YoVDO

Security for Hackers and Developers: Exploit Development

Offered By: Pluralsight

Tags

Exploit Development Courses Software Security Courses Return-oriented Programming Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will help you understand how to prioritize your software security by teaching you how to exploit your security. Make the proper steps to become more secure.

With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. In this course, Security for Hackers and Developers: Exploit Development, you'll learn the ins and outs of how to write basic exploits. First, you'll explore control-flow hijacks such as function and return pointer overwrites. Next, you'll cover how to create and debug shellcode. Finally, you'll discover how to overcome common security mitigations using return-oriented programming (ROP). By the end of this course, you’ll know how to exploit programs with confidence, which gives you the skills to defend software, write exploits, or reverse engineer malware.

Syllabus

  • Course Overview 1min
  • Auditing, Debugging, and Vulnerabilities 24mins
  • Understanding a Function Pointer Overwrite 13mins
  • Exploiting a Windows Server Using Shellcode 32mins
  • Exploiting a Basic Browser Bug 16mins
  • Applying Return-oriented Programming 19mins

Taught by

Dr. Jared DeMott

Related Courses

Systems & Network Security
Chaffey College via California Community Colleges System
Software Security for Web Applications
Codio via Coursera
Web Technologies and Security
Codio via Coursera
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX
Cache Side-Channel Attacks and Mitigations
Graz University of Technology via edX