A Certificate of Completion is offered for each class.
How do you know when a bug can end-up getting you “owned?” These courses look at vulnerability discovery in applications as well as how reliable exploits are constructed.
Learn how to expose the inner mechanisms of exploits and how they work. The class is highly hands-on and very lab intensive.
Working through lab examples and real world vulnerabilities to take you to the next level
This introductory course is for those interested in entering the field of malicious software analysis.
No Source? No Symbols? No Problem.
This course dives into the newest features of the Metasploit Framework and demonstrates how to use these features in every aspect of a penetration test.
Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.
An in-depth understanding of how advanced stealth malware works, how it interacts with the operating system, underlying hardware and network.
An unbiased view on the security of recent Xen systems (Xen 3.3 and 3.2), show exemplary attacks and a study of how various technology (e.g. Intel VT-d and TXT) and clever design of the VMM can help to improve security.
An in depth, hardcore drilldown into advanced Windows Vulnerability Exploitation techniques.