Medical analogies

Loading...
From the course by University of Colorado System
Software Design Threats and Mitigations
1 rating
University of Colorado System

Software Design Threats and Mitigations

1 rating
Course 4 of 4 in the Specialization Secure Software Design
From the lesson
Common Vulnerabilities and Weaknesses
How to use the CVE and CWE on-line databases to assess threats and mitigations

Meet the Instructors

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science
Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online.
© 2017 Coursera Inc. All rights reserved.
Download on the App StoreGet it on Google Play