Cheating on Windows, Fuzzing and Buffer Overflow: Attack Scenarios and Protection Methods
In just 2 hours, you’ll learn how to identify buffer-overflow vulnerabilities in Windows applications, exploit remote code execution vulnerability, and use various modern mitigations for vulnerabilities. In short, you will learn how to apply additional mitigations against software attacks in a short time.
We will also cover various modern mitigations for vulnerabilities and some methods on bypassing them.
What you will learn
Topics covered:
1. What is exploit
2. Buffer Overflow
3. Fuzzing
4. Debuggers
5. Vulnserver
6. Exploitation demo
7. Exploitation prevention
8. Exploit guard
What’s included
- Access to 2-hour recorded practical lesson
- Training materials to download
- The virtual training covers: Buffer Overflow, Fuzzing, Debuggers, Vulnserv, exploitation demo, exploitation prevention, exploit guard
- 12-month access to video recording, list of commands and training materials for you to keep and get back to whenever needed.
Additional information
PLEASE NOTE: It may take 2-3 business days for your course access to be activated. You will receive an email from us with all necessary details.
Only registered users can write reviews. Please Sign in or create an account