Software Architecture Security - The Complete Guide
4.6 (17 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
240 students enrolled

Software Architecture Security - The Complete Guide

Become a better Software Architect by designing secure systems
New
4.6 (17 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
243 students enrolled
Created by Memi Lavi
Last updated 6/2020
English
English [Auto]
Current price: $12.99 Original price: $149.99 Discount: 91% off
30-Day Money-Back Guarantee
This course includes
  • 4.5 hours on-demand video
  • 3 articles
  • 12 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Extensive, practical knowledge about Software Security, from the basics to the advanced
  • Software Security terminology (DDoS, MFA, SQL Injection, and lots more)
  • The hacker's mindset
  • The Software Architect's role in Software Security
  • The main security threats every developer and architect should be aware of
  • Proven methods of dealing with security threats
  • The complete Secure Architecture Process
  • Building Blocks of Secure Architecture
  • Applying this knowledge on a case study
Requirements
  • Some development knowledge is required, although there won't be actual coding
  • Familiarity with Software Architecture concepts is recommended but not mandatory
  • No security background is required!
Description

Software Security is one of the most important aspects of Software Architecture these days.

Almost daily you hear about new security incidents which caused data leak, disruption of service, and often - billions of dollar in damages, and some companies even shut down because of that.

You, as as software architect, has the responsibility to make sure your architecture is as secure as possible.

You simply cannot allow yourself to release a system that is not secure. These days, it's simply unacceptable.

Now, in order to design secure architecture, you must be well versed in all security aspects of software design.

And this is exactly what this course is for.

This course will teach you all you need to know, as an architect, regarding software security. When completing the course, you'll have the necessary knowledge to design secure architecture.

Now, i strongly believe that talking just about secure architecture is not enough. In order to be a really great architect you must have a holistic view of all aspects of software security.

And because of that, this course covers all the bases of software security.

Here is a partial list of what we'll talk about in this course:

- What is Security?

- The Secure Architecture Process

- Threat Modeling

- The Five Perimeters of software security

- Some common attacks and how to defend from them

- Authentication and Authorization

- Encryption

- Secure Communication

And lots and lots more...

In this course you'll learn the terminology of Software Security, and you'll encounter terms such as SQL Injection, MFA, MITM and more. Don't worry - we'll explain everything, and will make sure you fully understand these terms.

In fact, you don't have to have any prior knowledge of software security. We'll start from the very beginning.

After completing this course you'll have everything you need in order to design software architecture which is as secure as possible.


But that's not all...

At the end of this course, you'll be able to download the Secure Architecture Checklist, a comprehensive checklist that will guide you through the process of designing secure systems, and provide a step-by-step guidance for each step.

Using this checklist will ensure your system is as secure as possible, will make your client happy, and, most important - will make you a better architect.


This course takes you from the absolute basics of Software Security to the most advanced topics, known only to few. Completing this course will give you all the knowledge required for designing secure systems, and, as a bonus, will put you in a great position when looking for your next job.

No other course covers this topic in such a comprehensive and thorough way. I've put all my 20+ years of experience with hundreds of clients in this course, and I'm sure you will greatly benefit from it.


------------------------------------------------------------

What do my students have to say about my courses?

------------------------------------------------------------

"well done - The course was very practical" - Sam

"Good explanation on the topics covered, "Soft Skills" section is a great addition of topics" - Sergio

"[The course] given me the confidence to go out to the market and advertise myself as such [an Architect]" - Mathew

"Life Changing" - Arivazhagan

And lots more...


------------------------------------------------------------

Who is this course for?

------------------------------------------------------------

Any person who is involved in development, even system analyst, can profit from this course.

That includes:

- Junior developers

- Senior developers

- Architects

- Anyone who is interested in software security.

If you're not sure if this course is for you - drop me a note!


------------------------------------------------------------

What are the prerequisites for this course?

------------------------------------------------------------

It's a good idea to have some basic knowledge about software architecture, but it's not a must.

In any case, you don't have to have any prior knowledge of software security!

------------------------------------------------------------

About Me

------------------------------------------------------------

I've been in the software industry for more than 20 years, and a Software Architect for more than 17 years, working with a variety of clients - Fortune 100 enterprises, start-ups, govt. entities, defense, telco, banking, and lots more.

I'm an avid speaker and trainer, having trained thousands of students in various courses.

I love what I do, and my greatest passion (well, besides my family...) is designing modern, practical, and reliable systems for my clients, using the best possible architecture patterns.

Who this course is for:
  • Software Architects who want to integrate security into their software architecture
  • Developers who want to be aware of software security principles
  • Anyone who is interested in software security
Course content
Expand all 59 lectures 04:37:54
+ Introduction to Software Security
4 lectures 17:40
Software Security Terminology
05:22
Who is Responsible for the Security?
04:21
+ Secure Architecture Process
6 lectures 07:13
Introduction
03:25
Threat Modeling
00:48
Secure Architecture
00:58
SDLC
00:40
Testing
00:38
Production
00:44
+ Threat Modeling
6 lectures 26:55
Introduction
02:34
What is Threat Modeling
13:49
Conduction Threat Modeling
02:51
Threat Modeling Methodology
03:18
Threat Modeling Tools
03:08
Summary
01:15
+ Secure Architecture
5 lectures 23:26
Introduction to Secure Architecture
06:10
Security Perimeters
02:27
Physical Security
02:34
Network Security
06:52
Platform Security
05:23
+ Application and Data Security
9 lectures 01:43:23
Introduction
03:58
Authentication
21:51
OAuth2 Protocol
14:43
Authentication and the Architect
03:52
Authorization
15:40
Secure Communication
08:51
Secure Code
19:32
Secure Data
09:26
Logging and Monitoring
05:30
+ SDLC
3 lectures 15:02
Introduction
06:04
SDLC Process
06:52
SDLC and the Architect
02:06
+ Testing
4 lectures 27:46
Introduction
02:18
Penetration Testing
15:31
Load Testing
07:39
Security Testing and the Architect
02:18
+ Production
4 lectures 07:14
Introduction
02:31
Security Review
02:18
Penetration Testing
01:05
Production and the Architect
01:20
+ Case Study
8 lectures 28:20
Introduction
02:21
Introducing Dunderly
02:34
Threat Modeling
05:14
Secure Architecture
11:05
SDLC
00:48
Testing
02:48
Production
01:17
Case Study Summary
02:13