Software Life Cycle and Management considerations

Loading...
From the course by University of Colorado System
Software Design Threats and Mitigations
ratings
University of Colorado System

Software Design Threats and Mitigations

ratings
Course 4 of 4 in the Specialization Secure Software Design
From the lesson
Simple software compromises
A look into the specifics of two common exploitation techniques--buffer overflow and SQL injections. Even though they're "old", these exploits are still used today!

Meet the Instructors

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science