• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Buffer Overflow Attack Techniques And Countermeasures

Results for "buffer overflow attack techniques and countermeasures"


  • P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation

    ★ 4.8 (13) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

    ★ 5 (9) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    ★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    Coursera

    Introduction to Prompt Injection Vulnerabilities

    Skills you'll gain: AI Security, Large Language Modeling, LLM Application, Cybersecurity, Prompt Engineering, Threat Modeling, Cyber Security Assessment, Application Security, Vulnerability Assessments, Security Testing, Network Security, Exploitation techniques

    ★ 3.7 (20) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • M

    Microsoft

    Azure Cybersecurity Solutions And Microsoft Defender

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Threat Intelligence, Identity and Access Management, Network Security, Endpoint Detection and Response, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Event Management

    ★ 5 (7) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 4

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • A

    Amazon Web Services

    Increasing Application Security: Bedrock Guardrails & GenAI

    Skills you'll gain: Amazon Bedrock, AI Security, Prompt Engineering, Generative AI, Security Engineering, Application Security, Responsible AI, Security Controls

    Beginner · Course · 1 - 4 Weeks

    Category: Free
    Free
    Category: Credit offered
    Credit offered
  • U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    ★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Build toward a degree
    Build toward a degree
  • E

    Edureka

    Vulnerability Assessment and Management

    Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Security Testing, Patch Management, Cyber Risk, Threat Detection, Cyber Threat Hunting, Application Security, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Dashboard Creation, Cyber Security Strategy, Cyber Governance, Network Engineering, Web Applications

    Intermediate · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Offensive Security Using Python

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Exploit development, Threat Detection, Penetration Testing, Cloud Security, Exploitation techniques, Cyber Security Assessment, Vulnerability Scanning, Security Testing, Application Security, Cyber Operations, Incident Response, Security Engineering, CI/CD, Vulnerability Assessments, Python Programming, Web Scraping, Encryption, Automation

    Beginner · Course · 1 - 3 Months

    Category: New
    New
    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • I

    Infosec

    Memory, Encryption, and Protecting Data in Android

    Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems

    Mixed · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1234…834

In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses

  • Advanced Exploitation and Scripting Techniques: Packt
  • Exploit Development, Malware, & Defensive Strategies: Packt
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Introduction to Prompt Injection Vulnerabilities: Coursera
  • Azure Cybersecurity Solutions And Microsoft Defender : Microsoft
  • Certified Ethical Hacker (CEH): Unit 4: Pearson
  • Increasing Application Security: Bedrock Guardrails & GenAI: Amazon Web Services
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
  • Vulnerability Assessment and Management: Edureka

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok