There is a more recent version of this academic item available.

Overview

Students will learn how to assess their code and software stack for vulnerabilities additionally they will discover how those vulnerabilities are exploited, and how to mitigate those vulnerabilities.  Historical and current approaches to exploitation and defence will be explored. Students will gain a deep understanding of software vulnerabilities through hands … For more content click the Read More button below. Topics covered will include: input validation, data security, cryptography, hashes, random numbers, anti-tampering, fuzzing, overflow, and Return-oriented programming.

Delivery

In-person - Standard (usually weekly or fortnightly)

Course Outline

To access course outline please visit below link (Please note that access to UNSW Canberra course outlines requires VPN):

Fees

Pre-2019 Handbook Editions

Access past handbook editions (2018 and prior)