Software systems and information protection technologies

Course: Software Engineering

Structural unit: Faculty of information Technology

Title
Software systems and information protection technologies
Code
ВБ 1.5.
Module type
Вибіркова дисципліна для ОП
Educational cycle
Second
Year of study when the component is delivered
2021/2022
Semester/trimester when the component is delivered
4 Semester
Number of ECTS credits allocated
3
Learning outcomes
Reasonably choose programming paradigms and languages for software development; apply modern means of software development in practice. Be able to develop an adaptive component of an intelligent user interface, understand the principles of effective construction, management of the corporate infrastructure of operating systems, including real-time operating systems, to know the mathematical foundations of image recognition and to be able to apply methods of decomposition, image normalization and image classification; know the principles, methods and technologies of application software development for distributed information systems, including ERP systems; to be able to develop and solve current security issues of software engineering.
Form of study
Full-time form
Prerequisites and co-requisites
Successful completion of courses: "Algorithms and data structures", "Fundamentals of software engineering", "Analysis of software requirements".
Course content
The discipline includes the study by students of methodological and methodological issues related to vulnerability research and software protection, acquisition of special knowledge and practical skills in the application of methods and means of building effective software protection systems.
Recommended or required reading and other learning resources/tools
1. Microsoft Security Development Lifecycle (SDL) – Process Guidance https://msdn.microsoft.com/en-us/library/windows/desktop/84aed186-1d75-4366-8e61- d258746bopq.aspx 2. OWASP Foundation. OWASP Testing Guide v4.0. URL: https://www.owasp.org/index.php/Web_Application_Penetration_Testing. 3. Heiderich M., Nava E., Heyes G., Lindsay D. Web Application Obfuscation. –ISBN-10: 1597496049. 4. McNab C. Network Security Assessment : Know Your Network, second edition. – ISBN-10:0-596- 51030-6.
Planned learning activities and teaching methods
Lectures, laboratory classes, independent work
Assessment methods and criteria
The level of achievement of the planned learning outcomes is determined by the results: - semester assessment: - current control by checking the teacher and defending the results of tasks during classes and independent work outside classes by the student; - written modular control papers; - final assessment: - semester control in the form of an exam. 1. semester evaluation of the student's work - points are accumulated during the semester - a maximum of 60 points, a minimum of 36 points. 2. written final comprehensive control paper (PPKKR) - exam - the maximum score is 40 points (40% of the final score), the minimum is 24 points. The total number of points cannot exceed 100 points. For a positive grade for a discipline, a student must score at least 60 points in total for the semester assessment and exam.
Language of instruction
Ukrainian

Lecturers

This discipline is taught by the following teachers


Faculty of information Technology

Departments

The following departments are involved in teaching the above discipline

Faculty of information Technology