{"id":4,"date":"2025-06-04T19:51:30","date_gmt":"2025-06-04T19:51:30","guid":{"rendered":"https:\/\/courses.cs.colostate.edu\/cs003\/?page_id=4"},"modified":"2025-11-18T12:10:39","modified_gmt":"2025-11-18T19:10:39","slug":"cs-001","status":"publish","type":"page","link":"https:\/\/courses.cs.colostate.edu\/cs580b6\/","title":{"rendered":"CS-580b6"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Vulnerability Management and Analysis<\/h3>\n\n\n\n<p>This course is about the processes, tools, and techniques used to identify, assess, prioritize, and mitigate software and system vulnerabilities. Tools and techniques include vulnerability scoring systems and AI\/ML applications for vulnerability analysis. We will also conduct critical evaluation of current practices and literature in vulnerability management.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2025 Fall Semester Details<\/h4>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns wp-container-content-9cfa9a5a is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading\">Instructor(s)<\/h5>\n\n\n<style>.kb-table-container4_9ba4ca-32{overflow-x:auto;}.kb-table-container .kb-table4_9ba4ca-32 th{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:right;}.kb-table-container .kb-table4_9ba4ca-32 caption{text-align:center;}.kb-table-container .kb-table4_9ba4ca-32 td{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:left;}.kb-table-container .kb-table4_9ba4ca-32 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}@media all and (max-width: 1024px){.kb-table-container .kb-table4_9ba4ca-32 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}@media all and (max-width: 767px){.kb-table-container .kb-table4_9ba4ca-32 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}<\/style><div class=\"kb-table-container kb-table-container4_9ba4ca-32 wp-block-kadence-table\"><table class=\"kb-table kb-table4_9ba4ca-32\">\n<tr class=\"kb-table-row kb-table-row4_170755-54\">\n<td class=\"kb-table-data kb-table-data4_b4a01f-dc\">\n\n<p><strong>Instructor<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_1ab8d2-bb\">\n\n<p>Viktoria Koscinski<\/p>\n\n<\/td>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_35a45a-77\">\n<td class=\"kb-table-data kb-table-data4_0fe0f0-db\">\n\n<p><strong>Office<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_418880-51\">\n\n<p>CS Building, room 376<\/p>\n\n<\/td>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_a62e2b-c1\">\n<td class=\"kb-table-data kb-table-data4_bc694d-de\">\n\n<p><strong>Email<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_c0ba5e-78\">\n\n<p><a href=\"viktoria.koscinski@colostate.edu\" data-type=\"link\" data-id=\"viktoria.koscinski@colostate.edu\">viktoria.koscinski@colostate.edu<\/a><\/p>\n\n<\/td>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_3ad8c5-02\">\n<td class=\"kb-table-data kb-table-data4_3ff462-5a\">\n\n<p><strong>Office Hours<\/strong><\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_b37505-e5\">\n\n<p>MF 10:00a &#8211; 12:00p<\/p>\n\n\n\n<p>W 11:00a &#8211; 12:00p<\/p>\n\n<\/td>\n<\/tr>\n<\/table><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h5 class=\"wp-block-heading\">Class Schedule<\/h5>\n\n\n<style>.kb-table-container4_07f42a-d8{overflow-x:auto;}.kb-table-container .kb-table4_07f42a-d8 th{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:center;}.kb-table-container .kb-table4_07f42a-d8 caption{text-align:center;}.kb-table-container .kb-table4_07f42a-d8 td{padding-top:var(--global-kb-spacing-xxs, 0.5rem);padding-right:var(--global-kb-spacing-xxs, 0.5rem);padding-bottom:var(--global-kb-spacing-xxs, 0.5rem);padding-left:var(--global-kb-spacing-xxs, 0.5rem);text-align:left;}.kb-table-container .kb-table4_07f42a-d8 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}@media all and (max-width: 1024px){.kb-table-container .kb-table4_07f42a-d8 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}@media all and (max-width: 767px){.kb-table-container .kb-table4_07f42a-d8 tr{border-top:1px solid #888;border-right:1px solid #888;border-bottom:1px solid #888;border-left:1px solid #888;}}<\/style><div class=\"kb-table-container kb-table-container4_07f42a-d8 wp-block-kadence-table\"><table class=\"kb-table kb-table4_07f42a-d8\">\n<tr class=\"kb-table-row kb-table-row4_76cbba-eb\">\n<th class=\"kb-table-data kb-table-data4_fb9170-a7\">\n\n<p>Section<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_7b09a2-a3\">\n\n<p>Schedule<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_d89863-cf\">\n\n<p>Location<\/p>\n\n<\/th>\n\n<th class=\"kb-table-data kb-table-data4_c4f2e9-0d\">\n\n<p>Instructor<\/p>\n\n<\/th>\n<\/tr>\n\n<tr class=\"kb-table-row kb-table-row4_6ae12b-bf\">\n<td class=\"kb-table-data kb-table-data4_c1bdbe-df\">\n\n<p>001<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_3dbf82-79\">\n\n<p>MWF 9:00a &#8211; 9:50a<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_130cee-fd\">\n\n<p>Animal Science Building, Room 135<\/p>\n\n<\/td>\n\n<td class=\"kb-table-data kb-table-data4_983ccf-64\">\n\n<p>Viktoria Kosicnski<\/p>\n\n<\/td>\n<\/tr>\n<\/table><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns wp-container-content-9cfa9a5a is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Management and Analysis This course is about the processes, tools, and techniques used to identify, assess, prioritize, and mitigate software and system vulnerabilities. Tools and techniques include vulnerability scoring systems and AI\/ML applications for vulnerability analysis. We will also conduct critical evaluation of current practices and literature in vulnerability management. 2025 Fall Semester Details [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-no-page-title.php","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"class_list":["post-4","page","type-page","status-publish","hentry","post-preview"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"admin","author_link":"https:\/\/courses.cs.colostate.edu\/cs580b6\/author\/admin_41g0qmxe\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/pages\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":18,"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"predecessor-version":[{"id":88,"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/pages\/4\/revisions\/88"}],"wp:attachment":[{"href":"https:\/\/courses.cs.colostate.edu\/cs580b6\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}