The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
제공자:


이 강좌에 대하여
제공자:

콜로라도 대학교
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
강의 계획표 - 이 강좌에서 배울 내용
Common Vulnerabilities and Weaknesses
How to use the CVE and CWE on-line databases to assess threats and mitigations
Specific Design Considerations
Specific things you can do to create a better design.
Building Security in
Security must be built in to a project, not added on.
A Dramatic Failure
The consequences of a bad design can haunt you forever.
검토
- 5 stars78.94%
- 4 stars13.15%
- 3 stars7.89%
SOFTWARE DESIGN THREATS AND MITIGATIONS의 최상위 리뷰
it is a very good course and I am very happy to complete it I learn a lot about design and security aspect thank you so much university of Colorado
Very interesting course, in terms of content and the delivery.
Nice introduction to software threats and how to mitigate them already in the design phase. I am happy and curious to learn more and get deeper insights. Thank you!
Pretty good start, a bit stretchy at the end. Great for people fairly new to the security business, early material good for everyone.
Secure Software Design 특화 과정 정보
Information security is an extremely important topic in our world today. As individuals, we seek to protect our personal information while the corporations we work for have to protect suppliers, customers, and company assets. Creating secure software requires implementing secure practices as early in the software development lifecycle (SDLC) as possible.

자주 묻는 질문
강의 및 과제를 언제 이용할 수 있게 되나요?
이 전문 분야를 구독하면 무엇을 이용할 수 있나요?
재정 지원을 받을 수 있나요?
궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.