• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Buffer Overflow Attack Techniques And Countermeasures

Results for "buffer overflow attack techniques and countermeasures"


  • S

    SkillUp

    Network Traffic Analysis with Wireshark

    Skills you'll gain: Network Monitoring, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity

    ★ 4.8 (17) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    DDoS Attacks and Defenses

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Security Controls, Malware Protection, Security Engineering, Network Security, IT Security Architecture, Threat Detection, Firewall, Digital Forensics, Anomaly Detection, Code Review, Network Routing, Linux Commands, Proxy Servers, Linux, Internet Of Things

    ★ 4.5 (174) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Advanced Techniques in Embedded Software Testing

    Skills you'll gain: Code Coverage, Embedded Software, Real-Time Operating Systems, Performance Testing, System Testing, Software Testing, Verification And Validation, Test Engineering, Performance Stress Testing, Embedded Systems, Test Planning, Simulations, Real Time Data, Safety and Security

    Advanced · Course · 1 - 4 Weeks

    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Virtual Machines, Debugging, System Programming, Windows PowerShell, Virtual Environment, Virtualization, Programming Principles, Excel Macros, Linux

    ★ 4.5 (86) · Intermediate · Course · 1 - 3 Months

    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Identifying Security Vulnerabilities in C/C++Programming

    Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, System Programming, C (Programming Language), Identity and Access Management, Encryption

    ★ 4.6 (81) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages

    ★ 4.8 (3.4K) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Burp Suite Unfiltered - Go from a Beginner to Advanced

    Skills you'll gain: Security Testing, Test Tools, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Network Protocols, Web Applications, Test Automation, Development Environment, Proxy Servers, Authentications, Software Installation

    Beginner · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • I

    Infosec

    ChatGPT for Offensive Security

    Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Exploit development, Responsible AI, API Testing, AI Integrations, Data Ethics, Penetration Testing, OpenAI, Exploitation techniques, Vulnerability Scanning, Generative AI

    ★ 4 (16) · Beginner · Course · 1 - 3 Months

    Category: Free
    Free
    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Ethical Hacking: Meterpreter, DNS & ICMP Attacks

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence

    ★ 4.7 (15) · Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Endpoint Detection and Response Essentials

    Skills you'll gain: Endpoint Detection and Response, Endpoint Security, Threat Detection, Malware Protection, Exploitation techniques, Cyber Security Strategy, Cybersecurity, Incident Response, IT Security Architecture, AI Integrations, AI Security, Cyber Attacks, Security Controls, Network Security, Cyber Security Assessment, Mobile Security, ChatGPT, Operating Systems

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

    ★ 4.8 (13) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1234…834

In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses

  • Network Traffic Analysis with Wireshark: SkillUp
  • DDoS Attacks and Defenses: University of Colorado System
  • Advanced Techniques in Embedded Software Testing: Coursera
  • Malware Analysis and Introduction to Assembly Language: IBM
  • Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
  • Sound the Alarm: Detection and Response: Google
  • Burp Suite Unfiltered - Go from a Beginner to Advanced: Packt
  • ChatGPT for Offensive Security: Infosec
  • Advanced Penetration Techniques: Packt
  • Ethical Hacking: Meterpreter, DNS & ICMP Attacks: EDUCBA

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok