Focuses on advanced implementation of software vulnerabilities. This course covers attack vectors frequently used by malicious actors such as email attachments, compromised "watering hole" websites, and other tools often relied on to take advantage of unpatched vulnerabilities found in widely-used software applications. Patching techniques will be deployed in order to repair vulnerabilities found in software components.
2024-2025
Catalog Resources
- About ACC
- Paying for College
- Student Resources and Services
- Student Academic Records
- Academic Policies and Procedures
- Legal Notices
- Academic Programs
- Academic Plans
- Courses
- June 2025 Addendum
- Administrators and Faculty
- Workforce and Community Programs
- Littleton Campus Map
- Sturm Collaboration Campus Map
- DCSC Legacy Campus Map
- Archived Catalogs
Programs by Pathway
Secure Code Vulnerabilities II
CSC
4024