Course Outline BAIS3110 - 2021
Course Outline BAIS3110 - 2021
2021/2022
COURSE DESCRIPTION
The definition of any project requires both a clear and tested architecture and a clear security implementation model. This course
will examine a variety of architectures and their impacts on how projects get constructed and how they will perform under load.
Security will be examined from both network and application perspectives, and a variety of security solution patterns will be
examined.
LEARNING OUTCOMES
The following concepts, skills, and issues are used to support this Outcome:
• Explain the Lifecycle of an ASP.NET Core Application
• Create a customized template for your ASP.NET Core Programs
• Use System Utilities and program fragments to display ASP.NET properties and version
information
The following concepts, skills, and issues are used to support this Outcome:
• Use TCP/IP utilities to configure and test servers and clients
• Create TCP/IP clients and servers using dotNetCore and C#
• Explain the TCP/IP protocols and their advantages and disadvantages from a developers
perspective
• Write the code required to connect to a Web Service and document the Requests and Results
The following concepts, skills, and issues are used to support this Outcome:
• Create a trust boundary and chokepoints for a sample application
• Create a threat tree for a sample application
• Categorize and rank the threats
The following concepts, skills, and issues are used to support this Outcome:
• Demonstrate how to perform a buffer overrun attack and then eliminate it
• Demonstrate how to perform SQL injection and cross site scripting attacks and eliminate
them
• Create an authorization and authentication system in software
• Demonstrate how to implement data encryption in software
• Demonstrate how to securely create random numbers that are not predictable
The following concepts, skills, and issues are used to support this Outcome:
• Develop a checklist for securing applications so that they can be shipped
• Create patterns and templates containing coding standards to be followed to ensure your
application is secure
The following concepts, skills, and issues are used to support this Outcome:
• Choose a security research paper topic and get it approved
• Research the approved topic
• Prepare the security paper
• Present the security paper to the class
STUDENT EVALUATION
TOTAL 100%
DELIVERY METHOD
This course will be taught using a variety of delivery methods which may include face-to-face, online, or blended teaching
platforms. Collaborative exercises/assignments, seminars, labs, discussion, audio/visual presentations, case studies, and other
such activities may be used to support learning.
EQUITY STATEMENT
NAIT is committed to providing an environment of equality and respect for all people within the learning community, and to
educating faculty, staff, and students in developing inclusive teaching and learning contexts that are welcoming to all.
Changes to This Course Outline: Every effort has been made to ensure that information in this course outline is accurate at the time of publication. The Institute
reserves the right to change courses if it becomes necessary so that course content remains relevant. In such cases, the instructor will give the students clear and
timely notice of the changes.
All Rights Reserved: No part of this course outline may be reproduced in any form or resold without written permission from NAIT. Copyright 2020.