This document provides an introduction to concepts in computer security, focusing on exploitation techniques such as stack and heap overflows, as well as protections against these vulnerabilities. It covers technical details of memory and CPU architecture, various forms of exploits, and their corresponding countermeasures. Additionally, it offers resources for further learning and opportunities in the field of security engineering.