Duration 2 weeks
Weekly study 10 hours
Understand the methods of advanced and tailored cyber attacks
In some cases the exploit will not work directly (out-of-the-box). We may need to develop our own exploits or modify existing ones. In the first week of this short course, we will look into techniques to help us achieve this, while in the second week, we will introduce you to some of the tools and exploits used.
Last but not least, we’ll tackle the issue of reporting, a vital phase of a penetration test for which you need to be able to present your results and recommendations in an informative and actionable way.
What topics will you cover?
- Advanced exploits and reverse engineering looking at decompiled program code
- Buffer overflows and other techniques to modify program behaviour
- Shelcode generation using the Metasploit framework
- Social engineering techniques
- Presenting the findings and recommendations of a penetration test
Who is the course for?
The course is for MSc Cyber Security students.
Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.