This course empowers software developers to integrate security throughout the software development lifecycle (SDLC). In today’s rapidly evolving threat landscape, securing applications from the outset is crucial. You'll learn to identify and mitigate common security risks such as buffer overflows, SQL injection, and session hijacking. By emphasizing practical examples, this course bridges theory and real-world applications to build a “build security in” mindset.

Security-Driven Software Development
访问权限由 New York State Department of Labor 提供
您将学到什么
Identify non-functional requirements essential for software security, performance, and reliability
Model vulnerabilities in software design and analysis
Analyze and mitigate security threats specific to web applications
您将获得的技能
- Secure Coding
- Cybersecurity
- Cyber Security Assessment
- Open Web Application Security Project (OWASP)
- Software Development
- Unified Modeling Language
- Single Sign-On (SSO)
- Data Validation
- Authentications
- Cyber Security Strategy
- Security Software
- Development Testing
- Software Development Life Cycle
- Authorization (Computing)
- Role-Based Access Control (RBAC)
- OAuth
- Vulnerability Assessments
- Application Security
- Threat Modeling
- 技能部分已折叠。显示 8 项技能,共 19 项。
要了解的详细信息

添加到您的领英档案
14 项作业
January 2026
了解顶级公司的员工如何掌握热门技能

该课程共有14个模块
In this section, we explore security principles, OWASP, NIST, and software development lifecycles.
涵盖的内容
2个视频1篇阅读材料1个作业
In this section, we explore designing a secure functional model by analyzing requirements, non-functional security needs, and creating use cases for secure system behavior.
涵盖的内容
1个视频1篇阅读材料1个作业
In this section, we explore secure object model design, focusing on identifying objects, creating class diagrams, and defining invariants for secure behavior.
涵盖的内容
1个视频1篇阅读材料1个作业
In this section, we examine object behavior, interactions, and constraints to design secure dynamic models, enhancing system security and reliability through UML diagrams and practical applications.
涵盖的内容
1个视频3篇阅读材料1个作业
In this section, we explore designing secure system models by implementing partitions, modeling interactions, and using UML diagrams to visualize system architecture and enhance security.
涵盖的内容
1个视频1篇阅读材料1个作业
In this section, we explore threat modeling techniques like STRIDE, DREAD, and attack trees to identify and mitigate security risks in software systems through structured analysis.
涵盖的内容
1个视频2篇阅读材料1个作业
In this section, we explore authentication and authorization, focusing on their roles in securing systems. Key concepts include SSO, OAuth, and enterprise security models, with practical implementation insights.
涵盖的内容
1个视频3篇阅读材料1个作业
In this section, we explore input validation and sanitization to secure applications and prevent vulnerabilities.
涵盖的内容
1个视频3篇阅读材料1个作业
In this section, we examine standard web application vulnerabilities, including injection attacks, broken authentication, and request forgery, with practical strategies for mitigation and secure development practices.
涵盖的内容
1个视频2篇阅读材料1个作业
In this section, we explore database security, including SQL injection, RBAC, encryption, and enterprise protections to ensure data safety.
涵盖的内容
1个视频1篇阅读材料1个作业
In this section, we cover unit testing principles, frameworks, and secure testing practices.
涵盖的内容
1个视频2篇阅读材料1个作业
In this section, we cover regression testing, RPA tools, and enterprise test planning to ensure software stability after code changes.
涵盖的内容
1个视频1篇阅读材料1个作业
In this section, we cover integration, system, and acceptance testing to ensure software components work together reliably.
涵盖的内容
1个视频1篇阅读材料1个作业
In this section, we cover penetration testing types, phases, tools, and reports to improve system security.
涵盖的内容
1个视频1篇阅读材料1个作业
位教师

提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







