LinkedIn Google + Facebook YouTube Twitter
Build infinite skills
with project-based training videos
Reverse Engineering and Exploit Development Training Video

Reverse Engineering and Exploit Development Training Video

A Practical Training Course That Teaches Real World Skills

In this project-based Reverse Engineering and Exploit Development video tutorial series, you'll quickly have relevant skills for real-world applications.

Follow along with our expert instructor in this training course to get:

  • Concise, informative and broadcast-quality Reverse Engineering and Exploit Development training videos delivered to your desktop
  • The ability to learn at your own pace with our intuitive, easy-to-use interface
  • A quick grasp of even the most complex Reverse Engineering and Exploit Development subjects because they're broken into simple, easy to follow tutorial videos

Practical working files further enhance the learning process and provide a degree of retention that is unmatched by any other form of Reverse Engineering and Exploit Development tutorial, online or offline... so you'll know the exact steps for your own projects.

Share |
SKU: 02062 | Duration: 6 hours - 69 tutorial videos | Date Released: 2015-04-10
Works on: Windows PC or Mac | Format: DVD and Download | Instructor: Philip Polstra

Table of Contents

expand all / collapse all

Course Description

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Unlimited Online Access

The O’Reilly Learning Library is now part of Safari

Broad, deep, and trustworthy information—everything from the Learning Library plus much more. 40,000 books, videos, and tutorials from 200+ pro publishers.

Try it Free
  • Learn the way you like to—video, audio, books, tutorials, lessons
  • Available anytime, anywhere—mobile, desktop, even offline
  • Find the exact information you need to solve a problem on the fly, or learn something new from the ground up.

100% Money Back Guarantee

Complete Customer Satisfaction is our goal. All O'Reilly Training DVDs come with a 100% money back guarantee. If you are not happy with your Training DVD just contact our sales department within 30 days of purchase for a refund. View our full terms and conditions


-->