• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Buffer Overflow Attack Techniques And Countermeasures

Results for "buffer+overflow+attack+techniques+and+countermeasures"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    Memory, Encryption, and Protecting Data in Android

    Skills you'll gain: Cryptography, Encryption, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Authentications, Application Security, Network Security, Exploitation techniques, File Systems

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threats and Network Security Foundations

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Cybersecurity Attack and Defense Fundamentals

    Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Information Systems Security, Malware Protection, Authentications, Cyber Attacks, Threat Detection, Data Integrity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    795 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Cybersecurity for Business

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Security Awareness, Enterprise Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.9K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    OWASP Top 10 - 2021

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration

    4.6
    Rating, 4.6 out of 5 stars
    ·
    124 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Information Assurance Analysis

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security

    3.9
    Rating, 3.9 out of 5 stars
    ·
    9 reviews

    Intermediate · Specialization · 3 - 6 Months

What brings you to Coursera today?

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking: Meterpreter, DNS & ICMP Attacks

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis

    4.3
    Rating, 4.3 out of 5 stars
    ·
    6 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    N

    New York University

    Cyber Attack Countermeasures

    Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication

    4.7
    Rating, 4.7 out of 5 stars
    ·
    710 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    L

    LearnQuest

    Advanced Network Security

    Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, AI Security, Network Monitoring, Security Strategy, Information Systems Security, Cloud Management

    4.4
    Rating, 4.4 out of 5 stars
    ·
    96 reviews

    Advanced · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    Infosec

    Memory, Encryption, and Protecting Data in iOS

    Skills you'll gain: Apple iOS, iOS Development, Secure Coding, Encryption, Network Security, Application Programming Interface (API), Swift Programming, Mobile Security, Application Security, Data Persistence, Key Management, Data Security, Data Storage

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Web Security, Social Engineering & External Attacks

    Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript

    Intermediate · Course · 1 - 3 Months

1234…9

In summary, here are 10 of our most popular buffer+overflow+attack+techniques+and+countermeasures courses

  • Memory, Encryption, and Protecting Data in Android: Infosec
  • Cyber Threats and Network Security Foundations: Edureka
  • Cybersecurity Attack and Defense Fundamentals: EC-Council
  • Cybersecurity for Business: University of Colorado System
  • OWASP Top 10 - 2021: Infosec
  • Information Assurance Analysis: Johns Hopkins University
  • Ethical Hacking: Meterpreter, DNS & ICMP Attacks: EDUCBA
  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • Cyber Attack Countermeasures: New York University
  • Advanced Network Security: LearnQuest

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok