Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "buffer overflow attack techniques and countermeasures"
University of California, Irvine
Skills you'll gain: Business Writing, Negotiation, Stakeholder Management, Project Performance, Business Correspondence, Creative Problem-Solving, Problem Solving, Conflict Management, Concision, Project Risk Management, Editing, Brainstorming, Decision Making, Creative Thinking, Project Management, Project Planning, Risk Analysis, Emotional Intelligence, Scope Management, Relationship Building
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Skills you'll gain: PyTorch (Machine Learning Library), Supervised Learning, Feature Engineering, Generative AI, Keras (Neural Network Library), Jupyter, Unsupervised Learning, Natural Language Processing, Reinforcement Learning, Deep Learning, Scikit Learn (Machine Learning Library), Machine Learning Algorithms, Data Manipulation, Tensorflow, Python Programming, Verification And Validation, Applied Machine Learning, ChatGPT, Artificial Neural Networks, Statistical Machine Learning
Skills you'll gain: Systems Administration, Cloud Infrastructure, IT Infrastructure, Lightweight Directory Access Protocols, Active Directory, Disaster Recovery, Server Administration, Linux Administration, Cloud Computing, Servers, Windows Servers, Network Infrastructure, Data Storage, Virtualization, User Accounts
Vanderbilt University
Skills you'll gain: Data Visualization, Image Analysis, Data Visualization Software, Matlab, Machine Learning Methods, Algorithms, User Interface (UI), Applied Machine Learning, Object Oriented Programming (OOP), Statistical Methods, Data Analysis, Computer Programming, Programming Principles, Data Processing, Application Development, Data Structures, Scripting, Debugging, Mathematical Software, Data Manipulation
Rice University
Skills you'll gain: Statistical Hypothesis Testing, Microsoft Excel, Pivot Tables And Charts, Regression Analysis, Descriptive Statistics, Probability & Statistics, Graphing, Spreadsheet Software, Probability Distribution, Business Analytics, Statistical Analysis, Statistical Modeling, Excel Formulas, Data Analysis, Data Presentation, Statistics, Sample Size Determination, Box Plots, Statistical Inference, Estimation
University of Illinois Urbana-Champaign
Skills you'll gain: Data Storytelling, Data Visualization, Email Marketing, Data Presentation, Google Analytics, Digital Marketing, Analytics, Marketing Communications, Business Analytics, Content Marketing, Marketing Strategies, Marketing Analytics, Social Media Marketing, Marketing Management, Marketing, Web Analytics, Strategic Marketing, Digital Communications, Integrated Marketing Communications, Media Strategy
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
University of California San Diego
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Network Routing, Debugging, Network Model, Bioinformatics, Advanced Mathematics, Operations Research, Data Storage, Development Testing, Software Testing, Theoretical Computer Science, Computational Thinking, Network Analysis, Programming Principles, Computer Programming, Epidemiology, C++ (Programming Language), Infectious Diseases
Skills you'll gain: User Experience Design, User Story, Ideation, Usability, Web Content Accessibility Guidelines, User Research, Design Thinking, Human Centered Design, Competitive Analysis, Persona Development
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses
- Project Management & Other Tools for Career Development: University of California, Irvine
- DDoS Attacks and Defenses: University of Colorado System
- IBM AI Engineering: IBM
- System Administration and IT Infrastructure Services: Google
- MATLAB Programming for Engineers and Scientists: Vanderbilt University
- Business Statistics and Analysis: Rice University
- Digital Marketing: University of Illinois Urbana-Champaign
- Prepare Data for Exploration: Google
- Data Structures and Algorithms: University of California San Diego
- Start the UX Design Process: Empathize, Define, and Ideate: Google