Courses may be offered in one of the following modalities:
If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.
Semester: | Spring 2024 |
Number: | 0145-674-001 |
Instructor: | Kees Leune |
Days: | TBA |
Note: | Online, Asynchronous |
Location: | Online |
Credits: | 3 |
Course Meets: | March 25 - May 16 |
Notes: |
Open Only To Students In The Ms In Computer Science |
Course Materials: | View Text Books |
Description: |
Students will learn how to incorporate security considerations into the software development lifecycle by studying cyber threat analysis techniques and applying them to analyze threats facing computer software. Topics that are covered include methods like STRIDE and DREAD, as well as emerging techniques. |
Learning Goals: |
After completion of this course, students will:• Understand and explain the techniques behind threat modeling. Assessed by Quiz 1 and Exercise 1 and 2• Apply techniques to analyze existing cyber-based processes. Assessed by Quiz 2, and Assignment 3. • Evaluate and refine cyber-based processes by re-enforcing their defensive postures. Assessed by Quizzes 3-4, and Assignment 4. • Explain and demonstrate how bug-bounties can be applied to continuous protection of software development life cycle: Assessed by final exam, Quiz 5, and Assignment 5. *The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here. |
Prerequisites: |
» View Other Sections of this Course