Software: Buffer Overflows

From the course by University of Colorado System
Cyber Threats and Attack Vectors
45 ratings
University of Colorado System
45 ratings
Course 2 of 4 in the Specialization Cybersecurity for Business
From the lesson
Common Vulnerabilities
The week will focus on common vulnerabilities that systems face and how they work.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Department of Computer Science