Security Vulnerabilities

What Are Best Practices for Handling Vulnerabilities?
Published

November 18, 2024

Exploration

Activities

  • Monday: Laboratory session
  • Tuesday and Thursday: Security Solutions
    • Explore terms and concepts in security vulnerability management
    • Complete a case study on the topic of secrets in GitHub repositories
    • Learn more about common vulnerabilities and exposures (CVEs)
    • Understand how to use the common vulnerability scoring system (CVSS)
    • Continued highlighting of the concept of a “security synapse”
    • Student presentations that feature:
      • Explanation of a high-level concepts behind security scanning
      • In-class activity that connects concepts to real-world scenarios
      • Hands-on examples of methods for assess security vulnerabilities
      • Demonstrate the use of a practical approach to vulnerabilities

Slides

Full Screen: Week Thirteen: Security Vulnerabilities

Back to top