The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
Dieser Kurs ist Teil der Spezialisierung Spezialisierung Secure Software Design
von


Über diesen Kurs
von

University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Lehrplan - Was Sie in diesem Kurs lernen werden
Common Vulnerabilities and Weaknesses
How to use the CVE and CWE on-line databases to assess threats and mitigations
Specific Design Considerations
Specific things you can do to create a better design.
Building Security in
Security must be built in to a project, not added on.
A Dramatic Failure
The consequences of a bad design can haunt you forever.
Bewertungen
- 5 stars78,66 %
- 4 stars13,33 %
- 3 stars8 %
Top-Bewertungen von SOFTWARE DESIGN THREATS AND MITIGATIONS
Very interesting course, in terms of content and the delivery.
Nice introduction to software threats and how to mitigate them already in the design phase. I am happy and curious to learn more and get deeper insights. Thank you!
it is a very good course and I am very happy to complete it I learn a lot about design and security aspect thank you so much university of Colorado
Pretty good start, a bit stretchy at the end. Great for people fairly new to the security business, early material good for everyone.
Über den Spezialisierung Secure Software Design
Information security is an extremely important topic in our world today. As individuals, we seek to protect our personal information while the corporations we work for have to protect suppliers, customers, and company assets. Creating secure software requires implementing secure practices as early in the software development lifecycle (SDLC) as possible.

Häufig gestellte Fragen
Wann erhalte ich Zugang zu den Vorträgen und Aufgaben?
Was bekomme ich, wenn ich diese Spezialisierung abonniere?
Ist finanzielle Unterstützung möglich?
Haben Sie weitere Fragen? Besuchen Sie das Learner Help Center.