Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Dive into this intensive 60-minute masterclass that demystifies binary exploitation and reverse engineering through hands-on demonstrations and real-world techniques. Learn to understand memory corruption vulnerabilities and common attack vectors including buffer overflows and format string attacks. Explore PE file structure analysis and master reverse engineering using Ghidra for executable disassembly. Gain practical experience with stack-based buffer overflows, discover how to write simple shellcode payloads, and understand both exploitation methods and mitigation strategies. Perfect for ethical hackers, penetration testers, Red Team members, malware analysts, and cybersecurity professionals seeking to advance their technical exploitation and reverse engineering capabilities through practical, immediately applicable skills rather than theoretical concepts.
Syllabus
Master Binary Exploitation and Reverse Engineering in Just 60 Minutes
Taught by
INFOSEC TRAIN