Hacking Techniques / Exploits
Current trends in hacking and exploitation will be explored comprehensively. Students learn how to create exploits as a way to prevent, detect, and combat them. Buffer overflows, race conditions, and unvalidated inputs are examined. Students address the latest attack vectors and older attacks that are still prevalent. The evasion of anti-virus and intrusion detection systems is investigated. Students walk through many real-world attacks used by penetration testers.
Students registering for credit courses for the first time must declare a program at the point of registration. Declaring a program does not necessarily mean students must complete a program, individual courses may be taken for skill improvement and upgrading.
For more information, please contact Continuing Education