Construction of Secure Systems
About This Specialization
Follow the suggested order or choose your own.
Designed to help you practice and apply the skills you learn.
Highlight your new skills on your resume or LinkedIn.
- Intermediate Specialization.
- Some related experience required.
Usable SecurityCurrent session: Sep 18 — Nov 13.
- 7 weeks of study, 5-8 hours/week
About the CourseThis course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
Software SecurityCurrent session: Sep 18 — Nov 6.
- 6 weeks of study, 3-5 hours/week
- English, Korean
About the CourseThis course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
CryptographyUpcoming session: Oct 2 — Nov 27.
- 7 weeks of study, 4-7 hours/week
About the CourseThis course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.
Hardware SecurityUpcoming session: Sep 25 — Nov 20.
About the CourseIn this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
Cybersecurity Capstone ProjectStarts September 5
About the Capstone ProjectThis course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them.
Professor, University of Maryland, and Director, Maryland Cybersecurity Center