PowerBI Data Analyst - Create visualizations and dashboards from scratch
NY State-Licensed Certificates in Design, Coding & AI — Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the world of security vulnerabilities and exploitation in this 57-minute conference talk by Patricia Aas. Dive into the mindset of an "attacker" as you walk through simple exploit attempts, culminating in a detailed examination of a stack buffer overflow exploit. Learn how exploits are developed and utilized, gaining practical insights into secure coding practices. Focus on C programming and x86_64 assembly language to understand the technical aspects of exploitation. Gain a fresh perspective on security vulnerabilities, viewing exploitation as a programming practice rather than an abstract concept. Enhance your understanding of secure coding and develop a more comprehensive approach to software security.
Syllabus
The Anatomy of an Exploit - Patricia Aas
Taught by
NDC Conferences