Coursera
Coursera Logo

University of Colorado Boulder - Software Design Threats and Mitigations 

  • Offered byCoursera

Software Design Threats and Mitigations
 at 
Coursera 
Overview

Duration

19 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Software Design Threats and Mitigations
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 4 of 4 in the Secure Software Design Specialization
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Intermediate Level
  • Approx. 19 hours to complete
  • English Subtitles: French, Portuguese (European), Russian, English, Spanish
Read more
Details Icon

Software Design Threats and Mitigations
 at 
Coursera 
Course details

More about this course
  • The design step in developing software has some unique characteristics. First of all, it?s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures?paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.

Software Design Threats and Mitigations
 at 
Coursera 
Curriculum

Common Vulnerabilities and Weaknesses

Introduction to Threats and Mitigations

Open source threat and mitigation information

Medical analogies

Secure software design is good software design.

Additional Resource

Additional Resource

Additional Resource

Additional Resource

Open source threat and mitigation information

Secure software design is good software design

Specific Design Considerations

Design Principles in detail -- I

Design Principles in detail - II

Additional Resource

Additional Resource

Design Principles in detail

Building Security in

Security as a build-on, not an add-on

Active vs Passive security

Active vs Passive security

A Dramatic Failure

Therac-25 Case Study

Additional Resource

Therac-25 Case Study

Bitcoin Foundations

Intro to Bitcoin

Bitcoin Lecture 2

Additional Resource

Additional Resource

Bitcoin Foundations

The Bitcoin Project

Bitcoin Lecture 3

Bitcoin Lecture 4

Additional Reading

Additional Resource

Bitcoin 2

Simple software compromises

Buffer Overflow

SQL Injection

Software Life Cycle and Management considerations

Additional Resource

Additional Resource

Additional Resource

SQl Injection

Software Life Cycle and Management considerations

Final Exam

Assessment 1

Assessment 2

Assessment 3

Assessment 4

Assessment 5

Software Design Threats and Mitigations
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Software Design Threats and Mitigations
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...