About this Course
4.6
726 ratings
172 reviews
Specialization

Course 2 of 5 in the

100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 22 hours to complete

Suggested: 6 weeks of study, 3-5 hours/week...
Available languages

English

Subtitles: English, Korean...

Skills you will gain

Fuzz TestingBuffer OverflowSql InjectionPenetration Test
Specialization

Course 2 of 5 in the

100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 22 hours to complete

Suggested: 6 weeks of study, 3-5 hours/week...
Available languages

English

Subtitles: English, Korean...

Syllabus - What you will learn from this course

Week
1
Hours to complete
2 hours to complete

OVERVIEW

Overview and expectations of the course...
Reading
3 videos (Total 26 min), 4 readings, 1 quiz
Video3 videos
What is software security?7m
Tour of the course and expected background11m
Reading4 readings
Introductory Reading10m
Syllabus10m
FAQ and Errata10m
Glossary10m
Quiz1 practice exercise
Qualifying Quiz30m
Hours to complete
2 hours to complete

LOW-LEVEL SECURITY

Low-level security: Attacks and exploits ...
Reading
6 videos (Total 50 min), 2 readings, 2 quizzes
Video6 videos
Memory Layout11m
Buffer Overflow6m
Code Injection6m
Other Memory Exploits11m
Format String Vulnerabilities6m
Reading2 readings
Week 1 Reading10m
Project 110m
Quiz2 practice exercises
Week 1 quiz30m
VM BOF quiz24m
Week
2
Hours to complete
2 hours to complete

DEFENDING AGAINST LOW-LEVEL EXPLOITS

Defending against low-level exploits...
Reading
7 videos (Total 79 min), 1 reading, 1 quiz
Video7 videos
Memory Safety16m
Type Safety4m
Avoiding Exploitation9m
Return Oriented Programming - ROP11m
Control Flow Integrity14m
Secure Coding18m
Reading1 reading
Week 2 Reading10m
Quiz1 practice exercise
Week 2 quiz30m
Week
3
Hours to complete
3 hours to complete

WEB SECURITY

Web security: Attacks and defenses...
Reading
10 videos (Total 101 min), 2 readings, 2 quizzes
Video10 videos
Web Basics10m
SQL Injection10m
SQL Injection Countermeasures9m
Web-based State Using Hidden Fields and Cookies13m
Session Hijacking6m
Cross-site Request Forgery - CSRF6m
Web 2.05m
Cross-site Scripting13m
Interview with Kevin Haley21m
Reading2 readings
Week 3 Reading10m
Project 210m
Quiz2 practice exercises
BadStore quiz18m
Week 3 quiz32m
Week
4
Hours to complete
3 hours to complete

SECURE SOFTWARE DEVELOPMENT

Designing and Building Secure Software...
Reading
10 videos (Total 130 min), 1 reading, 1 quiz
Video10 videos
Threat Modeling, or Architectural Risk Analysis9m
Security Requirements13m
Avoiding Flaws with Principles8m
Design Category: Favor Simplicity10m
Design Category: Trust With Reluctance12m
Design Category: Defense in Depth, Monitoring/Traceability5m
Top Design Flaws9m
Case Study: Very Secure FTP daemon12m
Interview with Gary McGraw40m
Reading1 reading
Week 4 Reading10m
Quiz1 practice exercise
Week 4 quiz32m
4.6
172 ReviewsChevron Right
Career direction

25%

started a new career after completing these courses
Career Benefit

83%

got a tangible career benefit from this course
Career promotion

18%

got a pay increase or promotion

Top Reviews

By PRNov 20th 2016

Content is really valuable and actionable with a specific comeback for the student in terms of secure development, security and how to understand the origin of exploits and other cyber attacks

By DTMay 9th 2016

The course of this kind was extremely needed, still in it's current state it contains lots of inaccuracies in lectures and quizes. I hope they will be fixed up to the future sessions.

Instructor

Avatar

Michael Hicks

Professor
Department of Computer Science

About University of Maryland, College Park

The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign. ...

About the Cybersecurity Specialization

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them....
Cybersecurity

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.