Course curriculum

    1. Overview of the Course

    2. Value proposition for Students

    3. Outcomes for the Course

    1. Types of Software Vulnerabilities

    2. Vulnerability Identification

    3. Vulnerability Remediation

    1. Buffer Overflow

    2. Code Injection

    3. Command Injection

    4. Privilege Escalation

    5. Path Traversal

    1. Secure Coding Techniques

    2. Secure Encoding/Decoding

    3. Secure Input/Output Handling

    4. Secure Networking & Protocols

    1. Social Engineering

    2. Wireless Hacking

    3. Reverse Engineering

    4. Denial of Service (DoS) & Distributed Denial of Service (DDoS) Attacks

    1. Researching vulnerabilities

    2. Writing Exploits

    3. Buffer Overflows Exploits

    4. Defeating Exploit Detection Techniques

About this course

  • Free
  • 37 lessons
  • 0 hours of video content

Discover your potential, starting today