Detailed Course Outline Cyber security basicsMemory management vulnerabilitiesMemory management hardeningCommon software security weaknessesCryptography for developersSecurity testingWrap up