×

Ethical Hacking: Buffer Overflow

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

4h 2m

level

Beginner

Course Creator

James D. Murray

Last Updated

10-Feb-22

Pluralsight is not an official partner or accredited training center of EC-Council. Understanding buffer overflows can be difficult unless you know the basics. This course teaches the basics by not assuming you are a programmer or computer scientist.

Add your review

Pluralsight is not an official partner or accredited training center of EC-Council. Buffer overflow is a topic that only software developers using low-level programming languages really get an opportunity to fully understand. However, IT security professionals are increasingly called upon to better understand how vulnerabilities created by poor software design and implementation practices can be exploited to create security issues in systems and networks. The problem is that most IT professionals do not have the extensive software development background needed to tackle the subject of buffer overflow. This course breaks down the technical subjects of computer memory management, controlling code, and data inside of a running program, and exploiting poor quality software into terms that IT people with no software development experience can understand. Also examined are ways to prevent buffer overflow conditions and minimize the impact of buffer overflows that do happen. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Author Name: James D. Murray
Author Description:
James D. Murray is an active information security professional and a deprecated software engineer. Mr. Murray started thinking about programming in 1978 when he wrote his first BASIC program on a Commodore PET computer. His first job was building printed circuit boards for the Apple ][ and original IBM PC computers, but he didn’t really consider programming as a possible profession until 1981 after “finding” access to several UNIX systems with C compilers and connected to ARPAnet and BITNET. (Pl… more

Table of Contents

  • What Are Buffer Overflows?
    35mins
  • Inside Buffer Overflows
    61mins
  • Finding Buffer Overflows
    85mins
  • Mitigating Buffer Overflows
    60mins

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Ethical Hacking: Buffer Overflow”

Your email address will not be published. Required fields are marked *

Ethical Hacking: Buffer Overflow
Ethical Hacking: Buffer Overflow
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/