About this Course

2,577 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 6 hours to complete

Suggested: 4 weeks, 3-4 hours/week...

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 6 hours to complete

Suggested: 4 weeks, 3-4 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1

Week 1

2 hours to complete

Common Vulnerabilities and Weaknesses

2 hours to complete
4 videos (Total 17 min), 4 readings, 2 quizzes
4 videos
Open source threat and mitigation information3m
Medical analogies6m
Secure software design is good software design.4m
4 readings
Additional Resource10m
Additional Resource10m
Additional Resource10m
Additional Resource10m
2 practice exercises
Open source threat and mitigation information20m
Secure software design is good software design20m
Week
2

Week 2

2 hours to complete

Specific Design Considerations

2 hours to complete
2 videos (Total 26 min), 2 readings, 1 quiz
2 videos
Design Principles in detail - II8m
2 readings
Additional Resource30m
Additional Resource30m
1 practice exercise
Design Principles in detail20m
Week
3

Week 3

1 hour to complete

Building Security in

1 hour to complete
2 videos (Total 12 min)
2 videos
Active vs Passive security7m
1 practice exercise
Active vs Passive security20m
Week
4

Week 4

2 hours to complete

A Dramatic Failure

2 hours to complete
1 video (Total 14 min), 1 reading, 1 quiz
1 video
1 reading
Additional Resource30m
1 practice exercise
Therac-25 Case Study20m

Reviews

TOP REVIEWS FROM SOFTWARE DESIGN THREATS AND MITIGATIONS
View all reviews

Offered by

University of Colorado System logo

University of Colorado System

About the Secure Software Design Specialization

Information security is an extremely important topic in our world today. As individuals, we seek to protect our personal information while the corporations we work for have to protect suppliers, customers, and company assets. Creating secure software requires implementing secure practices as early in the software development lifecycle (SDLC) as possible. This Specialization focuses on ensuring security as part of software design and is for anyone with some workplace experience in software development who needs the background, perspective, and skills to recognize important security aspects of software design. You’ll consider secure design for multiple SDLC models, software architecture considerations, and design patterns. You’ll understand how to identify and implement secure design when considering databases, UML, unit testing, and ethics. Mindsets and attitudes of successful designers—and hackers—are presented as well as project successes and failures. Always at the core of front-end design will be user experience and you will have the opportunity to ensure clean and effective user interfaces that also serve to provide the best security. Back-end development topics such as database design are also covered....
Secure Software Design

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.