data force.

CR2.6 inventory automatic applications are used to keep the information about the software of the system.

RP3: Install and configure corporate applications addressing capabilities of users according to the plan of implementation of the organization.

CR3.1 Enterprise software installation takes place effectively ensuring the integrity of the system, fulfilling the requirements established by the Organization, and following as indicated in the technical documentation.

CR3.2 verification of the operation of the software in the whole of the system is carried out according to the procedures of safety and quality set by the Organization and the manufacturer.

CR3.3 Enterprise software is configured with appropriate parameters according to the plan of system security and the needs of the organization.

CR3.4 the necessary corporate software updates are conducted effectively, ensuring the integrity of the system, the adequacy of these and following the rules of the Organization's security.

CR3.5 the relevant installation details, as well as the incidents during the process, are reflected in the documentation, according to the procedure established by the organization.

CR3.6 technical documentation is interpreted correctly both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

RP4: Develop the user support plan, coordinating the technical support and maintenance personnel to ensure the use of the functions of the computer system.

CR4.1 guidelines for the installation, configuration and maintenance of base and jobs user application software is documented thoroughly.

CR4.2 resolution of common problems related to hardware devices and network in user posts are documented thoroughly.

CR4.3 assistance to the user is planned by applying the techniques of communication, the protocols established by the Organization and following the policies of security and protection of existing data and quality of service.

CR4.4 users in the different tools and equipment to handle training is planned to be done in gradual, and assisted way ensuring their full adaptation to the environment.

CR4.5 assistance procedures are organised to ensure their maximum availability to advice and attention from the users requirement.

RP5: Configure and manage the system resources to optimize performance according to the parameters of operation of applications.

CR5.1 to use performance metrics are established to specify the attributes of performance to consider.

CR5.2 to use performance analysis techniques are established for the performance of the system parameters.

CR5.3 checking to use programs are established to obtain the performance parameters of the system.

CR5.4 models that represent the system are carried out to obtain the same performance parameters.

CR5.5 simulation systems are configured to obtain the same performance parameters.

CR5.6 the system performance parameters obtained are analyzed to locate potential conflicts and determine hardware devices that can be reconfigured, removed or added.

CR5.7 hardware components are reconfigured, removed or added according to the analysis carried out for the improvement of the performance of your applications.

RP6: Plan of security as well as the recovery from the same backup to maintain adequate levels of security on the data according to the needs of use and within the policies of the organization.

Cr6.1 the architecture of the backup system is designed taking into account the requirements of the computer system.

Cr6.2 procedures of carrying out backups and the levels of these copies are planned according to the needs of the server, the time of preparation of copies, the times of recovery, storage spaces required and the validity of the historical copies.

Cr6.3 backup verification tests are conducted and verified its functionality according to the specifications of the organization.

Cr6.4 the system of identification and storage of media planning is carried out according to the specifications of quality of the organization.

Cr6.5 the documentation of procedures for obtaining and verification of copies of backup as well as contingency plans and troubleshooting is made according to the regulations of the organization.

RP7: Audit the use of system resources to ensure optimum performance according to the parameters of the operating plan.


CR7.1 the plan of audit with the tests functional necessary and periods of realization is implements, so ensure the optimal performance of the system.

CR7.2 the checking of incidents is carried out for check, specify and minimize effects negative on the system.

CR7.3 the diagnosis and localization of unwanted runs is performed using equipment and tools, and applies corrective procedure in adequate time.

CR7.4 the audit report is made in the standardised format that allows you to collect the information required for the performance of the repository of incidents.

CR7.5 technical documentation is interpreted correctly both if it is edited in Spanish or the official languages of the autonomous communities as if it is in the foreign language most often used in the sector.

Media production computer and peripheral equipment professional context. The operating system of the server software. Enterprise application software. Updates and software patches basis and application. Device drivers. Antivirus and security tools. Monitors for performance. Tools for modelling and simulation of systems. Automatic inventory tools. Office Tools. Management and realization of backup tools.

Products and results operating system and applications configured and parameterized according to the needs. Inventory software and configuration of system applications. Backup. Documentation for installation, configuration and part of incidences of the base of the system software. Documentation for installation, configuration and part of incidences of corporate application software. Guides for installation and configuration of applications and software base for support staff. Care plan and training of users. Backup copies made, archived and documented.

Information used or generated operating system installation manuals. Manual of operation of the system operating. Manual of installation of applications. Realization of backup operation manuals. Standards of safety (plan of security) and quality of the organization. Manual of administrative tools. Online help manuals. Online technical support. Plans of operation and implementation of the organization. Legislation on data protection and business regulations, intellectual property on the confidentiality of data.

Unit of competency 3 designation: ensure information technology equipment.

Level: 3 code: UC0486_3 realizations professionals and criteria of performance MOP1: apply security policies to improve the protection of servers and computers of end user according to needs of use and safety.

CR1.1 the plan of implementation of the computer system of the organization is analyzed by checking that it incorporates the necessary information on procedures of installation and upgrade of equipment, copies of backup and intrusion detection among others, as well as references of possibilities of use of the equipment and restrictions of the same and protections against attacks by viruses and other unwanted elements.

CR1.2 the access permissions, users, the different resources of the system are determined by means of corresponding tools according to the implementation Plan and the security of the computer system.

CR1.3 the access to them servers is performs guaranteeing the confidentiality and integrity of the connection according to them standards of security of the organization.

CR1.4 user policies are analyzed by verifying that there are reflected circumstances such as uses and restrictions assigned to computers and users, allowed and restricted network services and areas of responsibilities due to the use of computers.

CR1.5 security policy is transmitted to users, ensuring your complete and correct understanding.

CR1.6 the tasks performed are suitably documented according to the procedures of the organization.

CR1.7 the information affected by data protection legislation are verifying that authorized users comply with the requirements set out by the regulations and the channels of distribution of such information are documented and authorized according to the security plan.

Rp2: Configure servers to protect them from access unwanted according to needs of use and within the policies of the organization.

CR2.1 the location of the server on the network is carried out in an area protected and isolated according to safety regulations and the plan of implementation of the organization.

CR2.2 the services offered by the server and are configured by disabling the unnecessary according to rules of safety and implementation of the organization plan.

CR2.3 access and permissions to the resources of the server by users are configured depending on the purpose of the server itself and with the rules of the Organization's security.

CR2.4 mechanisms of activity log and incidences of the system are activated and the procedures of analysis of such information are enabled.

CR2.5 Server additional modules are analyzed based on their functionality and security risks involving their use, reaching a compromise solution.

CR2.6 the authentication mechanisms are configured so that they can offer levels of security and integrity in the connection of users according to the rules of the Organization's security.

CR2.7 roles and privileges of users are defined and allocated according to the instructions listed in safety standards and the exploitation of the organization plan.

RP3: Install and configure firewall and servers to ensure security against external attacks according to needs of use and within the policies of the organization.

CR3.1 firewall topology is selected depending on the implementation.

CR3.2 the elements of firewall hardware and software are chosen taking into account economic factors and performance.

CR3.3 firewalls are installed and configured according to the level defined in the security policy.

CR3.4 determine the filtering rules and levels of logging and alarms, configured and managed according to requirements issued by the Organization's security regulations.

CR3.5 firewalls are verified with testing games and checks that they exceed the specifications of the Organization's security rules.

CR3.6 the installation and updating of firewall and acting with the same procedures are documented according to the specifications of the organization.

CR3.7 registration systems are defined and configured for the review and study of possible attacks, intrusions and vulnerabilities.

Professional media production Corporate Office applications context. Strength of password verifiers. Analyzers of ports. Analyzers of system log files. Firewall. Specific computers or general purpose. Firewall personal or server. Authentication systems: weak: user and password based and robust: based on physical devices and biometric measures. Communication with cryptographic capabilities programs. Secure remote administration tools.

Products and results implementation plans revised according to directives of the organization. Reports audit of computer systems network services. Map and corporate firewall topology design. Installation and configuration of firewall Guide. Report of activity detected on the firewall. Map and back-up system design. Planning of the preparation of backup. Report of back-up copies. Regulations for the preparation of the design of firewall. Elaboration of operation of safety in accordance with the security policy.

Information used or generated security policy of telematic infrastructures. Manual installation, reference and use of firewall. Information on local area networks and wide area and public and private communication systems. Information about equipment and communications software.

With rules, regulations and standards (ISO, EIA, RFC-IETF, ITU-T). Hardware inventory record. Record of checking the security measures applied to every computer system. Topology of computer system to protect.

III. formation of professionalism certificate training module 1 name: administration of a computer system's HARDWARE.

Code: MF0484_3 level of professional qualification: 3 associated to the competition unit: UC0484_3: manage devices of the system's hardware.

Duration: 120 hours training unit 1 name: sizing, installing and optimizing the HARDWARE code: UF1891 duration: 70 hours referrer of competition: this training unit corresponds to the RP1, RP2 and RP3 capabilities and C1 evaluation criteria: identify the components of the system's hardware distinguishing characteristics and parameters and installation procedures.

CE1.1 analyze and explain the fundamentals of the physical architecture of a computer system specifying the different parts that compose it.

CE1.2 list and define the functions that perform each of the components of a computer system hardware explaining their characteristics.


CE1.3 classified according to type each one of the components a computer system hardware according to their characteristics, utility and purpose.

CE1.4 detail the technical characteristics and procedures of installation and configuration of the components of a computer system according to given features specifications hardware.

CE1.5 distinguish and explain the types of devices physical and technical of communication possible between them different components hardware of a system computer, describing their main characteristics and typology.

CE1.6 define and classify them different types of devices peripheral attending to its purpose, describing them different technical used to perform the communication with them themselves and them technologies available in drivers of input / output.

CE1.7 identify and classify different physical devices to connect to the system through a communications network.

CE1.8 starting from a so-called practical of identification and registration of devices hardware:-classify a collection of devices hardware according to different criteria: purpose, fitness for a system and compatibility among others.

-Operate with tools of inventoried registering comprehensively the characteristics of devices hardware in study.

-Document the installation of the devices physical detailing the procedures, incidents more frequent and parameters used.

C2: Select and apply procedures and techniques of monitoring of the performance of the devices to adjust settings and ensure the absence of conflict.

CE2.1 list and define performance metrics commonly used to measure the performance of a system.

CE2.2 characterize and analyze the main procedures and monitoring techniques used to measure the performance of a system.

CE2.3 apply the techniques and tools selected for optimum performance and determine the State of the system by analyzing the results of the measurements of performance and indicating if it is saturated, balanced or underused.

CE2.4 graphically represent the performance of the system according to the data obtained from monitoring.

CE2.5 analyze obtained in monitoring alarms and describe the main configuration problems related to hardware devices known explaining the most common solutions.

CE2.6 in a series of practical cases of monitoring and adjustment of systems:-select the performance metrics to be used according to the needs of the system.

-Obtain measurements of the performance of the system using skill with the tools necessary to carry it out.

-Analyze the measurements obtained, documenting them and presenting them to facilitate decisions about the system.

-Configure the parameters of the system necessary for is meet them requirements of performance.

-Reset the system depending on alarms obtained in the measurements.

-Specify and document the limitations that exist in an attempt to improve the performance of a system.

C3: Integrate and deploy computer systems hardware devices that ensure the continuity in the provision of services and the security of the data.

CE3.1 identify different hardware solutions available to ensure the continuity of the functioning of the system, describing their main characteristics and configurations CE3.2 define different hardware solutions available to ensure the recovery of the system in unexpected situations, describing their main characteristics and settings.

CE3.3 identify policies of security and data protection and its relationship in the recovery and continuity services and computer security-compliant applications.

CE3.4 in a so-called practical, deploy and configure solutions to ensure the continuity of the functioning of the system, given a few prerequisites:-analyze the system to determine the needs and provision of uninterruptable power systems.

-Properly installed power units and voltage stabilizers respecting the technical characteristics of the devices and standards concerning safety at the workplace.

-Parameterize and monitor the installed devices, adapting them to the system to ensure total compatibility, optimal performance, control and management of the same.

-Make a plan of intervention and activation of possible alternative mechanisms - document the installation of physical devices detailing procedures, more frequent incidents and parameters used.

CE3.5 in several practical cases of deployment and configuration solutions for the recovery of the system in unexpected situations, given security requirements to comply with:-install and configure a local server backup that ensures immediate recovery from the operation in case of fall of the main server.

-Install and configure solutions for disk arrays to increase system fault tolerance.

-Install and configure a system of clusters according to their typology to increase the reliability and productivity of the system.

-Make a plan of intervention and activation of possible alternative mechanisms.

-Before a possible fault locate the responsible for the same hardware devices, and establish the necessary procedures for repair or replacement.

-Configure properly replaced devices following the steps set out in the plan of action defined.

-Installation of the physical devices document detailing procedures, more frequent incidents and parameters used.

-Exhaustively documented the steps to follow for the recovery of the system once there has been an unforeseen situation.

-Plan and conduct tests to verify the adequacy of the implemented solutions, making improvements and adjustments to achieve optimum performance.

Contents 1. Classify and inventory hardware - identify and classify hardware:-know the different types of hardware according to purpose.

-To know the architecture of PCs and servers.

-Differentiate components identifying their functions.

-Classify components according to purpose, utility, and features.

-Install and replace computer components in a system, according to the manufacturer's documentation and the rules of the organization.

-Establish connectivity hardware:-differentiate the different communication buses in a computer system.

-Distinguish the different types of connectivity with peripherals.

-Identify the different types of connectivity and technologies of connectivity between them elements hardware that make up the architecture of a platform for the provision of a service.

-To establish connectivity between PCs or servers.

-Connect the servers with external storage equipment.

-Design connection with backup equipment.

-Connect to Internet.

-Choose and install the driver for input/output best suited according to the purpose to be achieved.

-Document and make an inventory of the hardware:-list the teams detailing components, status, and location.

-Document settings and configurations.

-Document connectivity.

-Labeled hardware.

-Keep the inventory:-upgrade to the high, low, and modifications.

-Audit the inventory.

2 monitor the performance - designed monitoring:-distinguish the different types of monitoring according to their purpose. Design external monitoring to ensure the availability of the system and designing the monitoring system capacity management.

-Select techniques or tools depending on the hardware.

-Define parameters to be monitored. Know the common parameters to be monitored.

-Monitor CPU, RAM, and the system's disks.

-Monitor the connectivity.

-Monitor services.

-Select the items to be monitored and the threshold of notice according to the procedures defined by the organization.

-Set the alerts: set up alerts to the unavailability of service and set up alerts to ensure the proper management of capacity according to the procedures defined in the organization.

-Monitor the system:-obtain performance statistics.

-Correctly interpret the graphical usage reports.

-Diagnose the State of the system:-analyze the performance: comparing the values obtained with the historic use of the system and locate bottlenecks in the system.

-Propose improvements.

-Assess the feasibility of substitution or extension of the hardware elements that cause bottlenecks, by others superior performance which fulfil the same function.

-Evaluate design alternatives to the architecture that adapt better to the needs of the system's performance.

-Optimize the performance parameters to implement better performance:-check the configuration of the BIOS of the system.

-Review the documentation from the manufacturer in search of new firmware versions which obtain better performance.

3. Design and implement fault-tolerant architectures


-Install the system hardware elements according to the manufacturer's specifications and the rules of the organization.

-Verify the correct operation of the system after its installation.

-Designing points of system fault tolerance:-define and implement electrical fault tolerance.

-Define and implement disk, and connectivity for fault tolerance.

-To know procedures backup and failover in the enterprise-defined:-outsource and safeguard copies according to the procedures in force in the organization.

-Facilitate backup technicians brackets containing the copies needed for the restoration of service.

-Install and configure the hardware architecture needed for the installation of the backup system.

-Learn about architectures that allow greater fault tolerance:-know the concept of cluster systems.

-Design and implement the necessary hardware architecture for the installation of a cluster. Implement the necessary hardware architecture for the installation of a database cluster.

-To know the concept of balanced by network systems.

4. diagnose and resolve faults - consult the manufacturer's documentation and internal documents of the Organization, as well as the technical assistance service of the manufacturer, or third parties with which the Organization has maintenance contract, seeking the origin and resolution of incidents.

-Use the diagnostic tools and documentation provided by the manufacturer.

-Planning and executing the service according to the manufacturer's documentation and internal procedures.

-Plan and run it repair guaranteeing the integrity of the information, and minimizing the impact on the availability of service:-put underway them mechanisms defined in it Organization for keep the service while is comes the replacement or repair.

-Replace or repair the component defective according to the specifications of the manufacturer.

-Verify the correct functioning of the system after the replacement of faulty components.

-Restore the normal operation of the service.

-Know and interpret adequately the plans of recovery of service existing in the company.

TRAINING unit 2 name: manage the growth and the conditions environmental code: UF1892 duration: 50 hours referrer of competition: this training unit corresponds with the RP4 and the RP5.

Capabilities and C1 evaluation criteria: analyzing and evaluating the devices available in the market to offer hardware implementations that improve the performance and capabilities of the computer system.

CE1.1 identify, assess and classify the hardware devices on the market, according to evolution and typology, using commercial catalogues, technical documentation, journals or any other method or support.

CE1.2 identify the parts of a computer system, typically that can cause bottlenecks and degradation of productivity.

CE1.3 explain the trends of technological evolution in the common physical devices of a computer system in order to propose improvements in the same.

CE1.4 in a practical course of growth in a properly characterized system planning, given estimates of possible increases in the burden of work of users:-analyze workloads expected and future, characterizing them properly.

-Deploy new workloads, integrating them into the system to observe possible effects on the performance of the same.

-Analyze the performance parameters obtained after submitting the system to new workloads.

-Plan and execute the implementation of new hardware devices needed to support new workloads and minimizing their effects on the system.

-Thoroughly document the results of the evaluation of the system under new burdens and propose, in a reasoned way, changes to the current configuration or new hardware implementations.

C2: Apply security and environmental conditioning procedures to ensure the integrity of the system and appropriate environment according to specifications and system requirements to install.

CE2.1 list and describe the major environmental factors and environment to take into account in the proper installation of computer equipment, to establish the precautions which may avoid or reduce its effect.

CE2.2 list and describe the major environmental and environment factors that can degrade the performance of a communications network, to establish the precautions that may prevent or lessen its effect.

CE2.3 interpret the technical specifications of the devices and the security plan to suit your installation and physical location getting optimum performance from them.

CE2.4 evaluate the installation of the mains make sure that its capacity and available equipment are suitable for all hardware devices and the operation of these is optimal.

CE2.5 in a practical course of computer equipment installation:-locate computers by respecting the environmental conditions of temperature and humidity recommended by the manufacturer.

-Locate computers respecting occupational safety and ergonomic conditions recommended.

-Check that the installation of the computer environment is free of smoke, dust, or any other environmental disturbance.

-Documenting the characteristics of location of computer equipment, detailing procedures, more frequent incidents and parameters used.

CE2.6 in a practical course of computer system security check:-ensure the handling of equipment by users so that the initial conditions of temperature and humidity don't vary from.

-Ensure the handling of equipment by users checking that he is respected with regard to safety regulations.

-Check the completion of backups, ensuring the adequacy of the frequency, support, and safeguarded information.

-Document the security incidents were found for its subsequent correction.

-Interpret the system security plan, extracting the safety procedures to be applied.

Contents 1. Managing growth - plan the extensions. Sizing up the future growth:-extrapolated from measurements of the platform in production.

-Simulated with mathematical models provided for new burdens.

-To assess whether planned new burdens are acceptable in the current platform.

-Analyze the market in search of them solutions hardware that offers:-know the catalogue of products of them major manufacturers.

-Select the product more suitable.

-Identify correctly those different types of hardware.

-Know the guidelines of prices.

-Reason the proposed balancing the component technical and the economic.

-Locate to the prescribers of market:-use the reports comparative as support to the choice of hardware.

-Use them reports of trends such as support to the choice of hardware.

-Run the extensions ensuring the greater availability of the service.

2. establish them conditions environmental appropriate-know them factors environmental that can affect to the operation of the installation:-identify the factors that affect to them equipment computer.

-Identify the factors that affect communications.

-Properly interpret the environmental needs of the hardware.

-Identify critical environmental parameters for the proper functioning of the hardware: establish measurements of temperature, humidity, and pressure, and to establish measurements of noise, vibrations and electromagnetic fields.

-Check the hardware manufacturers specifications.

-Establish ranges of use of the parameters for the equipment.

-Check the quality of the supply industrial:-check the installation electrical: check that the capacity of the installation electric comply with them values expected of consumption and check connection of the equipment to circuits filtered by SAIs.

-Check the installation of refrigeration: review them specifications of the conditioning of cold and check that complies with the requirements of cooling expected based on them specifications technical of the equipment hardware.

-Design the location of the equipment in the room:-design of the distribution.

-Choose the location of the different equipment hardware.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - 70 35 training unit 2 UF1891 - 50 25 sequence UF1892: to access the training unit 2 must have been overcome the training unit 1 criteria for access for students will be those laid down in article 4 of the Royal Decree that regulates the professionalism of the professional family certificate that accompanies This annex.

TRAINING MODULE 2


Name: Management SOFTWARE of a computer system.

Code: MF0485_3 level of professional qualification: 3 associated to the competition unit: UC0485_3: install, configure, and manage the base and system application software.

Duration: 210 hours training unit 1 name: installation and parameterization of SOFTWARE code: UF1893 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and the RP3.

Capabilities and C1 evaluation criteria: specify and implement procedures of installation and configuration of the software base and application according to the needs of operation of the computer system.

CE1.1 explain the suitability of different types of operating systems for different types of systems and purposes.

CE1.2 identify and describe different phases to follow in the installation of software on a computer system.

CE1.3 identify and explain the main parameters of configuration of the system operating for the management of devices, management of memory, management of processes and management of systems of files.

CE1.4 recognize and describe the main parameters of configuration of application software for the correct use of the resources of the system.

CE1.5 automate and schedule tasks in the system through the development of scripts.

CE1.6 in several practical cases of installation and configuration of an operating system in a computer system:-install the OS software extensively documenting the process, incidents that occurred and the parameters used.

-Properly configure the operating system parameters relating to memory system, indicating the Organization to continue and the use of advanced management techniques.

-Properly configure the parameters of the operating system relating to the execution of tasks: planning of work, timing and resource allocation mechanisms.

-Parameterize properly system input / output checking the optimum operation of peripheral devices.

-Organize file systems creating the structures necessary for the proper functioning of the system.

-Set up the parameters of the operating system in such a way that the specifications of the system security plan are met.

-Check the functioning of the operating system and devices involved in the system, making configuration of their drivers and the absence of conflict using the diagnostic that necessary software.

-Establish and configure the network parameters for the operating system to ensure and guarantee the data integrity and reliability of the system to follow the plan of safety and quality of the organization.

-Enable the Organization and configuration of users according to the needs and the Organization's security plan.

-Upgrade the server's operating system ensuring the integrity of the data system, and according to the Organization's security plan.

-Document the configuration of the system operating detailing the parameters used.

-Interpret properly the plan of safety of the Organization to implement the measures specified in the same according to normative of security computer.

CE1.7 in several practical cases of installation and configuration of application software in a computer system:-install the application software extensively documenting the process, incidents that occurred and the parameters used.

-Configure the parameters of the software of application referred to the use of resources of the system so is minimize the impact on the performance of the same.

-Configure the parameters of the software of application so is meets the specifications of the plan of security of the system.

-Verify the operation of the software of application and devices that make up the system, ensuring the configuration of their drivers and the absence of conflicts using the software of diagnosis that is necessary.

-Upgrade the application software ensuring the integrity of the system, data and according to the Organization's security plan.

-Document the configuration of application software, detailing the parameters used.

-To implement the measures specified in it in accordance with rules of computer security, properly interpret the Organization's security plan.

C2: Identify system software components distinguishing characteristics and detailing parameters.

CE2.1 analyze and list the different types of operating systems by specifying its most important features.

CE2.2 classify and describe the different types of applications and components software explaining its main features, functions and purpose.

CE2.3 identify the functions that performs an operating system installed on a computer system.

CE2.4 explain the requirements legal relating to property intellectual to have in features in the installation of software in the system.

CE2.5 from a practical course of identification and registration of software of a computer system:-classify a collection of installed software according to different criteria: purpose, suitability for a system and compatibility among others.

-Operate with tools of inventoried comprehensively recording characteristics of the installed software.

-Check the number and location of installed licenses of applications protected by laws of intellectual property for its correct performance.

-Check installed applications to verify the non-existence of illegal software.

-Register and control access privileges to the applications of the users according to the security plan and applicable data protection laws.

-Installing the software document detailing procedures, more frequent incidents and parameters used.

Contents 1. Software - Know and understand what is, and what it is.

-Distinguish software, firmware, and hardware.

-Identify the different types of software.

2. operating systems - understand the definition and utility of the operating systems:-list the functions of an operating system.

-To know the historical evolution of operating systems.

-Distinguish the different components of an operating system.

-Understand the management of processes.

-Distinguish the different types of file systems.

-Know the input/output systems.

-To know the use of drivers for hardware management.

-Distinguish the usual configure parameters and their typical values.

-To know the usual services and its purpose.

-Learn about utility users and user groups, as well as those of common use.

-Identify the different types of operating systems, describing its functions and structure.

-Classify operating systems:-classify operating systems according to purpose.

-Classify operating according to its degree of implementation systems.

-Operating systems single-user and multi-user.

-Operating systems monotasking and multi-tasking.

-Distributed operating systems.

-Real-time operating systems.

-To know the policies defined in the Organization's application in the installation of the operating system.

-Install and parameterize the operating systems:-carry out the preparations prior to the installation.

-Collect the necessary drivers.

-Define the type of file system to use, selecting between alternatives, based on the needs of the intended use.

-Define the values of the common parameters to configure.

-Install the operating system, configuring the hardware with the correct drivers, that guarantee the correct operation of the system:-manually install the operating system.

-Unattended install of the operating system.

-Automatically install the operating system.

-Clone servers.

-Set up the network.

-Check the correct installation of the operating system by starting and stopping, testing, and diagnostic tools.

-Upgrade the operating system.

-Understand and properly use the management operating system, commonly used tools:-know and use the tools of management groups and users.

-Understand and correctly use the permissions of the file system management tools.

-Understand and use correctly the settings and network diagnostic tools.

-Understand and correctly use the tools of management services.

-Understand and use correctly the systems monitoring tools provided by the system manufacturer.

-Secure the system according to the defined rules:-Configure the initial settings for users and groups.

-Configure the permissions on the file system.

-Configure the permissions on the registry.

-Set the permissions on the network configuration.

-Review and uninstall or disable unnecessary services.

-Documenting installation:-record the process and record incidents, as well as measures taken for their resolution.

-Detailing the values of the parameters set.

3. application software - distinguish between the different types of application to use software:


-Learn about various commonly used office packages.

-Distinguish the different functions that are capable of providing collaborative tools.

-To know the need for service that covers the ERP software.

-Know the need of service covering the CRM software.

-To know the policies defined in the Organization, of the choice and installation of application software implementation:-check the authorization of the installation.

