RiseUpp Logo
Educator Logo

Software Design Threats and Mitigations

This course is part of Secure Software Design.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Secure Software Design Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

4.7

(91 ratings)

5,645 already enrolled

Instructors:

English

Powered by

Provider Logo
Software Design Threats and Mitigations

This course includes

18 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Identify common software vulnerabilities using CVE and CWE databases

  • Implement security measures in software design

  • Analyze and prevent SQL injection and buffer overflow attacks

  • Understand Bitcoin security architecture and implications

  • Apply active and passive security measures

  • Develop secure software lifecycle management practices

Skills you'll gain

Cybersecurity
Software Security
Vulnerability Assessment
Bitcoin Technology
SQL Injection
Buffer Overflow
Security Design
Threat Mitigation
CVE Database
CWE Database

This course includes:

1.7 Hours PreRecorded video

10 quizzes, 4 assignments

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 8 modules in this course

This comprehensive course focuses on identifying and mitigating security threats in software design. Students learn about common vulnerabilities, security best practices, and real-world case studies including Bitcoin technology. The curriculum covers both theoretical concepts and practical applications in securing software systems, emphasizing the importance of building security into the design phase.

Common Vulnerabilities and Weaknesses

Module 1 · 2 Hours to complete

Specific Design Considerations

Module 2 · 2 Hours to complete

Building Security in

Module 3 · 1 Hours to complete

A Dramatic Failure

Module 4 · 1 Hours to complete

Bitcoin Foundations

Module 5 · 2 Hours to complete

The Bitcoin Project

Module 6 · 2 Hours to complete

Simple software compromises

Module 7 · 3 Hours to complete

Final Exam

Module 8 · 2 Hours to complete

Fee Structure

Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Secure Software Design

Instructor

Albert Glock
Albert Glock

4.8 rating

4 Reviews

23,533 Students

4 Courses

Experienced Computer Science Instructor at UCCS

Dr. Albert Glock is an accomplished instructor in the field of computer science, currently teaching at the University of Colorado Colorado Springs (UCCS). He holds a diverse educational background, with a B.S. in Astronautical Engineering and Political Science from the United States Air Force Academy, an MPA in International Affairs from Harvard University, and a Ph.D. in Computer Science from the University of Colorado Colorado Springs. Dr. Glock's professional experience spans over several decades, including roles in the U.S. Air Force and various positions in the private sector, where he has worked with companies such as Northrop Grumman and Briggs & Stratton.Dr. Glock specializes in software design and development, offering courses that cover software design methods, threats and mitigations, and the software development lifecycle. His extensive background in both academia and industry equips him with unique insights into practical applications of software engineering principles. He is dedicated to enhancing student learning experiences through innovative teaching methods and real-world applications.

Software Design Threats and Mitigations

This course includes

18 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.