TST 354 – Penetration Testing for Memory Corruption Vulnerabilities
Course Overview
Occurring when the contents of a memory location are modified due to programmatic behavior that exceeds the intention of the original programmer or program/language constructs. This type of programming error can lead to a program crash or strange and bizarre program behavior. This course teaches how to identify, test, and exploit these vulnerabilities.
After completing this course, you will be able to:
- Identify common memory corruption vulnerabilities
- Test for buffer overflows + Exploit known memory corruption vulnerabilities
- Understand advanced techniques for finding memory corruption vulnerabilities
Looking To Learn More?
Request more information on our courses and labs.
* required
Course Details
Course Number: TST 354
Course Duration: 12 minutes
Course CPE Credits: .25
NICE Work Role Category
StandardType
Available Languages
- English