Back to Software Design Threats and Mitigations
University of Colorado System

Software Design Threats and Mitigations

The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.

Status: Public Key Cryptography Standards (PKCS)
Status: Open Web Application Security Project (OWASP)
IntermediateCourse19 hours

Featured reviews

G

5.0Reviewed Sep 17, 2022

A​wesoome Really helped a lot in the understand about bitcoin and malfunction and also the

KD

5.0Reviewed Mar 15, 2020

Very interesting course, in terms of content and the delivery.

WL

4.0Reviewed Jan 17, 2019

Pretty good start, a bit stretchy at the end. Great for people fairly new to the security business, early material good for everyone.

TN

5.0Reviewed Aug 16, 2020

it is a very good course and I am very happy to complete it I learn a lot about design and security aspect thank you so much university of Colorado

All reviews

Showing: 13 of 13

Aglaia Feli
5.0
Reviewed Feb 8, 2020
Slavisa Dosenovic
5.0
Reviewed Oct 28, 2019
Kimberley Dearlove
5.0
Reviewed Mar 16, 2020
Mathew Samir Boctor
5.0
Reviewed Jun 15, 2020
ROSHINI ARUMUGHAM
5.0
Reviewed Mar 6, 2020
Wayne C. Louie
4.0
Reviewed Jan 18, 2019
Alexey Aliferov
1.0
Reviewed Dec 17, 2024
Tarun kumar nagora
5.0
Reviewed Aug 17, 2020
044_SUPRATIK GHOSH
5.0
Reviewed Sep 18, 2022
Hezekiah Emoseigh Aaron
5.0
Reviewed Sep 4, 2020
JONNALAGADDA MANISHANKAR
5.0
Reviewed Oct 19, 2025
Swayambrata Mohapatra
5.0
Reviewed Mar 17, 2023
DANIEL TORRES SANDI
3.0
Reviewed Feb 26, 2021