Course overview
The purpose of this course is to learn about secure software, including its design, implementation and maintenance. You will investigate a range of recent real-world attacks in order to understand the significance of the learning that you will do in this course. Throughout this course, you will be building foundation knowledge about a broad range of potential attacks and vulnerabilities. You will get hands-on experience reproducing attacks in an ethical way so you are able to prevent and protect yourself against attacks. This course requires previous programming experience and some understanding of computer systems.
Course learning outcomes
- Identify common vulnerable programming patterns that can expose systems, applications or websites to hackers.
- Employ secure software development practices in order to shield an organisation from possible cyber-attacks.
- Develop ethical exploits for security vulnerability to build experience around prevention methods.
- Apply a variety of mitigation strategies, proactively and reactively, for common vulnerability patterns.
Degree list
The following degrees include this course