Weekly study10 hours
Advanced Exploits and Reporting
Understand the methods of advanced and tailored cyber attacks
In some cases the exploit will not work directly (out-of-the-box). We may need to develop our own exploits or modify existing ones. In the first week of this short course, we will look into techniques to help us achieve this, while in the second week, we will introduce you to some of the tools and exploits used.
Last but not least, we’ll tackle the issue of reporting, a vital phase of a penetration test for which you need to be able to present your results and recommendations in an informative and actionable way.
- Advanced exploits and reverse engineering looking at decompiled program code
- Buffer overflows and other techniques to modify program behaviour
- Shelcode generation using the Metasploit framework
- Social engineering techniques
- Presenting the findings and recommendations of a penetration test
Learning on this course
You can take this self-guided course and learn at your own pace. On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explore advanced hacking techniques such as buffer overflows
- Develop simple custom exploits
- Assess social engineering techniques and how information can be gained without using a computer
- Summarise the findings of a penetration test
Who is the course for?
The course is for MSc Cyber Security students.
Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.
What software or tools do you need?
Kali Linux and a web browser.