Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Memory Corruption Safety Dance

Kaspersky via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course covers the following learning outcomes and goals: understanding the prevalence of memory safety vulnerabilities, evaluating the effectiveness of strategies and technologies to combat these vulnerabilities, and exploring future developments in preventing memory corruption exploitation. The course teaches individual skills and tools such as Defense-In-Depth strategies including Bug Minimization, Exploit Mitigations, and Isolation, as well as cost considerations in terms of Discovery and Development costs. The teaching method of the course includes a presentation style with real-world examples such as Browser Exploit Walkthroughs from 2009 and 2015. The intended audience for this course includes cybersecurity professionals, software developers, IT security specialists, and anyone interested in understanding and preventing memory safety vulnerabilities and exploitation techniques.

Syllabus

Introduction
What will we cover?
Applicability
Defense-In-Depth - A three-tiered approach
Defense-In-Depth - Bug Minimization
Defense-In-Depth - Exploit Mitigations
Defense-In-Depth - Isolation
Let's talk about cost - Discovery cost
Browser Exploit Walkthrough 2009 (UAF)
Browser Exploit Walkthrough 2015 (UAF) - Core Security (IE11) MS15-106
Let's talk about cost - Development cost
The Future

Taught by

Kaspersky

Reviews

Start your review of The Memory Corruption Safety Dance

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.