As indicated by the fact that Exploit Development classes are always sold out at the major conferences worldwide, there is a huge interest in this topic. Unlike the conferences, we offer a much more in depth and comprehensive class for exploit development. This class takes participants from “noob” to “1337″ in the span of 5 days. We begin the class with lower level, easy to grasp topics and then expand on those rapidly throughout the week. Again, compared to a two day class, this five day course goes deeper and expands out wider to produce better results for the student at the end of the week.
Exploit Development Open Enrollment Classroom Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 70% Hands-On, 30% Lecture
Exploit Development is a 5 day course that takes participants from minimal exposure to advanced concepts. The course will begin with simple, familiar concepts and expand rapidly into new more advanced areas.
Students do not need vast programming experience to participate in Exploit Development training. Templates will be provided for each exploit with the intent being to cut down on raw programming time in class, and instead focusing more on the methodology and mindset that goes into writing the different exploits.
Here are some of the topics to look forward to:
- Stack Overflows (in both Linux and Windows)
- Abusing Structured Exception Handlers on Windows
- Shellcoding Tricks (Negative jumps, egghunters, fragmented shellcode)
- Browser Exploits
- PDF Exploits
- ROP Exploits
Training Course Cost: $ 4,000 Per Enrollment
Coming from out of town? Ask about our hotel accommodation packages!
Custom Exploit Development Training For Your Organization
If your organization needs an exploit development class that is slightly customized to your needs, no problem! Just fill out the request information form to the right and tell us more about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
All Times Listed in Eastern Standard Time (EST)
Date: 04/07/2014 - 04/11/2014
Days: Mon | Tues | Weds | Thurs | Fri
Time: 8:30am - 5:00pm
Topics and Concepts Covered in Exploit Development Training
- Stack Overflows in Linux with GDB
- Stack Overflows in Windows with WInDBG
- Structured Exeption Handler Exploits
- Issues with shellcode
- Egghunters in Windows
- Egghunters in Linux
- Negative Jumps
- Fragmented Shellcode
- Heap Spray
- Browser Exploits
- PDB Exploits
- Bypassing DEP
- Bypassing ASLR
- Return Oriented Programming
- Kernel Exploitation
Recommended Training Audience and Prerequisites
For Students with a limited programming background and experience, worry not! Templates are provided for each exploit with the intent being to cut down on the raw programming time in class, and instead focusing more on the methodology and mindset that goes into writing these different exploits. By taking this approach, students can expect to learn and to execute 12-15 exploits over the duration of the class.
It is highly recommended that students have approximately two years of hacking or cyber security experience.
Target Audience:Advanced IT Security Professionals (deep technical), IT Security Assessors (Penetration Testers), Application Developers, Intrusion Analysts
News related to Exploit Development
- Hunting Cyber Threats with Big Data: Our Latest Webinar (2/21/2014)
- University of Maryland…Hacked and Exposed (2/20/2014)
- Security+ Practice Test (2/19/2014)