When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 8 modules in this course
The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
How to use the CVE and CWE on-line databases to assess threats and mitigations
Introduction to Threats and Mitigations•1 minute
Open source threat and mitigation information•4 minutes
Medical analogies•7 minutes
Secure software design is good software design.•5 minutes
5 readings•Total 45 minutes
Additional Resource•10 minutes
Get help and meet other learners. Join your Community!•5 minutes
Additional Resource•10 minutes
Additional Resource•10 minutes
Additional Resource•10 minutes
2 assignments•Total 60 minutes
Open source threat and mitigation information•30 minutes
Secure software design is good software design•30 minutes
2 discussion prompts•Total 20 minutes
Discussion 1•10 minutes
Discussion 2•10 minutes
Specific Design Considerations
Module 2•2 hours to complete
Module details
Specific things you can do to create a better design.
What's included
2 videos2 readings1 assignment1 discussion prompt
Show info about module content
2 videos•Total 26 minutes
Design Principles in detail -- I•17 minutes
Design Principles in detail - II•9 minutes
2 readings•Total 60 minutes
Additional Resource•30 minutes
Additional Resource•30 minutes
1 assignment•Total 30 minutes
Design Principles in detail•30 minutes
1 discussion prompt•Total 30 minutes
Discussion 3•30 minutes
Building Security in
Module 3•1 hour to complete
Module details
Security must be built in to a project, not added on.
What's included
2 videos1 assignment1 discussion prompt
Show info about module content
2 videos•Total 12 minutes
Security as a build-on, not an add-on•4 minutes
Active vs Passive security•8 minutes
1 assignment•Total 30 minutes
Active vs Passive security•30 minutes
1 discussion prompt•Total 30 minutes
Discussion 4•30 minutes
A Dramatic Failure
Module 4•2 hours to complete
Module details
The consequences of a bad design can haunt you forever.
What's included
1 video1 reading1 assignment1 discussion prompt
Show info about module content
1 video•Total 14 minutes
Therac-25 Case Study•14 minutes
1 reading•Total 30 minutes
Additional Resource•30 minutes
1 assignment•Total 30 minutes
Therac-25 Case Study•30 minutes
1 discussion prompt•Total 30 minutes
Discussion 5•30 minutes
Bitcoin Foundations
Module 5•2 hours to complete
Module details
A detailed look at the first two sentences of the abstract of Nakamoto's 2009 paper announcing Bitcoin.
What's included
2 videos2 readings1 assignment1 discussion prompt
Show info about module content
2 videos•Total 17 minutes
Intro to Bitcoin•8 minutes
Bitcoin Lecture 2•9 minutes
2 readings•Total 60 minutes
Additional Resource•30 minutes
Additional Resource•30 minutes
1 assignment•Total 30 minutes
Bitcoin Foundations•30 minutes
1 discussion prompt•Total 30 minutes
Discussion 6•30 minutes
The Bitcoin Project
Module 6•2 hours to complete
Module details
Continuing with the abstract of Nakamoto's Bitcoin paper. More details on how it works and how security is integrated into it.
What's included
2 videos2 readings1 assignment1 discussion prompt
Show info about module content
2 videos•Total 18 minutes
Bitcoin Lecture 3•8 minutes
Bitcoin Lecture 4•10 minutes
2 readings•Total 60 minutes
Additional Reading•30 minutes
Additional Resource•30 minutes
1 assignment•Total 30 minutes
Bitcoin 2•30 minutes
1 discussion prompt•Total 30 minutes
Discussion 7•30 minutes
Simple software compromises
Module 7•4 hours to complete
Module details
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!
Software Life Cycle and Management considerations•11 minutes
3 readings•Total 90 minutes
Additional Resource•30 minutes
Additional Resource•30 minutes
Additional Resource•30 minutes
2 assignments•Total 60 minutes
SQl Injection•30 minutes
Software Life Cycle and Management considerations•30 minutes
2 discussion prompts•Total 60 minutes
Discussion 8•30 minutes
Discussion 9•30 minutes
Final Exam
Module 8•3 hours to complete
Module details
A comprehensive course assessment comprising of 5 quizzes. Each assessment contains a randomized set of questions from different modules of the course.
What's included
5 assignments
Show info about module content
5 assignments•Total 150 minutes
Assessment 1•30 minutes
Assessment 2•30 minutes
Assessment 3•30 minutes
Assessment 4•30 minutes
Assessment 5•30 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.