Security for Hackers and Developers: Exploit Development
Offered By: Pluralsight
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will help you understand how to prioritize your software security by teaching you how to exploit your security. Make the proper steps to become more secure.
With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. In this course, Security for Hackers and Developers: Exploit Development, you'll learn the ins and outs of how to write basic exploits. First, you'll explore control-flow hijacks such as function and return pointer overwrites. Next, you'll cover how to create and debug shellcode. Finally, you'll discover how to overcome common security mitigations using return-oriented programming (ROP). By the end of this course, you’ll know how to exploit programs with confidence, which gives you the skills to defend software, write exploits, or reverse engineer malware.
With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. In this course, Security for Hackers and Developers: Exploit Development, you'll learn the ins and outs of how to write basic exploits. First, you'll explore control-flow hijacks such as function and return pointer overwrites. Next, you'll cover how to create and debug shellcode. Finally, you'll discover how to overcome common security mitigations using return-oriented programming (ROP). By the end of this course, you’ll know how to exploit programs with confidence, which gives you the skills to defend software, write exploits, or reverse engineer malware.
Syllabus
- Course Overview 1min
- Auditing, Debugging, and Vulnerabilities 24mins
- Understanding a Function Pointer Overwrite 13mins
- Exploiting a Windows Server Using Shellcode 32mins
- Exploiting a Basic Browser Bug 16mins
- Applying Return-oriented Programming 19mins
Taught by
Dr. Jared DeMott
Related Courses
Systems & Network SecurityChaffey College via California Community Colleges System Software Security for Web Applications
Codio via Coursera Web Technologies and Security
Codio via Coursera Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX Cache Side-Channel Attacks and Mitigations
Graz University of Technology via edX