Advanced technical training for security researchers, incident response handlers and exploit developers. Our hands-on workshops give your staff the skills to understand how modern attacks are developed and performed.
Our trainings are scheduled once enough people have indicated their interest in taking one. Fill out the form below if you are interested in taking a training offered by Trail of Bits.
|Available Trainings||Course Length||Register|
|Windows Browser Exploitation (“Assured Exploitation”)||2, 3 or 5 days||Waiting List|
If you would like to schedule a private training for your company or have any questions about the courses, please contact email@example.com. Receive announcements about our upcoming trainings by subscribing to our announcement list. If you would like to request help from your company to attend a training, we can help you get started.
Many security professionals have experience with stack overflows and heap spraying, but these techniques are rarely sufficient when applied to modern systems. Reliable exploitation on Vista and Windows 7 systems requires advanced techniques such as heap layout manipulation, return oriented programming and ASLR information leaks. This two-day intensive course focuses on teaching the principles behind these advanced techniques and will give the students hands-on experience with real-world exploits.