About this Course

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 6 hours to complete

Suggested: 4 weeks, 3-4 hours/week...

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 6 hours to complete

Suggested: 4 weeks, 3-4 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
2 hours to complete

Common Vulnerabilities and Weaknesses

4 videos (Total 17 min), 4 readings, 2 quizzes
4 videos
Secure software design is good software design.4m
4 readings
Additional Resource10m
Additional Resource10m
Additional Resource10m
Additional Resource10m
2 practice exercises
Open source threat and mitigation information20m
Secure software design is good software design20m
Week
2
2 hours to complete

Specific Design Considerations

2 videos (Total 26 min), 2 readings, 1 quiz
2 readings
Additional Resource30m
Additional Resource30m
1 practice exercise
Design Principles in detail20m
Week
3
1 hour to complete

Building Security in

2 videos (Total 12 min), 1 quiz
1 practice exercise
Active vs Passive security20m
Week
4
2 hours to complete

A Dramatic Failure

1 video (Total 14 min), 1 reading, 1 quiz
1 video
1 reading
Additional Resource30m
1 practice exercise
Therac-25 Case Study20m

Instructor

Avatar

Albert Glock

Instructor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Secure Software Design Specialization

Information security is an extremely important topic in our world today. As individuals, we seek to protect our personal information while the corporations we work for have to protect suppliers, customers, and company assets. Creating secure software requires implementing secure practices as early in the software development lifecycle (SDLC) as possible. This Specialization focuses on ensuring security as part of software design and is for anyone with some workplace experience in software development who needs the background, perspective, and skills to recognize important security aspects of software design. You’ll consider secure design for multiple SDLC models, software architecture considerations, and design patterns. You’ll understand how to identify and implement secure design when considering databases, UML, unit testing, and ethics. Mindsets and attitudes of successful designers—and hackers—are presented as well as project successes and failures. Always at the core of front-end design will be user experience and you will have the opportunity to ensure clean and effective user interfaces that also serve to provide the best security. Back-end development topics such as database design are also covered....
Secure Software Design

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.