Course Information
Course Overview
Application Penetration Testing for Security Professionals
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.
Course Content
- 12 section(s)
- 70 lecture(s)
- Section 1 Getting Started
- Section 2 Reversing Compiled Windows Applications
- Section 3 Reversing Compiled OS X Applications
- Section 4 Reversing Compiled Linux Applications
- Section 5 Reversing Android Applications
- Section 6 Finding Other Vulnerabilities
- Section 7 Simple Exploits
- Section 8 Exploit Payloads
- Section 9 Making Exploits Harder To Detect
- Section 10 Web Exploitation
- Section 11 ARM Exploitation
- Section 12 Future Directions
What You’ll Learn
- Learn more about various reversing tools, Learn more about common vulnerabilities and how to find them, You will become more familiar with simple exploits, web exploitation, and ARM exploitation
Skills covered in this course
Reviews
-
YY y
The content is quite short and lacks depth. If you're a beginner, you'll need to do some extra research to understand the content, and I believe there are many good courses for beginners on Udemy better than this one. If you're an expert, this course can’t provide you any new information.
-
EEAGLExJASTER YT
fine
-
EEderson Faccin Frasson
This course is like a lecture, the instructor could share examples or do a step-by-step to explain better to the students.
-
FFabian Bakkum
The focus in this course is on exploit development in particular, not reverse engineering in general. All in all it gives you a nice overview, but don't expect to gain a deep understanding from this course, but it gets your feet wet. Some things are overexplained, but others lack a bit of explanation, in particular, I would have liked more explanation on how programs are executed at the low level as I do not have any real experience programming in assembly.