Software Design Threats and Mitigations (Coursera)

Software Design Threats and Mitigations (Coursera)

Añade tu reseña
Añadir a Mis FavoritosAñadido a tus favoritosEliminado de tus favoritos 0
Añadir para comparar

Descripción de “Software Design Threats and Mitigations (Coursera)”

The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.

Who is this class for: This is a graduate class and it will be best appreciated by students who have a solid foundation in basic software engineering, who can code well (although no real coding is required) and who have had at least internships if not full-time jobs in software development. This is not to say that you need to know how to design software before you learn about designing secure software. It is to say that the more experience you already have in software development, the more the examples and ideas put forth in this course will resonate with you.

Course 4 of 4 in the Secure Software Design Specialization.

Syllabus

WEEK 1

Common Vulnerabilities and Weaknesses

How to use the CVE and CWE on-line databases to assess threats and mitigations

WEEK 2

Specific Design Considerations

Specific things you can do to create a better design.

WEEK 3

Building Security in

Security must be built in to a project, not added on.

WEEK 4

A Dramatic Failure

The consequences of a bad design can haunt you forever.

WEEK 5

Bitcoin Foundations

A detailed look at the first two sentences of the abstract of Nakamoto’s 2009 paper announcing Bitcoin.

WEEK 6

The Bitcoin Project

Continuing with the abstract of Nakamoto’s Bitcoin paper. More details on how it works and how security is integrated into it.

WEEK 7

Simple software compromises

A look into the specifics of two common exploitation techniques–buffer overflow and SQL injections. Even though they’re “old”, these exploits are still used today!

WEEK 8

Final Exam

A comprehensive course assessment comprising of 5 quizzes. Each assessment contains a randomized set of questions from different modules of the course.

Graded: Assessment 1

Graded: Assessment 2

Graded: Assessment 3

Graded: Assessment 4

Graded: Assessment 5

Especificaciones: Software Design Threats and Mitigations (Coursera)

Curso ofrecido por
Disponibilidad

✔ Disponible

Plataforma

Universidad

Impartido por

Albert Glock

País

USA

Nivel, duración y fechas
Nivel

Intermedio

Fecha

04/05/2020

Duración

8 semanas

Tiempo necesario

3-4 horas/semana

Idioma del curso
Idioma vehicular

Inglés

Subtítulos

No informado

Exámenes y Certificados
Certificados

Certificado de Pago

Exámenes/Proyectos

Con Examen/Proyecto Final de pago

User Reviews

0.0 fuera de 5
0
0
0
0
0
Write a review

Aún no hay reseñas.

Se el primero en opinar sobre “Software Design Threats and Mitigations (Coursera)”

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Antes de enviar tu opinión, has de aceptar nuestra política de cookies y privacidad

Software Design Threats and Mitigations (Coursera)
Software Design Threats and Mitigations (Coursera)

Este sitio web utiliza cookies para un correcto funcionamiento. Si continúas navegando estás dando tu consentimiento para estas cookies y aceptas nuestra política de cookies, clic para más información.

ACEPTAR
Aviso de cookies
Comparar artículos
  • Total (0)
Comparar
0