-Use the list of allowed applications.

-Register the installation made.

-Installing the application software, according to the manufacturer's recommendations, and the Organization's security standards:-check the software requirements prior to installation.

-Follow the installation instructions given by the manufacturer.

-Update the software of application.

-Check the correct functioning of the application software.

-Deploy massive and unattended application software.

4 automations - knowing different programming languages in common use for automation of tasks:-distinguish the native environment of each programming language.

-Use an editor suitable for the development of the code.

-Develop small scripts for performing maintenance tasks:-know the different programming languages of most commonly used can be used on each operating system.

-To know the commands and structures of the scripting languages.

-Use scripting languages reference documentation, properly to facilitate correct writing the code.

-Programming scripts for performing maintenance tasks.

-Select the most suitable programming language depending on the task to be automated and requirements of the operating system on which to run.

-Configure the automatic execution of the task in the operating system:-establish the timetable and frequency most appropriate.

-Configure execution on the system by checking its proper implementation, and results.

-Use automation tools.

5. inventory of sw-identify the reasons of the need of inventory.

-Select properly the parameters to make an inventory in a system.

-Manage licenses:-make an inventory of the purchased licenses.

-Make an inventory of the licenses installed.

-Make a plan of purchase of licenses based on the growth estimated and the models of licensing of the software used.

-Manage tools of inventory:-use properly tools of inventory to remove reports of licenses in use, and of licenses purchased.

-Keep up to date inventory.

-Use inventory automatic tools.

-Make an inventory of the base configuration and application.

-Update the list of applications allowed per user.

TRAINING unit 2 name: SOFTWARE maintenance code: UF1894 duration: 70 hours referrer of competition: this training unit corresponds to the RP2, RP4 and the RP5.

Capabilities and C1 evaluation criteria: plan support users ensuring maximum availability and the documentation of the corresponding tasks.

CE1.1 define the objectives of a plan of technical assistance and support to users.

CE1.2 explain the advantages and features main of them technical of assistance remote to them users through the services and tools available in the system.

CE1.3 list and describe the most common problems relating to the implementation of software in user posts.

CE1.4 list and describe the most common problems relating to hardware devices and network in user posts.

CE1.5 establish procedures of installation, configuration, and maintenance of software base and application in user posts.

CE1.6 in several practical cases of planning of support to users in a properly characterized system:-fix procedures for assistance based on the systematic entry of any problems identified to support staff.

-Thoroughly document the most common problems related to system software resources.

-Thoroughly document the most common problems related to system hardware resources.

-Plan your training for the adaptation of the personnel to work tools.

-Set up and operate properly with remote user assistance tools.

C2: Scan the system using simulation and modeling techniques to optimize performance.

CE2.1 define the concept of simulation, explaining the advantages of using this technique as well as its potential applications in different fields.

CE2.2 explain the need for representation of systems through models for further study.

CE2.3 identify and properly characterize the steps to be followed to perform the simulation of a system.

CE2.4 in a practical case of a properly characterized computer system simulation:-formulate goals to achieve through the simulation of the system.

-Analyze the characteristics of the system and build a model of the same using modeling tools available.

-Build a model of simulation according to the defined objectives and the obtained model, using simulation tools available.

-Run the simulation model extensively documenting the data obtained.

-Analyze the results of the simulation extracting points of malfunction or system problem.

-Adjust the system settings to solve the detected problems and optimize performance.

-Document the simulation processes detailing the objectives, models and results.

Contents 1. Maintenance plans - learn about the usefulness and functions of maintenance plans:-keep updated software.

-Manage the anti-virus.

-Train users in the maintenance work to be carried out.

-Optimize the file system.

-Design, develop and document the maintenance plan:-designing proactive maintenance.

-Document the reactive maintenance.

-Manage the frequent problems:-Locate and document the common problems.

-Resolve cases of frequent problems.

-Provide media users to solve by their own means the frequent problems.

-Tackle the cause root of the common problems.

-Use the knowledge acquired through experience:-consult the databases of knowledge in accordance with the rules laid down in the organization.

-Update the database of knowledge with new information derived from the activities of maintenance.

-Attend the user:-register users applications, establishing a correct prioritisation in its resolution.

-Inform the user of the status of your application and the estimated time of resolution of the same resolution.

-Educate the user procedures and channels appropriate to the service application and notification of incident, as well as possible solutions to apply before the emergence of common problems.

-Upgrade the system, keeping it up-to-date versions appropriate capabilities required by the needs and requirements of the system:-upgrade your operating system.

-Update applications.

-Patching the operating system.

-Patch applications.

2. optimizing the use of resources - check the adequacy of the performance of the system to the needs of the Organization:-select the parameters to be measured to verify the performance of the system.

-To establish the monitoring necessary to measure the performance of the system.

-Graphically represent the performance of the system, interpreting it, and establishing the adequacy or not to the needs of the organization.

-Propose necessary upgrades to increase performance.

-Use of modelling tools to predict the performance of the system on the basis of forecasts of system load increase.

-Perform load testing to verify the scalability of the system and its relevance to the present and future needs of the Organization:-Select tools appropriate for the testing of load according to the services provided.

-Design and implement the plan of load tests.

-Perform load tests without causing problems of service availability in the system in production.

-Represent and interpret the results of load tests.

TRAINING unit 3 name: audits and continuity of business code: UF1895 duration: 50 hours referrer of competition: this training unit corresponds to the RP6 and the RP7.

Capabilities and C1 evaluation criteria: analyze and define policies of copies of backup and recovery of data based on the specifications of safety.

CE1.1 classify the different types of backup systems of support, based on the support used in topology or architecture and systems supported (file, partition disk and database among others).

CE1.2 describe the levels of backups by explaining the differences between them.

CE1.3 associated with the backup policy involved systems, justifying decisions and meeting current regulations on the protection of personal data.


CE1.4 from a so-called practical that a scenario of storage systems is given in the exploitation of an organization plan:-estimate the volume of information to be copied per unit of time.

-Identify areas of storage media used for backups.

-Plan the authorized access to the supports.

-Keep track of information concerning the content, versions and location of data files.

-Organize the inventory of storage media and stored files.

-Verify that backups are receiving the same level of safety as the original files.

C2: Implement audit procedures using appropriate tools and techniques to ensure the parameters of functioning of the computer system.

CE2.1 list and explain the objectives to comply with the enabling of audits of the system.

CE2.2 classify according to priority, the events of the system and of the applications susceptible of be audited for the maintenance of the optimal operation of the system.

CE2.3 determine, for each event detected, the need to carry out corrective actions, establishing them if so.

CE2.4 in a so-called practical of application of procedures of audit in a system properly characterized:-establish them political of audit of form appropriate for not overloading the operation of the system and affect to your performance.

-Select a list of events to audit that provide information useful: home and detection of services, access to resources, connection and disconnection of users, events from applications and events of the system.

-Fix the actions corrective necessary associated to the events detected.

-Implement and integrate the tools available to the system according to the established audit plan.

-Set alarms to highlight the priority or critical event detection.

-Operate with the tools available for planning, definition and implementation of audits.

-Analyze audit logs by extracting information about the operation and status of the system for the preparation of the audit report.

-Interpreting technical documentation of the system and auditing tools.

Contents 1. Backups - categorized the data according to your copy needs.

-Differentiate between the various types of backups, distinguishing the differences between full, incremental, and differential, as well as the advantages and disadvantages of each of them, and the most common combinations of them.

-Properly establish retention periods consistent with the safety standards of the company, depending on the type of data needs, and with the legislation in force.

-Sizing backups:-set the size of full copy in accordance with the data to be copied and the occupation estimated to be copy device.

-Set the size of the copies depending on the time, according the political of copies to use.

-Establish the policy of copies of the Organization:-define the backup plan indicating each type of backup to perform, the hour of programming, the backup window, the retention period.

-Review the adequacy of the policy of copies to the rules of the Organization, as well as the regulations in force.

-Propose devices copy and supports most appropriate based on the needs of the Organization:-Learn about the different possible alternatives for the backup devices.

-Reason the best adaptation of each alternative to the needs of the organization.

-Perform backups according to procedures and existing policies in the Organization:-implement and configure backups.

-Schedule and run backups.

-Verify the backups through restorations, documenting restoration times and the result obtained.

-Manage the lifecycle of brackets:-safeguard copy stands, keeping them in optimal conditions for its conservation.

-Outsource copies.

-Destroy brackets after their life cycle in a manner consistent with the company's security standards, ensuring the impossibility of extracting information from them.

-Documentation of recovery plans:-design the steps to follow to complete restoration of a system in production.

-Document restorations to make to restoring a system in production, after one major problem.

2. current legislation - know the laws related to the processing of data:-legislation on protection of personal data.

-Legislation in the field of electronic commerce.

-Legislation on protection of intellectual property.

-List the main points to consider.

3. alternatives to copies - distinguish between safeguarding data and service availability.

-List the alternatives to ensure the availability of the service:-design alternatives in cluster.

-Design alternatives based on external storage.

-Design alternatives based on copies of images.

-Indicating advantages and disadvantages of the alternatives to ensure the availability of the service on the backing.

4. audit plans - describe the objectives of the audit plans: - differentiate between audits by its type and application (performance, safety, continuous improvement, optimisation of use) - describe the profile of the auditor.

-Audit system:-design the audit plan.

-Use audit tools.

-Document the outcome of the audit.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance unit training 1-UF1893 90 45 unit training 2-UF1894 70 35 unit training 3-UF1895 50 30 sequence: for access to them units training 2 and 3 should have is exceeded the unit training 1.

Training units 2 and 3 can be programmed independently.



Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 3 denomination: safety in teams computer code: MF0486_3 level of professional qualification: 3 associated to the competition unit: UC0486_3: make computers duration: 90 hours capabilities and C1 evaluation criteria: analyze the implementation of the organization plans to identify the involved elements of the system and the levels of security to implement.

CE1.1 identify the structure of a plan of implementation, explaining them content that are contained in each section.

CE1.2 distinguish those systems that can appear in the plan of implementation, describing the features of security that implement.

CE1.3 describe them levels of security that contained in the plan of implementation, associating them to the permissions of access for its implementation.

CE1.4 in a so-called practical in which is calls analyze the plan of implementation and their impact in the system:-determine the systems involved in the plan of implementation.

-Analyse the requirements of security of each system.

-Describe the measures of security to apply to each system.

-Complete the forms for the Declaration of personal data files.

C2: Analyze and implement the mechanisms of access physical and logical servers according to safety.

CE2.1 describe the characteristics of the mechanisms of physical access control, explaining its main functions.

CE2.2 expose the mechanisms of tracing, associating them with the server's operating system.

CE2.3 identify logical access control mechanisms, explaining its main features (password, filtering of IP ports among others).

CE2.4 in a practical course of implementation of a server according to given specifications:-determine the physical location of the server to ensure its functionality.

-Describe and justify the physical security measures to be implemented to ensure the integrity of the system.

-Identify the modules or additional applications to implement the level of security required by the server.

-Determine the threats to which the server, evaluating the risk posed, given the context of the server is exposed.

-Determine the permissions assigned to users and groups of users for the use of the system.

C3: Assess the role and need for each service running on the server of security specifications.

CE3.1 identify the usual services in the computer system of an organization, describing its mission within the IT infrastructure and communications.

CE3.2 identify and describe the services necessary for the operation of a server, depending on your mission within the computer system of the organization.


CE3.3 describe the threats of execution services, by applying more restrictive permissions, which guarantee its execution and minimize the risk.

CE3.4 in a practical course of implementation of a server with a set of services running with matches to a given operating plan:-indicate the relationships between that server and the rest of the computer system of the organization.

-Extract of the implementation plan security requirements to the server.

-Determine the minimum services required for the functioning of the system.

C4: Install, configure, and manage a firewall of the server with the required characteristics according to safety.

CE4.1 classify types of firewall, network and local, hardware and software, packages and application, describing their characteristics and main features.

CE4.2 describe a server firewall filtering rules, explaining the main parameters.

CE4.3 explain the traces of a firewall server format, reflecting the relevant safety information.

CE4.4 from a practical case of a firewall server installation in a local and remote access scenario:-determine the requirements of the server.

-Establish the relations of the server with the rest of equipment of the system computer.

-To elaborate the list of access rules to implement on the server.

-Compose a deployed firewall test plan.

-Execute test plan, drafting corrections to correct the identified deficiencies.

Contents 1. General criteria commonly accepted security of computer - security model oriented to the management of the risk associated with the use of information systems - relationship of threats frequently asked, the risks involved and the most common safeguards - safeguards and common security technologies - the management of information security as a complement to safeguards and measures technology 2. Business impact analysis - identification of business processes supported by information systems.

-Assessment of the requirements of confidentiality, integrity and availability of business processes - determination of information systems that support business processes and requirements of Security 3. Risk management - application of risk management and exposure of the alternative process FAQ's-methodologies commonly accepted identification and analysis of risks - application of safeguards and controls to obtain a reduction of risk 4. Plan of implementation of security - determination of the level of existing security systems against the necessary on the basis of the requirements of security of business processes - selection of safeguards to meet the requirements of security of information systems.

-Guide for the elaboration of the plan of implementation of the safeguards selected 5. Protection of personal data - general principles of protection of personal data - offences and penalties referred to in the legislation on protection of personal data - identification and registration of files with personal data used by the organization.

-Preparation of the document of security required by the legislation on protection of personal data 6. Physical and industrial security systems. Security logical of systems-determination of them perimeters of security physical-systems of control of access physical more frequent to them facilities of the Organization and to them areas in which are located them systems computer-criteria of security for the location physical of them systems computer-exhibition of elements more frequent to ensure the quality and continuity of the supply electric to them systems computer-requirements of air conditioning and protection against fire applicable to them systems computer-elaboration of the normative of security physical and industrial for the organization.

