Software Security

First report: Understand how to design web applications, how to assess their security and how to take the key steps to mitigate vulnerabilities. Second report: Understand how to design C-based applications, how to assess their security and how to take the key steps to mitigate vulnerabilities. Third report: Vulnerability research Description: First report: Students to (1) design a dynamic website, (2) use a tool to assess its security and complement with research and manual steps, (3) harden the code in order to mitigate the vulnerabilities found. This submission is in groups of 2. Second report: Students to (1) design a C-based application, (2) use a tool to assess its security and complement with research and manual steps, (3) harden the code in order to mitigate the vulnerabilities found. This submission is individual. Third report: Find 2 vulnerabilities in a reputed vulnerability repository, explain what they are along: (1) what software/system it uses as the vector, (2) the type and severity of vulnerability, (3) what pre-patch mitigations exist, (4) whether it is patchable (if yes, how). This submission is individual.

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS