• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Buffer Overflow Attack Techniques And Countermeasures

Results for "buffer overflow attack techniques and countermeasures"


  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Hacking and Patching

    Skills you'll gain: Penetration Testing, Exploit development, Metasploit, Application Security, Security Testing, Cyber Security Assessment, Vulnerability Scanning, Brute-force attacks, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Memory Management, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation

    4
    Rating, 4 out of 5 stars
    ·
    279 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Linux Security Techniques

    Skills you'll gain: Linux Servers, Linux Commands, Network Administration, Cryptography, User Accounts, Key Management, Brute-force attacks

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    OWASP Top 10

    Skills you'll gain: Cryptographic Protocols, Application Design, Exploitation techniques, Event Monitoring, Intrusion Detection and Prevention, Server Side, Continuous Monitoring, Computer Security Incident Management, System Monitoring, System Configuration

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Malware and Network Anomaly Detection

    Skills you'll gain: Anomaly Detection, Malware Protection, Threat Detection, Network Analysis, AI Security, Cybersecurity, Model Evaluation, Network Security, Machine Learning Methods, Classification Algorithms, Microsoft Windows

    4.7
    Rating, 4.7 out of 5 stars
    ·
    23 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Identifying Security Vulnerabilities

    Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Cisco Learning and Certifications

    Data Security

    Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Cryptographic Protocols, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Security Controls, Event Monitoring, Continuous Monitoring, Threat Detection, Data Integrity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    63 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Security Management, Vulnerability Management, Threat Detection, Malware Protection, Infrastructure Security, Continuous Monitoring, Cloud API, IT Automation, Event Monitoring, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Kali Linux: Analyze & Defend

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence

    5
    Rating, 5 out of 5 stars
    ·
    15 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    EDUCBA

    Data Center Security Management with Microsoft System Center

    Skills you'll gain: Incident Response, Incident Management, Data Centers, Computer Security Incident Management, DevSecOps, Continuous Monitoring, System Monitoring, Threat Detection, Infrastructure Security, IT Security Architecture, Security Management, Payment Card Industry (PCI) Data Security Standards, Data Security, Information Systems Security, IT Infrastructure, Security Information and Event Management (SIEM), Security Testing, DevOps, System Configuration, IT Automation

    4.9
    Rating, 4.9 out of 5 stars
    ·
    54 reviews

    Beginner · Course · 1 - 3 Months

1…456…834

In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses

  • Hacking and Patching: University of Colorado System
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Linux Security Techniques: Packt
  • OWASP Top 10: Packt
  • Advanced Malware and Network Anomaly Detection: Johns Hopkins University
  • Identifying Security Vulnerabilities: University of California, Davis
  • Data Security: Cisco Learning and Certifications
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Penetration Testing and Vulnerability Scanning: Edureka

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok