This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques.
Latest Online IT & Technology Training Courses, Course Reviews, Paid & Free Technology Courses and MOOCs in Information Technology domain. Share your e-Learning experience with IT community and submit your Online IT Course Reviews today.
Technology Courses for Threat Modeling
All IT Courses and Reviews can be editable through Desktop/Tablet.