CYBR487 — Secure Software Engineering

3 credits Catalog-Derived

Secure approaches for designing, building, testing, and maintaining software systems. Includes threat modeling and secure SDLC practices.

5
Objectives
40
Matches
40
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
62.0% Software Quality Assurance Analysts 25t
63.8% Computer Systems Engineers/Architec 23t
72.3% Penetration Testers 21t
62.0% Information Security Engineers 20t
52.5% Telecommunications Engineering Spec 17t

Learning Objectives & Matches

LO1

Design secure software architectures following security design principles and patterns

10 O*NET task matches
Batch:
Computer Systems Engineers/Arc 4.2/5
58% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 300
Computer Systems Engineers/Arc 3.7/5
56% ok

Perform security analyses of developed or packaged software components.

Claude Opus 4.6 approved at 300
Penetration Testers
54% ok

Design security solutions to address known device vulnerabilities.

Claude Opus 4.6 approved at 300
Web Developers
52% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Telecommunications Engineering 4.1/5
51% ok

Implement controls to provide security for operating systems, software, and data.

Claude Opus 4.6 denied
Blockchain Engineers
51% ok

Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.

Claude Opus 4.6 denied
Information Security Engineers 4.1/5
50% ok

Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.

Claude Opus 4.6 approved at 200
Computer Systems Engineers/Arc 4.0/5
50% ok

Verify stability, interoperability, portability, security, or scalability of system architecture.

Claude Opus 4.6 denied
Blockchain Engineers
49% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
Network and Computer Systems A 3.7/5
48% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 approved at 200
LO2

Perform threat modeling and security risk assessment for software systems

10 O*NET task matches
Batch:
Penetration Testers
64% ok

Develop presentations on threat intelligence.

Claude Opus 4.6 approved at 400
Penetration Testers
61% ok

Identify new threat tactics, techniques, or procedures used by cyber threat actors.

Claude Opus 4.6 approved at 400
Penetration Testers
57% ok

Develop and execute tests that simulate the techniques of known cyber threat actors.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.7/5
52% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 300
Penetration Testers
45% ok

Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.

Claude Opus 4.6 approved at 200
Information Security Engineers 3.8/5
45% ok

Coordinate vulnerability assessments or analysis of information security systems.

Claude Opus 4.6 approved at 200
Digital Forensics Analysts
45% ok

Conduct predictive or reactive analyses on security measures to support cyber security initiatives.

Claude Opus 4.6 approved at 100
Biostatisticians 3.5/5
41% ok

Develop or use mathematical models to track changes in biological phenomena, such as the spread of infectious diseases.

Claude Opus 4.6 denied
Web Developers
40% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Penetration Testers
40% ok

Gather cyber intelligence to identify vulnerabilities.

Claude Opus 4.6 denied
LO3

Implement security testing including SAST, DAST, and penetration testing

10 O*NET task matches
Batch:
Penetration Testers
72% ok

Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

Claude Opus 4.6 approved at 400
Penetration Testers
67% ok

Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.

Claude Opus 4.6 approved at 400
Software Quality Assurance Ana 4.2/5
62% ok

Test system modifications to prepare for implementation.

Claude Opus 4.6 approved at 400
Information Security Engineers 4.6/5
61% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 approved at 400
Penetration Testers
61% ok

Identify security system weaknesses, using penetration tests.

Claude Opus 4.6 approved at 400
Web Administrators 3.5/5
59% ok

Develop testing routines and procedures.

Claude Opus 4.6 denied
Penetration Testers
58% ok

Develop infiltration tests that exploit device vulnerabilities.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.9/5
55% ok

Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.

Claude Opus 4.6 approved at 300
Web Administrators 3.3/5
55% ok

Test new software packages for use in Web operations or other applications.

Claude Opus 4.6 denied
Penetration Testers
55% ok

Develop and execute tests that simulate the techniques of known cyber threat actors.

Claude Opus 4.6 approved at 300
LO4

Apply secure development lifecycle practices throughout the software development process

10 O*NET task matches
Batch:
Computer Systems Engineers/Arc 4.2/5
56% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 300
Computer Systems Engineers/Arc 3.7/5
54% ok

Perform security analyses of developed or packaged software components.

Claude Opus 4.6 approved at 300
Penetration Testers
47% ok

Discuss security solutions with information technology teams or management.

Claude Opus 4.6 approved at 200
Information Security Engineers 4.1/5
46% ok

Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.

Claude Opus 4.6 approved at 200
Information Security Engineers 3.9/5
45% ok

Develop information security standards and best practices.

Claude Opus 4.6 approved at 100
Web Developers
44% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Web Administrators 4.2/5
42% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Database Administrators 3.4/5
42% ok

Develop standards and guidelines for the use and acquisition of software and to protect vulnerable information.

Claude Opus 4.6 denied
Information Security Engineers 3.7/5
41% ok

Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.

Claude Opus 4.6 approved at 100
Information Security Engineers 3.9/5
40% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 100
LO5

Develop security requirements and security user stories for software projects

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)