Logo UAB

Safety Technology

Code: 104004 ECTS Credits: 6
Degree Type Year Semester
2502501 Prevention and Integral Safety and Security OB 1 2
The proposed teaching and assessment methodology that appear in the guide may be subject to changes as a result of the restrictions to face-to-face class attendance imposed by the health authorities.


Jose Martinez Martinez

Use of Languages

Principal working language:
spanish (spa)
Some groups entirely in English:
Some groups entirely in Catalan:
Some groups entirely in Spanish:

Other comments on languages

If international students are enrolled in the course, the language will be Spanish. Students can make their inquiries in writing in the following languages: Catalan, English, Spanish.


This subject doesn´t have any pre-requierments.

Objectives and Contextualisation

Differentiate and define security systems, such as electronic, physical and human elements, in the latter with special attention to learning men and women with respect and equality without prejudice to gender, installed and deployed in a facility to protect people and property before the different risks that can affect them.

Knowing the regulatory framework that regulates security technologies, and their relationship with the sectors of public security and private security.

Know the different electronic security devices that are marketed, installed, and maintained for the design of comprehensive security plans.

On the other hand, to know the existing physical security systems and how they are combined with electronic security systems to minimize the different risks to which the installation we wish to protect may be exposed.


  • Carry out analyses of preventative measures in the area of security.
  • Have a general understanding of basic knowledge in the area of prevention and integral safety and security.
  • Identify the resources necessary to respond to management needs for prevention and integral security.
  • Know how to communicate and transmit ideas and result efficiently in a professional and non-expert environment, both orally and in writing.
  • Make efficient use of ITC in the communication and transmission of results.
  • Respond to problems applying knowledge to practice.
  • Use the capacity for analysis and synthesis to solve problems.
  • Work and learn autonomously.
  • Work in institutional and interprofessional networks.

Learning Outcomes

  1. Analyse specific risks and understand the prevention mechanisms.
  2. Analyse the preventative interventions in matters of security, environment, quality and social corporate responsibility and identify the inherent risk factors.
  3. Diagnose the situation of integral security in companies and organisations.
  4. Draw up management proposals for prevention and security in an organisation.
  5. Identify, develop or acquire and maintain the main resources necessary to respond to tactical and operational needs inherent in the prevention and security sector.
  6. Know how to communicate and transmit ideas and result efficiently in a professional and non-expert environment, both orally and in writing.
  7. Make efficient use of ITC in the communication and transmission of results.
  8. Respond to problems applying knowledge to practice.
  9. Take a preventative view in the area of security.
  10. Use the capacity for analysis and synthesis to solve problems.
  11. Work and learn autonomously.
  12. Work in institutional and interprofessional networks.



  • Basic normative framework of Security Technologies.
    • Basic legislation.
    • Legislation Private security applicable to Security Technology.
    • Legislation Video surveillance. Legislation F.C.S.  
  • Physical security systems.
    • Perimetral
    • Foreign
    • Interiors  
  • Electronic security systems.
    • Access control. Intrusion.
    • Video surveillance.
    • CCTV.  
  • Fire protection system.
    • The detection.  
    • The extinction.
    • The alert and the evacuation.  
  • History of weapons.
    • Knives.
    • Firearms.
    • Applicable technologies in conflicts.  
  • Weapons and Explosives.
    • Basic weapons regulation.
    • Affectation of weapons in security systems.
    • Legislation on explosives.
    • The safety of explosives.  
  •  Shields Basic regulations Affectation of the shields in the security systems.  
    • Evolution of Security Technologies.  
    • Technosurveillance. Communication. Positioning Follow.    
    • Future of security technologies. Drones Robotics Cybersecurity
  • The technology of security against the human factor. Balance or technification of security.


• Classes with TIC support. Resolution of doubts and questions. Job tracking

• Resolution of exercises and practices: individual realization of works and practical cases, with ICT support.

• Personal study: Consolidation of theoretical and practical knowledge.

• The tutorials with the faculty will be arranged by email.

Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.


Title Hours ECTS Learning Outcomes
Type: Directed      
Classes with TIC support 12 0.48 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10
Evaluation 4 0.16 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10
Type: Supervised      
Work planning Readings, reflection on the subjects. Preparation of individual works. Continuous tests, and final test. 24 0.96 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10
Type: Autonomous      
Individual and group work (search for material, discussion, preparation and presentation). 110 4.4 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10


It will depart from the criteria based on continuous assessment, which will allow us to measure the degree of specific competences of the program that the student has achieved.

The values of each item for the evaluation are shown in the table below, all the items have to be overcome with (5) so that they can be computed in the evaluation.

Written test.

The evaluation tests will be theoretical / practical (PEC-1 and PEC-2) and will be carried out individually.

The works must be cited according to the corresponding regulations. No work will be admitted without a proper citation. https://ddd.uab.cat/pub/recdoc/2016/145881/citrefapa_a2016.pdf

Copy on examination or plagiarism.

If during a test the presence of students is detected copying will be automatically suspended without possibility of access to recovery.

In case of plagiarism in the writing of the works (PEC), each case will be assessed and, in extreme cases, the option of direct suspense without option to recovery will be considered.

In case of not passing the subject according to the aforementioned criteria (continuous evaluation), a recovery test may be done on the date scheduled in the schedule, and it will cover the entire contents of the program.

To participate in the recovery the students must have been previously evaluated in a set of activities, the weight of which equals a minimum of two thirds of the total grade of the subject. However, the qualification that will consist of the student's file is a maximum of 5-Approved.

Students who need to change an evaluation date must submit the request by filling in the document that you will find in the moodle space of Tutorial EPSI.

Without prejudice to other disciplinary measures deemed appropriate, and in accordance with current academic regulations, "in the event that the student makes any irregularity that could lead to a significant variation in the grade of an evaluation act, itwill be graded with a 0 This evaluation act, regardless of the disciplinary process that can be instructed In case of various irregularities occur in the evaluation acts of the same subject, the final grade of this subject will be 0 ".

In the event that the student repeats the subject, they must take all the tests specified in this teaching guide without exception. Works already presented by the student in previous years will not be accepted.

The tests / exams may be written and / or oral at the discretion of the teaching staff.

Assessment Activities

Title Weighting Hours ECTS Learning Outcomes
Final exam. 50% 0 0 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10
PEC 1 12.5% 0 0 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10
PEC 2 12.5% 0 0 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10
PEC 3 12.5% 0 0 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10
PEC 4 12.5% 0 0 1, 9, 6, 3, 8, 4, 2, 7, 5, 12, 11, 10



Aguado, V. (2007). Derecho de la Seguridad Pública y Privada. Navarra: Editorial Aranzadi.

Arzoz, X. (2010) Videovigilancia, seguridad ciudadana y derechos fundamentales. Navarra: Editorial Thomson Reuters.

Bentham, J. (1989). El Panóptico. Madrid: Editorial Endymion.

Bübl, M. (2017) La ciencia secreta de la cerrajería. Austria: Bübl.

Calero, L.M. (2005). La seguridad privada en España: actores, especificaciones y su planificación. Madrid: Editorial Universitas Internacional. S.L.

Desdentado, A., Muñoz, B. (2012). Control informático, videovigilancia y protección de datos en el trabajo. Valladolid: Editorial Lex Nova.

Díaz, F. (2013). Diccionario LID. Inteligencia y Seguridad. Madrid: Editorial Empresarial.

Ferro, J.M. (2015). Manual operativo del director y jefe de seguridad. Madrid: Editorial Auto-Editor.

Foucault, M. (2012). Vigilar y Castigar. Madrid: Editorial Biblioteca Nueva, S.L.

Freedman, L. (2019). La Guerra del Futuro. Barcelona: Editorial Crítica.

Gómez, R. (2014). Diccionario terminológico para la seguridad privada. Madrid: Editorial Tecnos.

Gómez, R. (2014). Diccionario terminológico de la seguridad privada. Madrid: Editorial Tecnos. S.L.

González, J. (2012) Inteligencia. Valencia: Tirant lo Blanch

González, M. (2011). Guía visual para falsear cerraduras (3.ed.). Illinois: Standard Publicaciones, Inc.

Innerarity, D., Solana, J. (2011). La humanidad amenazada: gobernar los riesgos globales. Barcelona: Editorial Paidós.

Lamas, L. (2019) Apertura de puertas, técnicas y trucos. (4.ed.). Madrid: Nivel Medio.

Lyon, D. (1995). El ojo electrónico. El auge de la sociedad de vigilancia. Madrid: Editorial Alianza.

Macías Fernández. D.  (2014). David contra Goliat. Guerra y Asimetría en la edad contemporánea. Madrid. Editorial Instituto Universitario Gutiérrez Mellado.

Martínez, R. (2002). Armas: ¿Libertad americana o prevención europea? Barcelona: Editorial Ariel.

Martínez, R., Rodríguez, J. (2018). Inteligencia artificial y armas letales autónomas. Gijón: Ediciones Trea.

Martínez. E.  (2008). Los soldados del Rey. Madrid. Editorial Andújar.

McLaughlin, E., Muncie, J. (2014). Diccionario de criminología. Barcelona: Editorial Gedisa, S.A.

Miró, F. (2012). El Cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio. Barcelona: Editorial Marcial Pons.

Montoya, R. (2014). Drones. La muerte por control remoto. Madrid: Editorial Akal.

Muñoz Bolaños. R.  (2001). La campaña de 1909. Las campañas de Marruecos, 1909-1927. Madrid.

Perales, T. (2014). Instalaciones de sonido, imagen y seguridad electrónica. Madrid: Editorial Marcombo.

Poveda, M.A., Torres, B. (2015). Dirección y gestión de la seguridad privada. Madrid: Editorial Fragua.

Puell de la Villa. F.  (2007). La guerra con armas de fuego. M. Artola (ed.). Historia de Europa. Madrid. Editorial Espasa Calpe. Vol. II.

Quedada. F. (2007). La Guerra con arma blancaM. Artola (ed.) Historia de Europa. Madrid. Editorial. Espasa Calpe. Vol. I.

Ridaura, M.ª J.  (2015). Seguridad Privada y Derechos Fundamentales (La nueva Ley 5/2014, de abril, de Seguridad Privada). Valencia: Editorial Tirant lo Blanch.

Rodríguez, A (2005). 250 modelos de cerrajería. Barcelona: Ediciones CEAC.

Rodríguez, F. (2018). Circuito cerrado de televisión y seguridad electrónica. (ed.2) Madrid. Editorial Paraninfos.

Somoza, O. (2004). La muerte violenta. Inspección ocular y cuerpo del delito. Madrid: Editorial la Ley.

Teijeiro de la Rosa. JM. (2016). Dinero y ejércitos en España. De la Antigüedad al siglo XXI. Madrid.

Torrente, D. (2015). Análisis de la seguridad privada. Barcelona: Editorial UOC.




For the realization of the subject it is not necessary any type of specific software.