The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have context. Pictures…paint a picture. Why are these things important? In this course, too, we begin looking at other disciplines (building architecture is a favorite one) for lessons on design.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
- 5 stars78.94%
- 4 stars13.15%
- 3 stars7.89%
來自SOFTWARE DESIGN THREATS AND MITIGATIONS的熱門評論
Nice introduction to software threats and how to mitigate them already in the design phase. I am happy and curious to learn more and get deeper insights. Thank you!
Pretty good start, a bit stretchy at the end. Great for people fairly new to the security business, early material good for everyone.
Very interesting course, in terms of content and the delivery.
it is a very good course and I am very happy to complete it I learn a lot about design and security aspect thank you so much university of Colorado
關於 Secure Software Design 專項課程
Information security is an extremely important topic in our world today. As individuals, we seek to protect our personal information while the corporations we work for have to protect suppliers, customers, and company assets. Creating secure software requires implementing secure practices as early in the software development lifecycle (SDLC) as possible.