• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Buffer Overflow Attack Techniques And Countermeasures

Results for "buffer overflow attack techniques and countermeasures"


  • C

    Coursera

    Introduction to Prompt Injection Vulnerabilities

    Skills you'll gain: AI Security, Large Language Modeling, LLM Application, Cybersecurity, Prompt Engineering, Threat Modeling, Cyber Security Assessment, Application Security, Vulnerability Assessments, Security Testing, Network Security, Exploitation techniques

    ★ 3.7 (20) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Ethical Hacking with Kali Linux: Analyze & Defend

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence

    ★ 5 (15) · Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Ethical Hacking: Meterpreter, DNS & ICMP Attacks

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence

    ★ 4.7 (15) · Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Defense in Depth Cybersecurity – Layered Security Strategy

    Skills you'll gain: Risk Management Framework, Cyber Security Strategy, Cyber Threat Intelligence, Threat Modeling, Security Strategy, Security Awareness, Cybersecurity, Computer Security Awareness Training, Security Engineering, IT Security Architecture, Zero Trust Network Access, Threat Management, Security Architecture Review, Human Factors (Security), Cyber Security Policies, Security Management, Security Controls, Network Security, Information Systems Security, Enterprise Security

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Credit offered
    Credit offered
  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Advanced Malware and Network Anomaly Detection

    Skills you'll gain: Anomaly Detection, Malware Protection, Threat Detection, Network Analysis, AI Security, Cybersecurity, Model Evaluation, Network Security, Machine Learning Methods, Classification Algorithms, Microsoft Windows

    ★ 4.7 (23) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    OWASP Top 10

    Skills you'll gain: Cryptographic Protocols, Application Design, Exploitation techniques, Event Monitoring, Intrusion Detection and Prevention, Server Side, Continuous Monitoring, Computer Security Incident Management, System Monitoring, System Configuration

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Advanced Cybersecurity Topics

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture

    ★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Web Security, Social Engineering & External Attacks

    Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications

    Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Build toward a degree
    Build toward a degree
  • E

    EDUCBA

    Data Center Security Management with Microsoft System Center

    Skills you'll gain: Incident Response, Incident Management, Data Centers, Computer Security Incident Management, DevSecOps, Continuous Monitoring, System Monitoring, Threat Detection, Infrastructure Security, IT Security Architecture, Security Management, Payment Card Industry (PCI) Data Security Standards, Data Security, Information Systems Security, IT Infrastructure, Security Information and Event Management (SIEM), Security Testing, DevOps, System Configuration, IT Automation

    ★ 4.9 (54) · Beginner · Course · 1 - 3 Months

    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • P

    Palo Alto Networks

    Palo Alto Networks Cybersecurity Foundation

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications

    ★ 4.6 (558) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…456…834

In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses

  • Introduction to Prompt Injection Vulnerabilities: Coursera
  • Ethical Hacking with Kali Linux: Analyze & Defend: EDUCBA
  • Ethical Hacking: Meterpreter, DNS & ICMP Attacks: EDUCBA
  • Defense in Depth Cybersecurity – Layered Security Strategy: Packt
  • Penetration Testing and Vulnerability Scanning: Edureka
  • Advanced Malware and Network Anomaly Detection: Johns Hopkins University
  • OWASP Top 10: Packt
  • Advanced Cybersecurity Topics: Johns Hopkins University
  • Web Security, Social Engineering & External Attacks: Packt
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok