When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 2 modules in this course
Secure Your AI: Threat Modeling is an intermediate course for architects and engineers tasked with protecting complex AI systems. This course moves beyond reactive security, teaching you to build resilience directly into your designs. You will master the critical architectural decision of secret management by performing a deep-dive comparison of self-hosted solutions like Vault and managed cloud services like AWS Secrets Manager. You will learn to create a full Total Cost of Ownership (TCO) analysis and use compliance and performance data to make a justifiable, portfolio-ready recommendation.
Next, you'll learn to proactively hunt for vulnerabilities by deconstructing system architecture into Data Flow Diagrams and applying the industry-standard STRIDE framework. This systematic process will enable you to identify and mitigate critical threats like Spoofing and Information Disclosure before they can be exploited. Through hands-on, scenario-based projects, you will draft professional security documents, defend your decisions to a simulated review board, and leave the course with the skills to design, build, and maintain secure AI systems.
This module tackles the critical architectural decision of secret management in AI systems. You will first understand the “why”—the security and operational necessity of a dedicated secret store. You will then learn the “what” of the two primary models: on-premise self-hosted (like Vault) versus managed cloud services (e.g., Secrets Manager). Thereafter, the focus shifts to the “how” of comparing them across TCO, compliance, and operational overhead, and learning how to structure a professional recommendation, culminating in the creation of a justified, portfolio-ready technical recommendation.
What's included
2 videos2 readings3 assignments
Show info about module content
2 videos•Total 11 minutes
TCO and Compliance: A Cost-Benefit Deep Dive•5 minutes
Architect's Choice: Documenting Your Recommendation•6 minutes
2 readings•Total 13 minutes
Cloud vs. On-Prem: The Secret Management Trade-off•7 minutes
Integration and Latency: Prototyping Your Connection•6 minutes
3 assignments•Total 35 minutes
Hands-On Learning (HOL): Prototype and Compare Solutions•15 minutes
Hands-On Learning (HOL): Draft the Technical Recommendation•10 minutes
Justification of Secret Management Decision•10 minutes
Systematic Security Risk Assessment
Module 2•1 hour to complete
Module details
You have secured your system's secrets. Now, it is time to proactively secure its design. This module shifts focus to threat modeling—the systematic process of securing an AI system by design. You will learn the why behind this proactive approach. You will then master the how of deconstructing an architecture into data flows and trust boundaries and the structured what of applying the STRIDE framework to methodically identify and mitigate risks. The module culminates in the “apply” task of creating a real-world threat model for an agent system.
What's included
2 videos3 readings3 assignments
Show info about module content
2 videos•Total 8 minutes
DFDs and Trust Boundaries: Decomposing AI Architecture•5 minutes
STRIDE in Practice: Identifying Spoofing and Info Disclosure•3 minutes
3 readings•Total 17 minutes
The Power of Proactivity: Threat Modeling in DevSecOps•6 minutes
STRIDE: Your Framework for Systematic Threat Identification•6 minutes
Targeted Mitigations: Countering Spoofing and Info Disclosure•5 minutes
3 assignments•Total 41 minutes
Hands-On Learning (HOL): Scan Report Analysis: Diagramming the Chat-Agent•10 minutes
Hands-On Learning (HOL): STRIDE Analysis and Mitigation Plan•15 minutes
Architectural Review and Mitigation Proposal•16 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Coursera brings together a diverse network of subject matter experts who have demonstrated their expertise through professional industry experience or strong academic backgrounds. These instructors design and teach courses that make practical, career-relevant skills accessible to learners worldwide.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.