Description of Individual Course Units
|
Offered By |
Graduate School of Natural and Applied Sciences |
Level of Course Unit |
Second Cycle Programmes (Master's Degree) |
Course Coordinator |
ASSISTANT PROFESSOR ERDEM ALKIM |
Offered to |
Ph.D. in Computer Science (English) |
Course Objective |
To provide the students with a comprehensive theoretical and applied study of; software security, software security exploits as well as the tools and techniques used in audit, analysis and solutions of security vulnerabilities and problems faced in web, mobile and cloud applications. To establish in-depth knowledge of vendor-independent web application hacking techniques and necessary defensive programming approaches to mitigate such attacks. |
Learning Outcomes of the Course Unit |
||||||||||
|
Mode of Delivery |
Face -to- Face |
Prerequisites and Co-requisites |
None |
Recomended Optional Programme Components |
None |
Course Contents |
|||||||||||||||||||||||||||||||||||||||||||||
|
Recomended or Required Reading |
Textbook(s)/References/Materials: |
Planned Learning Activities and Teaching Methods |
The course is taught in a lecture, class presentation and discussion format. Besides the taught lecture, group presentations are to be prepared by the groups assigned and presented in a discussion session. In some weeks of the course, results of the homework given previously are discussed. |
Assessment Methods |
||||||||||||||||||||||||||||||||
|
Further Notes About Assessment Methods |
None |
Assessment Criteria |
To be announced. |
Language of Instruction |
English |
Course Policies and Rules |
To be announced. |
Contact Details for the Lecturer(s) |
To be announced. |
Office Hours |
To be announced. |
Work Placement(s) |
None |
Workload Calculation |
||||||||||||||||||||||||||||||||||||||||
|
Contribution of Learning Outcomes to Programme Outcomes |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|