-Most frequently used file systems - establishment of the access control of computer systems to the network of the organization.

-Configuration of political and directives of the directory of users-establishment of them lists of control of access (ACLs) to files-management of high, low and modifications of users and them privileges that have assigned-requirements of safety related with the control of access of them users to the system operating-systems of authentication of users weak, strong and biometric-relationship of them records of audit of the system operating necessary for monitor and supervise the control of access-elaboration of the normative of control of access to the systems computer 7. Identification of services-identification of those protocols, services and ports used by the systems of information.

-Use of ports and open services analysis tools to determine those that are not necessary - use of communications traffic analysis tools to determine the actual use that make the information, protocols, services and ports 8 systems. Strengthening of systems - modification of users and passwords by default of different information systems.

-The policy configuration management passwords and privileges in the user directory - removal and closure of the tools, utilities, services and expendable ports - configuration of information systems use secure protocols wherever possible - update security patches of computer systems - the protection of information against malicious code systems - secure communications management , shared folders, printers and other shared resources from the system - monitoring safety and the proper use of information systems.

9 implementation and configuration of firewall - relationship of the different types of firewalls by location and functionality - safety criteria for the segregation of networks on the firewall using demilitarized zones / DMZ - use of virtual private networks / VPN to establish secure channels of communication - definition of rules of court on the firewall - relationship of the audit records for the firewall to monitor and supervise their proper functioning and security events - establishment of the monitoring and testing of the Firewall guidelines methodological training distance: training module number of total hours of module No. peak hours subject to distance learning training module - MF0486_3 90 40 criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

PROFESSIONAL practices module code computer systems management: MP0398 duration: 80 hours capacity and criteria of evaluation C1: identify system hardware components distinguishing characteristics and parameters and installation procedures.

CE1.1 detail them features techniques and procedures of installation and configuration of the components hardware of a system computer according to specifications of features given.

CE1.2 define and classify the different types of peripheral devices according to their purpose, describing the various techniques used to realize communication with them and the technologies available in input/output drivers.

CE1.3 identify and classify different physical devices to connect to the system through a communications network.

C2: Apply security and environmental conditioning procedures to ensure the integrity of the system and appropriate environment according to specifications and system requirements to install.

CE2.1 interpret the technical specifications of the devices and the security plan to suit your installation and physical location getting optimum performance from them.

CE2.2 evaluate the installation of the mains make sure that its capacity and available equipment are suitable for all hardware devices and the operation of these is optimal.

C3: Planning support users ensuring maximum availability and the documentation of the corresponding tasks.

CE3.1 define the objectives of a plan of technical assistance and support to users.

CE3.2 list and describe the most common problems relating to the implementation of software in user posts.

CE3.3 list and describe the most common problems relating to hardware devices and network in user posts.

CE3.4 establish procedures of installation, configuration, and maintenance of software base and application in user posts.


C4: analyze and define the political of realization of copies of support and of recovery of data depending on the specifications of security.

CE4.1 classify them different types of systems of copies of backup, based is in the support employee, in the topology or architecture and systems supported (file, partition of disk and database among others).

CE4.2 describe the levels of backups by explaining the differences between them.

CE4.3 associated with the backup policy involved systems, justifying decisions and meeting current regulations on the protection of personal data.

C5: Participate in the company's work processes, following the rules and instructions set forth in the work center.

CE5.1 behave responsibly both in human relations and works to be carried out.

CE5.2 comply with the procedures and rules of the workplace.

CE5.3 undertake with diligence the tasks according to the instructions received, trying to of that is adapted to the rhythm of work of the company.

CE5.4 integrated into the production processes of the work center.

CE5.5 use those channels of communication established.

CE5.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Put into production of new systems - review of the documentation of installation systems and suggest possible improvements on it.

-Installation of servers in accordance with the rules of the organization.

-Application servers software installation.

-Uninstall unused services.

-Establishing the Security server on servers installed.

-Design and configure the monitoring of systems installed.

-Configuration of the audit of the system according to the rules of the organization.

-Inventory of the new systems put in production.

-Configuration of backups of installed systems.

2 monitoring and performance of systems - review of the documentation of monitoring performance and ability in production systems.

-Review of the documentation of monitoring consumption electrical and environmental systems in production.

-Review of the documentation of audit systems in production.

-Behavior of the systems in production based on the expected future workloads.

3 attend users - corporate user support documentation review.

-Attention to corporate users.

-Improvements to procedures and documentation of care to users.

4 backup and restoration of service - review of the copies of the Organization's security documentation.

-Recovery procedures on testing equipment production servers, and document the results, proposing improvements on such procedures and/or policies of copies.

5 integration and communication in the workplace - responsible behaviour in the workplace.

-Respect the procedures and rules of the workplace.

-Interpretation and execution with diligence the instructions received.

-Recognition of the productive process of the organization.

-Use of the channels of communication established in the Centre's work.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

IV. requirements of them trainers modules training accreditation required experience professional required in the scope of the unit of competition MF0484_3: Administration hardware of a system computer ● Bachelor, engineer, architect or the title of grade corresponding u others titles equivalent.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





2 years MF0485_3: management software of a system computer ● Bachelor, engineer, architect or the title of grade corresponding u others titles equivalent.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





2 years MF0486_3: security in computing equipment ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities.





2 years V. spaces, facilities and equipment space training surface minimum requirements m2 15 students surface m2 45 60 computer technical classroom management classroom 25 pupils 45 60 M1 M2 M3 X X X classroom management classroom training area information technology X X X space training equipment classroom management - audiovisual equipment - PCs installed on network, canon imaging and internet - specific specialty - 2 slates to write with pen Software

-Flipchart - Material - table and Chair for trainer - classroom tables and chairs for students computer technical classroom - Racks - cold air-conditioning - SAIs - servers installed in network - external storage equipment - backup - Backup Software - devices - connection with the classroom management network - monitoring Software connection to Internet not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Annex XII I. identification of the certificate of professional designation: programming in systems of customer relationship management and enterprise resource planning and management.

Code: IFCT0610 professional family: information technology and communications professional Area: systems and telematics level of professional qualification: 3 professional qualification of reference: IFC363_3 administration and programming systems for customer relationship management and enterprise resource planning. (RD 1701 / 2007, of December 14)

Relationship of competition units comprising professionalism certificate: UC1213_3: install and configure systems for customer relationship management and enterprise resource planning.

UC1214_3: manage systems of planning of resources business and of management of relationships with customers.

UC1215_3: Perform and maintain software components in a system of customer relationship management and enterprise resource planning.

General competence: perform installation, configuration, and administration processes in systems of customer relationship management and enterprise resource planning (ERP-CRM systems: Enterprise Resource Planning - Customer Relationship Management), making the necessary adjustments through the programming of software components, following design specifications, to support the rules of business of the Organization, and ensuring its operation within the organizational parameters of the company.

Professional environment: Professional: develops his professional activity in the area of systems and development software companies or public or private entities, both on their own, as self-employed, of any size, with planning systems of enterprise resources and management of relationships with customers (ERPCRM systems).

Productive sectors: is located mostly in the service sector, and mainly in the following types of companies: companies which used integrated systems of enterprise resource and planning management of relationships with clients to manage, or which provide these consulting services, and that can be framed in any productive sector.

Related jobs or occupations: systems administrator of customer relationship management and enterprise resource planning.


Developer of software components in systems of customer relationship management and enterprise resource planning.

Duration of the training partner: 680 hours.

Relationship of modules training and of units training: MF1213_3: installation and configuration of systems of planning of resources business and of management of relationships with customers. (150 h) ● UF1882: installation of systems operating and management of data in systems ERP-CRM (30 hours) ● UF1883: installation of systems ERP-CRM (90 hours) ● UF1884: storage of data in systems ERP-CRM (30 hours) MF1214_3: administration of systems of planning of resources business and of management of relations with customers. (210 h) ● UF1885: the operating system in ERP-CRM (90 hours) systems management ● UF1886: management of the operator's data in ERP-CRM (90 hours) systems ● UF1887: security operations in ERP-CRM systems and datastore (30 hours) MF1215_3: creation and maintenance of software components in systems of customer relationship management and enterprise resource planning. (210 h) ● UF1888: maintenance and query data (90 hours) ● UF1889: development of component software system ERP-CRM (90 hours) ● UF1890: development of component software and queries within datastore (30 hours) MP0397 system: module not working professional practices in administration and programming systems for customer relationship management and enterprise resource planning. (80 hours)

II. professional profile of the certificate of professional competition 1 denomination unit: install and configure systems of planning of resources business and management of relationships with customers level: 3 code: UC1213_3 realizations professionals and criteria for making RP 1: install and configure the operating system and the data manager for the implementation of systems of enterprise resource planning (ERP-CRM systems) customer relationship management following technical specifications received and according to the Organization's needs.

CR 1.1 characteristics of server computers that will contain the operating system and the data manager are proposed to perform your installation, taking into account that they comply with the requirements of installation of ERP and CRM systems.

CR 1.2 selected operating system is installed and configured to host systems ERP-CRM, received specifications, by consulting manuals and according to manufacturer guidelines.

CR 1.3 selected data manager is installed and configured to host systems ERP-CRM, received specifications, by consulting manuals and according to manufacturer guidelines.

CR 1.4 operating system and the data manager parameters are adjusted and configured to ensure the integrity and reliability of the system, following the instructions in the manuals and guides of the manufacturer.

CR 1.5 testing installation and configuration of the operating system and the data manager are performed to verify its functionality, the following specifications received and according to needs of the implementation.

CR 1.6 them details relevant of the installation and of the test of the system operating and of the Manager of data, as well as them incidents produced during the process, is reflect in the documentation for keep registration and tracking of them works made, following the procedure established by the organization.

CR 1.7 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

RP 2: Install and configure the system of enterprise resource planning (ERP) for later adaptation to the characteristics of the company and exploitation, following technical specifications received and according to the Organization's needs.

CR 2.1 ERP system software is installed and configured on the servers for its operation, following the recommendations and guidelines of the manufacturer and instructed by experts or consultants.

CR 2.2 environment decided by the organization access for clients is installed and configured so that users can work with the ERP system, following the guidelines and recommendations of the product and the Organization's policies.

CR 2.3 the ERP system remote support infrastructure is installed and configured so that the company can perform such support, according to the conditions and agreed protocols and the Organization's security policy.

CR 2.4 tools of transportation of components between development, testing and operation, ERP systems, environments are configured to start the flow of changes and verification before being released for use by the end user, according to technical specifications and requirements of the organization.

CR 2.5 testing installation and configuration of the ERP system are performed to verify its functionality, received and according to needs of the implementation specifications.

CR 2.6 relevant details of installation and test of the ERP system, as well as the effects produced during the process, reflected in the documentation to maintain registration and monitoring of the work carried out, following the procedure established by the organization.

CR 2.7 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

RP-3: Install and configure the system of management of relationships with clients (CRM) for subsequent adaptation to the characteristics of the company and exploitation, received technical specifications and according to the Organization's needs.

CR 3.1 the server computer on which is installed the CRM system is configured to host it, according to technical specifications, and product guides.

CR 3.2 CRM system software is installed and configured on the servers for its operation, following the recommendations and guidelines of the manufacturer and instructed by experts or consultants.

CR 3.3 them products to give service of connection and access of them customers decided by the organization is installed and configured, so them users can work with the system of CRM, following them guides and recommendations of the product and them political of the organization.

CR 3.4 it infrastructure (router, line communications) of support remote of the system of CRM is installed and configured to the company of maintenance can perform said support, according to them conditions and protocols agreed and it political of security of the organization.

CR 3.5 remote assistance tools are deployed and configured so that the company can perform technical support, according to the conditions and agreed protocols and the Organization's security policy.

CR 3.6 tools of transportation of components between development, testing and operation, CRM systems, environments are configured to start the flow of changes and verification before being released for use by the end user, according to technical specifications and requirements of the organization.

CR 3.7 the installation and configuration of CRM system testing to verify its functionality, received and according to needs of the implementation specifications.

CR 3.8 relevant details of installation and test of the CRM system, as well as the effects produced during the process, reflected in the documentation to maintain registration and monitoring of the work carried out, following the procedure established by the organization.

CR 3.9 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

RP 4: Install and configure the data warehouse system (data warehouse) in ERP-CRM systems for exploitation, according to technical specifications received and according to the Organization's needs.

CR 4.1 the server computer on which the data warehouse is installed is configured to host it, following received technical specifications and product guides.

CR 4.2 data store system software is installed and configured on the servers for its operation, following the recommendations and guidelines of the manufacturer and instructed by experts or consultants.

CR 4.3 tools of transportation of components between the environments of development, testing, and data warehouse systems operation, are set to start the flow of changes and verification before being released for use by the end user, according to specifications received and according to the Organization's needs.

CR 4.4 the installation and configuration of the data warehouse system testing to verify its functionality, following specifications and needs of the implementation.

CR 4.5 relevant details of installation and testing of the data warehouse system, as well as the effects produced during the process, reflected in the documentation to maintain registration and monitoring of the work carried out, following the procedure established by the organization.

CR 4.6 the documentation technical specific associated, is interpreted, in his case, in the language foreign of use more frequent in the sector.

Media production professional context


Computer equipment. Equipment necessary hardware for installation of a planning system of enterprise resources, data warehouse and customer relationship management. Communications infrastructure. The operating system software and its installation and configuration tools. Data base software and its installation and configuration tools. Software of installation of each one of the systems: ERP, CRM, warehouse of data and other modules horizontal. Remote support software tools. Transportation software tools.

