About this Course

64,623 recent views

Learner Career Outcomes

31%

started a new career after completing these courses

23%

got a tangible career benefit from this course

13%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 2 of 5 in the
Flexible deadlines
Reset deadlines in accordance to your schedule.
Approx. 18 hours to complete
English

Skills you will gain

Fuzz TestingBuffer OverflowSql InjectionPenetration Test

Learner Career Outcomes

31%

started a new career after completing these courses

23%

got a tangible career benefit from this course

13%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 2 of 5 in the
Flexible deadlines
Reset deadlines in accordance to your schedule.
Approx. 18 hours to complete
English

Instructor

Offered by

Placeholder

University of Maryland, College Park

Syllabus - What you will learn from this course

Content RatingThumbs Up94%(4,367 ratings)Info
Week
1

Week 1

2 hours to complete

OVERVIEW

2 hours to complete
3 videos (Total 26 min), 4 readings, 1 quiz
3 videos
What is software security?7m
Tour of the course and expected background11m
4 readings
Introductory Reading10m
Syllabus10m
FAQ and Errata10m
Glossary10m
1 practice exercise
Qualifying Quiz30m
2 hours to complete

LOW-LEVEL SECURITY

2 hours to complete
6 videos (Total 50 min), 2 readings, 2 quizzes
6 videos
Memory Layout11m
Buffer Overflow6m
Code Injection6m
Other Memory Exploits11m
Format String Vulnerabilities6m
2 readings
Week 1 Reading10m
Project 110m
2 practice exercises
Week 1 quiz30m
VM BOF quiz30m
Week
2

Week 2

2 hours to complete

DEFENDING AGAINST LOW-LEVEL EXPLOITS

2 hours to complete
7 videos (Total 79 min), 1 reading, 1 quiz
7 videos
Memory Safety16m
Type Safety4m
Avoiding Exploitation9m
Return Oriented Programming - ROP11m
Control Flow Integrity14m
Secure Coding18m
1 reading
Week 2 Reading10m
1 practice exercise
Week 2 quiz30m
Week
3

Week 3

3 hours to complete

WEB SECURITY

3 hours to complete
10 videos (Total 101 min), 2 readings, 2 quizzes
10 videos
Web Basics10m
SQL Injection10m
SQL Injection Countermeasures9m
Web-based State Using Hidden Fields and Cookies13m
Session Hijacking6m
Cross-site Request Forgery - CSRF6m
Web 2.05m
Cross-site Scripting13m
Interview with Kevin Haley21m
2 readings
Week 3 Reading10m
Project 210m
2 practice exercises
BadStore quiz30m
Week 3 quiz30m
Week
4

Week 4

3 hours to complete

SECURE SOFTWARE DEVELOPMENT

3 hours to complete
10 videos (Total 130 min), 1 reading, 1 quiz
10 videos
Threat Modeling, or Architectural Risk Analysis9m
Security Requirements13m
Avoiding Flaws with Principles8m
Design Category: Favor Simplicity10m
Design Category: Trust With Reluctance12m
Design Category: Defense in Depth, Monitoring/Traceability5m
Top Design Flaws9m
Case Study: Very Secure FTP daemon12m
Interview with Gary McGraw40m
1 reading
Week 4 Reading10m
1 practice exercise
Week 4 quiz30m

Reviews

TOP REVIEWS FROM SOFTWARE SECURITY

View all reviews

About the Cybersecurity Specialization

Cybersecurity

Frequently Asked Questions

More questions? Visit the Learner Help Center.