{"id":55252,"date":"2023-08-28T07:12:28","date_gmt":"2023-08-28T07:12:28","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cb3591-engineering-secure-software-systems-syllabus-for-cyber-security-2021-regulation\/"},"modified":"2023-08-28T07:12:28","modified_gmt":"2023-08-28T07:12:28","slug":"cb3591-engineering-secure-software-systems-syllabus-for-cyber-security-2021-regulation","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cb3591-engineering-secure-software-systems-syllabus-for-cyber-security-2021-regulation\/","title":{"rendered":"CB3591: Engineering Secure Software Systems syllabus for Cyber Security 2021 regulation"},"content":{"rendered":"<p align=\"justify\">Engineering Secure Software Systems detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna University<\/a> official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Security 5th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cyber-security-5th-sem-syllabus-2021-regulation\">Cyber Security 5th Sem 2021 regulation scheme<\/a>. The detailed syllabus of engineering secure software systems is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit I<\/h4>\n<p>NEED OF SOFTWARE SECURITY AND LOW-LEVEL ATTACKS<br \/>\nSoftware Assurance and Software Security &#8211; Threats to software security &#8211; Sources of software insecurity &#8211; Benefits of Detecting Software Security &#8211; Properties of Secure Software &#8211; MemoryBased Attacks: Low-Level Attacks Against Heap and Stack &#8211; Defense Against Memory-Based Attacks\n<\/p>\n<p><h4>Unit II<\/h4>\n<p>SECURE SOFTWARE DESIGN<br \/>\nRequirements Engineering for secure software &#8211; SQUARE process Model &#8211; Requirements elicitation and prioritization- Isolating The Effects of Untrusted Executable Content &#8211; Stack Inspection &#8211; Policy Specification Languages &#8211; Vulnerability Trends &#8211; Buffer Overflow &#8211; Code Injection &#8211; Session Hijacking. Secure Design &#8211; Threat Modeling and Security Design Principles\n<\/p>\n<p><h4>Unit III<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit IV<\/h4>\n<p>SECURITY TESTING<br \/>\nTraditional Software Testing &#8211; Comparison &#8211; Secure Software Development Life Cycle &#8211; Risk Based Security Testing &#8211; Prioritizing Security Testing With Threat Modeling &#8211; Penetration Testing &#8211; Planning and Scoping &#8211; Enumeration &#8211; Remote Exploitation &#8211; Web Application Exploitation -Exploits and Client Side Attacks &#8211; Post Exploitation &#8211; Bypassing Firewalls and Avoiding Detection &#8211; Tools for Penetration Testing\n<\/p>\n<p><h4>Unit V<\/h4>\n<p>SECURE PROJECT MANAGEMENT<br \/>\nGovernance and security &#8211; Adopting an enterprise software security framework &#8211; Security and project management &#8211; Maturity of Practice\n<\/p>\n<p><h4>Practical Exercises<\/h4>\n<ol>\n<li>Implement the SQL injection attack.<\/li>\n<li>Implement the Buffer Overflow attack.<\/li>\n<li>Implement Cross Site Scripting and Prevent XSS.<\/li>\n<li>Perform Penetration testing on a web application to gather information about the system, then initiate XSS and SQL injection attacks using tools like Kali Linux.<\/li>\n<li>Develop and test the secure test cases<\/li>\n<li>Penetration test using kali Linux<\/li>\n<\/ol>\n<p><h4>Course Outcomes:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Julia H. Allen, \u201cSoftware Security Engineering\u201d, Pearson Education, 2008<\/li>\n<li>Evan Wheeler, \u201cSecurity Risk Management: Building an Information Security Risk Management Program from the Ground Up\u201d, First edition, Syngress Publishing, 2011<\/li>\n<li>Chris Wysopal, Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin, \u201cThe Art of Software Security Testing: Identifying Software Security Flaws (Symantec Press)\u201d, Addison-Wesley Professional, 2006<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>Robert C. Seacord, \u201cSecure Coding in C and C++ (SEI Series in Software Engineering)\u201d, Addison-Wesley Professional, 2005.<\/li>\n<li>Jon Erickson, \u201cHacking: The Art of Exploitation\u201d, 2nd Edition, No Starch Press, 2008.<\/li>\n<li>Mike Shema, \u201cHacking Web Apps: Detecting and Preventing Web Application Security Problems\u201d, First edition, Syngress Publishing, 2012<\/li>\n<li>Bryan Sullivan and Vincent Liu, \u201cWeb Application Security, A Beginner&#8217;s Guide\u201d, Kindle Edition, McGraw Hill, 2012<\/li>\n<li>Lee Allen, \u201cAdvanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Open Source: Community Experience Distilled)\u201d, Kindle Edition, Packt Publishing,2012<\/li>\n<li>Jason Grembi, \u201cDeveloping Secure Software\u201d<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Security, 2021 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/cyber-security+5th-sem\">Cyber Security 5th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Security results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University Cyber Security all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Engineering Secure Software Systems detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna University official website and presented for the Cyber Security [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[48,158],"tags":[],"class_list":["post-55252","post","type-post","status-publish","format-standard","hentry","category-5th-sem","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=55252"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55252\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=55252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=55252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=55252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}