Secure Software Lifecycle: From Requirements to Maintenance
Master secure coding throughout the entire software development lifecycle, from gathering requirements and designing secure systems to testing, deployment, and ongoing maintenance. Learn how to embed security at every stage for resilient, trustworthy software.
This course guides learners through the critical phases of the secure software development lifecycle, emphasizing the importance of security from initial requirements and design through coding, testing, deployment, and maintenance. You will explore secure design patterns, static analysis tools, secure CI/CD pipelines, and effective monitoring strategies. By the end of this course, you will be able to implement comprehensive security practices that support continuous improvement and long-term protection of your software assets.
Combining clear explanations with real-world scenarios, this course empowers learners to integrate security seamlessly into every phase of development. The content is structured to foster continuous learning and practical application, ensuring security remains a core focus throughout the software lifecycle.
This course is part three of a three-course Specialization designed to build a complete and cohesive understanding of the subject. While it offers valuable skills on its own, you’ll gain the most benefit by progressing through all three courses as a structured learning journey.
From Alice and Bob Learn Secure Coding
Copyright © 2025 by John Wiley & Sons, Inc. All rights, including for text and data mining, AI training, and similar technologies, are reserved.
Used by arrangement with John Wiley & Sons, Inc.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Six Trust Boundaries Between Your React App and the Next Compromise
Medium · JavaScript
Six Trust Boundaries Between Your React App and the Next Compromise
Medium · DevOps
Six Trust Boundaries Between Your React App and the Next Compromise
Medium · Cybersecurity
I Built a 10-Phase Attack Surface Recon Framework from Scratch — Here’s Everything I Learned
Medium · Cybersecurity
🎓
Tutor Explanation
DeepCamp AI