| INFORMATION TECHNOLOGIES (ENGLISH, NON-THESIS) | |||||
| Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 | ||
| Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
| CYS5119 | Secure Web Software Development | Spring | 3 | 0 | 3 | 12 |
| This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
| Language of instruction: | English |
| Type of course: | Departmental Elective |
| Course Level: | |
| Mode of Delivery: | Face to face |
| Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
| Recommended Optional Program Components: | None |
| Course Objectives: | Learning software assurance topic and learning principles of secure software development. |
|
The students who have succeeded in this course; Students will learn the following items: How to store software on escrow services? Requirements of secure software. Requirement of software certification. Principles of secure software development. |
| Fundamentals of information assurance, SDLC, software maturity, security enhancement methods, security measurement methods. |
| Week | Subject | Related Preparation |
| 1) | Course outline | Lecturer notes |
| 2) | Information assurance concept | Lecturer notes |
| 3) | Necessity of software security | Lecturer notes |
| 4) | Software licensing and certification | Lecturer notes |
| 5) | Data escrow concept and its applications | Lecturer notes |
| 6) | SDLC | Lecturer notes |
| 7) | Secure software development | Lecturer notes |
| 8) | Secure software development | Lecturer notes |
| 9) | Secure software development patterns | Lecturer notes |
| 10) | Software maturity | Lecturer notes |
| 11) | Determining software security and software security metering | Lecturer notes |
| 12) | Auditing of secure software development cycle | Lecturer notes |
| 13) | Up-to-date discussion | Lecturer notes |
| 14) | Up-to-date discussion | Lecturer notes |
| Course Notes / Textbooks: | Information Assurance Handbook: Effective Computer Security and Risk Management Strategies, Corey Schou, Steven Hernandez, 2014, McGraw-Hill Osborne Media. Secure and Resilient Software Development, Mark S. Merkow, Lakshmikanth Raghavan, 2010, Auerbach Publication. |
| References: | Ders notları |
| Semester Requirements | Number of Activities | Level of Contribution |
| Attendance | 10 | % 0 |
| Homework Assignments | 4 | % 10 |
| Presentation | 1 | % 10 |
| Midterms | 1 | % 20 |
| Final | 1 | % 60 |
| Total | % 100 | |
| PERCENTAGE OF SEMESTER WORK | % 40 | |
| PERCENTAGE OF FINAL WORK | % 60 | |
| Total | % 100 | |
| Activities | Number of Activities | Duration (Hours) | Workload |
| Course Hours | 14 | 3 | 42 |
| Study Hours Out of Class | 14 | 12 | 168 |
| Presentations / Seminar | 2 | 3 | 6 |
| Homework Assignments | 4 | 8 | 32 |
| Midterms | 1 | 20 | 20 |
| Final | 1 | 20 | 20 |
| Total Workload | 288 | ||
| No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
| Program Outcomes | Level of Contribution | |
| 1) | Uses basic Software Engineering knowledge and competencies. | |
| 2) | Applies the software development ability that is necessary for software engineering applications. | |
| 3) | Uses data structures and applies information about algorithm development. | |
| 4) | Develops system programs on operating systems. | |
| 5) | Defines computer organization, design and architectures. | |
| 6) | Creates the structure of computer networks and network security. | |
| 7) | Uses business intelligence, data mining and data analysis tools, applies techniques about them. | |
| 8) | Develops database applications and WEB based programs. | |
| 9) | Defines, analyzes, designs and manages information technologies projects. | |
| 10) | Uses and develops technology-based environments and tools in education. | |
| 11) | Detects, identifies and solves information technology needs of the business environment. | |
| 12) | Uses the capabilities of information technologies within the rules of professional responsibility and ethics. |