Print as pdf if you want a pdf! If you want a nicer printout, click off the browser's automatically added header and footer.

Blekinge Institute of Technology
Department of Software Engineering

Revision: 2
Reg.no: BTH-4.1.14-1188-2024


Course syllabus

Security, Privacy and Compliance

Security, Privacy and Compliance

7.5 credits (7,5 högskolepoäng)

Course code: PA2593
Main field of study: Software Engineering, Computer Science
Disciplinary domain: Technology
Education level: Second-cycle
Specialization: A1N - Second cycle, has only first-cycle course/s as entry requirements

Language of instruction: English
Applies from: 2024-11-01
Approved: 2024-11-01

1. Descision

This course is established by Dean 2022-03-25. The course syllabus is approved by Head of Department of Software Engineering 2024-11-01 and applies from 2024-11-01.

2. Entry requirements

Admission to the course requieres at least 120 credits, of which at least 90 credits are in a technical area, and a minimum of 2 years professional experience within an area related to software-intensive product and/or service development (shown by, for example, a work certificate from an employer).

3. Objective and content

3.1 Objective

The goal of the course is to (1) provide students with a unified practical perspective on security, privacy, and compliance in software engineering, and (2) teach students methods required for the application. A particular focus will be given on elaborating requirements for software-intensive products and services.

Along with the general information on security, privacy, and compliance, the course will emphasize techniques on how to handle security and privacy requirements and how to ensure compliance.

3.2 Content

The course consists of five modules:

  • Introduction to security, privacy, and compliance in software engineering
  • Security and security threat modeling in software engineering
  • Privacy and privacy threat modeling in software engineering
  • Compliance in software engineering
  • Security, privacy, and compliance in software engineering practice

4. Learning outcomes

The following learning outcomes are examined in the course:

4.1. Knowledge and understanding

On completion of the course, the student will be able to:

  • Describe the nature of security, privacy, and compliance requirements and their role in software engineering
  • Interpret the importance and relevance of security, privacy, and compliance requirements in different software engineering contexts
  • Demonstrate knowledge of suitable and feasible methods and tools for security, privacy and compliance implementation

4.2. Competence and skills

On completion of the course, the student will be able to:

  • Assess the needs for security, privacy, and compliance
  • Align security, privacy, and compliance requirements
  • Plan security, privacy, and compliance implementation activities
  • Apply threat and compliance modeling methods and tools consistently in software engineering projects

4.3. Judgement and approach

On completion of the course, the student will be able to:

  • Reflect on state of the art in techniques in security, privacy and compliance and associate them with practices applied in the industry

5. Learning activities

The teaching is organized around online lectures, pre-recorded videos, together with written material and research literature. Throughout the course, communication, feedback, and discussions with teachers and fellow participants will take place through email and the course´s online learning platform.

6. Assessment and grading

Modes of examinations of the course

Code Module Credit Grade
2305 Written assignment 1 1 credits GU
2315 Written assignment 2 4 credits GU
2325 Project assignment 2.5 credits GU

The course will be graded G Pass, UX Failed result, a little more work required, U Fail.

The examiner may carry out oral follow-up of written examinations.

The information before a course occasion states the assessment criteria and make explicit in which modes of examination that the learning outcomes are assessed.

An examiner can, after consulting the Disability Advisor at BTH, decide on a customized examination form for a student with a long-term disability to be provided with an examination equivalent to one given to a student who is not disabled.

7. Course evaluation

The course evaluation should be carried out in line with BTH:s course evaluation template and process.

8. Restrictions regarding degree

The course can form part of a degree but not together with another course the content of which completely or partly corresponds with the contents of this course.

9. Course literature and other materials of instruction

Materials such as research articles and other course materials, as well as recommendations for additional reading, are provided via the courses’ online platform.