YoVDO

Secure System Analysis and Design

Offered By: Coventry University via FutureLearn

Tags

Cybersecurity Courses Information Technology Courses Risk Management Courses Formal Methods Courses

Course Description

Overview

System design and system specification are crucial stages in the process of software development.

In this course, you will have the chance to explore the first two stages of the software development life cycle, focusing on design principles that can be used to improve the security level of the systems under development.

Upon completion of this course, you’ll understand how to apply formal methods to outline and design your system’s behaviour and reduce potential threats to your information security.

Understand and demonstrate the major principles of secure design

In the first week of this course, you’ll have the opportunity to learn how to identify security risks, and get to grips with the core principles underlying secure design. This includes identifying system threats, vulnerabilities, and risks before moving onto finding solutions to mitigate against them.

Explore modes of formal security modelling and specifications

Once you’ve understood how to identify threats, you’ll move onto applying formal processes to decide and design your system’s behaviour. This includes building your confidence in reviewing appropriate core security processes for your systems and prepares you for implementation.

Once you’ve completed this course, you’ll be ready to apply secure system design principles and move onto building your skills in development.

This ExpertTrack is suited to people looking to increase their understanding of software development lifecycle and security considerations. It has been designed for security analysts, security architects, software developers, and aspiring security specialists.


Syllabus

  • Applying Secure Design Principles
    • Welcome to Short Course 2
    • Identifying system threats, vulnerabilities and risks
    • Core secure design principles
    • Summary
  • Applying Formal Methods
    • Welcome to Week 2
    • Introduction to formal specification
    • Introduction to formal modelling
    • Summary

Taught by

Beatrix Daniel

Tags

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera