Chevron Left
Back to Software Security

Learner Reviews & Feedback for Software Security by University of Maryland, College Park

4.6
stars
1,589 ratings

About the Course

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials....

Top reviews

GB

May 26, 2019

Was prepared and presented in a very special and superb way. I am glad I took and completed it. Thanks to my tutor Michael Hicks and special appreciation to coursera for making this possible for me.

VJ

Jul 9, 2016

Really useful course. I would highly recommend it to any person interested in beginning with Software security. Some SW basic skills are needed to follow the course and take profit of the lessons.

Filter by:

251 - 275 of 355 Reviews for Software Security

By EVERTON P B

Jun 22, 2021

Great!

By Ashmit B

Apr 22, 2021

v good

By Vladimir A

Dec 10, 2016

Great!

By A L

Apr 11, 2021

Beast

By Emmanuel B O

Mar 15, 2021

great

By Viraj V K

Feb 20, 2020

Great

By khalifa R

Jan 5, 2018

great

By 李孔强

Jun 3, 2017

非常好!!

By Pham T (

Nov 6, 2022

Good

By NEERAJ K 2

Sep 24, 2022

good

By Md F

Jan 6, 2022

Best

By Saloni B

Jan 5, 2022

nice

By Rajat V

Sep 14, 2021

good

By Vu Q Q

Sep 1, 2021

Nice

By Zerihun U H

Jul 24, 2021

nice

By LOKONDA M

Jul 16, 2021

good

By 郑家成

Jul 3, 2021

good

By Pratiksha K

Apr 11, 2021

Best

By Muhammad A N

Feb 25, 2019

Good

By khosnor k

Jul 29, 2021

By david k

Sep 27, 2016

t

By Jimmy C C

May 6, 2020

Fantastic introduction to software security. My favourite part was the buffer overflow exploit project. I got a euphoria upon successfully hacking the program. Moreover, in the process of doing the project, I learned a lot about memory and low level programming. As a recent CS graduate, I learned a lot from this course; specifically, how unsafe C/C++ programs are (Week 1), the role of programming language theory in security (Week 5), the importance of input validation and sanitization, and overall security development mindfulness. In order to get the most out of this course, the learner should at least be familiar with assembly and computer architecture, C programming, web development. There is a minor mistake in a week 5 lecture that has gone unaddressed for a while, but the rest of the contents are amazing.

By Ramadas S M

Jul 17, 2016

This course on software security was very informative . This is the best place to start off for a beginner as it not only covers the technical aspects of security ,but also talks about modelling threats and identifying adversaries and their capabilities.I however was slightly disappointed with the testing methods of this course.I feel that most of the testing should have been on the basis of projects and a project should have been included every week .But, all in all taking the course was a very pleasant experience and I thoroughly enjoyed all the projects that were given.

Looking forward to taking the next course in the specialization!!

By Courtney H

Jun 14, 2016

This is a tough course. Tough because I had no experience in C or C++. My background is dot-net and visual basic. It's been study C++ 5 hours a day and take the course 2 hours a day. I made it. The professor is spot on when he says a C++ background is needed. But I made it.

If you have the required background you'll find it's a good basis for understanding the multiple vulnerabilities in this code, what they are and how they work. (You better understand stacks and heaps and pointers real well)

Worth the time and the effort. Cheers to University if Maryland for making it available and to Professor Hicks for his hard work.