• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Buffer Overflow Attack Techniques And Countermeasures

Results for "buffer overflow attack techniques and countermeasures"


  • I

    IBM

    Application Security for Developers and DevOps Professionals

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle

    ★ 4.7 (251) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Hardening, Linux, Linux Administration

    ★ 4.8 (90) · Beginner · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    Edureka

    OWASP Web Application Security

    Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Scanning, Risk Mitigation, Cyber Security Assessment, Vulnerability Management, Cyber Attacks, Security Engineering, Risk Analysis, Web Applications, Security Awareness, Computer Security, Security Management, Cyber Security Strategy, Authentications, Software Development, Linux, Linux Commands

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    Infosec

    OWASP Top 10 - 2021

    Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Continuous Monitoring, Secure Coding, System Monitoring, Patch Management, Identity and Access Management, Multi-Factor Authentication, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Incident Response

    ★ 4.5 (125) · Intermediate · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography

    ★ 4.8 (4.1K) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • S

    Starweaver

    Advanced Threat Intelligence Techniques

    Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered

What brings you to Coursera today?

  • S

    SkillUp

    Network Traffic Analysis with Wireshark

    Skills you'll gain: Network Monitoring, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity

    ★ 4.8 (17) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages

    ★ 4.8 (3.4K) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    DDoS Attacks and Defenses

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Security Controls, Malware Protection, Security Engineering, Network Security, IT Security Architecture, Threat Detection, Firewall, Digital Forensics, Anomaly Detection, Code Review, Network Routing, Linux Commands, Proxy Servers, Linux, Internet Of Things

    ★ 4.5 (174) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • N

    New York University

    Cyber Attack Countermeasures

    Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)

    ★ 4.7 (710) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pragmatic AI Labs

    LLM Security and Vulnerabilities

    Skills you'll gain: LLM Application, Large Language Modeling, Open Web Application Security Project (OWASP), AI Security, Cyber Security Assessment, Application Security, Security Architecture Review, Tool Calling, Threat Modeling, Security Testing, Secure Coding, Vulnerability Assessments, Vulnerability Management, Software Architecture, Prompt Patterns, Prompt Engineering, IT Security Architecture, Security Controls, Application Programming Interface (API), Data Validation

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1234…834

In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses

  • Application Security for Developers and DevOps Professionals: IBM
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • OWASP Web Application Security: Edureka
  • OWASP Top 10 - 2021: Infosec
  • Assets, Threats, and Vulnerabilities: Google
  • Advanced Threat Intelligence Techniques: Starweaver
  • Network Traffic Analysis with Wireshark: SkillUp
  • Sound the Alarm: Detection and Response: Google
  • DDoS Attacks and Defenses: University of Colorado System
  • Cyber Attack Countermeasures: New York University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok