This course is a win32 exploitation course. We will provide Linux & OS X exploitation at a later time as well. Feel free to browse the course syllabus to know what will be covered in this course.
OVERVIEW
This is one of our unique courses, because every advanced security research institution has its own tools and methods for exploit development. In this course, we will provide the students with detailed exploit development. Visit the instructors page to get to know your teachers better.
PRE-REQUIREMENTS
Good reverse engineering background, good programming skills.
GOALS
The participant will be able to exploit application vulnerabilities by developing exploitation codes that are reliable and effective, yet are not signature friendly.
COURSE MATERIAL
Interactive Slides
Video Tutorials
Downloadable Virtual Machines
Staff Responding to Every Question
PRICE
This is a very advanced course, at the price of $1199 .
CERTIFICATION
Students will receive a certificate of “Certified win32 Exploit Developer” upon successful completion of the training. This course has a final exam, in which students need to exploit a real-life application with a known vulnerability. The score from the final exam will be included on the certificate.
WHAT YOU SHOULD BRING
Students are required to have a personal computer with enough memory to run virtual machines, and spend enough time on the course and its labs & assignments.