Course description

Ever wonder how to apply threat-based thinking to a user- and usability-centered application lifecycle throughout the entire lifecycle? In this course students learn about the cradle to grave lifecycle of software applications and how to review for security implications at each stage.

Instructors

You may also like