YoVDO

The Anatomy of an Exploit

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Computer Science Courses Programming Courses Cybersecurity Courses Secure Coding Courses Security Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of security vulnerabilities and exploitation in this 57-minute conference talk by Patricia Aas. Dive into the mindset of an "attacker" as you walk through simple exploit attempts, culminating in a detailed examination of a stack buffer overflow exploit. Learn how exploits are developed and utilized, gaining practical insights into secure coding practices. Focus on C programming and x86_64 assembly language to understand the technical aspects of exploitation. Gain a fresh perspective on security vulnerabilities, viewing exploitation as a programming practice rather than an abstract concept. Enhance your understanding of secure coding and develop a more comprehensive approach to software security.

Syllabus

The Anatomy of an Exploit - Patricia Aas


Taught by

NDC Conferences

Related Courses

Probabilistic Graphical Models 1: Representation
Stanford University via Coursera
Computer Security
Stanford University via Coursera
Intro to Computer Science
University of Virginia via Udacity
Introduction to Logic
Stanford University via Coursera
Internet History, Technology, and Security
University of Michigan via Coursera