Exploit Development

exploit_tab

Overviewbutton_dl

This is one of our unique courses, because every advanced security research institution has its own tools and methods for exploit development. In this course, we will provide the students with detailed exploit development. Visit the instructors page to get to know your teachers better. This course is , win32 exploitation ad. We will provide Linux & OS X exploitation at a later time as well. Feel free to browse the course syllabus to know what will be covered in this course.

Pre-Requirements

Good reverse engineering background, good programming skills.

Goals

The participant will be able to exploit application vulnerabilities by developing exploitation codes that are reliable and effective, yet are not signature friendly.

Course Material

  • Interactive Slides
  • Video Tutorials
  • Downloadable Virtual Machines
  • Staff Responding to Every Question

Sample Video

Sample Chapter

You can download a sample chapter to review the quality of materials here.

Price

This is a very advanced course, at a very reasonable price of $1199 .

Certification

Students will receive a certificate of  “certified win32 exploit developer” upon successful completion of the training. This course has a final lab, in which students need to exploit a real-life application with a known vulnerability.

What You Should Bring

Students are required to have a personal computer with enough memory to run virtual machines, and spend enough time on the course and its labs & assignments.

Early Bird Registrations

Because we love students that are too interested in our courses, we provide a 20% discount for early bird registration. For this course will only have 7 seat for early bird,  So you just need to register now ! before early bird slots are all full!
Right now we support wire-transfer and paypal for account please contact us or just use our live chat !
By enrolling you are agreeing to the terms of service.
Share