YoVDO

Mitigating Hackers with Hardening on Linux - An Overview for Developers with Focus on Buffer Overflow

Offered By: Linux Foundation via YouTube

Tags

Linux Security Courses Embedded Systems Courses IoT security Courses Software Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive tutorial on Linux security and hardening techniques designed for developers working with embedded systems and IoT products. Gain insights into software vulnerabilities, their root causes, and effective countermeasures to mitigate security risks. Delve into the intricacies of buffer overflow attacks, CPU ABI basics, and process/thread stack layouts. Learn about modern OS hardening techniques for both userspace applications and kernel-level code. Participate in a practical code-level demonstration of a simple buffer overflow vulnerability on an ARM VM or hardware board, with accompanying code and documentation provided on GitHub. This 3-part tutorial covers security and hacking fundamentals, in-depth analysis of software vulnerabilities, and advanced Linux hardening strategies, with a focus on resource-constrained systems and C programming for both application and kernel-space development.

Syllabus

Mitigating Hackers with Hardening on Linux – An Overview for Developers, Focus... Kaiwan Billimoria


Taught by

Linux Foundation

Tags

Related Courses

Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Reverse Engineering and Exploit Development
Udemy
Master the OWASP Top 10
LinkedIn Learning
CASP+ Cert Prep: 2 Enterprise Security Architecture
LinkedIn Learning
Learning the OWASP Top 10 (2018)
LinkedIn Learning