Course Overview
This course articulates the differentiated approaches to application security by dissecting an application life cycle. The course content discusses typical technical controls that can be applied and the trade off in basic security controls.