General
Many security courses are about how to design your application and configuration to keep your platform secure. This course is the opposite: what can your platform do to make your application secure, and how does it do it? In this course we will discuss security features like containers, mobile permissions, and control flow integrity, give you hands-on experience, and show how they work under the hood.
This course will contain a mix of lectures and practical exercises. Students should have basic familiarity with information security, C programming, and the Linux operating system.