Educational guide | ||||||||||||||||||||||
IDENTIFYING DATA | 2019_20 | |||||||||||||||||||||
Subject | SECURE DESIGN AND PROGRAMMING | Code | 01732004 | |||||||||||||||||||
Study programme | ||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||
6 | Compulsory | First | ||||||||||||||||||||
Language |
|
|||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||
Department | ||||||||||||||||||||||
Coordinador | ||||||||||||||||||||||
Lecturers | |
|||||||||||||||||||||
Web | http:// | |||||||||||||||||||||
General description | ||||||||||||||||||||||
Tribunales de RevisiĆ³n |
|
|||||||||||||||||||||
Competencies |
Type A | Code | Competences Specific |
Type B | Code | Competences Transversal |
Type C | Code | Competences Nuclear |
C1 | ||
C2 | ||
C3 | ||
C4 | ||
C5 |
Learning aims |
Competences | |||
Design and develop secure software avoiding the most common software vulnerabilities | A17036 |
B5218 B5219 |
C1 C2 C4 C5 |
Program and analyze tasks in different programming languages in the area of communication and software security | A17035 |
B5218 B5219 |
C1 C2 C4 C5 |
Learn to communicate conclusions | B5214 B5215 B5216 B5217 |
C3 |
Contents |
Topic | Sub-topic |
Introduction to Software Security | |
Design and Architecture of Secure Software Systems | |
Secure Engineering Methodologies |
|
Software Defined Secure Programming |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Personal tuition | 3 | 0 | 3 | ||||||
Laboratory practicals | 20 | 48 | 68 | ||||||
Assignments | 0 | 28 | 28 | ||||||
Lecture | 20 | 20 | 40 | ||||||
Objective short-answer tests | 3 | 4 | 7 | ||||||
Practical tests | 2 | 2 | 4 | ||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Personal tuition | Monitoring student activity and progression. Advising, correcting and proposing improvement activities. |
Laboratory practicals | Programming exercises based on lectures under the supervision of the teacher. |
Assignments | Individual programming tasks that will be corrected by the teacher and defended by the student. |
Lecture | Explanation of theoretical knowledge with the active participation of students. |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Assignments | Coding and individual defense of the code. | 40% | |
Objective short-answer tests | Individual assessment of theoretical contents. | 30% | |
Practical tests | Evaluation of experience obtained by performing the practical assignments of the course. | 20% | |
Others | Part of the final mark assigned by the teacher depending on students active participation in the course. | 10% | |
Other comments and second call | |||
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
Fred Long, Dhruv Mohindra, Robert . Seacord, Dean F. Sutherland, David Svoboda, Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs, Addison-Wesley Professional, SEI Series in Software Engineering Robert C. Seacord, Secure Coding in C and C++, Addison-Wesley Professional, Second Edition. |
Complementary | |
Recommendations |