Degree in Electronic Engineering - Minor in Robotics

Become a qualified specialist focused in the field of robotics applied to sectors such as social, educational, therapeutic or care

Networking and IT Security

This subject trains the student in the world of ICT Security through the `Ethical Hacking´. It is a practical subject that is developed in the Networking Laboratories.
Type Subject

Titular Professors

Previous Knowledge

Local Area Networks.
It is recommended that the student have studied or is studying the subjects `Networking Laboratory´ or `System Design and Administration´


The objectives of this subject is that the students:
- Know well the concepts of network security, the existing threats, the necessary solutions and their deployment.
- Know and apply the techniques to secure networks and systems.
- Know the techniques used to perform attacks.
- Have the capacity to do security auditories (Ethical hacking)
- Know the laws related to ICT security and know how to act in consequence.

Learning Outcomes of this subject are:
RA.01 - Know the security technologies and their application in systems and data networks (GT).
RA.02 - The main safety techniques are known (GI).


1. Introduction and basic scenarios
2. Cryptography
3. Password Cracking
4. Basic Network Attacks
5. Footprinting
6. Host Scanning
7. OS and Applications Fingerprint
8. Searching for Vulnerabilities
9. Exploiting and Penetrating


The training activities used in the subject are the following:
- Presentation in the classroom of the concepts and procedures using the method of the lesson
- Laboratory practice
- Personal dedication to laboratory exercices
- Study and personal work
- Evaluations

The practical sessions are carried out in the Networking laboratory. Likewise, the student, throughout the subject, will have to complement his learning of the subject by means of the realization of diverse practices and assessments.

All laboratory practices are performed within a controlled testing environment, called "LOST Project", which allows the student to perform all kinds of tests and attacks, without any legal risk of harming any real system.


The evaluation activities used in the subject are:
1. Laboratory Practices (LABs) - Each lesson has a set of practices that accompany students to learn step by step the various topics.
2. Security Testing Report. Each group will have to perform a Vulnerability Assessment and a Penetration Test on a set of previously assigned servers of the LOST Project (Learning platfOrm for Security Training).
3. Final Interview of the Security Testing Report.
4. Individual exams

Evaluation Criteria

The Final Grade will be calculated as follows:
- 10% - Attendance
- 25% - LABs
- 35% - Security Testing Report
- 10% - Personal interview
- 20% - Exam (checkpoint or final)

The subject will be passed successfully if the Final Grade is equal to or higher than 5.

Basic Bibliography

Subject's notes and laboratory practices

Additional Material

Complementary documentation is available to students at (virtual campus).