Introduction to Threats and Mitigations

From the course by University of Colorado System
Software Design Threats and Mitigations
4 оценки
University of Colorado System
4 оценки
Course 4 of 4 in the Specialization Secure Software Design
From the lesson
Common Vulnerabilities and Weaknesses
How to use the CVE and CWE on-line databases to assess threats and mitigations

Meet the Instructors

  • Albert Glock
    Albert Glock
    Computer Science

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.