The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
This course is part of the Secure Software Design Specialization
Offered By


About this Course
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessCould your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
Common Vulnerabilities and Weaknesses
Specific Design Considerations
Building Security in
A Dramatic Failure
Reviews
- 5 stars79.01%
- 4 stars13.58%
- 3 stars7.40%
TOP REVIEWS FROM SOFTWARE DESIGN THREATS AND MITIGATIONS
Awesoome Really helped a lot in the understand about bitcoin and malfunction and also the
Very interesting course, in terms of content and the delivery.
Pretty good start, a bit stretchy at the end. Great for people fairly new to the security business, early material good for everyone.
it is a very good course and I am very happy to complete it I learn a lot about design and security aspect thank you so much university of Colorado
About the Secure Software Design Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.