|
Jun 01, 2025
|
|
|
|
CSC 355 Software Security (3) CSC 202 This course will make use of hands-on exercises in compiled and web-based software to illustrate attack methodologies and techniques that lead to software vulnerabilities that violate fundamental security principles. Attacks and mitigation strategies related to filter evasion, session management, input validation, buffer overflows, and related areas will be emphasized.
Add to Portfolio (opens a new window)
|
|