To understand that other protocols, being auxiliary (not related to the world of security), present exploitable vulnerabilities; and will be able to describe the most common attacks that try to take advantage of them, and some possible countermeasures |
|
|
|
|
Ability to identify the components of an operating system, recognise its functions and the interrelationships between them. |
|
B3
|
|
D3
|
The ability to solve problems with initiative, to make creative decisions and to communicate and transmit knowledge and skills, understanding the ethical and professional responsibility of the Technical Telecommunication Engineer activity. |
|
B4
|
|
D2
|
Manage and know the operative associated to the administration of current operating systems. |
|
B3
|
|
D3
|