Course Objectives:

  1. To fix software flaws and bugs in various software.
  2. To make students aware of various issues like weak random number generation, information leakage, poor usability, and weak or no encryption on data traffic.
  3. To learn techniques for successfully implementing and supporting network services on an enterprise scale and heterogeneous systems environment.
  4. To learn methodologies  and  tools  to  design  and  develop  secure  software  containing  minimum vulnerabilities.

Unit I

Secure Software Design: Identify software vulnerabilities and perform software security analysis, Mastersecurity programming practices, Master fundamental software security design concepts.

Click on any topic to read about the topic.

Unit II

Enterprise Application Development: Describe the nature and scope of enterprise software applications,Design distributed N-tier software application, Research technologies available for the presentation, business and data tiers of an enterprise software application, Design and build a database using an enterprise database system, Develop components at the different tiers in an enterprise system, design and develop a multi-tier solution to a problem using technologies used in enterprise system, present software solution.

Click on any topic to read about the topic.

Unit III

Enterprise Systems Administration: Design, implement and maintain a directory-based serverinfrastructure in a heterogeneous systems environment, monitor server resource utilization for system reliability and availability, Install and administer network services (DNS/DHCP/Terminal Services/ clustering/ Web /Email).

Click on any topic to read about the topic.

Unit IV

Software containing minimum vulnerabilities and flaws, perform security testing and quality assurance. Managing software quality in an organization, software configuration management, software measurement and metrics.

Click on any topic to read about the topic.


  1. Theodor Richardson, Charles N Thies, Secure Software Design, Jones & Bartlett.
  2. Kenneth R. van Wyk, Mark G. Graff, Dan S. Peter, Diana L. Burley, Enterprise Software Security, Addison Wesley.
  3. Nina S. Godbole, Software Quality Assurance: Principles and Practices, Narosa Publication.

Course Outcomes:  After successful completion of the course students will learn the following:-

  1. Differentiate between various software vulnerabilities
  2. Understand the Software process vulnerabilities for an organization.
  3. Monitor resources consumption in a software.
  4. Inter relate security and software development process.
error: You can only copy the programs code and output from this website. You are not allowed to copy anything else.