John Wiley & Sons

Secure Software Lifecycle: From Requirements to Maintenance

Ends soon! Save on skills that make you shine with 40% off 3 months of Coursera Plus. Save now

John Wiley & Sons

Secure Software Lifecycle: From Requirements to Maintenance

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

5 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

5 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Integrate security across all SLDC phases, from requirements to maintenance.

  • Apply secure design patterns, testing tools, and CI/CD security practices.

  • Monitor, maintain, and improve software security through continuous lifecycle management.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

May 2026

Assessments

7 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Learn Secure Coding with Bob and Alice Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 7 modules in this course

This module guides learners through the process of integrating security requirements into project planning across various development methodologies. You will explore how to design security activities for different project phases and analyze potential security risks to minimize threats. Real-world scenarios illustrate the importance of clear requirements and effective project management in maintaining security.

What's included

1 video2 readings1 assignment

This module introduces key strategies for embedding security into software design, including threat modeling, secure design patterns, and data flow analysis. Learners will discover how to proactively address vulnerabilities and enhance system resilience throughout the development lifecycle.

What's included

1 video2 readings1 assignment

This module introduces essential secure coding practices, including vulnerability analysis and dependency verification, to help you write safer code. You will learn how to leverage static analysis tools and manage third-party dependencies to minimize security risks, even with limited resources. Practical strategies for protecting secrets and responding to potential leaks are also covered.

What's included

1 video5 readings1 assignment

This module introduces key security testing techniques, including both manual and automated approaches, fuzzing, and bug bounty programs. Learners will explore how to define the scope of security tests, understand ethical considerations, and prioritize remediation of discovered vulnerabilities. Real-world scenarios and ethical dilemmas provide context for effective and responsible security testing.

What's included

1 video7 readings1 assignment

This module delves into integrating security practices within CI/CD pipelines, examining common risks and mitigation strategies to safeguard the deployment process. Learners will explore real-world scenarios, analyze the impact of security events, and discover best practices for maintaining secure system configurations throughout release cycles.

What's included

1 video4 readings1 assignment

This module delves into the unique challenges of maintaining and securing legacy systems, emphasizing risk analysis and the development of robust maintenance strategies. Learners will explore monitoring and observability practices, as well as the role of Content Delivery Networks (CDNs) in enhancing system resilience and mitigating security threats. Real-world scenarios illustrate the importance of proactive maintenance for business continuity.

What's included

1 video5 readings1 assignment

This module reinforces essential secure coding habits, risk analysis, and the importance of continuous learning in technology. Learners will explore real-world scenarios, such as password management and safe AI usage, and discover strategies for fostering a security-focused mindset within their organizations.

What's included

1 video5 readings1 assignment

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Wiley Skills Network
John Wiley & Sons
75 Courses4,436 learners

Offered by

Explore more from Computer Security and Networks

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Frequently asked questions