GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR

COURSE DESCRIPTION
SECURE SOFTWARE DEVELOPMENT/5101311
Course Title: SECURE SOFTWARE DEVELOPMENT
Credits 3 ECTS 8
Semester 1 Compulsory/Elective Elective
COURSE INFO
 -- LANGUAGE OF INSTRUCTION
  Turkish
 -- NAME OF LECTURER(S)
  Assist.Prof.Dr.Sami ACAR
 -- WEB SITE(S) OF LECTURER(S)
  websitem.gazi.edu.tr/site/samiacar, www.samiacar.net, www.samiacar.com
 -- EMAIL(S) OF LECTURER(S)
  samiacar@gazi.edu.tr, samiacar@gmail.com
 -- LEARNING OUTCOMES OF THE COURSE UNIT
Learning outcomes of this course as follows; To learn the basic concepts of secure software development, process and environments of secure software d
Having the knowledge about preparing and using secure software, and using security tools.
Gain the ability to grasp the concepts operating system firewalls, antivirus softwares, cyber attacks via internet protocols and ports.
To learn security policy of internet and mobile based applications.
Having the knowledge about cyber attacks via internet protocols and ports, spywares, malwares etc. and viruses.
To research and to learn secure database management systems.
Having the knowledge about secure configuration of web server and database server.
To learn methods and tools for software and database backup and restore.
To research and to learn secure software development studies in public and private sectors.
 -- MODE OF DELIVERY
  The mode of delivery of this course is Face to face
 -- PREREQUISITES AND CO-REQUISITES
  There is no prerequisite or co-requisite for this course.
 -- RECOMMENDED OPTIONAL PROGRAMME COMPONENTS
  There is no recommended optional programme component for this course.
 --COURSE CONTENT
1. Week  Introduction to Secure Software Development and basic concepts
2. Week  Software development process and environments
3. Week  The compilation of software and encryption
4. Week  Security of open-source softwares
5. Week  Operating system shields: Firewalls and antivirus softwares
6. Week  Security in internet based softwares and configuration of web servers
7. Week  Security for mobile applications
8. Week  MID-TERM EXAM
9. Week  The principles of secure software development for e-government and e-business applications
10. Week  Cyber attack tools for softwares and databases: malware, malicious software, viruses, and worms
11. Week  Network protocols and ports which are used by hackers and spywares for cyber attacks.
12. Week  Identifying the attacks, response, approaches and solution for cyber attacks via network protocols and ports
13. Week  Creating a secure data base management system, personal and corporate data protection
14. Week  Methods and tools for system backup
15. Week  System and data recovery softwares
16. Week  FINAL EXAM
 -- RECOMMENDED OR REQUIRED READING
  - Acar, S. ve Kavak, S. (2013). Qualification Status of Measures Taken for Internet and Network Security in Public Institutions, Unpublished research report, Ankara. - Acar, S. ve Meşe, G. (2013). Legal and institutional requirements for the protection of personal data in internet environment, Unpublished research report, Ankara. - Acar, S. ve Gürsoy, H. (2012). Transition to Audio, Visiual Recording and Video Conference Applications in the Turkish Courts: Criminal Courts Sample, Journal of Ankara Bar, Sayı:4, s.109-137, Ankara. - Acar, S. (2006). The Technological Infrastructure of E-Business and Security, EU Leonardo Da Vinci Project, Course Notes, Ankara.
 -- PLANNED LEARNING ACTIVITIES AND TEACHING METHODS
  Lecture, question & answer, demonstration
 -- WORK PLACEMENT(S)
  ---
 -- ASSESSMENT METHODS AND CRITERIA
 
Quantity
Percentage
 Mid-terms
1
40
 Assignment
0
0
 Exercises
0
0
 Projects
0
0
 Practice
0
0
 Quiz
0
0
 Contribution of In-term Studies to Overall Grade  
40
 Contribution of Final Examination to Overall Grade  
60
 -- WORKLOAD
 Efficiency  Total Week Count  Weekly Duration (in hour)  Total Workload in Semester
 Theoretical Study Hours of Course Per Week
3
1
3
 Practising Hours of Course Per Week
0
 Reading
8
3
24
 Searching in Internet and Library
8
8
64
 Designing and Applying Materials
0
 Preparing Reports
9
4
36
 Preparing Presentation
0
 Presentation
0
 Mid-Term and Studying for Mid-Term
4
8
32
 Final and Studying for Final
4
8
32
 Other
0
 TOTAL WORKLOAD: 
191
 TOTAL WORKLOAD / 25: 
7.64
 ECTS: 
8
 -- COURSE'S CONTRIBUTION TO PROGRAM
NO
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
1Can use theoretical and practical knowledge at the level of expertise acquired in the field.X
2Can analyse the problems related to the field by using research methods.X
3Can systematically pass on up-to-date advancements in the field of Forensic Computing and his or her own work supported by quantitative and qualitative data to the groups related and/or unrelated to the field, written, verbal and graphically.X
4Can use advanced level of informatics and communication technologies with computer software at the required level in the field of Forensic Computing.X
5Adopts life-long learning principle, is open to innovation, participates actively in the development of himself/herself and the institution.X
6Able to use foreign languages at the level required to monitor the foreign resources about Forensic Computing and to communicate with colleagues (European Language Portfolio Global Scale, Level B2).
7Can criticise the knowledge and skills at the level of expertise acquired in the field and direct his/her learning in the appropriate way.X
8Operates actively as an individual and among interdisciplinary groups.X
9Conducts resource searching in order to acquire information, uses databases and other information resources, evaluates the validity and actuality of information acquired through different resources.X
10Can control the stages of collection, interpretation, application and dissemination of data related to the field of Forensic Computing with respect to social, scientific, cultural and ethical values and can teach these values.
11Can develop strategy, politics and application plans related to the field of Forensic Computing and can evaluate the results within perspectives of quality processes.
12Can use the knowledge, problem solving and/or application skills absorbed in the field of Forensic Computing at an interdisciplinary practice.X
13Determines and defines the problems about the field of Forensic Computing, designs relative solutions, selects and applies the appropriate analytical methods and modeling techniques for the purpose.X
14Follows and applies the innovative approaches about the field.X