Course | Class No. | Start & End Date | Day | Time | Status | Location |
---|
You are viewing undergraduate classes for students in the Middle East and Africa.
Spring 2021 has a mix of on-site and remote on-site classes. Due to COVID restrictions, some classes will be taught in an interactive, remote format via Zoom. Those locations are listed as "Remote On-Site," and times are shown in Arab Standard Time (AST). Hover over the "ℹ" to confirm the class in your local time.
Summer 2024: 8 May - 13 August
Course | Class No. | Start & End Date | Day | Time | Status | Location | |
---|---|---|---|---|---|---|---|
SDEV 300 | Building Secure Python Applications (3) | ||||||
Prerequisite: CMSC 215. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. |
|||||||
50621 | 15 May 2024-09 Jul 2024 | Closed | Online | ||||
Section: 6380 | Faculty: Pike, Melissa A | Syllabus | Course Materials | ||||
SDEV 300 | Building Secure Python Applications (3) | ||||||
Prerequisite: CMSC 215. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. |
|||||||
50770 | 15 May 2024-09 Jul 2024 | Closed | Online | ||||
Section: 6381 | Faculty: Poma, Craig A | Syllabus | Course Materials | ||||
SDEV 300 | Building Secure Python Applications (3) | ||||||
Prerequisite: CMSC 215. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. |
|||||||
50966 | 15 May 2024-09 Jul 2024 | Open | Online | ||||
Section: 6382 | Faculty: Donoho, Lucas M. | Syllabus | Course Materials | ||||
SDEV 300 | Building Secure Python Applications (3) | ||||||
Prerequisite: CMSC 215. A hands-on study of best practices and strategies for building secure Python desktop and web applications. The objective is to design and build Python applications that are resistant to common security threats. Topics include syntax, data structures, style guides, data munging, web application frameworks, and the use of secure coding tools and processes to guard against application vulnerabilities. |
|||||||
51842 | 12 Jun 2024-06 Aug 2024 | Open | Online | ||||
Section: 6980 | Faculty: Babcock, Mark A | Syllabus | Course Materials | ||||
SDEV 325 | Detecting Software Vulnerabilities (3) | ||||||
Prerequisites: CMSC 320 and SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. |
|||||||
50622 | 15 May 2024-09 Jul 2024 | Open | Online | ||||
Section: 6380 | Faculty: Fair, Zachary | Syllabus | Course Materials | ||||
SDEV 325 | Detecting Software Vulnerabilities (3) | ||||||
Prerequisites: CMSC 320 and SDEV 300. An in-depth, practical application of techniques and tools for detecting and documenting software vulnerabilities and risks. The goal is to research, select, and use software to analyze code and isolate and prioritize application code and processes that could lead to failure or compromise data integrity or privacy. Topics include the top 25 software vulnerabilities, secure coding guidelines, static code analysis, and software assurance metrics. |
|||||||
52499 | 12 Jun 2024-06 Aug 2024 | Open | Online | ||||
Section: 6980 | Faculty: Bass, Brandon J | Syllabus | Course Materials | ||||
SDEV 350 | Database Security (3) | ||||||
Prerequisite: CMSC 320. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. |
|||||||
50626 | 15 May 2024-09 Jul 2024 | Open | Online | ||||
Section: 6380 | Faculty: De Los Santos, Ivan A. | Syllabus | Course Materials | ||||
SDEV 350 | Database Security (3) | ||||||
Prerequisite: CMSC 320. A study of processes and techniques for securing databases. The objective is to design, build, and maintain databases to minimize risks and security attacks. Topics include privileges and roles, user accounts, encryption, authentication methods, and auditing. |
|||||||
51814 | 12 Jun 2024-06 Aug 2024 | Open | Online | ||||
Section: 6980 | Faculty: Haseltine, Reginald Yagel | Syllabus | Course Materials | ||||
SDEV 360 | Secure Software Engineering (3) | ||||||
Prerequisite: CMSC 215. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). |
|||||||
51165 | 15 May 2024-09 Jul 2024 | Open | Online | ||||
Section: 6380 | Faculty: Eyler, Carl W | Syllabus | Course Materials | ||||
SDEV 360 | Secure Software Engineering (3) | ||||||
