University of Colorado Boulder - Software Design Threats and Mitigations
- Offered byCoursera
Software Design Threats and Mitigations at Coursera Overview
Duration | 19 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Software Design Threats and Mitigations at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 4 of 4 in the Secure Software Design Specialization
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Intermediate Level
- Approx. 19 hours to complete
- English Subtitles: French, Portuguese (European), Russian, English, Spanish
Software Design Threats and Mitigations at Coursera Course details
- The design step in developing software has some unique characteristics. First of all, it?s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures?paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
Software Design Threats and Mitigations at Coursera Curriculum
Common Vulnerabilities and Weaknesses
Introduction to Threats and Mitigations
Open source threat and mitigation information
Medical analogies
Secure software design is good software design.
Additional Resource
Additional Resource
Additional Resource
Additional Resource
Open source threat and mitigation information
Secure software design is good software design
Specific Design Considerations
Design Principles in detail -- I
Design Principles in detail - II
Additional Resource
Additional Resource
Design Principles in detail
Building Security in
Security as a build-on, not an add-on
Active vs Passive security
Active vs Passive security
A Dramatic Failure
Therac-25 Case Study
Additional Resource
Therac-25 Case Study
Bitcoin Foundations
Intro to Bitcoin
Bitcoin Lecture 2
Additional Resource
Additional Resource
Bitcoin Foundations
The Bitcoin Project
Bitcoin Lecture 3
Bitcoin Lecture 4
Additional Reading
Additional Resource
Bitcoin 2
Simple software compromises
Buffer Overflow
SQL Injection
Software Life Cycle and Management considerations
Additional Resource
Additional Resource
Additional Resource
SQl Injection
Software Life Cycle and Management considerations
Final Exam
Assessment 1
Assessment 2
Assessment 3
Assessment 4
Assessment 5