课程信息
4.9
10 个评分
The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design....
Stacks
Globe

100% 在线课程

立即开始,按照自己的计划学习。
Calendar

可灵活调整截止日期

根据您的日程表重置截止日期。
Intermediate Level

中级

Clock

Approx. 7 hours to complete

建议:4 weeks, 3-4 hours/week...
Comment Dots

English

字幕:English...
Stacks
Globe

100% 在线课程

立即开始,按照自己的计划学习。
Calendar

可灵活调整截止日期

根据您的日程表重置截止日期。
Intermediate Level

中级

Clock

Approx. 7 hours to complete

建议:4 weeks, 3-4 hours/week...
Comment Dots

English

字幕:English...

教学大纲 - 您将从这门课程中学到什么

Week
1
Clock
完成时间为 2 小时

Common Vulnerabilities and Weaknesses

How to use the CVE and CWE on-line databases to assess threats and mitigations...
Reading
4 个视频(共 17 分钟), 4 个阅读材料, 2 个测验
Video4 个视频
Open source threat and mitigation information3分钟
Medical analogies6分钟
Secure software design is good software design.4分钟
Reading4 个阅读材料
Additional Resource10分钟
Additional Resource10分钟
Additional Resource10分钟
Additional Resource10分钟
Quiz2 个练习
Open source threat and mitigation information20分钟
Secure software design is good software design20分钟
Week
2
Clock
完成时间为 2 小时

Specific Design Considerations

Specific things you can do to create a better design....
Reading
2 个视频(共 26 分钟), 2 个阅读材料, 1 个测验
Video2 个视频
Design Principles in detail - II8分钟
Reading2 个阅读材料
Additional Resource30分钟
Additional Resource30分钟
Quiz1 个练习
Design Principles in detail20分钟
Week
3
Clock
完成时间为 1 小时

Building Security in

Security must be built in to a project, not added on....
Reading
2 个视频(共 12 分钟), 1 个测验
Video2 个视频
Active vs Passive security7分钟
Quiz1 个练习
Active vs Passive security20分钟
Week
4
Clock
完成时间为 2 小时

A Dramatic Failure

The consequences of a bad design can haunt you forever....
Reading
1 个视频(共 14 分钟), 1 个阅读材料, 1 个测验
Video1 个视频
Reading1 个阅读材料
Additional Resource30分钟
Quiz1 个练习
Therac-25 Case Study20分钟

讲师

Albert Glock

Instructor
Computer Science

关于 University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

关于 Secure Software Design 专项课程

This specialization is for those with limited workplace experience in software development to obtain the background, perspective and skills to recognize important security aspects of software they are expected to design. Mindsets and attitudes of successful designers--and hackers--are presented as well as project successes and failures...
Secure Software Design

常见问题

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

还有其他问题吗?请访问 学生帮助中心