As indicated by the fact that Exploit Development classes are always sold out at the major conferences worldwide, there is a huge interest in this topic. Unlike the conferences, we offer a much more in depth and comprehensive class for exploit development. This class takes participants from “noob” to “1337″ in the span of 5 days. We begin the class with lower level, easy to grasp topics and then expand on those rapidly throughout the week. Again, compared to a two day class, this five day course goes deeper and expands out wider to produce better results for the student at the end of the week.
Exploit Development Open Enrollment Classroom Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 70% Hands-On, 30% Lecture
Exploit Development is a 5 day course that takes participants from minimal exposure to advanced concepts. The course will begin with simple, familiar concepts and expand rapidly into new more advanced areas.
Students do not need vast programming experience to participate in Exploit Development training. Templates will be provided for each exploit with the intent being to cut down on raw programming time in class, and instead focusing more on the methodology and mindset that goes into writing the different exploits.
Here are some of the topics to look forward to:
- Stack Overflows (in both Linux and Windows)
- Abusing Structured Exception Handlers on Windows
- Shellcoding Tricks (Negative jumps, egghunters, fragmented shellcode)
- Browser Exploits
- PDF Exploits
- ROP Exploits
Training Course Cost: $ 4,000 Per Enrollment
This is an Advanced Security course. You must meet specific prerequisites in order to enroll in this course. Please speak to your account manager for more details.
Coming from out of town? Ask about our hotel accommodation packages!
Custom Exploit Development Training For Your Organization
If your organization needs an exploit development class that is slightly customized to your needs, no problem! Just fill out the request information form to the right and tell us more about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
Topics & Concepts Covered in Exploit Development Training Include:
- Stack Overflows in Linux with GDB
- Structured Exeption Handler Exploits
- Egghunters in Windows & Linux
- Browser & PDB Exploits
- Bypassing DEP & ASLR
- Return Oriented Programming
- Kernel Exploitation
Recommended Training Audience and Prerequisites
For students with a limited programming background and experience, worry not! Templates are provided for each exploit with the intent being to cut down on the raw programming time in class, and instead focusing more on the methodology and mindset that goes into writing these different exploits. By taking this approach, students can expect to learn and to execute 12-15 exploits over the duration of the class.
It is highly recommended that students have approximately two years of hacking or cyber security experience.
This course is appropriate for Advanced IT Security Professionals (deep technical), IT Security Assessors (Penetration Testers), Application Developers, and Intrusion Analysts.