Specialized Training ยท DART Cybersecurity
Exploitation
In this course, trainees will learn how exploitation works on various operating systems.
About This Course
They will get an introduction to different vulnerability types, learn how to exploit them, create shellcodes, and deal with common exploit mitigation techniques.
Through hands-on exercises, participants will gain practical experience in understanding and exploiting vulnerabilities, as well as developing defensive strategies.
Programme Curriculum
1
Exploitation Techniques
โผ
- Logical Vulnerabilities
- Exploitation fundamentals
- Shellcode development
- How to exploit a race-condition with files
- Heap exploitation techniques
- Exploit Mitigation Techniques
- Bypassing Stack Canary (cookie)
- ASLR bypass techniques
- Return-oriented programming (ROP)
- Modern exploitation challenges
Course Registration
Registration is Currently Closed
Registration for this course is not open at the moment. Please check back later or contact us for more information.
Contact Us