Chevron Left
返回到 软件安全

學生對 马里兰大学帕克分校 提供的 软件安全 的評價和反饋

4.6
1,032 個評分
226 條評論

課程概述

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials....

熱門審閱

GB

May 27, 2019

Was prepared and presented in a very special and superb way. I am glad I took and completed it. Thanks to my tutor Michael Hicks and special appreciation to coursera for making this possible for me.

PR

Nov 20, 2016

Content is really valuable and actionable with a specific comeback for the student in terms of secure development, security and how to understand the origin of exploits and other cyber attacks

篩選依據:

151 - 软件安全 的 175 個評論(共 220 個)

創建者 Alessandro B

Nov 26, 2016

Awesome!

創建者 Zeming Z

Feb 10, 2019

prefect

創建者 Vladimir A

Dec 11, 2016

Great!

創建者 Viraj V K

Feb 20, 2020

Great

創建者 Khalifa R R

Jan 06, 2018

great

創建者 李孔强

Jun 03, 2017

非常好!!

創建者 Muhammad A N

Feb 25, 2019

Good

創建者 david k

Sep 28, 2016

t

創建者 Ramadas S M

Jul 17, 2016

This course on software security was very informative . This is the best place to start off for a beginner as it not only covers the technical aspects of security ,but also talks about modelling threats and identifying adversaries and their capabilities.I however was slightly disappointed with the testing methods of this course.I feel that most of the testing should have been on the basis of projects and a project should have been included every week .But, all in all taking the course was a very pleasant experience and I thoroughly enjoyed all the projects that were given.

Looking forward to taking the next course in the specialization!!

創建者 Courtney H

Jun 14, 2016

This is a tough course. Tough because I had no experience in C or C++. My background is dot-net and visual basic. It's been study C++ 5 hours a day and take the course 2 hours a day. I made it. The professor is spot on when he says a C++ background is needed. But I made it.

If you have the required background you'll find it's a good basis for understanding the multiple vulnerabilities in this code, what they are and how they work. (You better understand stacks and heaps and pointers real well)

Worth the time and the effort. Cheers to University if Maryland for making it available and to Professor Hicks for his hard work.

創建者 Ricardo D A R

Jun 11, 2018

Thank you for an insightful look at the world of software security. If I were to make a suggestion it would be to include a refresher module about programming in C. I find it odd that the syllabus wouldn't include some basics on C (while assuming the student is fluid with C) and yet, the course had a couple of modules to explain the most basic of web functionalities like server and client paradigm. I think some students of this course have that kind of knowledge mastered, and would have liked a refreshment for C to have an easier time in the earlier weeks.

創建者 Emilie D

Mar 20, 2017

Learnt a lot. Quite a lot of background required esp. if you've never debugged/analyzed memory locations/ of C programs before. I'm a web developer and write php in my day to day, with a little experience in C++. Being able to read C code wasn't too much of a problem. Very hard, however, was figuring out how to use gdb properly to analyze/ debug -- to calculate the distance between two memory locations, for example. That wasn't something I cared to anguish over.

創建者 Akash V

Jun 10, 2018

I personally enjoyed the course. It covers number of topics in software security. Although I find this course pretty easy (read basic), I can understand that the goal of the course is to introduce and focus security in the software development process itself, hence it is brief. I would have liked if more "practical" work was there in the course. I liked all the assignments as well as projects, few of them were really good.

創建者 Carlos M

Sep 07, 2016

Very good course. Very good introduction to some interesting concepts in software security. Well explained. Maybe introduce more practical exercises. They could also include references to places where you can practice the concepts learned. For example repositories as vulnhub and others are sites where you can put into practice exercises. It however is a course that is very well explained ...

創建者 Eugenia G

Jun 27, 2017

Described security issues are very practical & real. Material built in a structured and logical way. Very interesting interviews with the Expert from the certain security areas that gives oppertunity to see how it works from inside. Had some issues with the Projects passing due to the way how questions built - it took more time to understood questions then to find a response on it.

創建者 David G

Nov 24, 2017

Good foundations, feels a bit dated though as the Web Security sections seem more focused on vulnerabilities more common in PHP/pre-Web 2.0 & the rise of modern frameworks such as Ruby on Rails, which is surprising for a series that came out in 2014. Still essential knowledge though for software security 101.

創建者 Rohit J

Mar 28, 2020

Excellent informative course. I specially find week 3-6 more interesting and relatable to my work. Week 1 - 2 are also informative but are heavily depends on C programming language. The projects are mildly challenging but are bit outdated, uses Virtual Box and stuff. I hope they update them with Docker.

創建者 Ayman M H

Sep 16, 2019

I wanna thank Dr Michael but in fact the course wants some editing. First you should write the prerequisite courses for it also a link for each one would be generous. Second we should have more practical exercise done by the instructors live to explain more.. Thank you

創建者 Alberto H A

Mar 22, 2017

This course is totally recommended for developers and architects no matter the programming language you use.

In my opinion, the only thing that I missed was a project for the penetration testing week.

Contents are very well teached and the interviews were awesome.

創建者 Andy Y

May 12, 2017

The course was taught well and contained very interesting and relevant content. However, an increase of projects would be beneficial as I feel just spitting out facts learned from the videos doesn't really make the information stick in a meaningful way.

創建者 Lucian C

Jun 12, 2016

Some parts of the course were more advanced (Program Analysis), while some briefly touched the topic (Penetration Testing). Web Application Security was almost there, while Low Level Security was just right!

Keep up the good work, recommended +++++

創建者 Scott S

Jul 03, 2019

Solid course in software security. Really clear explanation of looking under the covers of how buffer overflows work. However, the virtual machines are four years out of date and getting them running for the labs were a major pain.

創建者 James N

Jun 24, 2017

I really enjoyed the hands-on C exploit labs. That deserves a six week course on its own. The rest of the material provides a good introduction to tooling and general concepts. I feel like it is two different courses, in a way.

創建者 Vijay V

Feb 02, 2020

Great Course!!! Awesome course material.

It would be of great help if there could be video on setting up the projects for quiz.

As lot of people may from from non linux background and may have not in touch with c language.

創建者 TAMERA Y

Aug 21, 2017

Great Course. I like that it offered the interviews at the end of each lesson. I didn't know anything about the style of fuzzing or pen testing prior to taking this course. I need to delve into the learning hands