About this Course
4.9
14 ratings
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Intermediate Level

Intermediate Level

Hours to complete

Approx. 5 hours to complete

Suggested: 4 weeks, 3-4 hours/week...
Available languages

English

Subtitles: English
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Intermediate Level

Intermediate Level

Hours to complete

Approx. 5 hours to complete

Suggested: 4 weeks, 3-4 hours/week...
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
2 hours to complete

Common Vulnerabilities and Weaknesses

How to use the CVE and CWE on-line databases to assess threats and mitigations...
Reading
4 videos (Total 17 min), 4 readings, 2 quizzes
Video4 videos
Open source threat and mitigation information3m
Medical analogies6m
Secure software design is good software design.4m
Reading4 readings
Additional Resource10m
Additional Resource10m
Additional Resource10m
Additional Resource10m
Quiz2 practice exercises
Open source threat and mitigation information20m
Secure software design is good software design20m
Week
2
Hours to complete
2 hours to complete

Specific Design Considerations

Specific things you can do to create a better design....
Reading
2 videos (Total 26 min), 2 readings, 1 quiz
Video2 videos
Design Principles in detail - II8m
Reading2 readings
Additional Resource30m
Additional Resource30m
Quiz1 practice exercise
Design Principles in detail20m
Week
3
Hours to complete
1 hour to complete

Building Security in

Security must be built in to a project, not added on....
Reading
2 videos (Total 12 min), 1 quiz
Video2 videos
Active vs Passive security7m
Quiz1 practice exercise
Active vs Passive security20m
Week
4
Hours to complete
2 hours to complete

A Dramatic Failure

The consequences of a bad design can haunt you forever....
Reading
1 video (Total 14 min), 1 reading, 1 quiz
Video1 video
Reading1 reading
Additional Resource30m
Quiz1 practice exercise
Therac-25 Case Study20m

Instructor

Avatar

Albert Glock

Instructor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Secure Software Design Specialization

This specialization is for those with limited workplace experience in software development to obtain the background, perspective and skills to recognize important security aspects of software they are expected to design. Mindsets and attitudes of successful designers--and hackers--are presented as well as project successes and failures...
Secure Software Design

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.