Understanding Vulnerabilities & Exploits is the first of two courses offered in our Offensive Boot Camp series.
A variety of tools and techniques are presented that are fundamental to today’s offensive security professionals. The coursework is designed to be hands on, with students expected to apply techniques in a lab setting after discussing in a lecture format. The skills presented can be used immediately on the job to build the skillset of a junior penetration tester or junior red team professional.
In this course, you will learn to:
- Enumerate modern computing environments to uncover and exploit security flaws on the web, as well as within Linux and Windows operating systems
- Discover and understand common flaws routinely seen in modern computing systems and applications
Before taking this course, you should be able to:
- Give a brief description of client/server architectures, network sockets, firewalls, transport protocols (TCP vs. UDP), and application protocols (e.g. HTTP, FTP, SSH, DNS, etc.).
- Comfortably use the Linux and Windows command line and use command line text editors (e.g. vi and vim) to edit and read files.
The course will begin with a crash course of essential commands and tools to enhance proficiency.
- Read and modify (given examples and instruction) source code in a variety of languages.
*NOTE: This is a technical course, where students will be expected to utilize the Linux command line, be able to edit files in a text editor, edit source code, and understand the basics of computer networking. However, the coursework is presented in an accessible way to allow students who may not have experience in all areas the ability to learn. The boot camp also leads with a crash course of the required Linux and networking skills to enhance student proficiency.
Current Course Offerings
February 27th and 28th
*Note: The above dates are for the on-site sessions of the course. The online component of the course will begin approximately four weeks before the on-site sessions.