Course Overview
Learning Objectives
Explain how vulnerabilities are found and how they are exploited. Write secure code (code without vulnerabilities) and mitigate vulnerabilities that might be present on modern Linux and embedded systems. Differentiate between software in embedded systems and other modern computing systems, and explain the similarities and differences between securing both of them.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):