Module overview
Aims and Objectives
Learning Outcomes
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Common issues affecting the security of software systems
- Reverse Engineering of Software
- Software analysis
Transferable and Generic Skills
Having successfully completed this module you will be able to:
- Recognise software vulnerabilities and protection in a range of application domains
Subject Specific Practical Skills
Having successfully completed this module you will be able to:
- Identify security weaknesses in software systems and applications
- Undertake basic reverse engineering of software
Subject Specific Intellectual and Research Skills
Having successfully completed this module you will be able to:
- Describe specific methods for exploiting software systems
Syllabus
Learning and Teaching
Teaching and learning methods
Type | Hours |
---|---|
Wider reading or practice | 22 |
Revision | 10 |
Completion of assessment task | 46 |
Follow-up work | 18 |
Preparation for scheduled sessions | 18 |
Teaching | 36 |
Total study time | 150 |
Resources & Reading list
Textbooks
Eldad Eilam (2005). Reversing: Secrets of Reverse Engineering. John Wiley and Sons.
Dieter Gollman (2011). Computer Security. Wiley.
Assessment
Summative
This is how we’ll formally assess what you have learned in this module.
Method | Percentage contribution |
---|---|
Continuous Assessment | 100% |
Referral
This is how we’ll assess you if you don’t meet the criteria to pass this module.
Method | Percentage contribution |
---|---|
Set Task | 100% |
Repeat
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
Method | Percentage contribution |
---|---|
Set Task | 100% |
Repeat Information
Repeat type: Internal & External