Search result for Exploit development Online Courses & Certifications
Get Course Alerts by Email
Reverse Engineering and Exploit Development
by Infinite Skills- 4.1
6 hours on-demand video
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems....
$17.99
Ethical Hacking & Bug Hunting: Buffer Overflow For Beginners
by Eslam Medhat (Ethical Hacking, Bug Bounty and Penetration Testing)- 0.0
1.5 hours on-demand video
Learn how to exploit Buffer Overflows on Windows systems. Get a shell! (Reverse engineering and Exploit development). After taking this course, you will have a better understanding of the approaches (reverse engineering, exploit development) that bug hunters use to find security vulnerabilities. You will learn how to exploit Buffer Overflows on Windows systems. Creating final exploit code. Exploit development....
$16.99
Ethical Hacking Bug Bounty Course
by Abdul Motin- 0.0
35 mins on-demand video
After taking this course, you will have a better understanding of the approaches (reverse engineering, exploit development) that bug hunters use to find security vulnerabilities. You will learn how to exploit Buffer Overflows on Windows systems....
$12.99
Ethical Hacking with Metasploit: Exploit & Post Exploit
by Muharrem AYDIN- 4.5
5 hours on-demand video
Learn Ethical Hacking from scratch with Metasploit , exploit vulnerabilities and become a white hat hacker Welcome to my “Ethical Hacking with Metasploit: Exploit & Post Exploit” course. After learning Metasploit by practicing against victim machines you will be able to exploit and remotely access to Linux and Windows victim machines and gain control and access files (read/write/update/execute)....
$20.99
Hands-on Penetration Testing Labs 2.0
by Jesse Kurrus, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP- 0.0
3.5 hours on-demand video
We're also going to focus upon exploit development, covering in detail how to craft a buffer overflow exploit for a custom Linux and Windows binary. In order to accomplish this goal of buffer over flow exploit development and debugging, we're going to be creating a Windows 7 analysis and attack machine. Custom exploit development...
$15.99
The Metasploit Course For Ethical Hacker
by MdJahidul Said- 0.0
30 mins on-demand video
Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine....
$12.99
Concurrent Programming in Python
by Packt Publishing- 3.2
2.5 hours on-demand video
You will learn about the principal approaches to concurrency that Python has to offer, including libraries and tools needed to exploit the performance of your processor. BignumWorks Software LLP is an India-based software consultancy that provides consultancy services in the area of software development and technical training....
$12.99
Related searches
Penetration Testing - Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Learn exploitation phase of penetration testing, including the foundations of explorations, application debugging, reverse engineering, exploitation development and web application exploitation. This is a self-paced course that continues the development of ethical hacking skills. In the exploitation phase, the penetration testers try to exploit security weaknesses actively. Discover and exploit Cross-Site Request Forgery (CSRF) attacks....
$166
Hands-on Penetration Testing Labs 3.0
by Jesse Kurrus, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP- 4.5
4 hours on-demand video
More specifically, we'll be going over key essential pentesting skills such as port scanning and service enumeration, local file inclusion, web directory brute forcing, buffer overflows exploit development, SQL injection, Cross-Site Scripting, various types of reverse shells, a variety of local privilege escalation, and much more. Custom exploit development...
$15.99
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. SECURE SOFTWARE DEVELOPMENT...