| CS0 | CS1 | CS2 | |
| Integer Error | C++JavaPseudocode | C++Java | C++Java |
| Input Validation | C++JavaPythonPseudocode | C++JavaPython | C++Java |
| Buffer Overflow | C++JavaPythonPseudocode | C++JavaPython | C++Java |
| Software Development Life Cycle | C++JavaPython | ||
| Best Practices for Secure Variables | Java | ||
| Encapsulation | C++Java | ||
| Data Hiding | C++ | C++JavaPython | |
| Exception Handling | C++Java |
| Web Development | Cross-Site Scripting (XSS) | PHPRuby on Rails |
| Databases | SQL Injection | IntroISCS |
| Networking | Wi-Fi | Module |
| Man in the Middle Attack | Module | |
| Other Modules | Security Trade-offs | Module |
| Beware of Input Buffer Misbehavior | Module | |
| Industrial Control Systems | Intro | |
| Mobile Risk Management | Intro | |
See a module in action in less than a minute:
Using these modules:
- Simply select the module you would like to use from the buttons above.
- To share with students, simply give them a link to the module’s url.
Some lessons are still in development and do not yet have a full module. To use one of these courses, email us at securityinjections@towson.edu and we will make it a priority.