Unit 8: Malicious Software and Software Security
In this unit, we will explore malicious software, also known as malware. We will also study common software security issues such as buffer overflow, used by several malware to exploit systems' vulnerability. At the end of the unit, we will learn how to use these malware and other security attacks to carry out information warfare.
Completing this unit should take you approximately 8 hours.
8.1: Malicious Web
8.2: Internet Security Issues
8.3: Types of Internet Security Issues
8.4: Secure Coding
8.5: Electronic and Information Warfare