- Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems.
- Covers essential exploit development skills for advanced penetration testers and security professionals.
- Students will be required to obey high ethical principles and not exploit systems without authorization.
Learning Objectives
- Define and explain essential Windows features and their weaknesses.
- Research, discover and exploit vulnerabilities in Mac OS X as part of ethical, authorized penetration tests.
- Research, discover and exploit vulnerabilities in Cisco iOS as part of ethical, authorized penetration tests.
- Evaluate and implement protection mechanisms.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):