CSC 424 Secr Code Vulnerabilities II

Focuses on advanced implementation of software vulnerabilities. This course covers attack vectors frequently used by malicious actors such as email attachments, compromised "watering hole" websites, and other tools often relied on to take advantage of unpatched vulnerabilities found in widely-used software applications. Patching techniques will be deployed in order to repair vulnerabilities found in software components.

Credits

4