ABOUT THE COURSE
As organizations worldwide increase their reliance on software controls to protect their computing environments and data, the topic of Software Security Assurance grows in importance. The tremendous potential costs associated with security incidents, the emergence of increasingly complex regulations, and the continued operational costs associated with staying up to date with security patches all require that organizations give careful consideration to how they address software security..
What You Will Learn
The following tables list Microsoft Certifications by name and describe how they enable IT professionals to display and validate their skills and experience.
Who Should Attend
|Module 02:||Web Application|
|Module 03:||Low-Level Attacks Against The Heap and Stack|
|Module 04:||Malicious Computation Without Code Injection|
|Module 05:||Control Flow Integrity|
|Module 06:||Applying Randomization as a (non) Defense|
|Module 07:||Isolating The Effects of Untrusted Executable Content|
|Module 08:||Carrying on Despite Attack(or Fault)|
|Module 09:||Language-Based,Information Flow Security|
|Module 10:||Dynamic Information Flow Analysis|
|Module 11:||Software Obfuscation|