Open source threat and mitigation information

Loading...
From the course by University of Colorado System
Software Design Threats and Mitigations
ratings
University of Colorado System

Software Design Threats and Mitigations

ratings
Course 4 of 4 in the Specialization Secure Software Design
From the lesson
Common Vulnerabilities and Weaknesses
How to use the CVE and CWE on-line databases to assess threats and mitigations

Meet the Instructors

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science