This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
About this Course
Skills you will gain
- 5 stars73.13%
- 4 stars20.92%
- 3 stars4.29%
- 2 stars0.63%
- 1 star1.01%
TOP REVIEWS FROM SOFTWARE SECURITY
Week 5 about program analysis and is very interesting and many concepts are new to me. This is also a very well structured course. I had a great time studying it. Thanks, Mike.
Very nice and informative course with practical challenges to solve to get hands on idea of the topics learned during the lectures. Thumbs up.
Was prepared and presented in a very special and superb way. I am glad I took and completed it. Thanks to my tutor Michael Hicks and special appreciation to coursera for making this possible for me.
Very useful course to update the current knowlege and to learn new technologies and theoretical facts. Also, identified how software security should be combined with software development.
About the Cybersecurity Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.