Certified Ethical Hacker: Buffer Overflow (Update Avail.)


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Buffer overflow attacks exploit vulnerabilities in an application due to mishandling of occurrences of data buffers being presented with more data than they were intended to hold. This course looks at buffer overflow attack methodology and tools, and countermeasures. This course is the sixteenth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Target Audience
Network and information security professionals

Prerequisites
None

Expected Duration (hours)
1.1

Lesson Objectives

Certified Ethical Hacker: Buffer Overflow (Update Avail.)

  • identify types of buffer overflow
  • sequence the steps in a buffer overflow attack
  • sequence the steps for testing for a stack overflow vulnerability
  • recognize countermeasures against buffer overflow attacks
  • identify buffer overflow attack methodology and tools, and how to counter them
  • Course Number:
    sp_ceth_a16_it_enus

    Expertise Level
    Intermediate