Software Design Threats and Mitigations

  • 4.7
Approx. 19 hours to complete

Course Summary

Learn about software design threats and how to mitigate them in this comprehensive course. Gain insights into the different types of software design threats and how to identify and address them.

Key Learning Points

  • Understand the different types of software design threats
  • Learn how to identify and mitigate software design threats
  • Gain knowledge on software security best practices

Job Positions & Salaries of people who have taken this course might have

    • USA: $98,000
    • India: ₹1,100,000
    • Spain: €40,000
    • USA: $98,000
    • India: ₹1,100,000
    • Spain: €40,000

    • USA: $115,000
    • India: ₹1,500,000
    • Spain: €45,000
    • USA: $98,000
    • India: ₹1,100,000
    • Spain: €40,000

    • USA: $115,000
    • India: ₹1,500,000
    • Spain: €45,000

    • USA: $75,000
    • India: ₹900,000
    • Spain: €32,000

Related Topics for further study


Learning Outcomes

  • Identify and mitigate software design threats
  • Apply security best practices in software design
  • Develop a comprehensive understanding of software security

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of software design principles
  • Familiarity with software development concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Cybersecurity Fundamentals
  • Secure Software Design
  • Threats and Countermeasures

Notable People in This Field

  • Bruce Schneier
  • Troy Hunt

Related Books

Description

The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.

Outline

  • Common Vulnerabilities and Weaknesses
  • Introduction to Threats and Mitigations
  • Open source threat and mitigation information
  • Medical analogies
  • Secure software design is good software design.
  • Additional Resource
  • Additional Resource
  • Additional Resource
  • Additional Resource
  • Open source threat and mitigation information
  • Secure software design is good software design
  • Specific Design Considerations
  • Design Principles in detail -- I
  • Design Principles in detail - II
  • Additional Resource
  • Additional Resource
  • Design Principles in detail
  • Building Security in
  • Security as a build-on, not an add-on
  • Active vs Passive security
  • Active vs Passive security
  • A Dramatic Failure
  • Therac-25 Case Study
  • Additional Resource
  • Therac-25 Case Study
  • Bitcoin Foundations
  • Intro to Bitcoin
  • Bitcoin Lecture 2
  • Additional Resource
  • Additional Resource
  • Bitcoin Foundations
  • The Bitcoin Project
  • Bitcoin Lecture 3
  • Bitcoin Lecture 4
  • Additional Reading
  • Additional Resource
  • Bitcoin 2
  • Simple software compromises
  • Buffer Overflow
  • SQL Injection
  • Software Life Cycle and Management considerations
  • Additional Resource
  • Additional Resource
  • Additional Resource
  • SQl Injection
  • Software Life Cycle and Management considerations
  • Final Exam
  • Assessment 1
  • Assessment 2
  • Assessment 3
  • Assessment 4
  • Assessment 5

Summary of User Reviews

Discover the best software design threats and mitigations with this course from Coursera. Students rave about the course's informative content, engaging instructor, and practical approach to designing secure software. While some users found the pace of the course to be too slow, many appreciated the thoroughness of the explanations and the opportunity to interact with classmates.

Key Aspect Users Liked About This Course

Many users appreciated the practical approach to designing secure software.

Pros from User Reviews

  • Informative content
  • Engaging instructor
  • Thorough explanations

Cons from User Reviews

  • Slow pace
  • Limited interaction with instructor
  • Some outdated material
English
Available now
Approx. 19 hours to complete
Albert Glock
University of Colorado System
Coursera

Instructor

Albert Glock

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses