Specialized Training ยท DART Cybersecurity

Exploitation

In this course, trainees will learn how exploitation works on various operating systems.

About This Course

In this course, trainees will learn how exploitation works on various operating systems. They will get an introduction to different vulnerability types, learn how to exploit them, create shellcodes, and deal with common exploit mitigation techniques.

Programme Curriculum
1
Exploitation Techniques
โ–ผ
  • Logical Vulnerabilities Exploitation
  • Shellcodes
  • Heap Exploitation
  • Exploit Mitigation Techniques
  • Bypassing Stack Canary (cookie) Exercise
  • Bypassing ASLR / DEP
Course Registration
๐Ÿ”’

Registration is Currently Closed

Registration for this course is not open at the moment. Please check back later or contact us for more information.

Contact Us