Free Online

Binary Exploitation Courses and Certifications

Master buffer overflows, format string attacks, and heap exploitation to uncover software vulnerabilities and strengthen security defenses. Learn through hands-on challenges on YouTube and specialized platforms, developing skills in assembly, memory manipulation, and exploit development for ethical hacking and penetration testing.

29 courses
Showing 29 courses
Filter by
Filters
  1. Level
  2. Duration
  3. Language
    • YouTube
    • 3 hours 56 minutes
    • On-Demand
    • Free Video
    • YouTube
    • 1 hour 1 minute
    • On-Demand
    • Free Video
    • YouTube
    • 58 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 1 hour 10 minutes
    • On-Demand
    • Free Video
    • YouTube
    • 49 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 22 minutes
    • On-Demand
    • Conference Talk
    • Coursera
    • 8 weeks, 10 hours a week
    • On-Demand
    • Paid Course
    • 3 courses
    • Udemy
    • 2 hours 22 minutes
    • On-Demand
    • Paid Course

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.