Products and results systems of ERP, CRM and data warehouse installed and configured, ready to be adapted to the particularities of the business through the coding of components.

Information used or generated guides and manuals for installation of the operating system and the data manager. Guides and installation manuals of the ERP, CRM and data warehouse systems. Manual installation of other enterprise management modules. Plan implementation and documentation of the Organization guidelines. Documentation prepared for installation and configuration of implanted systems.

Unit of competition 2 name: managing systems of planning of resources business and management of relationships with customers level: 3 code: UC1214_3 realizations professionals and criteria for making RP 1: administer the system of enterprise resource planning (ERP) to maintain and ensure its operation, according to the criteria established by the Organization and the recommendations of the manufacturer of the product.

CR 1.1 the management tasks of the operating system and the data manager, on which the ERP system, installed are made to keep them in tip-top condition, following guidelines and established procedures.

CR 1.2 service access for clients decided by the organization is managed and maintained so that users can work with the enterprise resource planning system, following the guidelines and recommendations of the product and the Organization's security policies.

CR 1.3 ERP system monitoring tools are used to detect processes that overload and collapse the system, following specifications received and according to the Organization's needs.

CR 1.4 them processes of extraction of data and others processes of Fund is monitored and is performs its monitoring, following the guides and procedures established.

CR 1.5 them incidents detected or interconnecting is resolved to keep the stability of the system of ERP, according to the documentation and following them instructions received, whenever exist these and correspond to the Organization; otherwise they are scaled to the manufacturer or to the company and are recorded to manage the maintenance contract.

CR 1.6 them tools of control of the saturation of the system and of them times of delay in the access to the Manager of data is handled to tune and optimize the exploitation of the system of ERP, according to specifications technical and needs of the organization.

CR 1.7 them new components and elements software of the system of ERP is transported between them different environments of development, test and exploitation, running procedures specific and performing its follow-up, for keep the flow of modifications and its verification before be released for its use by the user end, following specifications technical and needs of the organization.

CR 1.8 them processes made as well as them incidents produced in the Administration is reflect in the documentation to keep registration and tracking of them works made, following the procedure established by the organization.

CR 1.9 associated specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

2 RP: Manage relationships with clients (CRM) management system to maintain and ensure its operation, according to the criteria established by the Organization and the recommendations of the manufacturer of the product.

2.1 CR products to give service and decided by the Organization client access is administered and maintained so that users can work with the CRM system, following the guidelines and recommendations of the product and the Organization's security policies.

CR 2.2 the CRM system monitoring tools are used to detect processes that overload and collapse the system, according to the Organization's needs and technical specifications.

CR 2.3 data extraction processes and other background processes are monitored and performs its monitoring, following guidelines and established procedures.

CR 2.4 system of CRM management tools are managed to facilitate the administration of all the elements that make up the CRM system, following guidelines and established procedures.

CR 2.5 detected or reported incidents are resolved to maintain the stability of the CRM system, following the documentation and the instructions received, provided that these exist and correspond to the Organization; in another case is scaled to the manufacturer or to the company awarded and is registered to manage the contract of maintenance.

CR 2.6 control tools of the saturation of the system and the delay in the access times to data manager are managed to tune and optimize the exploitation of system CRM, technical specifications and according to the Organization's needs.

CR 2.7 new components and elements of CRM system software are transported between different environments for development, testing and operation, running specific procedures and carrying out monitoring, to keep the flow of changes and verification before being released for use by the end user, according to technical specifications and needs of the organization.

2.8 CR made processes as well as incidents caused in the administration are reflected in the documentation to maintain registration and monitoring of the work carried out, following the procedure established by the organization.

CR 2.9 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

3 RP: Manage data warehouse (data warehouse) to maintain and ensure its operation, according to the criteria established by the Organization and the recommendations of the manufacturer of the product.

CR 3.1 the management tasks of the operating system and the data manager on which the data warehouse system installed are made to keep them in tip-top condition, following guidelines and established procedures.

CR 3.2 service access for clients decided by the organization is managed and maintained so that users can work with the data warehouse system, following the guidelines and recommendations of the product and the Organization's security policies.

CR 3.3 data warehouse system monitoring tools are used to detect processes that overload and collapse the system, according to the Organization's needs and technical specifications.

CR 3.4 them processes of extraction of data and others processes of Fund is monitored and is performs its monitoring, following the guides and procedures established.

CR 3.5 detected or reported incidents are resolved to maintain the stability of the system of data store, according to the technical documentation and following the instructions received, provided that these exist and correspond to the Organization; otherwise they are scaled to the manufacturer or to the company and are recorded to manage the maintenance contract.

CR 3.6 tools of the saturation control system and the delay in the access times to data manager are managed to tune and optimize the exploitation of system data store, according to technical specifications and according to the Organization's needs.

CR 3.7 new components and software of data warehouse system elements are transported between different environments for development, testing and operation, running specific procedures and conducting its follow-up, to maintain the flow of changes and verification before being released for use by the end user, according to the Organization's needs and technical specifications.

3.8 CR made processes as well as incidents caused in the administration are reflected in the documentation to maintain registration and monitoring of the work carried out, following the procedure established by the organization.

CR 3.9 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

4 RP: Carry out safety procedures in ERP systems, CRM and data warehouse to ensure controlled access and data integrity, attending to the needs of the organization.

CR 4.1 of backing up the data in ERP, CRM and data warehouse systems operations to prevent their loss, according to the established procedures and in accordance with the policy established by the organization.


CR 4.2 the creation and management of users, roles, and profiles is to respond to requests related to access to ERP, CRM and data warehouse and to its different modules, received specifications and systems according to the Organization's needs.

CR 4.3 them components to which is enter from the CRM is configured to ensure that only can access to them who should, following them guides and procedures established and attending to the political of security of the organization.

CR 4.4 them data that use them systems of ERP, CRM and warehouse of data subject to the law of protection of data (LOPD) is identified and is reported to the Department of safety to adopt them measures necessary, following them procedures established.

CR 4.5 processes performed as well as produced incidents are reflected in the documentation to maintain registration and monitoring of the work carried out, following the procedure established by the organization.

Context professional means of production equipment computer. Systems operating and database. Systems of ERP, CRM and storage of data. Tools for user management and management of permissions to resources in ERP, CRM and data warehouse systems. Control tools performance in ERP, CRM and data warehouse systems. Tools for monitoring of processes in ERP, CRM and data warehouse systems. Tools for monitoring memory usage in ERP, CRM and data warehouse systems. Monitoring tools of management of storage devices in ERP, CRM and data warehouse systems. Testing tools stress in pre-exploitation in ERP, CRM and data warehouse systems.

Products and results systems of ERP, CRM and integrated data store managed and operating properly. Performance of the systems of ERP, CRM and data warehouse exploitation parameters suitable. Systems of ERP, CRM and data warehouse safe and intact in the access and use of resources.

Information used or generated Manual of exploitation. Manual administration of the operating system and the data manager. Manuals and guides administration of the ERP, CRM and data warehouse systems. Guidelines for documentation of the organization. Plan of operation of the organization. Manual monitoring tools. Graphics and performance analysis. Listings of access and restrictions on users. Report of incidents. Protocol to incidents. Legislation on data protection.

Competition 3 denomination unit: make and maintain components SOFTWARE in a system of planning of resources business and of management of relationships with customers.

Level: 3 code: UC1215_3 realizations professionals and criteria for making RP 1: performing maintenance of the dictionary of data and consultation in planning systems and enterprise resource management of relationships with customers (ERP-CRM systems) for the extraction and subsequent processing of information, according to established design specifications.

CR 1.1 objects of the dictionary of data and their relationships are created and maintained using tools provided by the ERP-CRM systems, following received design specifications and standards set by the organization.

CR 1.2 tools and languages for consultation and handling provided by ERP-CRM systems are used to extract information contained therein received specifications, in accordance with their characteristics and complying with the current legislation on data protection.

CR 1.3 access data managers is to extract information using tools and languages provided by ERP-CRM systems, following received specifications and characteristics of the same.

CR 1.4 tasks performed are documented for registration and subsequent use, according to rules of the organization.

RP 2: Create and maintain software components to manipulate and upload information in planning systems and enterprise resource management of relationships with customers (ERP-CRM systems), using languages and tools provided, following design specifications laid down.

CR 2.1 the tools provided by the ERP-CRM systems are used to manage the data and generate forms and listings, according to technical specifications and according to needs of use.

CR 2.2 elements of programming language used to create components that handle the data contained in ERP-CRM systems, according to technical specifications and in accordance with the needs of the organization.

CR 2.3 processes to automate the extraction of data (properly batches inputs) are created using tools and languages provided by ERP-CRM systems, following received specifications and characteristics of the same.

CR 2.4 software components are kept and modified to add new functionality to ERP-CRM systems, according to needs of the exploitation of the system.

CR 2.5 software developed or modified components are tested to demonstrate the functionality added or modified in ERP-CRM systems, complying with the rules of the organization.

CR 2.6 software components created on ERP-CRM systems are documented for registration and subsequent use, adjusting to the rules of the organization.

3 RP: Develop components and queries within the data warehouse system (data warehouse) to store and collect information (data mining), according to established design specifications.

CR 3.1 structures (cubes, multi-cubes) information and their relationships are defined to store corporate data store system information and facilitate handling, technical and design specifications, in accordance with standards of the organization.

CR 3.2 them origins of data that integrate the system of warehouse of data is managed so are available, according to needs and meeting standards of security of the organization.

CR 3.3 extractors of information about data warehouse system are generated and integrated in order to extract the necessary information in an efficient way, according to technical specifications, according to rules of the Organization and complying with the current legislation on data protection.

CR 3.4 the InfoSource on data warehouse system are generated for the extraction of data from the external system defining the structure of communication, transfer and transfer rules, technical specifications, according to ILO standards and complying the legislation on data protection.

CR 3.5 software components are created to gather information from the source system and data warehouse system using query and manipulation language, technical specifications and complying the legislation on data protection.

3.6 CR created software components and queries are documented for registration and subsequent use, according to rules of the organization.

CR 3.7 the specific technical documentation, is interpreted, where applicable, in the foreign language most often used in the sector.

Media production equipment professional context. Operating systems and productivity of data. ERP, CRM and data warehouse systems. Tools and languages for consultation and manipulation of data in ERP, CRM and data warehouse systems.

Products and results components of inquiry, forms and lists for obtaining and manipulating data in ERP, CRM and data warehouse systems. Components for the extraction of data in ERP, CRM and data warehouse systems.

Information used or generated manuals of operation of the operating system and database. Manual operation of the ERP, CRM and data warehouse systems. Manuals of the languages and tools for the manipulation of information in ERP, CRM and data warehouse systems. Guidelines for documentation of the organization. Plan of operation of the organization. Documentation of developed components. Legislation on data protection.

IV. formation of the certificate of professionalism module training 1 name: installation and configuration of systems of planning of resources business and of management of relationships with customers code: MF1213_3 level of professional qualification: 3 associated to the competition unit: UC1213_3: install and configure systems for customer relationship management and enterprise resource planning.

Duration: 150 hours training unit 1 name: installation of systems operating and management of data in systems ERP-CRM code: UF1882 duration: 30 hours reference of competition: this training unit corresponds to the RP1.

Capabilities and criteria of evaluation C1: identify procedures and install the operating system on which will implement the data manager and ERP-CRM system, identifying the necessary parameters and using software, according to models of implementation tools and manuals for installation and configuration.

CE1.1 identify the characteristics of the hardware related to the physical size of ERP-CRM systems, according to technical specifications.


CE1.2 distinguish the functions and features of the operating system on which you will install ERP-CRM system to decide the choices that arise during installation using the product manuals.

CE1.3 describe the operating system configuration parameters required for the implementation of the ERP-CRM, depending on the type of implementation system.

CE1.4 define the characteristics of the structure of the file system necessary for the installation of the ERP-CRM system, structuring them according to the data manager and the system to be installed later.

CE1.5 in practical cases, properly characterized, installation and configuration of the operating system on which will be subsequently installed ERP-CRM system, and the data manager following manuals and installation guides:-installation of the operating system software.

-Configure and adjust parameters using tools and running scripts for configuration.

-Sizing the system of files.

-Create the basic user's access to the operating system.

-Carry out the test to verify the functionality of the installation.

-Interpret the documentation inherent to the installation, even if is edited in the language foreign of use more frequent in the sector, using it of help in the installation and configuration.

-Document the procedures carried out according to formats specified.

C2: Identify procedures and installing the data manager to implement the ERP-CRM system, identifying the necessary parameters and using software, according to models of implementation tools and manuals for installation and configuration.

CE2.1 distinguish the functions and features of data in ERP-CRM systems managers to decide the choices that arise during installation, using schematics and diagrams.

CE2.2 describe the configuration parameters of the data manager for the implementation of the ERP-CRM system, taking into account the implementation type.

CE2.3 identify the containers, and other components of the architecture of the data manager that must be created or modified for the implementation of the ERP-CRM system, taking into account the implementation type.

CE2.4 in practical cases, properly characterized, install and configure data manager on which, subsequently, will receive the ERP-CRM system, following installation and configuration guides and manuals:-installing the data manager software using assistants.

-Run database creation scripts.

-Configure and adjust parameters using tools and running configuration scripts.

-Create the basic user of access to the data manager for the management of the ERP system.

-Testing to ensure the functionality of the installation.

-Interpret the documentation inherent to the installation, even if is edited in the language foreign of use more frequent in the sector, using it of help in the installation and configuration.

-Document the procedures carried out in accordance with specified formats.

