• Classroom
  • Online, Self-Paced
Course Description

Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit them. In addition, current techniques that attempt to remediate the threat of software vulnerability exploitation will be discussed.

This will be a lab driven class where specific software vulnerability types in particular environments are discussed and then exploited in a lab setting. Examples of lab components of the class as well as specific topics covered include:

  • Shellcode development
  • Stack overflow exploitation
  • Heap overflow exploitation
  • Static source code analysis
  • Defeating non-executable stack protection

The class will help students be more aware of the specific details and mechanisms of software exploits we see in the wild. This knowledge will enable the students to better analyze their own software for vulnerabilities in an effort to produce more secure code.

Learning Objectives

  • Gain a deep understanding of the basic software vulnerability exploitation techniques.
  • Get hands on experience with proof of concept exploit development.
  • Understand current exploit remediation technologies and their weaknesses.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.