INFORMATION TECHNOLOGIES (ENGLISH, NON-THESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CYS5119 | Secure Web Software Development | Spring | 3 | 0 | 3 | 12 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Departmental Elective |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
Recommended Optional Program Components: | None |
Course Objectives: | Learning software assurance topic and learning principles of secure software development. |
The students who have succeeded in this course; Students will learn the following items: How to store software on escrow services? Requirements of secure software. Requirement of software certification. Principles of secure software development. |
Fundamentals of information assurance, SDLC, software maturity, security enhancement methods, security measurement methods. |
Week | Subject | Related Preparation |
1) | Course outline | Lecturer notes |
2) | Information assurance concept | Lecturer notes |
3) | Necessity of software security | Lecturer notes |
4) | Software licensing and certification | Lecturer notes |
5) | Data escrow concept and its applications | Lecturer notes |
6) | SDLC | Lecturer notes |
7) | Secure software development | Lecturer notes |
8) | Secure software development | Lecturer notes |
9) | Secure software development patterns | Lecturer notes |
10) | Software maturity | Lecturer notes |
11) | Determining software security and software security metering | Lecturer notes |
12) | Auditing of secure software development cycle | Lecturer notes |
13) | Up-to-date discussion | Lecturer notes |
14) | Up-to-date discussion | Lecturer notes |
Course Notes / Textbooks: | Information Assurance Handbook: Effective Computer Security and Risk Management Strategies, Corey Schou, Steven Hernandez, 2014, McGraw-Hill Osborne Media. Secure and Resilient Software Development, Mark S. Merkow, Lakshmikanth Raghavan, 2010, Auerbach Publication. |
References: | Ders notları |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 10 | % 0 |
Homework Assignments | 4 | % 10 |
Presentation | 1 | % 10 |
Midterms | 1 | % 20 |
Final | 1 | % 60 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 12 | 168 |
Presentations / Seminar | 2 | 3 | 6 |
Homework Assignments | 4 | 8 | 32 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 288 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Uses basic Software Engineering knowledge and competencies. | |
2) | Applies the software development ability that is necessary for software engineering applications. | |
3) | Uses data structures and applies information about algorithm development. | |
4) | Develops system programs on operating systems. | |
5) | Defines computer organization, design and architectures. | |
6) | Creates the structure of computer networks and network security. | |
7) | Uses business intelligence, data mining and data analysis tools, applies techniques about them. | |
8) | Develops database applications and WEB based programs. | |
9) | Defines, analyzes, designs and manages information technologies projects. | |
10) | Uses and develops technology-based environments and tools in education. | |
11) | Detects, identifies and solves information technology needs of the business environment. | |
12) | Uses the capabilities of information technologies within the rules of professional responsibility and ethics. |