Blekinge Institute of Technology, BTH, has a distinctive focus on the digitalisation of society and sustainability.<br> BTH’s task is to contribute to a more sustainable societal development through higher education, research and innovation. BTH conducts education and research in fields in which society has major needs.<br> Through international excellence, we contribute to digital and sustainable transformation. As an institute of technology, we have a responsibility and a unique opportunity to make our contribution to both regional and national competitiveness and to global sustainability.<br> External engagement with wider society and the private sector contribute to making us more attractive and ensuring that our education and research maintain high quality and relevance.<br>
The course aims to provide an understanding of the application of software development in an environment based on the philosophy of lean and agile working methods. It includes an understanding of industry-relevant technologies to promote the development of software products as well as an understanding that value is of the utmost importance within businesses and organizations. The focus of the course is thus on creating a better understanding of the relationship between values and the influence of principles on businesses and organizations to achieve the best application of agile working methods and Lean as a philosophy.
The mobile and connected world of today generates a large amount of data that needs to be managed, analysed, and linked. This is often done on the cloud. The development, deployment, and management of this is called Cloud Computing. The purpose of this course is to offer a wide background about designing, developing, deploying, testing, and monitoring a cloud solution, specifically with a focus on big data problems.
This course is a guide to the cybersecurity issues arising throughout the entire development process. We consider the development from the security perspective from the beginning stage until the final release and beyond. No matter whether you are a developer, engineer, or a top-level manager, this course will benefit you. You will learn some useful hands-on approaches for trade-off analysis, requirements prioritization methods, risk assessment approaches, and other security aspects at all stages of development. M1 - Introducing Security Development Lifecycle M2 - Security Trade-off Analysis M3 - Security in Requirements M4 - Security in Design M5 - Security in Development M6 - Security in verification M7 - Security after releace