Software Design Threats and Mitigations

Por: Coursera . en: , ,

  • Common Vulnerabilities and Weaknesses
    • How to use the CVE and CWE on-line databases to assess threats and mitigations
  • Specific Design Considerations
    • Specific things you can do to create a better design.
  • Building Security in
    • Security must be built in to a project, not added on.
  • A Dramatic Failure
    • The consequences of a bad design can haunt you forever.
  • Bitcoin Foundations
    • A detailed look at the first two sentences of the abstract of Nakamoto's 2009 paper announcing Bitcoin.
  • The Bitcoin Project
    • Continuing with the abstract of Nakamoto's Bitcoin paper. More details on how it works and how security is integrated into it.
  • Simple software compromises
    • A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!
  • Final Exam
    • A comprehensive course assessment comprising of 5 quizzes. Each assessment contains a randomized set of questions from different modules of the course.

Plataforma