This course is part of Secure Software Design.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Secure Software Design Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.7
(91 ratings)
5,645 already enrolled
Instructors:
English
What you'll learn
Identify common software vulnerabilities using CVE and CWE databases
Implement security measures in software design
Analyze and prevent SQL injection and buffer overflow attacks
Understand Bitcoin security architecture and implications
Apply active and passive security measures
Develop secure software lifecycle management practices
Skills you'll gain
This course includes:
1.7 Hours PreRecorded video
10 quizzes, 4 assignments
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 8 modules in this course
This comprehensive course focuses on identifying and mitigating security threats in software design. Students learn about common vulnerabilities, security best practices, and real-world case studies including Bitcoin technology. The curriculum covers both theoretical concepts and practical applications in securing software systems, emphasizing the importance of building security into the design phase.
Common Vulnerabilities and Weaknesses
Module 1 · 2 Hours to complete
Specific Design Considerations
Module 2 · 2 Hours to complete
Building Security in
Module 3 · 1 Hours to complete
A Dramatic Failure
Module 4 · 1 Hours to complete
The Bitcoin Project
Module 6 · 2 Hours to complete
Simple software compromises
Module 7 · 3 Hours to complete
Final Exam
Module 8 · 2 Hours to complete
Fee Structure
Individual course purchase is not available - to enroll in this course with a certificate, you need to purchase the complete Professional Certificate Course. For enrollment and detailed fee structure, visit the following: Secure Software Design
Instructor
Experienced Computer Science Instructor at UCCS
Dr. Albert Glock is an accomplished instructor in the field of computer science, currently teaching at the University of Colorado Colorado Springs (UCCS). He holds a diverse educational background, with a B.S. in Astronautical Engineering and Political Science from the United States Air Force Academy, an MPA in International Affairs from Harvard University, and a Ph.D. in Computer Science from the University of Colorado Colorado Springs. Dr. Glock's professional experience spans over several decades, including roles in the U.S. Air Force and various positions in the private sector, where he has worked with companies such as Northrop Grumman and Briggs & Stratton.Dr. Glock specializes in software design and development, offering courses that cover software design methods, threats and mitigations, and the software development lifecycle. His extensive background in both academia and industry equips him with unique insights into practical applications of software engineering principles. He is dedicated to enhancing student learning experiences through innovative teaching methods and real-world applications.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.