CSC 4024 Secr Code Vulnerabilities II
Focuses on advanced implementation of software vulnerabilities. This course covers attack vectors frequently used by malicious actors such as email attachments, compromised "watering hole" websites, and other tools often relied on to take advantage of unpatched vulnerabilities found in widely-used software applications. Patching techniques will be deployed in order to repair vulnerabilities found in software components.
Prerequisite
Grade of C or higher in the following course:
CSC 3024