Online Course
Software Design Threats and Mitigations
University of Colorado System via Coursera
-
98
-
- Write review
Overview
Class Central Tips
Syllabus
-How to use the CVE and CWE on-line databases to assess threats and mitigations
Specific Design Considerations
-Specific things you can do to create a better design.
Building Security in
-Security must be built in to a project, not added on.
A Dramatic Failure
-The consequences of a bad design can haunt you forever.
Bitcoin Foundations
-A detailed look at the first two sentences of the abstract of Nakamoto's 2009 paper announcing Bitcoin.
The Bitcoin Project
-Continuing with the abstract of Nakamoto's Bitcoin paper. More details on how it works and how security is integrated into it.
Simple software compromises
-A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!
Final Exam
-A comprehensive course assessment comprising of 5 quizzes. Each assessment contains a randomized set of questions from different modules of the course.
Taught by
Albert Glock and Oluwatobi Akanbi
Tags
Related Courses
-
Software Design as an Abstraction
University of Colorado System
-
Software Design as an Element of the Software Development Lifecycle
University of Colorado System
-
Software Design Methods and Tools
University of Colorado System
-
Secure Software Design
University of Colorado System
-
CSSLP Cert Prep: 3 Secure Software Design
-
Design Patterns
University of Alberta
4.4
Reviews
0.0 rating, based on 0 reviews