Enrollment options

This course will make use of hands-on exercises in compiled and web-based software to illustrate attack methodologies and techniques that lead to software vulnerabilities that violate fundamental security principles. Attacks and mitigation strategies related to filter evasion, session management, input validation, buffer overflows, and related areas will be emphasized.
Guests cannot access this course. Please log in.