- Level Professional
- المدة 19 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.الوحدات
Introduction to Threats and Mitigations
1
Videos
- Introduction to Threats and Mitigations
2
Readings
- Additional Resource
- Get help and meet other learners. Join your Community!
Open source threat and mitigation information
1
Assignment
- Open source threat and mitigation information
1
Discussions
- Discussion 1
1
Videos
- Open source threat and mitigation information
1
Readings
- Additional Resource
Medical analogies
1
Videos
- Medical analogies
1
Readings
- Additional Resource
Secure software design is good software design
1
Assignment
- Secure software design is good software design
1
Discussions
- Discussion 2
1
Videos
- Secure software design is good software design.
1
Readings
- Additional Resource
Design Principles in detail -- I
1
Videos
- Design Principles in detail -- I
1
Readings
- Additional Resource
Design Principles in detail - II
1
Assignment
- Design Principles in detail
1
Discussions
- Discussion 3
1
Videos
- Design Principles in detail - II
1
Readings
- Additional Resource
Security as a build-on, not an add-on
1
Videos
- Security as a build-on, not an add-on
Active vs Passive security
1
Assignment
- Active vs Passive security
1
Discussions
- Discussion 4
1
Videos
- Active vs Passive security
Therac-25 Case Study
1
Assignment
- Therac-25 Case Study
1
Discussions
- Discussion 5
1
Videos
- Therac-25 Case Study
1
Readings
- Additional Resource
Intro to Bitcoin
1
Videos
- Intro to Bitcoin
1
Readings
- Additional Resource
Bitcoin Lecture 2
1
Assignment
- Bitcoin Foundations
1
Discussions
- Discussion 6
1
Videos
- Bitcoin Lecture 2
1
Readings
- Additional Resource
Bitcoin Lecture 3
1
Videos
- Bitcoin Lecture 3
1
Readings
- Additional Reading
Bitcoin Lecture 4
1
Assignment
- Bitcoin 2
1
Discussions
- Discussion 7
1
Videos
- Bitcoin Lecture 4
1
Readings
- Additional Resource
Buffer Overflow
1
Videos
- Buffer Overflow
1
Readings
- Additional Resource
SQL Injection
1
Assignment
- SQl Injection
1
Discussions
- Discussion 8
1
Videos
- SQL Injection
1
Readings
- Additional Resource
Software Life Cycle and Management considerations
1
Assignment
- Software Life Cycle and Management considerations
1
Discussions
- Discussion 9
1
Videos
- Software Life Cycle and Management considerations
1
Readings
- Additional Resource
Final Exam
5
Assignment
- Assessment 1
- Assessment 2
- Assessment 3
- Assessment 4
- Assessment 5
Auto Summary
Discover the essential aspects of software design in "Software Design Threats and Mitigations" by Coursera. This professional-level course delves into the unique characteristics of the design phase, emphasizing the importance of visual representations and drawing lessons from other disciplines like architecture. Perfect for IT and computer science professionals, the course spans 1140 minutes and offers a starter subscription option. Join now to enhance your software design skills!

Albert Glock