CYS5119 Secure Web Software DevelopmentBahçeşehir UniversityDegree Programs CYBER SECURITY (ENGLISH, THESIS)General Information For StudentsDiploma SupplementErasmus Policy StatementNational QualificationsBologna Commission
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CYS5119 Secure Web Software Development Fall
3 0 3 12
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester.

Basic information

Language of instruction: English
Type of course: Departmental Elective
Course Level:
Mode of Delivery: Face to face
Course Coordinator : Dr. Öğr. Üyesi AHMET NACİ ÜNAL
Recommended Optional Program Components: None
Course Objectives: Learning software assurance topic and learning principles of secure software development.

Learning Outcomes

The students who have succeeded in this course;
Students will learn the following items: How to store software on escrow services? Requirements of secure software. Requirement of software certification. Principles of secure software development.

Course Content

Fundamentals of information assurance, SDLC, software maturity, security enhancement methods, security measurement methods.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Course outline Lecturer notes
2) Information assurance concept Lecturer notes
3) Necessity of software security Lecturer notes
4) Software licensing and certification Lecturer notes
5) Data escrow concept and its applications Lecturer notes
6) SDLC Lecturer notes
7) Secure software development Lecturer notes
8) Secure software development Lecturer notes
9) Secure software development patterns Lecturer notes
10) Software maturity Lecturer notes
11) Determining software security and software security metering Lecturer notes
12) Auditing of secure software development cycle Lecturer notes
13) Up-to-date discussion Lecturer notes
14) Up-to-date discussion Lecturer notes


Course Notes / Textbooks: Information Assurance Handbook: Effective Computer Security and Risk
Management Strategies, Corey Schou, Steven Hernandez, 2014, McGraw-Hill
Osborne Media.
Secure and Resilient Software Development, Mark S. Merkow, Lakshmikanth
Raghavan, 2010, Auerbach Publication.
References: Ders notları

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 10 % 0
Homework Assignments 4 % 10
Presentation 1 % 10
Midterms 1 % 20
Final 1 % 60
Total % 100
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Study Hours Out of Class 14 12 168
Presentations / Seminar 2 3 6
Homework Assignments 4 8 32
Midterms 1 20 20
Final 1 20 20
Total Workload 288

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
Program Outcomes Level of Contribution
1) Understand and implement advanced concepts of Siber Security
2) Use math, science, and modern engineering tools to formulate and solve advenced siber security problems.
3) Review the literature critically pertaining to his/her research projects, and connect the earlier literature to his/her own results
4) Follow, interpret and analyze scientific researches in the field of engineering and use the knowledge in his/her field of study
5) Work effectively in multi-disciplinary research teams
6) Acquire scientific knowledge
7) Find out new methods to improve his/her knowledge.
8) Effectively express his/her research ideas and findings both orally and in writing
9) Defend research outcomes at seminars and conferences.
10) Prepare master thesis and articles about thesis subject clearly on the basis of published documents, thesis, etc.
11) Demonstrate professional and ethical responsibility.