CS0 | CS1 | CS2 | |
Integer Error | C++JavaPseudocode | C++Java | C++Java |
Input Validation | C++JavaPythonPseudocode | C++JavaPython | C++Java |
Buffer Overflow | C++JavaPythonPseudocode | C++JavaPython | C++Java |
Software Development Life Cycle | C++JavaPython | ||
Best Practices for Secure Variables | Java | ||
Encapsulation | C++Java | ||
Data Hiding | C++ | C++JavaPython | |
Exception Handling | C++Java |
Web Development | Cross-Site Scripting (XSS) | PHPRuby on Rails |
Databases | SQL Injection | IntroISCS |
Networking | Wi-Fi | Module |
Man in the Middle Attack | Module | |
Other Modules | Security Trade-offs | Module |
Beware of Input Buffer Misbehavior | Module | |
Industrial Control Systems | Intro | |
Mobile Risk Management | Intro | |
See a module in action in less than a minute:
Using these modules:
- Simply select the module you would like to use from the buttons above.
- To share with students, simply give them a link to the module’s url.
Some lessons are still in development and do not yet have a full module. To use one of these courses, email us at securityinjections@towson.edu and we will make it a priority.