Information on individual educational components (ECTS-Course descriptions) per semester | |
| Degree programme: | Bachelor Computer Science - Software and Information Engineering |
| Type of degree: | FH Bachelor´s Degree Programme |
| Full-time | |
| Summer Semester 2026 | |
| Course unit title | Secure Software Development |
| Course unit code | 024717040501 |
| Language of instruction | German |
| Type of course unit (compulsory, optional) | Compulsory |
| Semester when the course unit is delivered | Summer Semester 2026 |
| Teaching hours per week | 3 |
| Year of study | 2026 |
| Level of course unit (e.g. first, second or third cycle) | First Cycle (Bachelor) |
| Number of ECTS credits allocated | 4 |
| Name of lecturer(s) | Armin SIMMA |
| Prerequisites and co-requisites |
Basic knowledge of handling the Unix / or Linux command line; Knowledge of the most important commands for navigation in the tree; Copying, deleting, etc. of files; User management; Basic knowledge of networking: Configuring the network interface; Basic knowledge about the configuration of network devices (routers, switches) using the console (e.g. CLI). The students understand the concepts of structured as well as object-oriented programming. They master an object-oriented programming language. They know how to design software and can apply a software process. They know basic design patterns. Students already know concepts and models related to computer networks (e.g., layer model); They know the most important network protocols (e.g., HTTP, TCP, IP, DNS, etc.). They can log and analyze network traffic (e.g., using wireshark) network traffic. |
| Course content |
Introduction:
OWASP Top 10: Web Application Risks
|
| Learning outcomes |
Students know and understand models, concepts and tools to:
|
| Planned learning activities and teaching methods |
|
| Assessment methods and criteria |
Seminar 40% |
| Comment |
Not applicable |
| Recommended or required reading |
Allen, Julia H. (2008): Software Security Engineering: A Guide for Project Managers: A Guide for Project Managers. 1. Aufl. Upper Saddle River, NJ: Addison-Wesley Professional. Anderson, Ross J. (2008): Security Engineering: A Guide to Building Dependable Distributed Systems. 2. Tokyo, New York: Wiley. Bell, Laura u.a. (2017): Agile Application Security: Enabling Security in a Continuous Delivery Pipeline. Sebastopol, CA: O'Reilly UK Ltd. Deogun, Daniel; Johnsson, Dan Bergh; Sawano, Daniel (2019): Secure By Design. 1st Aufl. Shelter Island: Manning Publications. Fernandez-Buglioni, Eduardo (2013): Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. 1. Chichester, West Sussex: Wiley. Howard, Michael (2009): 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. 1. Aufl. New York: McGraw-Hill Education. Kriha, Walter; Schmitz, Roland (2008): Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche. 2008. Aufl. Berlin: Springer. Kriha, Walter; Schmitz, Roland (2009): Sichere Systeme. Konzepte, Architekturen und Frameworks. 2009. Aufl. Berlin: Springer. LeBlanc, Jonathan; Messerschmidt, Tim (2016): Identity and Data Security for Web Development: Best Practices. 1. Aufl. Beijing ; Boston: O'Reilly UK Ltd. McGraw, Gary R. (2006): Software Security: Building Security In. Annotated ed. Upper Saddle River, NJ: Addison Wesley. Najera-Gutierrez, Gilberto (2018): Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition. 2nd Revised edition. Birmingham, UK: Packt Publishing. Paulus, Sachar (2011): Basiswissen Sichere Software: Aus- und Weiterbildung zum ISSECO Certified Professional for Secure Software Engineering. 1. Aufl. Heidelberg: Dpunkt Verlag. Richer, Justin; Sanso, Antonio (2017): OAuth 2 in Action. 1st Aufl. Shelter Island, NY: Manning Publications. Schäfers, Tim Philipp (2018): Hacking im Web: Denken Sie wie ein Hacker und schließen Sie die Lücken in Ihren Webapplikationen | Völlig überarbeitete & aktualisierte 2. Auflage. 2., überarbeitete & aktualisierte Aufl. Haar bei München: FRANZIS Verlag GmbH. Schumacher, Markus u.a. (2005): Security Patterns: Integrating Security and Systems Engineering. 1. Chichester, England ; Hoboken, NJ: Wiley. Seacord, Robert C. Seacord (2013): Secure Coding in C and C++. 2nd edition. Upper Saddle River, NJ: Addison-Wesley Professional. Shostack, Adam (2014): Threat Modeling: Designing for Security. 1. Indianapolis, IN: Wiley. Stuttard, Dafydd; Pinto, Marcus (2011): The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws. 2. Indianapolis, IN : Chichester: Wiley. |
| Mode of delivery (face-to-face, distance learning) |
Classroom teaching and labs with mandatory attendance |
| Summer Semester 2026 | go Top |