Class Deals by MOOC List - Click here and see Coursera's Active Discounts, Deals, and Promo Codes.
Course 4 of 4 in the Secure Software Design Specialization.
Common Vulnerabilities and Weaknesses
How to use the CVE and CWE on-line databases to assess threats and mitigations
Specific Design Considerations
Specific things you can do to create a better design.
Building Security in
Security must be built in to a project, not added on.
A Dramatic Failure
The consequences of a bad design can haunt you forever.
A detailed look at the first two sentences of the abstract of Nakamoto's 2009 paper announcing Bitcoin.
The Bitcoin Project
Continuing with the abstract of Nakamoto's Bitcoin paper. More details on how it works and how security is integrated into it.
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!
A comprehensive course assessment comprising of 5 quizzes. Each assessment contains a randomized set of questions from different modules of the course.