Medical analogies

Loading...
From the course by 科罗拉多大学系统
Software Design Threats and Mitigations
3 ratings
科罗拉多大学系统
3 ratings
Course 4 of 4 in the Specialization Secure Software Design
From the lesson
Common Vulnerabilities and Weaknesses
How to use the CVE and CWE on-line databases to assess threats and mitigations

Meet the Instructors

  • Albert Glock
    Albert Glock
    Instructor
    Computer Science

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.