Application SecurityLaajuus (5 cr)
Code: 3011640
Credits
5 op
Objective
After completing the course the student is able to:
- Understand common application security threats, vulnerabilities, and attacks
- Evaluate the technical and business impacts of different kinds of attacks
- Describethe security principles for developing high security web applications
- participate in high security web applications developing projects
- use security testing tools
- analyse and report the results from security testing
- give justified improvement proposals to mitigate security vulnerabilities
Content
- Network discovery, port and service identification
- Vulnerability scanning and penetration testing
- Web application security threats, vulnerabilities, and attacks
- The impacts of security breaches
- Web application security principles
- Implementing a secure web application
- Web application security organizations
Enrollment
02.07.2024 - 06.09.2024
Timing
02.09.2024 - 13.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
- English
Teachers
- Jani Ekqvist
Groups
-
PTIETS22swisPTIETS22 Software Development and Information Systems
Objective
After completing the course the student is able to:
- Understand common application security threats, vulnerabilities, and attacks
- Evaluate the technical and business impacts of different kinds of attacks
- Describethe security principles for developing high security web applications
- participate in high security web applications developing projects
- use security testing tools
- analyse and report the results from security testing
- give justified improvement proposals to mitigate security vulnerabilities
Content
- Network discovery, port and service identification
- Vulnerability scanning and penetration testing
- Web application security threats, vulnerabilities, and attacks
- The impacts of security breaches
- Web application security principles
- Implementing a secure web application
- Web application security organizations
Materials
Online material, provided through ItsLearning.
Teaching methods
Lectures
Self-Study with online materials
Laboratory Work
Project Work
Exam schedules
none
International connections
Lectures and self-study with online materials
Laboratory Work
Project Work
Sustainable development is not applicable.
Completion alternatives
none
Student workload
Lectures 12h
Self-Study with online materials 40h
Laboratory Work 40h
Project Work 40h
Project presentations and reflection 3h
Content scheduling
Period 3:
- Application security threats, vulnerabilities, and attacks
- Application security principles
- Application security organizations and standards
Period 4:
- Designing and implementing a secure web application
- Building secure continuous development and operations environment
Further information
All communication is through ItsLearning.
Evaluation scale
H-5
Assessment methods and criteria
The evaluation is based on:
- Homework assignments, 35% of grade
- Laboratory assignments, 35% of grade
- Project work, 30% of grade
Attendance is mandatory during contact hours to receive the points for the individual assignments and project work for proper assessment of learning.
Grading scale for completed assignments in each category is:
< 50% - Fail
50 - 59% - 1
60 - 69% - 2
70 - 79% - 3
80 - 89% - 4
90 - 100% - 5
Assessment criteria, fail (0)
Student has incomplete understanding of application security and is unable to design and implement a secure software development process.
Assessment criteria, satisfactory (1-2)
Student is able to design, implement or operate a secure continuous development process with supervision.
Student has knowledge of application security threats, vulnerabilities and attacks, and understands the impacts of a security breach. Student is somewhat familiar with application security organizations and standards.
Assessment criteria, good (3-4)
Student is able to design and implement a secure continuous development process with supervision and operate it competently.
Student understands application security threats, vulnerabilities and attacks, and can mitigate the impacts of a security breach. Student is familiar with application security organizations and standards, and is able to utilize them in their work.
Assessment criteria, excellent (5)
Student is able to design and implement a secure continuous development process without supervision and operate it competently.
Student has an excellent understanding of application security threats, vulnerabilities and attacks, and can mitigate the impacts of a security breach. Student is familiar with application security organizations and standards, and is able to utilize them to create effective security processes.
Enrollment
01.05.2023 - 14.09.2023
Timing
04.09.2023 - 15.12.2023
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
- Finnish
- English
Seats
15 - 40
Teachers
- Jani Ekqvist
Groups
-
PTIETS21swisPTIETS21 Software Development and Information Systems
-
ICTMODictprojSem
-
ICT_MOD_UPV_23ICT_MOD_UPV_23
Objective
After completing the course the student is able to:
- Understand common application security threats, vulnerabilities, and attacks
- Evaluate the technical and business impacts of different kinds of attacks
- Describethe security principles for developing high security web applications
- participate in high security web applications developing projects
- use security testing tools
- analyse and report the results from security testing
- give justified improvement proposals to mitigate security vulnerabilities
Content
- Network discovery, port and service identification
- Vulnerability scanning and penetration testing
- Web application security threats, vulnerabilities, and attacks
- The impacts of security breaches
- Web application security principles
- Implementing a secure web application
- Web application security organizations
Materials
Online material, provided through ItsLearning.
Student workload
Lectures 12h
Self-Study with online materials 40h
Laboratory Work 40h
Project Work 40h
Project presentations and reflection 3h
Content scheduling
Period 3:
- Application security threats, vulnerabilities, and attacks
- The impacts of security breaches
- Application security principles
- Application security organizations and standards
Period 4:
- Designing and implementing a secure web application
- Building secure continuous development and operations environment
Further information
All communication is through ItsLearning.
Evaluation scale
H-5
Assessment methods and criteria
The evaluation is based on:
- Homework assignments, 40% of grade
- Laboratory assignments, 40% of grade
- Project work, 20% of grade
Assessment criteria, fail (0)
Student has incomplete understanding of application security and is unable to design and implement a secure software development process.
Assessment criteria, satisfactory (1-2)
Student is able to design, implement or operate a secure continuous development process with supervision.
Student has knowledge of application security threats, vulnerabilities and attacks, and understands the impacts of a security breach. Student is somewhat familiar with application security organizations and standards.
Assessment criteria, good (3-4)
Student is able to design and implement a secure continuous development process with supervision and operate it competently.
Student understands application security threats, vulnerabilities and attacks, and can mitigate the impacts of a security breach. Student is familiar with application security organizations and standards, and is able to utilize them in their work.
Assessment criteria, excellent (5)
Student is able to design and implement a secure continuous development process without supervision and operate it competently.
Student has an excellent understanding of application security threats, vulnerabilities and attacks, and can mitigate the impacts of a security breach. Student is familiar with application security organizations and standards, and is able to utilize them to create effective security processes.
Enrollment
20.07.2022 - 15.09.2022
Timing
29.08.2022 - 16.12.2022
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Engineering and Business
Campus
Kupittaa Campus
Teaching languages
- Finnish
- English
Seats
40 - 50
Degree programmes
- Degree Programme in Business Information Technology
Teachers
- Jani Ekqvist
Groups
-
ICTMODictprojSem
-
PTIETS20swisPTIETS20 Software Development and Information Security
Objective
After completing the course the student is able to:
- Understand common application security threats, vulnerabilities, and attacks
- Evaluate the technical and business impacts of different kinds of attacks
- Describethe security principles for developing high security web applications
- participate in high security web applications developing projects
- use security testing tools
- analyse and report the results from security testing
- give justified improvement proposals to mitigate security vulnerabilities
Content
- Network discovery, port and service identification
- Vulnerability scanning and penetration testing
- Web application security threats, vulnerabilities, and attacks
- The impacts of security breaches
- Web application security principles
- Implementing a secure web application
- Web application security organizations
Materials
Online material, provided through ItsLearning.
Student workload
Lectures 15h
Self-Study with online materials 40h
Laboratory Work 40h
Project Work 40h
Content scheduling
Period 3:
- Web application security
Period 4:
- Security testing
Further information
All communication is through ItsLearning.
Evaluation scale
H-5
Assessment methods and criteria
The evaluation is based on:
- Homework assignments, 40% of grade
- Laboratory assignments, 40% of grade
- Project work, 20% of grade