About
This course looks at systems and protocols, how to design threat models for them and how to use a large number of current security technologies and concepts to block specific vulnerabilities. Students will use a large number of systems and programming security tools in the laboratories.
Resources