Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Applied Technology Academy
  4. OffSec - Advanced Windows Exploitation - OSEE

OffSec - Advanced Windows Exploitation - OSEE

We are a premier provider of EXP-401 Offensive Security OSEE Training. Modern exploits for Windows-based platforms require modern bypass methods to circumvent Microsoft’s defenses. In Advanced Windows Exploitation, our expert instructors will challenge students to develop creative solutions that work in today’s increasingly difficult exploitation environment.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
EXP-401
Course Prerequisites

All students are required to have:

  • Experience in developing windows exploits and understand how to operate a debugger. Familiarity with WinDBG, x86_64 assembly, IDA Pro and basic C/C++ programming is highly recommended. A willingness to work and put in real effort will greatly help students succeed in this security training course.
  • A laptop that is able to run three VMs with ease. Please do not bring netbooks or other low-resolution systems. The only supported host operating system is Windows 10.
  • VMware Workstation 15 or higher
  • 64-bit CPU with a minimum of 4 cores along with support for NX, SMEP, VT-d/IOMMU and VT-x/EPT
  • At least 160 GB HD free
  • At least 16 GB of RAM
Training Purpose
Functional Development
Skill Development
Specific Audience
All
General Public
Federal Employee
Delivery Method
Classroom
Online, Instructor-Led
Online, Self-Paced
Course Locations

1992 Lewis Turner Blvd
Suite 131
Fort Walton Beach, FL 32547

1700 North Tampa Street
Tampa, FL 33602

1320 E 9th Ave
Suite 100
Tampa, FL 33605

722 E. 9th Court
Panama City, FL 32401

317 S. 6th Street
Las Vegas, NV 89101

445 Dexter Avenue
Suite 4050
Montgomery, AL 36104

5835 Callaghan Road
Suite 105
San Antonio, TX 78225

560 Warner Robins Street
Warner Robins, GA 31098

3165 Washington Road
Suite D
Augusta, GA 30907

164 NW Promontory
Suite 200
Farmington, UT 84025

6950 Columbia Gateway Dr
Suite 450
Columbia, MD 21046

620 Herndon Pkwy
Herndon, VA 20170

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

  • Bypass and evasion of user mode security mitigations such as DEP, ASLR, CFG, ACG and CET
  • Advanced heap manipulations to obtain code execution along with guest-to-host and sandbox escapes
  • Disarming WDEG mitigations and creating version independence for weaponization
  • 64-Bit Windows Kernel Driver reverse engineering and vulnerability discovery
  • Bypass of kernel mode security mitigations such as kASLR, NX, SMEP, SMAP, kCFG and HVCI

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: