The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
About this Course
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
- 5 stars79.48%
- 4 stars12.82%
- 3 stars7.69%
TOP REVIEWS FROM SOFTWARE DESIGN THREATS AND MITIGATIONS
Pretty good start, a bit stretchy at the end. Great for people fairly new to the security business, early material good for everyone.
it is a very good course and I am very happy to complete it I learn a lot about design and security aspect thank you so much university of Colorado
Very interesting course, in terms of content and the delivery.
Awesoome Really helped a lot in the understand about bitcoin and malfunction and also the
About the Secure Software Design Specialization
Information security is an extremely important topic in our world today. As individuals, we seek to protect our personal information while the corporations we work for have to protect suppliers, customers, and company assets. Creating secure software requires implementing secure practices as early in the software development lifecycle (SDLC) as possible.
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.