The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
Software Design Threats and Mitigations
This course is part of Secure Software Design Specialization
Instructor: Albert Glock
Sponsored by Louisiana Workforce Commission
5,719 already enrolled
(92 reviews)
Skills you'll gain
Details to know
Add to your LinkedIn profile
14 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 8 modules in this course
How to use the CVE and CWE on-line databases to assess threats and mitigations
What's included
4 videos5 readings2 assignments2 discussion prompts
Specific things you can do to create a better design.
What's included
2 videos2 readings1 assignment1 discussion prompt
Security must be built in to a project, not added on.
What's included
2 videos1 assignment1 discussion prompt
The consequences of a bad design can haunt you forever.
What's included
1 video1 reading1 assignment1 discussion prompt
A detailed look at the first two sentences of the abstract of Nakamoto's 2009 paper announcing Bitcoin.
What's included
2 videos2 readings1 assignment1 discussion prompt
Continuing with the abstract of Nakamoto's Bitcoin paper. More details on how it works and how security is integrated into it.
What's included
2 videos2 readings1 assignment1 discussion prompt
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!
What's included
3 videos3 readings2 assignments2 discussion prompts
A comprehensive course assessment comprising of 5 quizzes. Each assessment contains a randomized set of questions from different modules of the course.
What's included
5 assignments
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
92 reviews
- 5 stars
77.17%
- 4 stars
14.13%
- 3 stars
6.52%
- 2 stars
0%
- 1 star
2.17%
Showing 3 of 92
Reviewed on Sep 17, 2022
Awesoome Really helped a lot in the understand about bitcoin and malfunction and also the
Reviewed on Mar 15, 2020
Very interesting course, in terms of content and the delivery.
Reviewed on Aug 16, 2020
it is a very good course and I am very happy to complete it I learn a lot about design and security aspect thank you so much university of Colorado
Recommended if you're interested in Computer Science
LearnKartS
University of Colorado Boulder
California Institute of the Arts
University of California, Davis
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy