To use our site, you agree to the use of cookies and data processing according to our privacy statement.


This course provides a thorough guide to memory corruption issues. We cover arbitrary writes, the most severe type of memory corruption vulnerabilities,  the classic buffer overflows and the subtle off-by-one vulnerability. We discuss the culprits for introducing memory corruption and techniques to systematically discover vulnerabilities. In the final section, we close with coding best practices.

Are you a seasoned programmer, who wants to know about memory corruption vulnerabilities? If yes, this course is for you!  Start with the basic buffer overflows and expand your knowledge of secure coding practices!  This course is online, available for you anywhere, anytime.

Experience this training now, for free


View the upcoming courses or get in touch with us

Please click here to access our e-learning platform where you will be able to view more online courses and the upcoming dates for classroom training with full access to equipment. Once you have your plans defined, there you can also register and purchase your seat right away. If you have questions or would like to discuss a special training program for your company, please contact us at