This course empowers software developers to integrate security throughout the software development lifecycle (SDLC). In today’s rapidly evolving threat landscape, securing applications from the outset is crucial. You'll learn to identify and mitigate common security risks such as buffer overflows, SQL injection, and session hijacking. By emphasizing practical examples, this course bridges theory and real-world applications to build a “build security in” mindset.

Security-Driven Software Development
4 days left! Gain next-level skills with Coursera Plus for $199 (regularly $399). Save now.

Recommended experience
What you'll learn
Identify non-functional requirements essential for software security, performance, and reliability
Model vulnerabilities in software design and analysis
Analyze and mitigate security threats specific to web applications
Skills you'll gain
- Single Sign-On (SSO)
- Open Web Application Security Project (OWASP)
- Cybersecurity
- Authorization (Computing)
- Security Software
- Authentications
- OAuth
- Secure Coding
- Application Security
- Software Development Life Cycle
- Software Development
- Vulnerability Assessments
- Role-Based Access Control (RBAC)
- Cyber Security Strategy
- Cyber Security Assessment
- Data Validation
- Threat Modeling
- Development Testing
- Unified Modeling Language
Details to know

Add to your LinkedIn profile
January 2026
14 assignments
See how employees at top companies are mastering in-demand skills

There are 14 modules in this course
In this section, we explore security principles, OWASP, NIST, and software development lifecycles.
What's included
2 videos1 reading1 assignment
In this section, we explore designing a secure functional model by analyzing requirements, non-functional security needs, and creating use cases for secure system behavior.
What's included
1 video1 reading1 assignment
In this section, we explore secure object model design, focusing on identifying objects, creating class diagrams, and defining invariants for secure behavior.
What's included
1 video1 reading1 assignment
In this section, we examine object behavior, interactions, and constraints to design secure dynamic models, enhancing system security and reliability through UML diagrams and practical applications.
What's included
1 video3 readings1 assignment
In this section, we explore designing secure system models by implementing partitions, modeling interactions, and using UML diagrams to visualize system architecture and enhance security.
What's included
1 video1 reading1 assignment
In this section, we explore threat modeling techniques like STRIDE, DREAD, and attack trees to identify and mitigate security risks in software systems through structured analysis.
What's included
1 video2 readings1 assignment
In this section, we explore authentication and authorization, focusing on their roles in securing systems. Key concepts include SSO, OAuth, and enterprise security models, with practical implementation insights.
What's included
1 video3 readings1 assignment
In this section, we explore input validation and sanitization to secure applications and prevent vulnerabilities.
What's included
1 video3 readings1 assignment
In this section, we examine standard web application vulnerabilities, including injection attacks, broken authentication, and request forgery, with practical strategies for mitigation and secure development practices.
What's included
1 video2 readings1 assignment
In this section, we explore database security, including SQL injection, RBAC, encryption, and enterprise protections to ensure data safety.
What's included
1 video1 reading1 assignment
In this section, we cover unit testing principles, frameworks, and secure testing practices.
What's included
1 video2 readings1 assignment
In this section, we cover regression testing, RPA tools, and enterprise test planning to ensure software stability after code changes.
What's included
1 video1 reading1 assignment
In this section, we cover integration, system, and acceptance testing to ensure software components work together reliably.
What's included
1 video1 reading1 assignment
In this section, we cover penetration testing types, phases, tools, and reports to improve system security.
What's included
1 video1 reading1 assignment
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,




