This course is designed to demonstrate the types of vulnerability commonly found in space applications, from mission control software to onboard software. We’ll dig into previously reported vulnerabilities, how to identify them, and how they could affect a mission if exploited. By the end of it, trainees should have acquired enough knowledge to be able […]