This course examines common low-level software vulnerabilities that take advantage of current system architectures. Mitigation strategies at the software level and the system level will be discussed and analyzed