Your transaction is in progress.
Please Wait...
Course Details
KTO KARATAY UNIVERSITY
Trade and Industry Vocational School
Programme of Information Security Technology
Course Details
Course Code Course Name Year Period Semester T+A+L Credit ECTS
08120103 Secure Software Development 1 Spring 2 2+2+0 4 4
Course Type Compulsory
Course Cycle Associate (Short Cycle) (TQF-HE: Level 5 / QF-EHEA: Short Cycle / EQF-LLL: Level 5)
Course Language Turkish
Methods and Techniques -
Mode of Delivery Face to Face
Prerequisites -
Coordinator Lect. Seda YILDIRIM
Instructor(s) Lect. Gizem ÇELİK
Instructor Assistant(s) -
Course Instructor(s)
Name and Surname Room E-Mail Address Internal Meeting Hours
Lect. Gizem ÇELİK C-125 [email protected] 7434 Friday
10:00-12:00
Course Content
Introduction to Secure Software Development
Software Security Fundamentals and Threat Types
Security in the Software Development Lifecycle (SDLC)
Secure Coding Principles and Best Practices
Input Validation and Data Validation Techniques
Authentication and Authorization Mechanisms
Encryption and Data Privacy
Web Application Security and the OWASP Top 10
SQL Injection, XSS, and Other Common Vulnerabilities
Secure Software Architecture and Design Patterns
Code Analysis, Security Testing, and Vulnerability Scanning
Error Management, Logging, and Event Monitoring
Security Policies, Standards, and Regulations
Term Project Presentations and Security Audit Assessment
Objectives of the Course
The aim of this course is to teach the fundamental concepts of software security, types of threats, and secure software development processes. Students will learn how to integrate security into the Software Development Life Cycle (SDLC), apply secure coding principles, and identify and mitigate common vulnerabilities such as SQL Injection and XSS. They will also gain the ability to design secure software architectures, implement data protection techniques, and develop secure applications using authentication and authorization mechanisms.
Contribution of the Course to Field Teaching
Basic Vocational Courses
Specialization / Field Courses X
Support Courses
Transferable Skills Courses
Humanities, Communication and Management Skills Courses
Relationships between Course Learning Outcomes and Program Outcomes
Relationship Levels
Lowest Low Medium High Highest
1 2 3 4 5
# Program Learning Outcomes Level
P1 He/she has basic, current and practical knowledge about his/her profession. 5
P3 Follows current developments and practices for his/her profession and uses them effectively. 5
P11 Explains and applies data security and encryption methods. 5
P13 Identifies and fixes security vulnerabilities in computer and software systems. 5
P20 To enable students to gain the competence to solve the problems they encounter in their academic and professional lives by using information technologies effectively and efficiently. 5
Course Learning Outcomes
Upon the successful completion of this course, students will be able to:
No Learning Outcomes Outcome Relationship Measurement Method **
O1 P.1.1
O2 P.11.1 1
O3 P.1.5 1,4,5
O4 P.13.1 1
O5 P.13.2 7
O6 P.13.3 5
O7 P.13.4 1,7
O8 P.13.5 1,7
O9 P.13.6 5
O10 P.20.4 7
** Written Exam: 1, Oral Exam: 2, Homework: 3, Lab./Exam: 4, Seminar/Presentation: 5, Term Paper: 6, Application: 7
Weekly Detailed Course Contents
Week Topics
1 Introduction to Secure Software Development
2 Software Security Fundamentals and Threat Types
3 Security in the Software Development Lifecycle (SDLC)
4 Secure Coding Principles and Best Practices
5 Input Validation and Data Validation Techniques
6 Authentication and Authorization Mechanisms
7 Encryption and Data Privacy
8 Web Application Security and OWASP Top 10
9 SQL Injection, XSS, and Other Common Vulnerabilities
10 Secure Software Architecture and Design Patterns
11 Code Analysis, Security Testing, and Vulnerability Scanning
12 Error Handling, Logging, and Event Monitoring
13 Security Policies, Standards, and Legal Regulations
14 Term Project Presentations and Security Audit Evaluation
Textbook or Material
Resources Michael Howard, David LeBlanc, Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World, 2nd ed. Edition, Microsoft Press (2003)
Mark G. Graff, Kenneth R. Van Wyk, Secure Coding: Principles and Practices, O'Reilly Media (2003)
Gerardus Blokdyk, Software Security Vulnerability A Complete Guide, 5STARCooks (2020)
Evaluation Method and Passing Criteria
In-Term Studies Quantity Percentage
Attendance - -
Laboratory - -
Practice - -
Field Study - -
Course Specific Internship (If Any) - -
Homework - -
Presentation 1 20 (%)
Projects - -
Seminar - -
Quiz - -
Listening - -
Midterms 1 30 (%)
Final Exam 1 50 (%)
Total 100 (%)
ECTS / Working Load Table
Quantity Duration Total Work Load
Course Week Number and Time 14 2 28
Out-of-Class Study Time (Pre-study, Library, Reinforcement) 14 2 28
Midterms 1 10 10
Quiz 0 0 0
Homework 0 0 0
Practice 14 2 28
Laboratory 0 0 0
Project 0 0 0
Workshop 0 0 0
Presentation/Seminar Preparation 1 6 6
Fieldwork 0 0 0
Final Exam 1 20 20
Other 0 0 0
Total Work Load: 120
Total Work Load / 30 4
Course ECTS Credits: 4
Course - Learning Outcomes Matrix
Relationship Levels
Lowest Low Medium High Highest
1 2 3 4 5
# Learning Outcomes P1 P11 P13 P20
O1 Bilişim güvenliği temel kavramlarını tanımlar. 5 5 - -
O2 Güncel güvenlik trendlerini analiz eder. 5 - - -
O3 Veri güvenliğinin temel prensiplerini ve amacını tanımlar. - 5 - -
O4 Yazılım ve sistemlerdeki yaygın güvenlik açıklarını ve bu açıkların nedenlerini açıklar. - - 5 -
O5 Güvenlik açıklarını bulmak için kullanılan temel analiz ve tarama araçlarını kullanabilir. - - 5 -
O6 Tespit edilen bir güvenlik açığının olası etkisini ve risk seviyesini değerlendirir. - - 4 -
O7 Sistem ve yazılımların yaşam döngüsü boyunca güvenlik kontrollerini sürdürmenin önemini kavrar ve temel adımlarını uygular. - - 4 -
O8 Tespit edilen güvenlik açıklarını kapatmak için uygun yamaları veya kod düzeltmelerini önerir ve uygular. - - 5 -
O9 Güvenlik testleri sonrasında elde edilen sonuçları anlaşılır bir şekilde raporlar ve ilgili paydaşlara sunar. - - 5 -
O10 Veri güvenliği, etik ve gizlilik konularında bilinçli olma ve bu ilkeleri uygulayabilme. - - - -