Overview
Students will learn how to assess their code and software stack for vulnerabilities additionally they will discover how those vulnerabilities are exploited, and how to mitigate those vulnerabilities. Historical and current approaches to exploitation and defence will be explored.
Students will gain a deep understanding of software vulnerabilities through hands … For more content click the Read More button below.
Topics covered will include: input validation, data security, cryptography, hashes, random numbers, anti-tampering, fuzzing, overflow, and Return-oriented programming.
Delivery
In-person - Standard (usually weekly or fortnightly)
Course Outline
To access course outline please visit below link (Please note that access to UNSW Canberra course outlines requires VPN):
Fees
Type | Amount |
---|---|
Commonwealth Supported Students (if applicable) | $N/A |
Domestic Students | $6330 |
International Students | $N/A |
Pre-2019 Handbook Editions
Access past handbook editions (2018 and prior)