Skip to content

Commit af9b697

Browse files
Add security courses on a provisional basis.
See #639
1 parent bafc536 commit af9b697

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

README.md

+22
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,7 @@ just remember that you can't purchase success!
105105
- [Core systems](#core-systems)
106106
- [Core theory](#core-theory)
107107
- [Core applications](#core-applications)
108+
- [Core security](#core-security)
108109
- [Advanced CS](#advanced-cs)
109110
- [Advanced programming](#advanced-programming)
110111
- [Advanced math](#advanced-math)
@@ -279,6 +280,27 @@ Courses | Duration | Effort | Prerequisites
279280
[Greedy Algorithms, Minimum Spanning Trees, and Dynamic Programming](https://www.coursera.org/learn/algorithms-greedy) | 4 weeks | 4-8 hours/week | Graph Search, Shortest Paths, and Data Structures
280281
[Shortest Paths Revisited, NP-Complete Problems and What To Do About Them](https://www.coursera.org/learn/algorithms-npcomplete) | 4 weeks | 4-8 hours/week | Greedy Algorithms, Minimum Spanning Trees, and Dynamic Programming
281282

283+
### Core Security
284+
**Topics covered**
285+
`Confidentiality, Integrity, Availability`
286+
`Secure Design`
287+
`Defensive Programming`
288+
`Threats and Attacks`
289+
`Network Security`
290+
`Cryptography`
291+
`and more`
292+
293+
Note: These courses are provisionally recommended. There is an open [Request For Comment](https://github.com/ossu/computer-science/issues/639) on security course selection. Contributors are encouraged to compare the various courses in the RFC and offer feedback.
294+
295+
Courses | Duration | Effort | Prerequisites
296+
:-- | :--: | :--: | :--:
297+
[Information Security: Context and Introduction](https://www.coursera.org/learn/information-security-data) | 5 weeks | 3 hours/week | -
298+
[Principles of Secure Coding](https://www.coursera.org/learn/secure-coding-principles)| 4 weeks | 4 hours/week | -
299+
[Identifying Security Vulnerabilities](https://www.coursera.org/learn/identifying-security-vulnerabilities) | 4 weeks | 4 hours/week | -
300+
301+
Choose **one** of the following:
302+
[Identifying Security Vulnerabilities in C/C++Programming](https://www.coursera.org/learn/identifying-security-vulnerabilities-c-programming) | 4 weeks | 5 hours/week | -
303+
[Exploiting and Securing Vulnerabilities in Java Applications](https://www.coursera.org/learn/exploiting-securing-vulnerabilities-java-applications) | 4 weeks | 5 hours/week | -
282304

283305
### Core applications
284306

0 commit comments

Comments
 (0)