Software Design Threats and Mitigations

This course is part of Secure Software Design Specialization

Instructor: Albert Glock

Skills you'll gain

  •   Software Architecture
  •   Vulnerability Management
  •   Software Visualization
  •   Cryptography
  •   Software Design
  •   Blockchain
  •   Threat Modeling
  •   Software Design Patterns
  •   Security Engineering
  •   Secure Coding
  •   Application Security
  •   Vulnerability Assessments
  •   Public Key Cryptography Standards (PKCS)
  • There are 8 modules in this course

    The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.

    Specific Design Considerations

    Building Security in

    A Dramatic Failure

    Bitcoin Foundations

    The Bitcoin Project

    Simple software compromises

    Final Exam

    Explore more from Software Development

    ©2025  ementorhub.com. All rights reserved