Free Online

Use-After-Free Vulnerability Courses and Certifications

Explore use-after-free (UAF) vulnerabilities to understand memory management flaws and exploit techniques in real-world systems. Learn to detect, exploit, and mitigate UAF issues in Android kernels, browsers, and operating systems through hands-on tutorials and security conference talks on YouTube. Ideal for aspiring security researchers and ethical hackers.

14 courses
Showing 14 courses
Filter by
Filters
  1. Level
  2. Duration
  3. Language
    • YouTube
    • 34 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 35 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 35 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 32 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 35 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 38 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 47 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 57 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 44 minutes
    • On-Demand
    • Conference Talk
    • YouTube
    • 6 hours 12 minutes
    • On-Demand
    • Free Video

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.