TST 354 – Penetration Testing for Memory Corruption Vulnerabilities

Course Overview


Occurring when the contents of a memory location are modified due to programmatic behavior that exceeds the intention of the original programmer or program/language constructs. This type of programming error can lead to a program crash or strange and bizarre program behavior. This course teaches how to identify, test, and exploit these vulnerabilities.

After completing this course, you will be able to:

  • Identify common memory corruption vulnerabilities
  • Test for buffer overflows + Exploit known memory corruption vulnerabilities
  • Understand advanced techniques for finding memory corruption vulnerabilities

Looking To Learn More?

Request more information on our courses and labs.

* required

Course Details

Course Number: TST 354
Course Duration: 12 minutes
Course CPE Credits: .25

NICE Work Role Category

Available Languages

  • English