This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
This course is part of the Cybersecurity Specialization
Offered By
About this Course
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessSkills you will gain
- Fuzz Testing
- Buffer Overflow
- Sql Injection
- Penetration Test
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
OVERVIEW
LOW-LEVEL SECURITY
DEFENDING AGAINST LOW-LEVEL EXPLOITS
WEB SECURITY
SECURE SOFTWARE DEVELOPMENT
Reviews
- 5 stars73.19%
- 4 stars20.89%
- 3 stars4.27%
- 2 stars0.62%
- 1 star1%
TOP REVIEWS FROM SOFTWARE SECURITY
Although it was very interesting and enlightening course and the content of the course was excellent, I would like to point out that the learning technique used was a bit monotonous.
Week 5 about program analysis and is very interesting and many concepts are new to me. This is also a very well structured course. I had a great time studying it. Thanks, Mike.
The course overall is very good, I hope to have a more specialized course in C/C++ languages with more practices, as I work more with embedded systems/C
Content is really valuable and actionable with a specific comeback for the student in terms of secure development, security and how to understand the origin of exploits and other cyber attacks
About the Cybersecurity Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.