- Cybersecurity
- Java
- secure programming
- C/C++
- Cryptography
- Authentication Methods
- Identifying vulernabilities
- C/C++ Programming
- Java Programming
- security
提供:
学習内容
Practice improving the security and robustness of your programs.
Create threat models and apply basic cryptography.
Evaluate and remediate fragile C++ library code.
Exploit common types of injection problems and fix the root causes.
習得するスキル
この専門講座について
応用学習プロジェクト
The courses provide ample practice activities including exploiting WebGoat, an OWASP project designed to teach penetration testing.
This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.
関連する経験が必要です。
関連する経験が必要です。
専門講座の仕組み
コースを受講しましょう。
Courseraの専門講座は、一連のコース群であり、技術を身に付ける手助けとなります。開始するには、専門講座に直接登録するか、コースを確認して受講したいコースを選択してください。専門講座の一部であるコースにサブスクライブすると、自動的にすべての専門講座にサブスクライブされます。1つのコースを修了するだけでも結構です。いつでも、学習を一時停止したり、サブスクリプションを終了することができます。コースの登録状況や進捗を追跡するには、受講生のダッシュボードにアクセスしてください。
実践型プロジェクト
すべての専門講座には、実践型プロジェクトが含まれています。専門講座を完了して修了証を獲得するには、成功裏にプロジェクトを終了させる必要があります。専門講座に実践型プロジェクトに関する別のコースが含まれている場合、専門講座を開始するには、それら他のコースをそれぞれ終了させる必要があります。
修了証を取得
すべてのコースを終了し、実践型プロジェクトを完了すると、修了証を獲得します。この修了証は、今後採用企業やあなたの職業ネットワークと共有できます。

この専門講座には4コースあります。
Principles of Secure Coding
This course introduces you to the principles of secure programming. It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. We'll go through a detailed example of writing robust code and we'll see many common programming problems and show their connection to writing robust, secure programs in general. We’ll examine eight design principles that govern secure coding and how to apply them to your own work. We’ll discuss how poor design choices drive implementation in coding. We’ll differentiate between informal, formal, and ad hoc coding methods. Throughout, methods for improving the security and robustness of your programs will be emphasized and you will have an opportunity to practice these concepts through various lab activities. A knowledge of the C programming language is helpful, but not required to participate in the lab exercises.
Identifying Security Vulnerabilities
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection.
Identifying Security Vulnerabilities in C/C++Programming
This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. This course uses the focusing technique that asks you to think about: “what to watch out for” and “where to look” to evaluate and ultimately remediate fragile C++ library code.
Exploiting and Securing Vulnerabilities in Java Applications
In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community.
提供:

カリフォルニア大学デービス校(University of California, Davis)
UC Davis, one of the nation’s top-ranked research universities, is a global leader in agriculture, veterinary medicine, sustainability, environmental and biological sciences, and technology. With four colleges and six professional schools, UC Davis and its students and alumni are known for their academic excellence, meaningful public service and profound international impact.
よくある質問
返金ポリシーについて教えてください。
1つのコースだけに登録することは可能ですか?
学資援助はありますか?
無料でコースを受講できますか?
このコースは100%オンラインで提供されますか?実際に出席する必要のあるクラスはありますか?
専門講座を修了することで大学の単位は付与されますか?
専門講座を修了するのにどのくらいの期間かかりますか?
What background knowledge is necessary?
Do I need to take the courses in a specific order?
さらに質問がある場合は、受講者ヘルプセンターにアクセスしてください。