ZDResearch Exploit Development
Overview
This course will teach you fundamentals of exploit development, and walk you through hours of hands-on reverse engineering and exploit development practices, making you comfortable in pursuing the field on your own. It also enables you to take part in our upcoming, Advanced Exploit Development course.
The course is taught by some of the world’s best hackers, with real, hands-on hacking experience and not just security training. Our instructors have worked in many of the world’s top hacking teams, have received hacking bounties from many well-known companies such as Google and Facebook, and have worked as cyber security consultants in companies such as Google, Facebook and Intel.
This is one of our unique courses, because every advanced security research firm has its own tools and methods for exploit development. In this course, we will provide the students with detailed Win32 exploit development.
Pre-Requirements
- Assembly Programming
- Windows Architecture
- C Programming
- Reverse Engineering
- Python Programming
Goals
The participant will be able to exploit application vulnerabilities by developing exploitation codes that are reliable and effective, yet are not signature friendly. They will also fully comprehend fundamental exploitation techniques, and use them to develop advanced exploitation methods.
Course Material
- Interactive Slides
- Video Lectures
- Downloadable Materials
- Assignments
- Staff Responding to Every Question
Preview
The following preview will include an initial lecture of the course, where Stack Exploitation is demonstrated:
Price
Certification
Upon successful completion of course materials, you will receive a certificate of completion from Exdemy. Upon passing ZDResearch’s exam, you will receive the ZDResearch Win32 Exploit Developer (ZWED) certificate.
What You Should Bring
Students are required to have a personal computer with enough memory to run virtual machines, and spend enough time on the course and its labs & assignments.
Target Audience
- Security Engineers
- Hackers
- Researchers
- Exploit Developers
- Bounty Hunters