Trust in Web and Network Technologies

This course demonstrates to students the requirement to properly employ web and network technologies when developing secure software systems. Web and networked systems have a disproportionate reliance on trust, and are often vulnerable to remote exploitation. This course examines vulnerabilities that potentially introduce unique opportunities to exploit software, and even execute arbitrary (attacker-supplied) code. Finally, the course enumerates these classes of vulnerabilities associated with trust in web and network technologies, and presents prevention and mitigation techniques, along with methods to test and discover such vulnerabilities. If you’re interested in this course, contact us today!

Input Validation

This course demonstrates to students the requirement to perform input validation when developing secure software systems. It examines a variety of vulnerabilities—caused by failure to validate input—that potentially allow an attacker to alter intended program execution flow and execute arbitrary (attacker-supplied) code. Finally, the course enumerates several classes of vulnerabilities associated with input validation, and presents prevention and mitigation techniques, along with methods to test and discover such vulnerabilities. The specific vulnerability classes addressed during this course account for 50% of the most critical vulnerabilities reported to the National Vulnerability Database from 2011 through 2015.

CONTACT US

Language, Environment and Human-computer Interaction

This course demonstrates to students the requirement to consider object-oriented programming vulnerabilities, as well as potential adverse effects of the execution environment and human-computer interactions, when developing secure software systems. It examines vulnerabilities that potentially introduce unique opportunities to exploit software, and even execute arbitrary (attacker-supplied) code. Finally, the course enumerates these classes of vulnerabilities associated with languages, execution environment, and human-computer interaction, and presents prevention and mitigation techniques, along with methods to test and discover such vulnerabilities. If you’re interested in this course, contact us today!