This course empowers software developers to integrate security throughout the software development lifecycle (SDLC). In today’s rapidly evolving threat landscape, securing applications from the outset is crucial. You'll learn to identify and mitigate common security risks such as buffer overflows, SQL injection, and session hijacking. By emphasizing practical examples, this course bridges theory and real-world applications to build a “build security in” mindset.

Security-Driven Software Development

Security-Driven Software Development

Instructor: Packt - Course Instructors
Access provided by Inter IKEA
Recommended experience
What you'll learn
Identify non-functional requirements essential for software security, performance, and reliability
Model vulnerabilities in software design and analysis
Analyze and mitigate security threats specific to web applications
Skills you'll gain
- Secure Coding
- Vulnerability Assessments
- Software Development Life Cycle
- Threat Modeling
- Cyber Security Strategy
- Single Sign-On (SSO)
- Security Software
- Unified Modeling Language
- Development Testing
- Open Web Application Security Project (OWASP)
- Role-Based Access Control (RBAC)
- Authorization (Computing)
- Application Security
- Authentications
- OAuth
- Cybersecurity
- Data Validation
- Cyber Security Assessment
- Software Development
Details to know

Add to your LinkedIn profile
14 assignments
January 2026
See how employees at top companies are mastering in-demand skills

There are 14 modules in this course
In this section, we explore security principles, OWASP, NIST, and software development lifecycles.
What's included
2 videos1 reading1 assignment
In this section, we explore designing a secure functional model by analyzing requirements, non-functional security needs, and creating use cases for secure system behavior.
What's included
1 video1 reading1 assignment
In this section, we explore secure object model design, focusing on identifying objects, creating class diagrams, and defining invariants for secure behavior.
What's included
1 video1 reading1 assignment
In this section, we examine object behavior, interactions, and constraints to design secure dynamic models, enhancing system security and reliability through UML diagrams and practical applications.
What's included
1 video3 readings1 assignment
In this section, we explore designing secure system models by implementing partitions, modeling interactions, and using UML diagrams to visualize system architecture and enhance security.
What's included
1 video1 reading1 assignment
In this section, we explore threat modeling techniques like STRIDE, DREAD, and attack trees to identify and mitigate security risks in software systems through structured analysis.
What's included
1 video2 readings1 assignment
In this section, we explore authentication and authorization, focusing on their roles in securing systems. Key concepts include SSO, OAuth, and enterprise security models, with practical implementation insights.
What's included
1 video3 readings1 assignment
In this section, we explore input validation and sanitization to secure applications and prevent vulnerabilities.
What's included
1 video3 readings1 assignment
In this section, we examine standard web application vulnerabilities, including injection attacks, broken authentication, and request forgery, with practical strategies for mitigation and secure development practices.
What's included
1 video2 readings1 assignment
In this section, we explore database security, including SQL injection, RBAC, encryption, and enterprise protections to ensure data safety.
What's included
1 video1 reading1 assignment
In this section, we cover unit testing principles, frameworks, and secure testing practices.
What's included
1 video2 readings1 assignment
In this section, we cover regression testing, RPA tools, and enterprise test planning to ensure software stability after code changes.
What's included
1 video1 reading1 assignment
In this section, we cover integration, system, and acceptance testing to ensure software components work together reliably.
What's included
1 video1 reading1 assignment
In this section, we cover penetration testing types, phases, tools, and reports to improve system security.
What's included
1 video1 reading1 assignment
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






