• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Buffer Overflow Attack Techniques And Countermeasures

Results for "buffer overflow attack techniques and countermeasures"


  • Status: Preview
    Preview
    I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Virtual Machines, Debugging, System Programming, Windows PowerShell, Virtual Environment, Virtualization, Programming Principles, Excel Macros, Linux

    4.5
    Rating, 4.5 out of 5 stars
    ·
    86 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free
    Free
    I

    Infosec

    ChatGPT for Offensive Security

    Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Exploit development, Responsible AI, API Testing, AI Integrations, Data Ethics, Penetration Testing, OpenAI, Exploitation techniques, Vulnerability Scanning, Generative AI

    4
    Rating, 4 out of 5 stars
    ·
    16 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cyber Threats and Attack Vectors

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Threat Management, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Exploitation techniques, Network Security, Vulnerability Assessments, Cloud Services, Cloud Computing, Vulnerability Management, Data Security, Human Factors (Security), Incident Response, Software As A Service

    4.7
    Rating, 4.7 out of 5 stars
    ·
    675 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Burp Suite Unfiltered - Go from a Beginner to Advanced

    Skills you'll gain: Security Testing, Test Tools, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Network Protocols, Web Applications, Test Automation, Development Environment, Proxy Servers, Authentications, Software Installation

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Advanced System Security Design

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity

    4.5
    Rating, 4.5 out of 5 stars
    ·
    658 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities in C/C++Programming

    Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, System Programming, C (Programming Language), Identity and Access Management, Encryption

    4.6
    Rating, 4.6 out of 5 stars
    ·
    81 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Hacking and Patching

    Skills you'll gain: Penetration Testing, Exploit development, Metasploit, Application Security, Security Testing, Cyber Security Assessment, Vulnerability Scanning, Brute-force attacks, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Memory Management, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation

    4
    Rating, 4 out of 5 stars
    ·
    279 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Information Assurance Analysis

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations

    4
    Rating, 4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Azure Cybersecurity Solutions And Microsoft Defender

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Threat Intelligence, Identity and Access Management, Network Security, Endpoint Detection and Response, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Event Management

    5
    Rating, 5 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    Memory, Encryption, and Protecting Data in Android

    Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    P

    Packt

    Offensive Security Using Python

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Exploit development, Threat Detection, Penetration Testing, Cloud Security, Exploitation techniques, Cyber Security Assessment, Vulnerability Scanning, Security Testing, Application Security, Cyber Operations, Incident Response, Security Engineering, CI/CD, Vulnerability Assessments, Python Programming, Web Scraping, Encryption, Automation

    Beginner · Course · 1 - 3 Months

1234…834

In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses

  • Malware Analysis and Introduction to Assembly Language: IBM
  • ChatGPT for Offensive Security: Infosec
  • Cyber Threats and Attack Vectors: University of Colorado System
  • Burp Suite Unfiltered - Go from a Beginner to Advanced: Packt
  • Advanced System Security Design: University of Colorado System
  • Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Hacking and Patching: University of Colorado System
  • Information Assurance Analysis: Johns Hopkins University
  • Azure Cybersecurity Solutions And Microsoft Defender : Microsoft

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok