• Classroom
Course Description
  • Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems.
  • Covers essential exploit development skills for advanced penetration testers and security professionals.
  • Students will be required to obey high ethical principles and not exploit systems without authorization.

Learning Objectives

  • Define and explain essential Windows features and their weaknesses.
  • Research, discover and exploit vulnerabilities in Mac OS X as part of ethical, authorized penetration tests.
  • Research, discover and exploit vulnerabilities in Cisco iOS as part of ethical, authorized penetration tests.
  • Evaluate and implement protection mechanisms.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Operations
  • Digital Forensics
  • Exploitation Analysis