As indicated by the fact that Exploit Development classes are always sold out at the major conferences worldwide, there is a huge interest in this topic. Unlike the conferences, we offer a much more in depth and comprehensive class for exploit development. This class takes participants from “noob” to “1337” in the span of 5 days. We begin the class with lower level, easy to grasp topics and then expand on those rapidly throughout the week. Again, compared to a two day class, this five day course goes deeper and expands out wider to produce better results for the student at the end of the week.

Exploit Development Open Enrollment Classroom Training in Maryland, Washington D.C. or Northern Virginia

Delivery Style: 70% Hands-On, 30% Lecture

We offer Exploit Development training at our two locations in the D.C. Metro area: Greenbelt, MD and Ashburn, VA. Exploit Development is a 5 day course that takes participants from minimal exposure to advanced concepts.  The course will begin with simple, familiar concepts and expand rapidly into new more advanced areas.

Students do not need vast programming experience to participate in Exploit Development training.  Templates will be provided for each exploit with the intent being to cut down on raw programming time in class, and instead focusing more on the methodology and mindset that goes into writing the different exploits.

Here are some of the topics to look forward to:

  • Stack Overflows (in both Linux and Windows)
  • Abusing Structured Exception Handlers on Windows
  • Shellcoding Tricks (Negative jumps, egghunters, fragmented shellcode)
  • Browser Exploits
  • PDF Exploits
  • ROP Exploits

Training Course Cost: $ 4,000 Per Enrollment

This is an Advanced Security course. You must meet specific prerequisites in order to enroll in this course. Please speak to your account manager for more details.

Coming from out of town? Ask about our hotel accommodation packages!

Exploit Development Training Schedule

All Times Listed in Eastern Standard Time (EST)

For information related to scheduling, please fill out the information request form to the right.

 

 

Custom Training For Your Organization

Does your organization have special training needs? Let us know! We'll put together a customized training course proposal targeted to the specific needs of your staff. Select your ideal start-date, your location preference and your equipment requests and we will gladly compose a training plan for your company quickly and free of any obligation.

Custom Computer Training Inquiry Form
 

Topics & Concepts Covered in Exploit Development Training Include:

  • Stack Overflows in Linux with GDB
  • Structured Exeption Handler Exploits
  • Egghunters in Windows & Linux
  • Browser & PDB Exploits
  • Bypassing DEP & ASLR
  • Return Oriented Programming
  • Kernel Exploitation

Recommended Training Audience and Prerequisites

For students with a limited programming background and experience, worry not! Templates are provided for each exploit with the intent being to cut down on the raw programming time in class, and instead focusing more on the methodology and mindset that goes into writing these different exploits. By taking this approach, students can expect to learn and to execute 12-15 exploits over the duration of the class.

It is highly recommended that students have approximately two years of hacking or cyber security experience.

This course is appropriate for Advanced IT Security Professionals (deep technical), IT Security Assessors (Penetration Testers), Application Developers, and Intrusion Analysts.