
Secure Software Engineering
7M06106 Secure Software Engineering
Algorithms and Data Structures, as well as Databases
Objective of Educational Program
Preparation of competitive masters with applied knowledge and skills to find vulnerabilities in software code at all stages of its development.
List of a specialist’s positions
- Secure Software Developer;
- Architect-Software Developer;
- Software Engineer.
Learning outcomes
- Apply methodological and methodical knowledge in conducting scientific research, pedagogical and educational work.
- Manage a team in the process of developing a software system.
- Apply standards, methods, technologies, tools and technical means for the design, maintenance and development of software systems.
- Develop the architecture of the software system, ensure the security and reliability of the system.
- Develop and design complex software systems.
- Speak a foreign language at a professional level that allows conducting scientific research and teaching special disciplines in universities.
- Formulate and solve problems arising in the course of research activities that require in-depth professional knowledge
- Choose the necessary approaches and research methods, modify existing ones and develop new ones based on the objectives of a particular study.
- Apply psychological methods and means of improving the effectiveness and quality of training in the learning process.
- Apply effective methods for data security verification, vulnerability detection and remediation, development and implementation of security measures.
Secure Software Engineering is a process that includes the following stages:
1. Threat and Vulnerability Analysis — At this stage, potential threats and vulnerabilities that may affect software security are identified and assessed.
2. Secure System Design — At this stage, the software architecture and design are developed with security considerations integrated. This includes the application of secure architectural patterns and principles, as well as the implementation of protection mechanisms.
3. Secure Coding — At this stage, software is developed in a manner that ensures an appropriate level of security. This includes adherence to secure software development methodologies and best practices.
4. Vulnerability Testing — At this stage, the developed software is tested for vulnerabilities. This includes conducting static and dynamic source code analysis, as well as penetration testing.
5. Secure Deployment — At this stage, the software is deployed within the information infrastructure. This includes ensuring the security of the infrastructure and data, as well as providing security training for personnel.
To optimize the professional activities of software developers, the proposed educational program incorporates all necessary disciplines to enable specialists to develop software in accordance with stages 1–5. This begins with threat and vulnerability analysis and integrates these considerations into architectural design, secure coding practices, software testing, and deployment within operational infrastructure.
2. Secure System Design — At this stage, the software architecture and design are developed with security considerations integrated. This includes the application of secure architectural patterns and principles, as well as the implementation of protection mechanisms.
3. Secure Coding — At this stage, software is developed in a manner that ensures an appropriate level of security. This includes adherence to secure software development methodologies and best practices.
4. Vulnerability Testing — At this stage, the developed software is tested for vulnerabilities. This includes conducting static and dynamic source code analysis, as well as penetration testing.
5. Secure Deployment — At this stage, the software is deployed within the information infrastructure. This includes ensuring the security of the infrastructure and data, as well as providing security training for personnel.
To optimize the professional activities of software developers, the proposed educational program incorporates all necessary disciplines to enable specialists to develop software in accordance with stages 1–5. This begins with threat and vulnerability analysis and integrates these considerations into architectural design, secure coding practices, software testing, and deployment within operational infrastructure.
M094 – Information technology
Group of educational programs
Group of educational programs
Master of Technical Sciences in «7M06106 Secure Software Engineering»
Awarded degree
Awarded degree
2 years
Duration of study
Duration of study
Documents
Academic disciplines

Contacts
Admission Committee
8(7172) 64-57-10
info@astanait.edu.kz
Mon-Fri 9:00 – 18:00