| 0 | Introduction |  | 
    
      | 1 | Software Security Principles |  | 
    
      | 2 | User Authentication |  | 
    
      | 3 | Memory Safety - I |  | 
    
      | 4 | Memory Safety - II |  | 
    
      | 5 | Memory Safety - III |  | 
    
      | 6 | Software Vulnerabilities - I |  | 
    
      | 7 | Software Vulnerabilities - II |  | 
    
      | 8 | Secure Software Development Lifecycle |  | 
    
      | 9 | Web Security |  | 
    
      | 10 | Open-source Software Security - I |  | 
    
      | 11 | Open-source Software Security - II |  | 
    
      | 12 | Malicious Software |  | 
    
      | 13 | Supply Chain Security - I |  | 
    
      | 14 | Supply Chain Security - II |  | 
    
      | 15 | Defense Strategies - I |  | 
    
      | 16 | Defense Strategies - II |  |