Course Summary
Learn about software design threats and how to mitigate them in this comprehensive course. Gain insights into the different types of software design threats and how to identify and address them.Key Learning Points
- Understand the different types of software design threats
- Learn how to identify and mitigate software design threats
- Gain knowledge on software security best practices
Job Positions & Salaries of people who have taken this course might have
- USA: $98,000
- India: ₹1,100,000
- Spain: €40,000
- USA: $98,000
- India: ₹1,100,000
- Spain: €40,000
- USA: $115,000
- India: ₹1,500,000
- Spain: €45,000
- USA: $98,000
- India: ₹1,100,000
- Spain: €40,000
- USA: $115,000
- India: ₹1,500,000
- Spain: €45,000
- USA: $75,000
- India: ₹900,000
- Spain: €32,000
Related Topics for further study
Learning Outcomes
- Identify and mitigate software design threats
- Apply security best practices in software design
- Develop a comprehensive understanding of software security
Prerequisites or good to have knowledge before taking this course
- Basic understanding of software design principles
- Familiarity with software development concepts
Course Difficulty Level
IntermediateCourse Format
- Online
- Self-paced
Similar Courses
- Cybersecurity Fundamentals
- Secure Software Design
- Threats and Countermeasures
Notable People in This Field
- Bruce Schneier
- Troy Hunt
Related Books
Description
The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
Outline
- Common Vulnerabilities and Weaknesses
- Introduction to Threats and Mitigations
- Open source threat and mitigation information
- Medical analogies
- Secure software design is good software design.
- Additional Resource
- Additional Resource
- Additional Resource
- Additional Resource
- Open source threat and mitigation information
- Secure software design is good software design
- Specific Design Considerations
- Design Principles in detail -- I
- Design Principles in detail - II
- Additional Resource
- Additional Resource
- Design Principles in detail
- Building Security in
- Security as a build-on, not an add-on
- Active vs Passive security
- Active vs Passive security
- A Dramatic Failure
- Therac-25 Case Study
- Additional Resource
- Therac-25 Case Study
- Bitcoin Foundations
- Intro to Bitcoin
- Bitcoin Lecture 2
- Additional Resource
- Additional Resource
- Bitcoin Foundations
- The Bitcoin Project
- Bitcoin Lecture 3
- Bitcoin Lecture 4
- Additional Reading
- Additional Resource
- Bitcoin 2
- Simple software compromises
- Buffer Overflow
- SQL Injection
- Software Life Cycle and Management considerations
- Additional Resource
- Additional Resource
- Additional Resource
- SQl Injection
- Software Life Cycle and Management considerations
- Final Exam
- Assessment 1
- Assessment 2
- Assessment 3
- Assessment 4
- Assessment 5
Summary of User Reviews
Discover the best software design threats and mitigations with this course from Coursera. Students rave about the course's informative content, engaging instructor, and practical approach to designing secure software. While some users found the pace of the course to be too slow, many appreciated the thoroughness of the explanations and the opportunity to interact with classmates.Key Aspect Users Liked About This Course
Many users appreciated the practical approach to designing secure software.Pros from User Reviews
- Informative content
- Engaging instructor
- Thorough explanations
Cons from User Reviews
- Slow pace
- Limited interaction with instructor
- Some outdated material