
Secure Software Engineering
7M06106 Secure Software Engineering
Algorithms and Data Structures, as well as Databases
Objective of Educational Program
Preparation of competitive masters with applied knowledge and skills to find vulnerabilities in software code at all stages of its development.
List of a specialist’s positions
- Secure Software Developer;
- Architect-Software Developer;
- Software Engineer.
Learning outcomes
- Apply methodological and methodical knowledge in conducting scientific research, pedagogical and educational work.
- Manage a team in the process of developing a software system.
- Apply standards, methods, technologies, tools and technical means for the design, maintenance and development of software systems.
- Develop the architecture of the software system, ensure the security and reliability of the system.
- Develop and design complex software systems.
- Speak a foreign language at a professional level that allows conducting scientific research and teaching special disciplines in universities.
- Formulate and solve problems arising in the course of research activities that require in-depth professional knowledge
- Choose the necessary approaches and research methods, modify existing ones and develop new ones based on the objectives of a particular study.
- Apply psychological methods and means of improving the effectiveness and quality of training in the learning process.
- Apply effective methods for data security verification, vulnerability detection and remediation, development and implementation of security measures.
Secure Software Engineering is a process that includes the following stages:
1. Threat and Vulnerability Analysis — At this stage, potential threats and vulnerabilities that may affect software security are identified and assessed.
2. Secure System Design — At this stage, the software architecture and design are developed with security considerations integrated. This includes the application of secure architectural patterns and principles, as well as the implementation of protection mechanisms.
3. Secure Coding — At this stage, software is developed in a manner that ensures an appropriate level of security. This includes adherence to secure software development methodologies and best practices.
4. Vulnerability Testing — At this stage, the developed software is tested for vulnerabilities. This includes conducting static and dynamic source code analysis, as well as penetration testing.
5. Secure Deployment — At this stage, the software is deployed within the information infrastructure. This includes ensuring the security of the infrastructure and data, as well as providing security training for personnel.
To optimize the professional activities of software developers, the proposed educational program incorporates all necessary disciplines to enable specialists to develop software in accordance with stages 1–5. This begins with threat and vulnerability analysis and integrates these considerations into architectural design, secure coding practices, software testing, and deployment within operational infrastructure.
2. Secure System Design — At this stage, the software architecture and design are developed with security considerations integrated. This includes the application of secure architectural patterns and principles, as well as the implementation of protection mechanisms.
3. Secure Coding — At this stage, software is developed in a manner that ensures an appropriate level of security. This includes adherence to secure software development methodologies and best practices.
4. Vulnerability Testing — At this stage, the developed software is tested for vulnerabilities. This includes conducting static and dynamic source code analysis, as well as penetration testing.
5. Secure Deployment — At this stage, the software is deployed within the information infrastructure. This includes ensuring the security of the infrastructure and data, as well as providing security training for personnel.
To optimize the professional activities of software developers, the proposed educational program incorporates all necessary disciplines to enable specialists to develop software in accordance with stages 1–5. This begins with threat and vulnerability analysis and integrates these considerations into architectural design, secure coding practices, software testing, and deployment within operational infrastructure.
M094 – Information technology
Group of educational programs
Group of educational programs
Master of Technical Sciences in «7M06106 Secure Software Engineering»
Awarded degree
Awarded degree
2 years
Duration of study
Duration of study
Program Structure
BD – Basic Disciplines
UC – University Component
EC – Elective Component
UC – University Component
EC – Elective Component
| № | Course Cycle | Course Component | Course Code | Course Title | Academic Credits |
|---|---|---|---|---|---|
| 1 | BD | UC | PM | Psychology of Management | 4 |
| 2 | BD | UC | FLP | Foreign language (professional) | 4 |
| 3 | BD | UC | NONE | Higher Education Pedagogy | 4 |
| 4 | BD | UC | HPS | History and Philosophy of Science | 4 |
| 5 | BD | UC | PP 5206 | Teaching Practicum | 4 |
| 6 | BD | EC | ACN M 2024 / ACNS M 2024 | Advanced Computer Networking / Advanced Computer Networks Security | 5 |
| 7 | BD | ЕС | ADMS M 2024 / AMIS M 2024 | Advanced Database Management Systems / Advanced Management Information Systems | 5 |
| 8 | BD | ЕС | SRRA M 2024 / SAD M 2024 | Software Resilience and Risk Assessment / Systems Analysis and Design | 5 |
MD – Major Disciplines
UC – University Component
UC – University Component
| № | Course Cycle | Course Component | Course Code | Course Title | Academic Credits |
|---|---|---|---|---|---|
| 1 | MD | UC | SSAD 2024 | Secure Software Architecture and Design | 5 |
| 2 | MD | UC | AIASD 2024 | AI-assisted Soft Development | 5 |
| 3 | MD | UC | TMS | Teaching methods and strategies | 5 |
| 4 | MD | UC | ABAT M 2024 | Advanced Binary Analysis Techniques | 5 |
| 5 | MD | UC | BPD 2024 | Blockchain platforms development | 4 |
| 6 | MD | UC | RP 2-2 | Research Practice | 10 |
| 7 | MD | UC | ITAC M 2024 | IT Audit and Control | 4 |
| 8 | MD | UC | RP 1-2 | Research Practice | 10 |
| 9 | MD | UC | ASQM M 2024 | Advanced Software Quality Assurance | 5 |
RW — Research Work
UC – University Component
UC – University Component
| № | Course Cycle | Course Component | Course Code | Course Title | Academic Credits |
|---|---|---|---|---|---|
| 1 | RW | UC | NIRM 1 | Research work of masters's student, including an intership and the completion of a master's thesis | 4 |
| 2 | RW | UC | NIRM 6 | Research work of masters's student, including an intership and the completion of a master's thesis | 6 |
| 3 | RW | UC | NIRM 1-2 | Research work of masters's student, including an intership and the completion of a master's thesis | 2 |
| 4 | RW | UC | NIRM 5216 | Research work of masters's student, including an intership and the completion of a master's thesis | 4 |
| 5 | RW | UC | NIRM 3 | Research work of masters's student, including an intership and the completion of a master's thesis | 8 |
Documents
Academic disciplines

Contacts
Admission Committee
8(7172) 64-57-10
info@astanait.edu.kz
Mon-Fri 9:00 – 18:00