Cybersecurity Specialization

Starts Nov 16

Cybersecurity Specialization

Cybersecurity Fundamentals. Construction of Secure Systems

About This Specialization

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.

Created by:

5 courses

Follow the suggested order or choose your own.


Designed to help you practice and apply the skills you learn.


Highlight your new skills on your resume or LinkedIn.

Intermediate Specialization.
Some related experience required.
  1. COURSE 1

    Usable Security

    7 weeks of study, 5-8 hours/week

    About the Course

    This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security
  2. COURSE 2

    Software Security

    6 weeks of study, 3-5 hours/week
    English, Korean

    About the Course

    This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defen
  3. COURSE 3


    7 weeks of study, 4-7 hours/week

    About the Course

    This course will introduce you to the foundations of modern cryptography, with an eye toward pra
  4. COURSE 4

    Hardware Security


    About the Course

    In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will le
  5. COURSE 5

    Cybersecurity Capstone Project

    Upcoming session:

    About the Capstone Project

    This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please n


  • University of Maryland, College Park

    The University of Maryland inspires, supports and promotes entrepreneurial spirit, creativity and innovation among faculty, staff and students.

    The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign.

  • Michael Hicks

    Michael Hicks

  • Jennifer Golbeck

    Jennifer Golbeck

  • Gang Qu

    Gang Qu

    Associate Professor
  • Jonathan  Katz

    Jonathan Katz

    Professor, University of Maryland, and Director, Maryland Cybersecurity Center