Contents 1. Operating systems in systems ERP-CRM - types of operating systems and differences.

-Different types of operating systems - differences between operating systems - description and features.

-Minimum requirements for the installation of an ERP/CRM - technical specifications necessary for an ERP and CRM system system - outline a computer hardware that can accommodate ERP and CRM systems.

-Outline of necessary hardware according to technical specifications.

-Peripherals that can be connected.

-Networks and connection in a structure systems client/server - operating system configuration parameters: definition and types.

-Definition of settings of the operating system.

-Definition of users on the operating system.

-Storage system: structure and units.

-Establishment of the units of storage on the computer.

-Partition of the hard disk.

-Formulas and tables for the sizing of equipment and operating systems on which to install an ERP and CRM.

-Establishment and size of file system.

-Installation of the operating system processes to support ERP and CRM - systems installation of the operating system.

-Configuration and adjustment of the required parameters in the operating system.

-Realization of tests that verify the different functionalities.

-Documentation of the performed processes.

2. data management systems systems ERP-CRM - management of data, types and features.

-Define different types of data managers.

-Definition of the characteristics of the data management systems.

-Architecture and components of a data management system.

-Definition of database systems - data architecture definition: establish entities, relationships, and properties.

-A data manager installation processes to ERP and CRM systems.

-Installation of a data management system.

-Creation of user's access to the System Manager of data.

-Realization of tests that verify the different functionalities.

-Documentation of the performed processes.

-The data manager configuration parameters.

-Definition of the configuration parameters for a data management - different types of parameters unit training 2 name: installation and configuration of systems ERP-CRM code: UF1883 duration: 90 hours referrer of competition: this training unit corresponds to the RP2 and RP3.

Capabilities and criteria of evaluation C1: identify the functionality and settings and install ERP system for subsequent exploitation, following deployment models and using installation and configuration manual.

CE1.1 distinguish the functions and features of ERP systems to decide the choices that arise during installation, using schematics and diagrams.

CE1.2 identify components and modules of an ERP system: financial, sales and procurement, among others, to add different features to it, defining different types of implementation.

CE1.3 recognize the parameters of configuration of the ERP system to adjust its operation, taking into account the different implementation models according to economic sector / type of exploitation.

CE1.4 distinguish services of access for customers and their configuration parameters, for the connection of the user to the ERP system.

CE1.5 identify configuration parameters required to install remote support infrastructure, characteristics of this service.

CE1.6 recognize the necessary elements that allow the connection of the ERP system with other systems, according to types of implementation.

CE1.7 explain the system of transport of components of ERP systems, between the different environments of development, testing and operation, to start the flow of changes and verification before being released for use by the end user, according to technical specifications.

CE1.8 in practical cases, properly characterized, perform the installation and configuration of an ERP system for your operation, following the manuals and guides for installation and configuration:-installing the software of ERP system using assistants and taking into account the different modules to implement.

-Install the necessary patches for its operation.

-Configure and adjust parameters of the ERP system, using and running configuration scripts and tools provided by the system.

-Install and configure the environment of access services to customers.

-Install and configure remote support infrastructure.

-Configure the transport of objects between different environments - testing to verify the performance together with the operating system and the data manager.

-Interpret the documentation inherent to the installation, even if it is published in the foreign language most often used in the sector, using the aid in installation and configuration.

-Document the procedures carried out in accordance with specified formats.

C2: Specify functionality and settings and install the CRM system for further exploitation, following deployment models and using installation and configuration manual.

CE2.1 distinguish the functions and features of CRM systems to decide the choices that arise during installation, using schematics and diagrams.

CE2.2 identify components and modules of a CRM system (mobility and call center, among others) to add different features to it, defining different types of implementation.

CE2.3 recognize the CRM system settings to adjust its performance, distinguishing implementation models according to economic sector / type of exploitation.

CE2.4 distinguish services of access for customers and their configuration parameters, for the connection of the user to the CRM system.

CE2.5 identify configuration parameters required to install remote support infrastructure, characteristics of this service.


CE2.6 recognize the necessary elements that allow making connection to the system of CRM with ERP system, to obtain the data that need.

CE2.7 explain the system of transport of components of CRM systems, between the different environments of development, testing and operation, to start the flow of changes and verification before being released for use by the end user, according to technical specifications.

CE2.8 in cases practical that involve perform the installation and configuration of a system of CRM for your put in operation, following manual and guides of installation and configuration:-perform the installation of the software of the system of CRM using assistants and taking in has them different modules to implement.

-Install the patches necessary for its operation.

-Configure and adjust parameters of the CRM system using and running scripts and configuration tools provided by the system.

-Install and configure the environment of services of access to those customers.

-Install and configure the infrastructure of support remote.

-Set up of the transport of objects between those different environments.

-Perform tests to check the operation of the installation and configuration.

-Interpret the documentation inherent to the installation, even if it is published in the foreign language most often used in the sector, using the aid in installation and configuration.

-Document the procedures carried out in accordance with specified formats.

Contents 1. Architecture and characteristics of a system ERP - organization of a company.

-Realization of the diagram of the Organization of a company.

-Relational model: entities, relationships, and properties.

-Definition of the needs of a company and adaptability within the ERP.

-Definition of the company departments and functions of each Department.

-Definition of the modules of the ERP system and connection among them.

-The module Basic, capabilities operational.

-Establishment of configuration parameters and master tables common to the different modules of the ERP within the sector to which the company belongs.

-Architecture client/server - minimum requirements of the client machine - minimum requirements for the server machine.

-Definition of the connections between client and server in an ERP system.

-Establishment of communication between client and server.

2 modules of an ERP - characteristics of functional modules of an ERP system system.

-Establishment of the features of each module of the ERP.

-Setting up tables and settings of each module.

-Description, typology and interconnection between modules.

-Connection between the different modules of an ERP.

-Traceability and procedures to implement between different modules.

-Obtaining reports and statistics concerning the information of each module.

-Interpretation and obtaining the information stored in the database of each module.

-Tools used for obtaining this information, generating reports.

-Business Intelligence tools.

3. processes of ERP - ERP system settings system installation.

-Definition of configuration parameters to set the operation of the ERP.

-Definition of master tables, description, type, and use.

-Other modules, features and installation.

-Connection of the ERP with other programs.

-Services of access to the ERP system.

-Definition of users of an ERP and their profiles or features.

-Configuration parameters for users, permissions for menu access.

-Update of the ERP system and application updates.

-Installation of an ERP software.

-Different versions of an ERP upgrade.

-Configuration of the parameters for the operation of the ERP.

-Documentation of the performed processes.

4 environments - developing, testing and operating environments - development definition of development environments for testing and operation of ERP.

-Verification and validation of the tests performed.

-Installation and configuration of the transport system.

-Systems for the exchange of information on the different modules of the ERP.

5. architecture and features of a CRM system - organization of a company and its characteristics of electronic business (e-business) external relations.

-Diagram of organization of the company.

-Relational model: entities, relationships, and properties.

-The Basic module, operational capabilities.

-Establishment of configuration parameters and master tables common to the different modules of CRM, the sector to which the company belongs.

6 modules of CRM system - characteristics of functional modules of a CRM system, typology, interconnection between the modules.

-Establishment of the features of each module of the CRM.

-Establishment of tables and settings of each module.

-Obtaining reports and statistics concerning the information of each module.

-Interpretation and obtaining the information stored in the database of each module.

-Tools used for obtaining this information, generating reports.

7 a CRM - CRM system settings system installation processes.

-Definition of configuration parameters to set the operation of the CRM.

-Definition of master tables, description, type, and use.

-Other modules, features and installation.

-Connection of the CRM with other programs.

-Access to the CRM system services.

-Definition of users of CRM and their profiles or features.

-Configuration parameters for users, permissions for menu access.

-Updating the CRM system and application updates.

-Installation of a CRM software.

-Update of different versions of a CRM.

-Configuration of the parameters for the operation of the CRM.

-Documentation of the performed processes.

8. development environments - environments of development, testing and operation about CRM systems - definition of development environments for testing and operation of ERP.

-Verification and validation of the tests performed.

-Installation and configuration of the transport system.

-Systems for the exchange of information on the different modules of the ERP.

-Remote technical support - remote technical assistance in the ERP system: installation and configuration.

-Remote technical assistance in the CRM system: installation and configuration.

UNIT training 3 designation: storage of data in systems ERP-CRM code: UF1884 duration: 30 hours reference of competition: this unit training is corresponds with the RP4.

Capabilities and criteria of evaluation C1: identify the functionality and them parameters of configuration and install the system of warehouse of data in systems ERP-CRM for its later exploitation, following models of implementation and using manual of installation and configuration.

CE1.1 distinguish the functions and characteristics of systems store data in ERP-CRM systems to decide the choices that arise during installation, using schematics and diagrams.

CE1.2 identify components and modules of an ERP-CRM systems data warehouse system to add different features to it, defining different types of implementation.

CE1.3 recognize the parameters of the system configuration data in ERP-CRM systems store to adjust its operation according to the installation guide.

CE1.4 recognize the necessary elements that allow making connection to system data store with the ERP system to obtain data.

CE1.5 explain the system of transport of components between the different environments of development, test and operation and store system data, to start the flow of changes and verification before being released for use by the end user, according to technical specifications.

CE1.6 in practical cases, properly characterized, perform the installation and configuration of a system of data warehouse in ERP-CRM systems for further exploitation, according to the manuals and installation guides:-installation of the data warehouse software using assistants and taking into account the different modules to implement.

-Install the necessary patches to operate following instructions given by the installation guides - configure and adjust parameters of the data store, ERP systems and CRM, running configuration scripts and using tools provided by the system, following installation and configuration guides.

-Test the connection and the flow of data between the system of warehouse of data and the systems of ERP and of CRM.

-Set up of the transport of objects between those different environments.

-Perform tests to ensure the functionality of the installation.

-Interpret the documentation inherent to the installation, even if is edited in the language foreign of use more frequent in the sector, using it of help in the installation and configuration.

-Document the procedures carried out according to formats specified.

Content


1. systems of warehouse of data (data warehouse) in systems ERP-CRM-architecture and features of the systems of store of data about systems ERP-CRM.

-Definition of functionalities and features General of a system of storage of data.

-Realization of schemes and diagrams.

-Use and advantages of the enterprise data warehouse systems.

-Connection between a data warehouse system and ERP.

-Components and modules of data warehouse systems.

-Identification of components and modules of a data warehouse system.

-Definition of the functionalities of the data warehouse system.

-Description of different types of implementation.

2. installation of the data warehouse system processes.

-Data warehouse system configuration parameters.

-Definition of parameters, types and features.

-Adjustment of the operation within the industry to which the company belongs.

-Update of system data warehouse and application of updates.

-Installation of the data warehouse software.

-Update of different versions.

-Configuration of the parameters for the operation.

-Documentation of the performed processes.

3. connections of system data store with ERP and CRM systems:-characteristics and configuration parameters.

-Definition of the parameters that allow the connection of the system with an ERP or CRM data warehouse.

-Environments of development, testing and operation of data warehouse systems: installation and configuration of the transport system.

-Definition of development environments for testing and operation of the data warehouse system.

-Establishment of the system of transport of information between development and the system of data warehouse environments.

Methodological guidelines training distance: formative units total duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1882 30 20 unit training 2 - 3 90 80 formative unit UF1883 - UF1884 30 20 sequence: to access units training 2 and 3 must have been overcome the training unit 1.

Criteria for access for students will be those laid down in article 4 of the Royal Decree governing the certificate of professionalism of the professional family accompanies to which this annex.

TRAINING module 2 name: management systems customer relationship management and enterprise resource planning.

Code: MF1214_3 level of professional qualification: 3 associated to the competition unit: UC1214_3: managing systems of customer relationship management and enterprise resource planning.

Duration: 210 hours training unit 1 name: administration of the operating system in systems ERP-CRM code: UF1885 duration: 90 hours referrer of competition: this training unit corresponds to the RP1 and the RP2.

Capabilities and criteria of evaluation C1: identify settings and maintenance of the operating system and the data in ERP-CRM systems manager, and perform the management tasks to ensure its operation, according to technical specifications and user needs.

CE1.1 identify the main configuration parameters that affect the performance of the operating system and Manager of data according to needs of use of ERP-CRM systems.

CE1.2 recognize the main parameters of configuration of the operating system and the data manager for the administration of storage devices, memory management and file system management.

CE1.3 monitor processes, events and the performance of the operating system and the data manager, using specific software tools, according to needs of use in ERP-CRM systems.

CE1.4 manage the physical and logical elements of the storage of the operating system and the data manager to detect and solve possible faults in the same capacity, using specific software tools, according to needs of use in ERP-CRM systems.

CE1.5 identify events and alarms from the operating system and the data manager to ERP-CRM systems are installed for making its resolution or scale them to the top level, documenting the situation of departure procedures carried out.

CE1.6 in a case study, properly characterized, carry out management of the operating system and the data manager, received technical specifications:-use specific tools to detect the size of the free in the storage system.

-Use specific tools to view and control the management of data and the operating system load.

-Set up and adjust the parameters of the operating system.

-Create users and permissions for authorization.

-Interpret the documentation inherent, even if it is published in the foreign language most often used in the sector, using the support in the administration.

-Document tasks performed according to specified formats.

C2: Identify the processes of the different systems of ERP, CRM and data warehouse, monitor them and resolve any incidents that occur to maintain the functionality and performance of the system, technical specifications and according to needs of use.

CE2.1 describe the parameters of the systems of ERP, CRM and data warehouse that influence their performance, according to technical specifications.

CE2.2 describe the main processes of systems ERP, CRM and warehouse data and characteristics of the monitoring tools for your track.

