CS366 Offensive Security II
This course exposes students to application-based vulnerabilities and the subsequent attacks (SQL injection, authentication, authorization, security misconfiguration, and file inclusion). Topics such as cloud security, mobile security, IoT security will be covered and their vulnerabilities explained. Techniques for maintaining persistence after compromising a system will be presented and the students will learn how attackers avoid detection, escalate privileges, and cover their tracks, as well as reporting and communicating the results of the attack. Prerequisite: CS365
Prerequisite
Offensive Security I (
CS365)