Search

Memory Corruption issues in C

Secure Coding 101 - a complete guide for the embedded system programmer

Register for this online course

Description

This course provides a thorough guide to memory corruption issues. We cover arbitrary writes, the most severe type of memory corruption vulnerabilities,  the classic buffer overflows and the subtle off-by-one vulnerability. We discuss the culprits for introducing memory corruption and techniques to systematically discover vulnerabilities. In the final section, we close with coding best practices.

Are you a seasoned programmer, who wants to know about memory corruption vulnerabilities? If yes, this course is for you!  Start with the basic buffer overflows and expand your knowledge of secure coding practices!  This course is online, available for you anywhere, anytime.

Experience this training now, for free

We are working hard on creating a novel experience with learning about software vulnerabilities, for an engaging experience we created interactive content with many illustrative examples. Click on the image below to experience the look and feel of our online training. This free demo is a real part of the second section of the training course, focused on buffer overflows.

 

View the upcoming courses or get in touch with us

Please click here to access our e-learning platform where you will be able to view more online courses and the upcoming dates for classroom training with full access to equipment. Once you have your plans defined, there you can also register and purchase your seat right away. If you have questions or would like to discuss a special training program for your company, please contact us at trainingacademy@riscure.com.

By continuing to browse this website, you agree to the use of cookies and data processing according to our privacy statement. Close