CE2.3 use the tools that evaluate the performance of ERP and CRM systems to detect problems of code and performance thereof, among others and correct them, received technical specifications.

CE2.4 detailing the procedures for monitoring and detection of incidents in systems of ERP, CRM and datastore to its resolution or escalated to the highest level, following the indications of the technical manuals of administration and received specifications.

CE2.5 in a case study, properly characterized, resolve incidents in ERP, CRM and data warehouse systems, given technical specifications:-analyze symptoms detected.

-Recognize the affected performance parameters.

-Identify the processes involved should be monitored using appropriate tools.

-Use the technical manuals of Administration to collect the information required for your solution.

-Troubleshoot incidents using the appropriate procedures, or escalate them to the next level.

-Check the functioning of the system, once solved the incidence.

-Enumerate and quantify system performance improvements obtained after applying actions to do so.

-Describe the procedures of turning back in anticipation that the changes do not produce the desired effect.

-Document the operations carried out in the system in order to be applied if the circumstances return to reproduce, according to specified formats.

CE2.6 a practical, properly characterized, if integration telephony - computer (CTI) CTI management tool not displays them CRM system users that need it:-check that the communication server and CTI driver are installed and running.

-Check the configuration parameters of communications, especially those that refer to the maximum number of active agent communications sessions.

-Check that session of communications orphan (active on server but no user logged on to that agent) there is no.

CE2.7 in a case duly characterized simulate, using stress tools pre-exploitation, low performance, a failure of one or more process execution and an occupation 100% of the memory of the server, on an ERP system:-capture basic performance data (number of processes running, percentage of memory used by process) using tools for the performance.

-Analyze the data ordering them, sorting them, by grouping them and making graphs.

-Check that the environment meets the requirements of hardware and software, determined by the manufacturer.

-If loss of performance or the bug is reproducible, determine the steps to reproduce it, and do so without other connected users to know which item is causing the problem.

-If the yield loss or failure is not reproducible, increase levels of trace amounts of the components of the server and wait to return to produce the loss to determine its causes and reproduce it voluntarily.

-Document tasks performed and occurrences produced according to specified formats.

CE2.8 in a case study, properly characterized, in which a web client is used to connect to a CRM system and that the browser does not produce an adequate response:


-Check that the environment: versions of the browser, installed patches, additional software and other hardware requirements, meets the requirements of the product.

-Enter the date and time at which the error occurred to verify later on the machine error log that other critical errors that may arise this not occurred.

-Enable diagnostic mechanisms available for determining the values of occupation of CPU, occupation of memory, among others, for several occasions in which again give the error.

-If the error is reproducible, determine if is produces with the application standard or only in the application set «to measure» by the developers. If the error only occurs with the configured application, try turning off different parts of the performed configuration to detect the source of the error.

-If the error is not reproducible, increase levels of traces of the server components and expected to return to the failure to determine its causes and reproduce it voluntarily.

-Document tasks performed and occurrences produced according to specified formats.

CE2.9 interpret the documentation inherent, even if it is published in the foreign language most often used in the sector, using the support in the administration.

Contents 1. The operating system management system ERP-CRM - ERP, CRM systems operating system configuration parameters: definition, types and use.

-Identification of the configuration parameters that affect the performance of the operating system (OS).

-Configuration and usage of the parameters - memory and file management of the SO - configuration of users and permissions to work in the SO - tools software for monitoring processes, events, and performance of the system, and storage management.

-Monitoring of processes for establishing performance of the OS.

-Use of specific software tools to measure the performance of the OS.

2 events and alarms from the operating system.

-Sending of warning alarms faced a problem in the operating system.

-Identification of alarms.

-Classification and solution of problems.

-Trace and files of confirmation of those processes carried out. (logs).

-Documentation of processes carried out.

-Verification that the processes have been carried out.

-Characteristics and types.

-Software tools used to control of alarms and the identification of processes.

3 incident management of the operating system - traces of the system (logs).

-Document tasks.

-Document produced incidents.

-Incidents: identification and resolution.

-Establish mechanisms to trace operating system and locate incidents or errors on the system.

-Determine causes of produced errors and possible solutions.

4. Administration of the Manager of data in systems ERP-CRM-parameters of configuration of the Manager of data in systems ERP and CRM: definition, types and use.

-Definition of settings - configuration of users and permissions for a manager of data management.

-Software tools for the management of storage and to monitor processes, events, and performance of the database.

-Use of software tools to monitor processes and establish yields in the database.

-Detection and troubleshooting.

5 events and alarms from the data manager in ERP-CRM systems - sending alarms of notice on the data manager.

-Identification of alarm.

-Classification and solution of problems.

-Traces and confirmation of the performed processes files. (logs) - documentation of processes performed - check that the processes have been carried out.

-Characteristics and types.

-Software tools used to control of alarms and the identification of processes.

6. management of maintenance in ERP and CRM systems - processes of ERP and CRM systems.

-Definition of the functions of an ERP system.

-Define processes in ERP and CRM - system parameters of the systems that affect yield.

-Definition of the parameters to study the performance of the ERP system.

-Monitoring and performance assessment tools:-details of the processes of monitoring and detection of incidents.

-Definition of tools that evaluate the performance.

7. transport of components between development, test and operation systems of ERP-CRM - Version Control and management of the different environments.

-Definition of development environments of the ERP - minimum requirements for the implementation of the ERP system - architectures of different environments according to the operating system.

-Definition of the architecture model, view, controller which based screens and ERP processes.

-The system of exchange of information between different environments: features and elements involved.

-Definition of the data model in which the database will be based.

-Protocols for communication between the ERP and other devices - Hardware is necessary for data exchange.

-Errors in the execution of transport: types and solution.

-Establishment of methods for tracing software used for playback errors.

-Documentation of errors found during development and troubleshooting 8. Extraction processes of data in ERP and CRM systems - features and functionality.

-Definition of tools to access the data base - obtaining reports and classification of the information stored in the ERP and CRM to help decision making.

-Implementation procedures.

-Resolution of incidents; traces of execution.

-Establishment of methods for tracing software used for playback errors.

-Documentation of errors found during development and troubleshooting unit training 2 name: administration of systems ERP-CRM code in data manager: UF1886 duration: 90 hours referrer of competition: this training unit corresponds with the RP3.

Capabilities and C1 evaluation criteria: describe the operation and manage the transport system of objects and components between the different environments of development, testing and operation, to maintain the flow of changes and verification before being released for use by the end user, according to technical and functional requirements.

CE1.1 describe the physical and logical architecture of environments of development, testing and operation of the system of ERP, CRM and data warehouse to identify the needs of the transport management.

CE1.2 explain the features of the tools of transportation between the environments of development, test and operation systems of ERP, CRM and data warehouse, taking into account technical and functional specifications.

CE1.3 describe the procedures of passage of components made between environments of development, test and operation systems of ERP, CRM and data warehouse using the specific tools of these products.

CE1.4 in a case study, properly characterized, manage the transportation of components between development, test and operation systems of ERP, CRM and data warehouse, following technical specifications:-identify the components involved in the transport.

-Identify possible incompatibilities between components.

-Related versions in each environment (development, test and operation) product or developed components.

-Use transportation tools.

-Check the syntax of the component and the possible results of the transport.

-List the steps to follow to make transport between environments.

-Check the abstracts from the transport of components and their possible outcomes.

-Interpret the documentation inherent, even if it is published in the foreign language most often used in the sector, using the support in the administration.

-Document tasks performed and occurrences produced according to specified formats.

C2: Describe the operation and periodically launch the extraction procedures of data that feed data systems of ERP, CRM and data warehouse to maintain the timeliness of its information, technical specifications.

CE2.1 describe the physical and logical architecture that is involved in procedures for the extraction of data in ERP, CRM and data warehouse systems.

CE2.2 describe the extraction procedures of data (batch input) between ERP and CRM systems, and the data store; CRM and data warehouse; and CRM and ERP, identifying and executing the extractors to obtain the data.

CE2.3 interpret traces (logs) obtained after the release of data extraction procedures in the system to verify or detecting incidents in the execution.

CE2.4 in a case study, properly characterized, the extraction of data between systems of ERP, CRM and data warehouse, received specifications:-prepare (batch input) data extraction processes following the specifications received.

-Launch data extraction procedures.

-Observe traces (logs) and interpret the results.

-Run the extractors of the data store and view the logs produced.


-Identify and correct any incidents that occur in the extraction process.

-Document tasks performed and occurrences produced according to specified formats content 1. Maintenance in data warehouse management - processes of data warehouse systems.

-Definition of the structure of data-definition of the structure of processes-integration of processes-parameters of the systems that influence in the performance.

-Definition of parameters of configuration-optimization of resources of software and time of execution 2. Evaluation of performance - monitoring and performance assessment tools: features and functions.

-Definition of the functionalities that are want to evaluate.

-Definition of tools to evaluate the performance of the system ERP.

3. resolution of problems in the warehouse of data-traces of the system (logs).

-Definition of systems to trace the processes between ERP, CRM and data warehouse systems.

-Incidents: identification and resolution.

-Definition of processes to identify incidents, control and resolution - documentation of tasks and made incidents.

4. transport of components between development, test and operation in data warehouse environments - information transmission system.

-Features in data - tools involved in the transmission of data, configuration parameters.

-Development environments.

-Definition of development, testing, and operating environments - transport management between the environments of development, testing and operation 5. Errors in the execution of the transport - types of errors - syntax checking.

-Identification of incompatibilities between components.

-Documentation of errors found.

-Problem solving - use of manuals for troubleshooting - contributed solutions 6 documentation. Extraction processes of data in data warehouse systems - features and functionality.

-Definition of the structure involved in the processes of data extraction.

-Treatment of transformation of these data and information to facilitate decision making.

-Interpretation of results.

-Implementation procedures.

-Definition of procedures of data between ERP, CRM systems and database extraction.

7 incidents in the data extraction process - execution trace.

-Establishment of traces to study incidents - troubleshooting - solution and documentation of incidents.

TRAINING unit 3 name: operations of security in systems ERP-CRM and warehouse of data code: UF1887 duration: 30 hours reference of competition: this training unit corresponds with the RP4.

Capabilities and criteria of evaluation C1: identify tools and techniques to ensure access by customers and the integrity of the information, and manage the security of ERP, CRM and data warehouse systems, established technical specifications.

CE1.1 detailing the characteristics of the access channels to ERP, CRM and data warehouse systems.

CE1.2 determine the modules or components of ERP, CRM and data warehouse required to enable access through the possible channels.

CE1.3 describe the procedures of monitoring of the channels of access to systems of ERP, CRM and data warehouse to see status and performance.

CE1.4 creating users, groups, roles, privileges and profiles of authorization to ERP, CRM and data warehouse systems, to ensure access to it and the work of users, according to given specifications.

CE1.5 interpret the backup plan and carry out their execution to ensure the integrity of the ERP, CRM and data warehouse systems.

CE1.6 describe the steps to take to ensure the integrity and confidentiality of the information stored and manipulated within the ERP, CRM and data warehouse systems, taking into account the existing legislation on data protection.

CE1.7 in a case study, properly characterized, manage customers access to ERP, CRM and data warehouse systems, given technical specifications:-identify possible access channels according to the posed requirements.

-Configure the modules or components necessary to create the connection of the client.

-Configure the connections between the system of ERP, CRM and storage of data, and a system mobile.

-Create the users and profiles of authorization.

-Attach the profiles to the users.

-Check the functioning of the connection made and of the users and profiles created and associated.

-Interpret the documentation inherent, even if is edited in the language foreign of use more frequent in the sector, using the of help in the administration.

-Document the tasks performed and the incident produced according to formats specified.

Contents 1. Security of the system of ERP, CRM and warehouse of data-channels of access to those systems.

-Definition of the characteristics and methods of access to an ERP system - ways to ensure the integrity and confidentiality of the data: security protocols - compliance with the specifications of the LOPD - Control attempts to access a system, successful and failed.

-Management of assignments in CRM systems.

-Creation of rules of assignment of services.

-Allocation of business services.

2. user - create user - management Division of the company in roles of work - definition of profiles of job - assignment of users in profiles.

-By menu and company - permits customization according to the configured user profiles ERP processes.

-Parameterization of different profiles configured ERP modules.

3 backup - on-line/offline backup - copies different systems of safety - elements of hardware necessary to make copies - validate that the copies are made correctly by obtaining logs.

-Replicates in mirror - synchronization of programs and data on another identical server (mirror) - restoration of system and backups - a problem in the main equipment copies system restore.

Methodological guidelines training distance: units training duration in hours of training units no. peak hours likely to distance learning training unit 1 - UF1885 90 80 unit training 2 - 3 90 80 formative unit UF1886 - UF1887 30 20 sequence: formative units corresponding to this module can be programmed independently criteria for access to students shall be those laid down in article 4 of the Royal Decree that regulates the professional certificate of the Professional family that accompanies this annex.

TRAINING module 3 name: creation and maintenance of components SOFTWARE in systems of planning of resources business and of management of relationships with customers code: MF1215_3 level of professional qualification: 3 associated to the competition unit: UC1215_3: make and maintain software components in a system of customer relationship management and enterprise resource planning.

Duration: 240 hours training unit 1 name: maintenance operations and data query code: UF1888 duration: 90 hours referrer of competition: this training unit corresponds to the RP1.

Capabilities and criteria of evaluation C1: identify the data dictionary objects and keep them using languages and tools provided by ERP-CRM systems, following defined design specifications.

CE1.1 explain the features and elements that make up the data model used in ERP and CRM systems according to established design specifications.

