Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "buffer overflow attack techniques and countermeasures"
Skills you'll gain: Package and Software Management, Desktop Support, Linux, Microsoft Windows, File Systems, Remote Access Systems, Operating Systems, Linux Administration, OS Process Management, System Support, Systems Administration, Software Installation, User Accounts, System Configuration, Linux Commands, Command-Line Interface, System Monitoring, User Provisioning, Authorization (Computing), Identity and Access Management
Skills you'll gain: Data Mining, Big Data, Cloud Computing, Data Analysis, Data Science, Digital Transformation, Data-Driven Decision-Making, Business Logic, Deep Learning, Machine Learning, Artificial Intelligence
University of Michigan
Skills you'll gain: Negotiation, Contract Negotiation, Conflict Management, Communication, Contract Management, Influencing, Planning, Decision Making, Ethical Standards And Conduct, Industrial and Organizational Psychology
- Status: Free
University of Pennsylvania
Skills you'll gain: Vocabulary, Business Writing, Interviewing Skills, Verbal Communication Skills, Language Learning, Business Correspondence, Professional Networking, Business Communication, Grammar, Recruitment
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Linux, Encryption, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
Multiple educators
Skills you'll gain: Unsupervised Learning, Supervised Learning, Classification And Regression Tree (CART), Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Algorithms, Applied Machine Learning, Machine Learning, Jupyter, Data Ethics, Decision Tree Learning, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Reinforcement Learning, Random Forest Algorithm, Feature Engineering, Artificial Neural Networks
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
The Museum of Modern Art
Skills you'll gain: Liberal Arts, Social Studies, Aesthetics, Electronic Media, Culture, Cultural Diversity, Media and Communications, Design, Journalism, Architectural Design, Multimedia, Environmental Issue, Artificial Intelligence, Storytelling, Research, Sociology, Creative Design, Social Justice, Non-Verbal Communication, 3D Modeling
In summary, here are 10 of our most popular buffer overflow attack techniques and countermeasures courses
- Operating Systems and You: Becoming a Power User: Google
- What is Data Science? : IBM
- Successful Negotiation: Essential Strategies and Skills: University of Michigan
- English for Career Development: University of Pennsylvania
- Cyber Threats and Attack Vectors: University of Colorado System
- Hacking and Patching: University of Colorado System
- Foundations of Cybersecurity: Google
- The Bits and Bytes of Computer Networking: Google
- Google IT Support: Google
- Machine Learning: DeepLearning.AI