Print as pdf if you want a pdf! If you want a nicer printout, click off the browser's automatically added header and footer.
Blekinge Institute of Technology
Department of Software Engineering
Revision: 2
Reg.no:
Introduction to Security in the Software Development Lifecycle
Introduction to Security in the Software Development Lifecycle
6 credits (6 högskolepoäng)
Course code: PA2585
Main field of study: Software Engineering
Disciplinary domain: Technology
Education level: Second-cycle
Specialization: A1N - Second cycle, has only first-cycle course/s as entry requirements
Language of instruction: English
Applies from: 2024-11-01
Approved: 2024-11-01
This course is established by Dean 2021-02-25. The course syllabus is approved by Head of Department of Software Engineering 2024-11-01 and applies from 2024-11-01.
Admission to the course requires at least 120 completed credits, of which at least 90 credits are in a technical area, and a minimum of 2 years professional experience within an area related to software-intensive product and/or service development (shown by, for example, a work certificate from an employer).
The purpose of this course is to introduce security practices within the Software Development Lifecycle (SDLC) at the requirements, design, implementation, verification, and after release stages of software development.
This course is the guide to the cybersecurity issues arising throughout the entire development process. We consider the development from the security perspective from the beginning stage until the final release and beyond. The course is adapted to give a solid introduction to non-security-experts mainly and addresses both how professionals (developers, managers, decision-makers) can utilize security to improve (software-based) products/services, and how they are affected by security issues and challenges.
Whether you are a software developer in a bank or telecom company, or you are a product manager in a gaming company, this course will be relevant for you.
This course covers trade-off analysis, investment decisions into security, requirements selection and prioritization, and risk assessment approaches. The student will learn the hands-on approaches for trade-off analysis, requirements prioritization methods, risk assessment approaches, and other security aspects at all stages of the software development lifecycle (SDLC). By taking security aspects into account as a part of product design and development, the student can use different techniques and methods along with the best practices.
The following learning outcomes are examined in the course:
On completion of the course, the student will be able to:
On completion of the course, the student will be able to:
On completion of the course, the student will be able to:
The teaching is organised around online lectures, pre-recorded videos, together with written material, literature, and research literature. Throughout the course, communication, feedback, and discussions with teachers and fellow participants will take place through email and the course’s online learning platform.
Modes of examinations of the course
Code | Module | Credit | Grade |
2110 | Written assignment 1 | 2 credits | GU |
2120 | Written assignment 2 | 2 credits | GU |
2130 | Written assignment 3 | 2 credits | GU |
The course will be graded G Pass, UX Failed result, a little more work required, U Fail.
The examiner may carry out oral follow-up of written examinations.
The information before a course occasion states the assessment criteria and make explicit in which modes of examination that the learning outcomes are assessed.
An examiner can, after consulting the Disability Advisor at BTH, decide on a customized examination form for a student with a long-term disability to be provided with an examination equivalent to one given to a student who is not disabled.
The course evaluation should be carried out in line with BTH:s course evaluation template and process.
The course can form part of a degree but not together with another course the content of which completely or partly corresponds with the contents of this course.
Materials such as research articles and other course materials, as well as recommendations for additional reading, are provided via the courses’ online platform.
This course replaces PA2582
This is not a legal document. If you would like a copy of the legal decision regarding this course plan, contact the registrar at Blekinge Institute of Technology.