GB
2019年5月26日
Was prepared and presented in a very special and superb way. I am glad I took and completed it. Thanks to my tutor Michael Hicks and special appreciation to coursera for making this possible for me.
PR
2016年11月19日
Content is really valuable and actionable with a specific comeback for the student in terms of secure development, security and how to understand the origin of exploits and other cyber attacks
創建者 Vladimir A
•2016年12月10日
Great!
創建者 A L
•2021年4月11日
Beast
創建者 Emmanuel B O
•2021年3月15日
great
創建者 Viraj V K
•2020年2月20日
Great
創建者 khalifa R
•2018年1月5日
great
創建者 李孔强
•2017年6月3日
非常好!!
創建者 Pham T (
•2022年11月6日
Good
創建者 NEERAJ K 2
•2022年9月24日
good
創建者 Md F
•2022年1月6日
Best
創建者 Saloni B
•2022年1月5日
nice
創建者 Rajat V
•2021年9月14日
good
創建者 Vu Q Q
•2021年9月1日
Nice
創建者 Zerihun U H
•2021年7月24日
nice
創建者 LOKONDA M
•2021年7月16日
good
創建者 郑家成
•2021年7月3日
good
創建者 Pratiksha K
•2021年4月11日
Best
創建者 Muhammad A N
•2019年2月25日
Good
創建者 khosnor k
•2021年7月29日
創建者 david k
•2016年9月27日
t
創建者 Jimmy C C
•2020年5月6日
Fantastic introduction to software security. My favourite part was the buffer overflow exploit project. I got a euphoria upon successfully hacking the program. Moreover, in the process of doing the project, I learned a lot about memory and low level programming. As a recent CS graduate, I learned a lot from this course; specifically, how unsafe C/C++ programs are (Week 1), the role of programming language theory in security (Week 5), the importance of input validation and sanitization, and overall security development mindfulness. In order to get the most out of this course, the learner should at least be familiar with assembly and computer architecture, C programming, web development. There is a minor mistake in a week 5 lecture that has gone unaddressed for a while, but the rest of the contents are amazing.
創建者 Ramadas S M
•2016年7月17日
This course on software security was very informative . This is the best place to start off for a beginner as it not only covers the technical aspects of security ,but also talks about modelling threats and identifying adversaries and their capabilities.I however was slightly disappointed with the testing methods of this course.I feel that most of the testing should have been on the basis of projects and a project should have been included every week .But, all in all taking the course was a very pleasant experience and I thoroughly enjoyed all the projects that were given.
Looking forward to taking the next course in the specialization!!
創建者 Courtney H
•2016年6月14日
This is a tough course. Tough because I had no experience in C or C++. My background is dot-net and visual basic. It's been study C++ 5 hours a day and take the course 2 hours a day. I made it. The professor is spot on when he says a C++ background is needed. But I made it.
If you have the required background you'll find it's a good basis for understanding the multiple vulnerabilities in this code, what they are and how they work. (You better understand stacks and heaps and pointers real well)
Worth the time and the effort. Cheers to University if Maryland for making it available and to Professor Hicks for his hard work.
創建者 Ricardo D A R
•2018年6月11日
Thank you for an insightful look at the world of software security. If I were to make a suggestion it would be to include a refresher module about programming in C. I find it odd that the syllabus wouldn't include some basics on C (while assuming the student is fluid with C) and yet, the course had a couple of modules to explain the most basic of web functionalities like server and client paradigm. I think some students of this course have that kind of knowledge mastered, and would have liked a refreshment for C to have an easier time in the earlier weeks.
創建者 Emilie D
•2017年3月20日
Learnt a lot. Quite a lot of background required esp. if you've never debugged/analyzed memory locations/ of C programs before. I'm a web developer and write php in my day to day, with a little experience in C++. Being able to read C code wasn't too much of a problem. Very hard, however, was figuring out how to use gdb properly to analyze/ debug -- to calculate the distance between two memory locations, for example. That wasn't something I cared to anguish over.