• Online, Instructor-Led
  • Online, Self-Paced
Course Description

Teach students how to identify, verify, remediate and report vulnerabilities found in computer systems by reviewing the source code in an automated and educated way.

Learning Objectives

  • Understand Threat Modeling
  • Learn Microsoft Security Development Lifecycle
  • Identify multiple vulnerabilities in applications? source code
  • Learn different techniques to find bugs: Manual, Scanning, Fuzzing
  • Practice with best commercial source code scanners in the market
  • Confirm the vulnerability by replicating the bug in the Lab
  • Propose vulnerability remediation with a mitigation strategy
  • Report the finding and details to the stakeholders

Framework Connections