OffSec - EXP301
EXP-301: Windows User Mode Exploit Development(線上課程及認證考試方案)
EXP-301: Windows User Mode Exploit Development
- 時數:0小時
- 費用:NT$ 57,570
- 點數:不適用企業點數
選擇查詢分區開課時間
地點 | 班號 | 日期 | 時間 | 預約 |
---|
目前查無開課時段
詳細開課時間請洽詢業務
新竹、台中、高雄如有上課需求,請參考台北開課日期,洽當地服務人員依需求加開遠距開課日期
教材
課程目標
Windows User Mode Exploit Development (EXP-301) is a course that teaches learners the basics of modern exploit development. Despite being a fundamental course, it is at the 300 level because it relies on substantial knowledge of assembly and low level programming. It begins with basic buffer overflow attacks and builds into learning the skills needed to crack the critical security mitigations protecting enterprises. Learners who complete the course and pass the exam earn the OffSec Exploit Developer (OSED) certification. The OSED is one of three certifications making up the OSCE³ certification along with the OSEP for advanced penetration testing and OSWE for web application security.
線上課程方案介紹 (恆逸金銀卡會員另有優惠)
● Course & Cert Exam Bundle:NT57,570/一次性(含90天Lab與1次考試)
● Learn One: NT90,490/一年(含365天Lab與2次考試)
● Learn Unlimited:NT200,000/(含365天Lab與無限次考試)
適合對象
- Windows User Mode Exploit Development is an intermediate course designed for those who want to learn about exploit development skills
- Job roles like penetration testers, exploit developers, security researchers, Malware analysts, and software developers working on security products, could benefit from the course
預備知識
- Familiarity with debuggers (ImmunityDBG, OllyDBG)
- Familiarity with basic exploitation concepts on 32-bit
- Familiarity with writing Python 3 code
- Ability to read and understand C code at a basic level
- Ability to read and understand 32-bit Assembly code at a basic level
課程內容
- Windows User Mode Exploit Development: General Course Information
- WinDbg and x86 Architecture
- Exploiting Stack Overflows
- Exploiting SEH Overflows
- Introduction to IDA Pro
- Overcoming Space Restrictions: Egghunters
- Creating Custom Shellcode
- Reverse Engineering for Bugs
- Stack Overflows and DEP Bypass
- Stack Overflows and ASLR Bypass
- Format String Specifier Attack Part I
- Format String Specifier Attack Part II
- Trying Harder: The Labs
學會技能
- Learn the fundamentals of reverse engineering
- Create custom exploits
- Develop the skills to bypass security mitigations
- Write handmade Windows shellcode
- Adapt older techniques to more modern versions of Windows
備註事項
報名請上OffSec全系列線上課程平台
推薦課程
相關連結
台北恆逸教育訓練中心
- 02-25149191
- 02-25149292
- 台北市松山區復興北路99號14樓
新竹恆逸教育訓練中心
- 03-5723322
- 03-5745738
- 新竹市光復路二段295號3樓之2
台中恆逸教育訓練中心
- 04-23297722
- 04-23102000
- 台中市西區臺灣大道二段309號2樓
高雄恆逸教育訓練中心
- 07-5361199
- 07-5361698
- 高雄市苓雅區新光路38號4樓之1