Prerequisite: CMSC 215. An in-depth study of the processes, standards, and regulations associated with secure software engineering. The objective is to plan, manage, document, and communicate all phases of a secure software development cycle. Topics include security requirements, secure software life cycle development, threat modeling, and Security Technical Implementation Guides (STIGs). |
|||||||
52374 | 12 Jun 2024-06 Aug 2024 | Open | Online | ||||
Section: 6980 | Faculty: Johnson, Kyle L | Syllabus | Course Materials | ||||
SDEV 400 | Secure Programming in the Cloud (3) | ||||||
Prerequisite: SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. |
|||||||
50885 | 15 May 2024-09 Jul 2024 | Open | Online | ||||
Section: 6380 | Faculty: Waithe, Errol S. | Syllabus | Course Materials | ||||
SDEV 400 | Secure Programming in the Cloud (3) | ||||||
Prerequisite: SDEV 300. A hands-on study of programming secure applications in the cloud. The goal is to design and build applications in the cloud while implementing appropriate security policies. Topics include cloud computing models, risks and security challenges of programming in the cloud, and data security. |
|||||||
51815 | 12 Jun 2024-06 Aug 2024 | Open | Online | ||||
Section: 6980 | Faculty: Taylor, Matthew A | Syllabus | Course Materials | ||||
SDEV 425 | Mitigating Software Vulnerabilities (3) | ||||||
Prerequisites: SDEV 325 and SDEV 360. An in-depth analysis and evaluation of the mitigation of software vulnerabilities. The aim is to detect and mitigate software vulnerabilities by evaluating code. Topics include language-specific software vulnerabilities, mitigation, and input validation. |
|||||||
51802 | 12 Jun 2024-06 Aug 2024 | Open | Online | ||||
Section: 6980 | Faculty: Boswell, Justin L. | Syllabus | Course Materials | ||||
SDEV 460 | Software Security Testing (3) | ||||||
Prerequisite: SDEV 425. A hands-on study of exploits, attacks, and techniques used to penetrate application security defenses and strategies for mitigating such attacks. The objective is to apply appropriate methodologies for software penetration testing to identify application weaknesses and logic flaws and to test and create scripts for exploitation and discovery. Topics include web architecture, application infrastructure, reconnaissance, discovery, mapping, and exploitation. |
|||||||
50886 | 15 May 2024-09 Jul 2024 | Open | Online | ||||
Section: 6380 | Faculty: Howard, Christopher G | Syllabus | Course Materials | ||||
SDEV 460 | Software Security Testing (3) | ||||||
Prerequisite: SDEV 425. A hands-on study of exploits, attacks, and techniques used to penetrate application security defenses and strategies for mitigating such attacks. The objective is to apply appropriate methodologies for software penetration testing to identify application weaknesses and logic flaws and to test and create scripts for exploitation and discovery. Topics include web architecture, application infrastructure, reconnaissance, discovery, mapping, and exploitation. |
|||||||
54440 | 15 May 2024-09 Jul 2024 | Open | Online | ||||
Section: 6381 | Faculty: | Syllabus | Course Materials |
printer-friendly
Quick Search
- African American Studies
- Accounting
- Anthropology
- Arabic
- Art History
- Art
- Asian Studies
- Astronomy
- Behavioral and Social Science
- Biology
- Business and Management
- Career Planning
- Criminology/Criminal Justice
- Chemistry
- Chinese
- Computer Information Technolo
- Computer Science
- Computer Studies
- Communication Studies
- Cyber Security-Info Assurance
- Data Analytics
- Economics
- Emergency Management
- English
- Environmental Hlth and Safety
- Environmental Management
- Experiential Learning
- Finance
- French
- Fire Science
- Geography
- Geology
- German
- Gerontology
- Graphic Communication
- Government and Politics
- History
- Health Services Management
- Homeland Security
- Human Resource Management
- Humanities
- Information Systems Managemen
- Japanese
- Journalism
- Legal Studies
- Library Skills & Info Literac
- Mathematics
- Marketing
- Music
- Natural Science
- Nursing
- Nutrition
- Professional Exploration
- Philosophy
- Physics
- Public Safety Administration
- Psychology
- Software Development&Security
- Sociology
- Spanish
- Speech
- Statistics and Probability
- Women's Studies
- Writing