Udemy

Reverse Engineering and Exploit Development

Enroll Now
  • 11,608 Students
  • Updated 1/2017
4.4
(1,292 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
6 Hour(s) 6 Minute(s)
Language
English
Taught by
Infinite Skills
Rating
4.4
(1,292 Ratings)

Course Overview

Reverse Engineering and Exploit Development

Application Penetration Testing for Security Professionals

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Course Content

  • 12 section(s)
  • 70 lecture(s)
  • Section 1 Getting Started
  • Section 2 Reversing Compiled Windows Applications
  • Section 3 Reversing Compiled OS X Applications
  • Section 4 Reversing Compiled Linux Applications
  • Section 5 Reversing Android Applications
  • Section 6 Finding Other Vulnerabilities
  • Section 7 Simple Exploits
  • Section 8 Exploit Payloads
  • Section 9 Making Exploits Harder To Detect
  • Section 10 Web Exploitation
  • Section 11 ARM Exploitation
  • Section 12 Future Directions

What You’ll Learn

  • Learn more about various reversing tools, Learn more about common vulnerabilities and how to find them, You will become more familiar with simple exploits, web exploitation, and ARM exploitation


Reviews

  • Y
    Y y
    2.5

    The content is quite short and lacks depth. If you're a beginner, you'll need to do some extra research to understand the content, and I believe there are many good courses for beginners on Udemy better than this one. If you're an expert, this course can’t provide you any new information.

  • E
    EAGLExJASTER YT
    3.0

    fine

  • E
    Ederson Faccin Frasson
    2.5

    This course is like a lecture, the instructor could share examples or do a step-by-step to explain better to the students.

  • F
    Fabian Bakkum
    4.0

    The focus in this course is on exploit development in particular, not reverse engineering in general. All in all it gives you a nice overview, but don't expect to gain a deep understanding from this course, but it gets your feet wet. Some things are overexplained, but others lack a bit of explanation, in particular, I would have liked more explanation on how programs are executed at the low level as I do not have any real experience programming in assembly.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed