Detailed Course Outline
- Coding responsibly with GenAI
- Memory management vulnerabilities
- Memory management hardening
- Common software security weaknesses
- Using vulnerable components
- Wrap up
We use cookies to enhance your experience with personalised content and recommendations, tailored advertising, social media features and for analysing our traffic. Please choose if this site may use web cookies or other technologies that can uniquely recognize your browser (“Cookies”) as described below. You can choose not to permit some types of collection using our cookie settings, which may impact your experience of the website and services we offer.