Security Vulnerabilities
What Are Best Practices for Handling Vulnerabilities?
Exploration
Read chapters eight and nine in Computer Systems Security: Planning for Success
Activities
Monday: Laboratory session Tuesday and Thursday: Security Solutions - Explore terms and concepts in security vulnerability management
- Complete a case study on the topic of secrets in GitHub repositories
- Learn more about common vulnerabilities and exposures (CVEs)
- Understand how to use the common vulnerability scoring system (CVSS)
- Continued highlighting of the concept of a “security synapse”
- Student presentations that feature:
- Explanation of a high-level concepts behind security scanning
- In-class activity that connects concepts to real-world scenarios
- Hands-on examples of methods for assess security vulnerabilities
- Demonstrate the use of a practical approach to vulnerabilities