Ethical Hacking: Buffer Overflow

Understanding buffer overflows can be very difficult for non-programmers and IT professionals unless someone takes the time to really explain the basics. This course does that by not assuming you are a programmer or computer scientist. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Course info
Rating
(31)
Level
Beginner
Updated
May 27, 2016
Duration
4h 2m
Table of contents
Description
Course info
Rating
(31)
Level
Beginner
Updated
May 27, 2016
Duration
4h 2m
Description

Buffer overflow is a topic that only software developers using low-level programming languages really get an opportunity to fully understand. However, IT security professionals are increasingly called upon to better understand how vulnerabilities created by poor software design and implementation practices can be exploited to create security issues in systems and networks. The problem is that most IT professionals do not have the extensive software development background needed to tackle the subject of buffer overflow. This course breaks down the technical subjects of computer memory management, controlling code, and data inside of a running program, and exploiting poor quality software into terms that IT people with no software development experience can understand. Also examined are ways to prevent buffer overflow conditions and minimize the impact of buffer overflows that do happen. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

James D. Murray is an information security professional and worked professionally as a software developer for over 25 years. He teaches information security courses at Stanbridge College in Southern California and works as a security analyst for Verizon. Mr. Murray has an MSIT Information Security degree and many IT certifications.

More from the author