Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Applied Technology Academy
  4. OffSec - EXP-401: Advanced Windows Exploitation (OSEE)

OffSec - EXP-401: Advanced Windows Exploitation (OSEE)

We are a premier provider of EXP-401 Offensive Security OSEE Training. Modern exploits for Windows-based platforms require modern bypass methods to circumvent Microsoft’s defenses. In Advanced Windows Exploitation, our expert instructors will challenge students to develop creative solutions that work in today’s increasingly difficult exploitation environment.

Provider Information

More courses from this provider:
Contact Information

1992 Lewis Turner Blvd, Suite 131
Fort Walton Beach, FL 32547

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
EXP-401
Course Prerequisites

All students are required to have:

  • Experience in developing windows exploits and understand how to operate a debugger. Familiarity with WinDBG, x86_64 assembly, IDA Pro and basic C/C++ programming is highly recommended. A willingness to work and put in real effort will greatly help students succeed in this security training course.
  • A laptop that is able to run three VMs with ease. Please do not bring netbooks or other low-resolution systems. The only supported host operating system is Windows 10.
  • VMware Workstation 15 or higher
  • 64-bit CPU with a minimum of 4 cores along with support for NX, SMEP, VT-d/IOMMU and VT-x/EPT
  • At least 160 GB HD free
  • At least 16 GB of RAM
Training Purpose
Functional Development
Skill Development
Specific Audience
All
Federal Employee
General Public
Delivery Method
Classroom
Online, Instructor-Led
Online, Self-Paced
Course Locations

Fort Walton Beach, FL 32547

Tampa, FL 33602

Tampa, FL 33605

Panama City, FL 32401

Las Vegas, NV 89101

Montgomery, AL 36104

San Antonio, TX 78225

Warner Robins, GA 31098

Augusta, GA 30907

Farmington, UT 84025

Columbia, MD 21046

Herndon, VA 20170

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

  • Bypass and evasion of user mode security mitigations such as DEP, ASLR, CFG, ACG and CET
  • Advanced heap manipulations to obtain code execution along with guest-to-host and sandbox escapes
  • Disarming WDEG mitigations and creating version independence for weaponization
  • 64-Bit Windows Kernel Driver reverse engineering and vulnerability discovery
  • Bypass of kernel mode security mitigations such as kASLR, NX, SMEP, SMAP, kCFG and HVCI

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: