Last modified: 23 Jul 2024 11:05
Software bugs and vulnerabilities are the main source of threats to security. This course introduces students to design, development, testing and evaluating secure and dependable software. This course develops students both theoretical and practical skills to define, implement, examine, and manage secure software lifecycle. The course provides necessary skills needed for security professionals ranging from software architects, developers to penetration testers and IT Managers.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | Second Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
In this course, students will be exposed to number of secure software development and management techniques to practice effective software security techniques. By the end of the course, students should be able to do the following things:
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | 15 | Feedback Weeks | 15 | |
Feedback |
Based on Lecture 5 and 6 Feedback - Online. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Evaluate | Able to carry out the secure software testing and evaluation. |
Procedural | Analyse | Understand the fundamental requirements of secure software design and development. |
Procedural | Apply | Gain the skills to apply the secure software architecture and design principles. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | 16 | Feedback Weeks | 16 | |
Feedback |
Based on Lecture 9 and 10 Feedback - Online. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Understand | Understand the challenges organisations face in managing their software supply chain and how they can minimise their security exposure from their supply chain partners. |
Factual | Understand | Have the basic understanding of secure software deployment, operations and maintenance. |
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | 16 | Feedback Weeks | 16 | |
Feedback |
Topic that encompasses the knowledge/skills gained in the course. Feedback - Online. |
Word Count | 2000 |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Evaluate | Able to carry out the secure software testing and evaluation. |
Conceptual | Understand | Understand the challenges organisations face in managing their software supply chain and how they can minimise their security exposure from their supply chain partners. |
Factual | Understand | Have the basic understanding of secure software deployment, operations and maintenance. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | 14 | Feedback Weeks | 14 | |
Feedback |
Based on Lecture 3 and 4 Feedback - Online. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Apply | Appreciate the basic concepts of secure software design. |
Procedural | Analyse | Understand the fundamental requirements of secure software design and development. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | 15 | Feedback Weeks | 15 | |
Feedback |
Based on Lecture 7 and 8 Feedback - Online. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Evaluate | Able to carry out the secure software testing and evaluation. |
Factual | Understand | Understand and appreciate the challenges of software lifecycle management. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | 14 | Feedback Weeks | 14 | |
Feedback |
Based on Lecture 1 and 2 Feedback - Online |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Apply | Appreciate the basic concepts of secure software design. |
Conceptual | Understand | Understand the importance of secure software development techniques for cybersecurity. |
There are no assessments for this course.
Assessment Type | Summative | Weighting | ||
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
(Continuous Assessment Courses Only) Where a student fails the course overall they will be afforded the opportunity to resit those parts of the course that they failed (pass marks will be carried forward). Feedback - Online. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Factual | Understand | Have the basic understanding of secure software deployment, operations and maintenance. |
Conceptual | Understand | Understand the importance of secure software development techniques for cybersecurity. |
Factual | Understand | Understand and appreciate the challenges of software lifecycle management. |
Conceptual | Understand | Understand the challenges organisations face in managing their software supply chain and how they can minimise their security exposure from their supply chain partners. |
Procedural | Apply | Gain the skills to apply the secure software architecture and design principles. |
Procedural | Analyse | Understand the fundamental requirements of secure software design and development. |
Conceptual | Evaluate | Able to carry out the secure software testing and evaluation. |
Conceptual | Apply | Appreciate the basic concepts of secure software design. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.