Detailed Course Outline Cyber security basicsMemory management vulnerabilitiesMemory management hardeningCommon software security weaknessesWrap up