Integer Error C++JavaPseudocode C++Java C++Java
Input Validation C++JavaPythonPseudocode C++JavaPython C++Java
Buffer Overflow C++JavaPythonPseudocode C++JavaPython C++Java
Software Development Life Cycle C++JavaPython    
Best Practices for Secure Variables   Java  
Encapsulation     C++Java
Data Hiding C++   C++JavaPython
Exception Handling     C++Java



Web Development Cross-Site Scripting (XSS) PHPRuby on Rails
Databases SQL Injection IntroISCS
Networking Wi-Fi Module
Man in the Middle Attack Module
Other Modules Security Trade-offs Module
Beware of Input Buffer Misbehavior Module
Industrial Control Systems Intro
Mobile Risk Management Intro


See a module in action in less than a minute:



Using these modules:

  • Simply select the module you would like to use from the buttons above.
  • To share with students, simply give them a link to the module’s url.


Some lessons are still in development and do not yet have a full module. To use one of these courses, email us at securityinjections@towson.edu and we will make it a priority.

Copyright © Towson University