CE1.2 identify the types of objects and structures that make up the ERP-CRM system data dictionary.

CE1.3 describe the mechanisms that ensure the integrity of the data contained in the data dictionary: primary key, foreign key and referential integrity, among others, according to the data model and the logical design of the system.

CE1.4 describe the features and functionality of the languages and tools provided by the ERP-CRM system used for the creation of objects and data structures.

CE1.5 create objects and data structures, as well as their relationships using languages and tools provided by the ERP-CRM system, according to the data of the system model.

CE1.6 an if practical, properly characterized, that involves maintaining data dictionary objects following a logical design and specified data model:-identify the objects that make up the logical design.

-Identify the object to modify.

-Identify relationships between objects.

-Perform maintenance operations using tools and languages provided by the ERP-CRM system.

-Document the procedures carried out in accordance with specified formats.


C2: Creating queries, reports and forms using languages and tools provided by the ERP-CRM system to extract and present information, according to the design specifications.

CE2.1 describe the features and functionality of the query languages provided by ERP and CRM systems used for the extraction of information, according to your specifications techniques.

CE2.2 describe the features of the tools provided by the system ERP-CRM for extract and present the information of these, according to their specifications technical and functional.

CE2.3 explain them features of them forms and reports, identifying them types and elements that them make up for their elaboration following specifications received.

CE2.4 present information extracted from ERP-CRM system in forms and reports using tools provided by those and received technical specifications.

CE2.5 in a case practical, properly characterized, that involves extract information of them systems ERP and CRM using languages of consultation and tools specific of them same, following specifications received:-identify the sources that contain the information to remove.

-Perform the operations of extraction of data using the language of inquiry.

CE2.6 in a case practical, properly characterized, create forms and reports for present information following a design specified:-identify the sources that contain the information to extract.

-Identify the format and elements to use as the report or the form to develop.

-Produce a report or form using the tools provided by the ERP-CRM system.

-Test the functionality of the report or elaborate form - document the procedures carried out in accordance with specified formats.

CE2.7 interpret the documentation inherent, even if it is published in the foreign language most often used in the sector, using the aid in development.

Contents 1. Models of data in ERP-CRM - data types and features models systems.

-Features of the data model.

-Definition of the data model.

-Relational model, definition of mechanisms that ensure referential integrity.

-Definition of tables.

-Connection between tables.

2. design of data.

-Definition of objects and data structures, characteristics.

-Definition of the elements that make up the design of the database.

-Definition of relationships between the elements.

-Creation, modification and deletion of objects and data structures.

-Maintenance of the database.

-Realization of operations between tables that ensure the creation, modification, and deletion of records between tables defined in the model.

3. definition of data types.

-Definition, data types and semantic characteristics.

-Definition of types of data that will be used in the data model.

-Definition of constants and variables in the data model.

-Extension of the data model in ERP and CRM systems.

-Definition of tables in the system.

-Definition of fields in the tables configured, set primary keys and indexes of management.

-Definition of the relations between the tables configured.

4. data dictionary systems ERP-CRM - data dictionary objects.

-Established programming language features.

-Definition of libraries, classes, and methods of the programming language.

-Tools for the creation and maintenance of the data dictionary.

-Definition of tools documentation 5. Screen designs - definition of screens of data collection.

-Tools for designing tables and maintenance - data entry screens settings - maintenance tools.

-Configuration of tools to create tables of data.

6 operations of inquiry - search tools agile user - definition of the functionalities of inquiry - search screens settings - protocols property search criteria for strings or numbers 7. Forms and reports into ERP-CRM systems - forms.

-Features of those forms and reports-search of tools standard that facilitate the obtaining of the information.

-The information to other systems, for example, Excel export.

-Reports, elements of reporting architectures.

-Specifications for the design of reports.

-Tools for creating forms and reports.

-Development of reporting for the obtaining of information 8. Access to information - access using ODBC.

-Definition of the Protocol ODBC - utilization of query language SQL - graphics unit training 2 name: development of component SOFTWARE in systems ERP-CRM code: UF1889 duration: 90 hours referrer of competition: this training unit corresponds to the RP2.

Capabilities and criteria of evaluation C1: identify programming techniques and create software components to modify or add features to the ERP-CRM system using tools and programming languages provided by these systems, according to the design specifications.

CE1.1 describe techniques, standards, recommendations and procedures of developing components in ERP-CRM systems according to specifications.

CE1.2 identify query optimization techniques to improve performance in access to large volumes of information in ERP-CRM systems.

CE1.3 use the grammar, syntax, and semantics of programming language provided by the ERP-CRM system for the creation and maintenance of software components, technical specifications.

CE1.4 identify and use the tools provided by the system to perform and maintain components software, technical and functional specifications.

CE1.5 identify and create components extraction software of data in the ERP-CRM system using the languages and tools provided, following technical specifications CE1.6 explain the methods of using programming interfaces of applications (APIs) provided by the system ERPCRM, allowing the development of components from other languages, functional specifications and design.

CE1.7 in a case study that involves creating components to manipulate the information in the ERP-CRM system, received design specifications:-identify the source of data to manage.

-To develop the component using the language provided by the ERP-CRM system.

-Optimize queries made in the component.

-Check and debug the component drawn up to ensure that they perform the required functionality--document the procedures conducted according to specified formats.

CE1.8 in a case study, properly characterized, create components to perform extractions of data between systems of ERP and CRM, received design specifications:-identify and define the transactions and their possible types.

-Explain and make the process of transferring data between ERP and CRM systems.

-Describe the possible mechanisms of automatic data entry into ERP and CRM systems.

-To develop the component using the language provided by the ERP-CRM system.

-Check and debug the component drawn up to ensure that it performs the required functionality - document the procedures conducted according to specified formats.

CE1.9 interpret the documentation inherent, even if it is published in the foreign language most often used in the sector, using the aid in development.

Contents 1. Techniques and standards for the development of components - functional specifications for the development of components.

-Techniques of optimization of queries and access to large volumes of information.

2. the language provided by the systems ERP-CRM - features and syntax of the language.

-Declaration of data. Programming structures.

3. definition of programming languages.

-Sentences of the language.

-Development environments and tools development in ERP and CRM systems.

4. definition of the database.

-Definition of database and structure of an ERP system tables.

5. functional analysis - Division of the activities of the ERP module - traceability between the 6 modules. Programming in ERP and CRM systems - generation programmes of extraction of data between systems (batch input).

-Extraction of information contained in ERP-CRM, data processing systems.

7 library of basic functions - functions definition - definition of libraries of functions (API) 8. Documentation - documentation of functional analysis.

-Documentation of the libraries and functions.

9 testing and debugging of a program - validation of programs.

-Error handling.

TRAINING unit 3 name: development of component SOFTWARE and queries inside of the system of warehouse of data code: UF1890 duration: 30 hours reference of competition: this training unit corresponds with the RP3.

Capabilities and evaluation criteria


C1: specify the structures and develop components for the handling and collection of information of the system of warehouse of data in systems ERP-CRM, following specifications technical and functional given.

CE1.1 identify the types of structures of information (cubes, multi-cubes), as well as their relationships necessary to store information in the system of warehouse of data, according to specifications technical.

CE1.2 identify the origins of data that is used to load the system of warehouse of data, following specifications of design.

CE1.3 explain the mechanisms that are used to create extractors of information in the data warehouse system, technical and functional specifications.

CE1.4 create software components for extracting information from data warehouse system using query languages and handling provided by the same, received specifications.

CE1.5 in a case study that involves collecting information in a data warehouse system:-create - cubes and multi-cubes - information structures and their relationships according to design specifications.

-Identify and prepare data sources.

-List the steps for loading the data into a data warehouse system and describe the charging system logs.

-Document the procedures carried out in accordance with specified formats.

CE1.6 in a case study, properly characterized, extracting information contained in the data warehouse system, received specifications:-identify data sources.

-Perform the extractors using the language provided by the data warehouse system.

-Define the structure of communication, transfer and transfer to data extraction rules.

-Run the extractors of information.

-Document the procedures carried out in accordance with specified formats.

CE1.7 interpret the documentation inherent, even if it is published in the foreign language most often used in the sector, using the aid in development.

Contents 1. Loading data - exploration of the data structures of information, cubes and multi-cubes store system.

-Identification of types of information structures and their relationships to store information.

-Process of loading data into the data warehouse system.

-Identification of data sources for data load.

-Creation of software components to extract information from a data warehouse system.

2. extraction of data (data warehouse) - tools for loading and extraction of data from data warehouse systems.

-Mechanisms that are used for the extraction of data - structuring the information to suit the needs of the company.

-Creation of data extractors.

-Obtaining information from internal or external sources.

-Grouping, processing and homogenization of information for study 3. Tools of obtaining of information-tools for viewing and broadcasting.

Guidelines methodological training to distance: units training duration total in hours of them units training No. of hours maximum susceptible of training to distance unit training 1-UF1888 90 80 unit training 2-UF1889 90 80 unit training 3-UF1890 30 20 sequence: for access to them units training 2 and 3 must have is exceeded it unit formative 1, since this constitutes the base of knowledge of the module.

PROFESSIONAL PRACTICES MODULE OF ADMINISTRATION AND PROGRAMMING SYSTEMS FOR CUSTOMER RELATIONSHIP MANAGEMENT AND ENTERPRISE RESOURCE PLANNING.

Code: MP0397 duration: 80 hours capabilities and C1 evaluation criteria: providing technical support in the installation and configuration of the operating system and the data manager for the implementation of systems of enterprise resource planning (ERP-CRM systems) customer relationship management.

CE1.1 identify the necessary technical characteristics in the servers so that they can accommodate the installation of ERP and CRM systems.

CE1.2 provide technical support in the installation and configuration of the operating system and the data manager, received and according to needs of the implementation specifications.

CE1.3 provide technical assistance in the installation of ERP, CRM systems, and the data manager, following the specifications noted on its adaptation to the needs of the C2 organization: participate in the process management of ERP, CRM and data warehouse systems.

CE2.1 collaborate in the administration of the operating system and the data Manager tasks, ensuring access to the datastore with the following tools: CE2.2 collaborate in monitoring and optimization of the performance of the ERP-CRM systems, according to the specifications and needs of the organization.

C3: Use software components to query, manipulate, and load information into ERP, CRM systems and the data store.

CE3.1 perform query and data mining on data warehouse system.

CE3.2 manage software components for the generation of forms and listings in ERP-CRM C4 systems: participate in the company's work processes, following the rules and instructions set forth in the work center.

CE4.1 behave responsibly both in human relations and works to be carried out.

CE4.2 respect the procedures and rules of the workplace.

CE4.3 undertake with diligence the tasks according to the instructions received, trying to of that is adapted to the rhythm of work of the company.

CE4.4 integrated into the production processes of the work center.

CE4.5 use established communication channels.

CE4.6 comply with the measures of prevention of risks, occupational health and environmental protection at all times.

Contents 1. Installation of the operating system - Definition of functional requirements - disk capacity - memory RAM - drives, partitions - communication protocols - installation procedures.

-Installation in Windows environments - installation on Linux - command interpretation environments.

-Control of resources - virtualization - the OS installation processes to support ERP and CRM - systems identify necessary features on a server to accommodate the installation of ERP and CRM systems.

2. installation of the data management system - definition of the architecture and components of the data management system.

-Installation of the data Manager processes to ERP and CRM systems.

-Application of the data manager configuration parameters.

-Modification of the elements of a database «tuning».

-Identification of the common database on the market.

3. installation of the system ERP - identification of the characteristics of a company.

-ERP system installation processes.

-Remote technical assistance procedures.

4. installation of CRM systems - identification of the characteristics of a company and its external relations.

-CRM system installation processes.

-Remote technical assistance procedures.

5. installation of the data storage system - identification of the database of the entity model.

-Data storage system installation procedures.

-Technical assistance in remote processes.

6 integration and communication in the workplace - responsible behaviour in the workplace.

-Respect to the procedures and rules of the Centre's work.

-Interpretation and execution with diligence the instructions received.

-Recognition of the productive process of the organization.

-Use of the channels of communication established in the workplace.

-Adapting to the pace of work of the company.

-Follow-up of the prevention of risks, occupational health and environmental protection regulations.

V. requirements of the trainers modules training accreditation required professional experience required in the field of competition MF1213_3 unit: installation and configuration of planning systems and enterprise resource management of relationships with clients ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities 2 years MF1214_3: administration of planning systems and enterprise resource management of relationships with clients ● Bachelor, engineer, architect or corresponding degree or other equivalent securities.

● Diplomado, technical engineer, technical architect or corresponding degree or other equivalent securities 2 years







MF1215_3: creation and maintenance of components software in systems of planning of resources business and of management of relationships with customers ● Bachelor, engineer, architect or the title of grade corresponding u others titles equivalent.

● Graduate, technical engineer, technical architect or corresponding degree or other equivalent titles 2 years space training surface m2 15 students surface m2 25 pupils 45 60 management classroom space training M1 M2 M3 classroom management x x x space training equipment classroom management - audiovisual equipment - PCs installed on network, canon of projection and internet - specific specialty Software - slates to write with pen - flipchart - classroom - table and Chair - Material for trainer Tables and chairs for students not be construed that identified different training areas must necessarily differentiate themselves through enclosures.

Facilities and equipment shall comply with the relevant health industrial and hygienic regulations and respond to universal accessibility and safety of the participants.

The number of units that must be prepared for utensils, machines and tools specified in the equipment of training spaces, will be sufficient for a minimum of 15 students and need to increase, where appropriate, to cater for the higher number.

In the case that the training is directed at people with disabilities accommodations and reasonable adjustments will be made to ensure their participation on equal terms.

Related Laws