- Introduction to Secure Software
- Secure Software Lifecycle
- Requirements & Security
- Threat Modeling Workshop
- Secure Design Principles
- Secure Coding Practices
- Dependency & Supply Chain Security
- Secure Coding Labs
- Static Analysis (SAST)
- Dynamic Analysis (DAST)
- Software Composition Analysis (SCA)
- Authentication & Authorization
- Data Protection & Cryptography
- CI/CD Hardening Labs
- Secure Deployment & Runtime Protection
- Incident Response & Reporting
- Case Studies Review
- Mid-course checkpoint: End of Week 4 (submit lab results).
- Final assessment: End of Week 9 (complete capstone project).