Reverse Engineering and Exploit Development Training Video

Course

Online

£ 97.69 + VAT

*Indicative price

Original amount in AUD:

$ 189

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

A Practical Training Course That Teaches Real World Skills In this project-based Reverse Engineering and Exploit Development video tutorial series, you'll quickly have relevant skills for real-world applications. Follow along with our expert instructor in this training course to get: Concise, informative and broadcast-quality Reverse Engineering and Exploit Development training videos delivered to your desktop The ability to learn at your own pace with our intuitive, easy-to-use interface A quick grasp of even the most complex Reverse Engineering and Exploit Development subjects because they're broken into simple, easy to follow tutorial videos Practical working files further enhance the learning process and provide a degree of retention that is unmatched by any other form of Reverse Engineering and Exploit Development tutorial, online or offline... so you'll know the exact steps for your own projects. Course Fast Facts: Only 6 hours to complete this course 69 tutorial videos Expert instructors lead each course Download to any Windows PC or Mac and save for viewing off line Course is accessible 24/7 from any computer once downloaded You can study from home or at work at your own pace in your own time Course Description In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other...

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

System Requirements - Digital Download Digital Download: Microsoft Windows XP or higher, Mac OS X 10.4 or higher. Minimum screen resolution of 1024x768 Digital Download specific requirements: Between 1GB and 6GB of available hard drive space (depending on the training course) An Internet connection with sufficient bandwidth. You must have at least a 56K modem connection (Broadband recommended). Most modern ADSL and Cable internet solutions will be sufficient. Do I need...

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Windows
  • Linux
  • Web
  • Engineering
  • IT Development
  • Skills and Training

Course programme

  • 01. Getting Started
    • Introduction To Reversing
    • About The Author
    • Ethical Considerations
    • Reversing Tools - Part 1
    • Reversing Tools - Part 2
    • Reversing Tools - Part 3
    • Reversing Tools - Part 4
    • Reversing Tools - Part 5
    • Reversing Tools - Part 6
    • 0110 How To Access Your Working Files
  • 02. Reversing Compiled Windows Applications
    • 0201 Vulnerabilities - Part 1
    • 0202 Vulnerabilities - Part 2
    • 0203 Vulnerabilities - Part 3
    • 0204 Using Fuzzing - Part 1
    • 0205 Using Fuzzing - Part 2
    • 0206 Using Fuzzing - Part 3
    • 0207 Using Fuzzing - Part 4
    • 0208 Just Enough Assembly - Part 1
    • 0209 Just Enough Assembly - Part 2
    • 0210 Just Enough Assembly - Part 3
    • 0211 Stack Overflows - Part 1
    • 0212 Stack Overflows - Part 2
    • 0213 Stack Overflows - Part 3
    • 0214 Heap Overflows - Part 1
    • 0215 Heap Overflows - Part 2
    • 0216 Heap Overflows - Part 3
    • 0217 Heap Overflows - Part 4
    • 0218 Format String Bugs - Part 1
    • 0219 Format String Bugs - Part 2
    • 0220 Format String Bugs - Part 3
    • 0221 Format String Bugs - Part 4
    • 0222 Section Overflows
    • 0223 Windows Kernel Flaws
    • 0224 Decompilers
    • 0225 Automation - Part 1
    • 0226 Automation - Part 2
  • 03. Reversing Compiled OS X Applications
    • 0301 Where Are The Vulnerabilities?
    • 0302 Locating Stack Overflows
    • 0303 Heap Overflows
  • 04. Reversing Compiled Linux Applications
    • 0401 Where Are The Vulnerabilities?
    • 0402 Linux Stack Overflows - Part 1
    • 0403 Linux Stack Overflows - Part 2
    • 0404 Linux Stack Overflows - Part 3
    • 0405 Linux Stack Overflows - Part 4
    • 0406 Linux Stack Overflows - Part 5
    • 0407 Linux Heap Overflows - Part 1
    • 0408 Linux Heap Overflows - Part 2
    • 0409 Linux Heap Overflows - Part 3
    • 0410 Linux Heap Overflows - Part 4
    • 0411 Linux Kernel Flaws - Part 1
    • 0412 Linux Kernel Flaws - Part 2
  • 05. Reversing Android Applications
    • 0501 Introduction To Android And ARM
    • 0502 Android Applications
  • 06. Finding Other Vulnerabilities
    • 0601 Web Site Vulnerabilities
    • 0602 Database Vulnerabilities
  • 07. Simple Exploits
    • 0701 Going From Vulnerability To Exploit
    • 0702 A Simple Exploit Script
    • 0703 Creating A Metasploit Module For An Exploit - Part 1
    • 0704 Creating A Metasploit Module For An Exploit - Part 2
    • 0705 Creating A Metasploit Module For An Exploit - Part 3
  • 08. Exploit Payloads
    • 0801 Shellcode - Part 1
    • 0802 Shellcode - Part 2
    • 0803 Shellcode - Part 3
    • 0804 Shellcode - Part 4
  • 09. Making Exploits Harder To Detect
    • 0901 Encoding Shellcode - Part 1
    • 0902 Encoding Shellcode - Part 2
  • 10. Web Exploitation
    • 1001 Web Exploits In Metasploit
  • 11. ARM Exploitation
    • 1101 Android Exploits In Metasploit
  • 12. Future Directions
    • 1201 Wrap Up And Suggestions For Further Study

Additional information

Digital Download FAQs

Q: What is a digital download?

A digital download is training that you download from the internet using your web browser instead of us shipping you a physical CD.

Q: How instant is the "Instant Purchase"?

If you complete your purchase, you are emailed your access key within minutes of the transaction completing.

Q: How do I access my digital download purchase?

Once you complete your purchase, you will receive an email with an Access Key, and instructions on how to download your purchase. You will enter that Access Key...

Reverse Engineering and Exploit Development Training Video

£ 97.69 + VAT

*Indicative price

Original amount in AUD:

$ 189