Secure Software Lifecycle: From Requirements to Maintenance

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Secure Software Lifecycle: From Requirements to Maintenance

Coursera · Intermediate ·🔐 Cybersecurity ·7h ago
Master secure coding throughout the entire software development lifecycle, from gathering requirements and designing secure systems to testing, deployment, and ongoing maintenance. Learn how to embed security at every stage for resilient, trustworthy software. This course guides learners through the critical phases of the secure software development lifecycle, emphasizing the importance of security from initial requirements and design through coding, testing, deployment, and maintenance. You will explore secure design patterns, static analysis tools, secure CI/CD pipelines, and effective monitoring strategies. By the end of this course, you will be able to implement comprehensive security practices that support continuous improvement and long-term protection of your software assets. Combining clear explanations with real-world scenarios, this course empowers learners to integrate security seamlessly into every phase of development. The content is structured to foster continuous learning and practical application, ensuring security remains a core focus throughout the software lifecycle. This course is part three of a three-course Specialization designed to build a complete and cohesive understanding of the subject. While it offers valuable skills on its own, you’ll gain the most benefit by progressing through all three courses as a structured learning journey. From Alice and Bob Learn Secure Coding Copyright © 2025 by John Wiley & Sons, Inc. All rights, including for text and data mining, AI training, and similar technologies, are reserved. Used by arrangement with John Wiley & Sons, Inc.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Six Trust Boundaries Between Your React App and the Next Compromise
Learn how to establish trust boundaries between your React app and external dependencies to prevent security compromises
Medium · JavaScript
Six Trust Boundaries Between Your React App and the Next Compromise
Learn to secure your React app from supply-chain attacks with 6 trust boundaries after the TanStack npm package compromise
Medium · DevOps
Six Trust Boundaries Between Your React App and the Next Compromise
Learn to secure your React app from supply-chain attacks with six trust boundaries after the TanStack npm package compromise
Medium · Cybersecurity
I Built a 10-Phase Attack Surface Recon Framework from Scratch — Here’s Everything I Learned
Learn how to build a 10-phase attack surface recon framework from scratch using Node.js and React, and improve your cybersecurity skills
Medium · Cybersecurity
Up next
The Weakest Link in a Global Life Sciences Company? People. With Dr. Kevin Jones
SANS Institute
Watch →