Latest news on LayerOne

Subscribe to the RSS Feed

Training Spotlight: Introduction to Stack-based Exploitation

Posted on 25 April 2019 by operator (0)

Learn the essentials of memory corruption and binary exploitation in this hands-on course! A must-have for those getting started with hacking, bug bounties, software development, software QA, and penetration testing! Instructor proceeds for this training go directly to Hackers for Charity!

This course is intended for bug bounty hunters, software developers, software QA testers, penetration testers, security analysts, security administrators, network administrators with a security focus, and anyone else interested in learning about . This course focuses on the fundamentals of binary exploitation and is appropriate for beginner to intermediate skill levels.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about this year’s training lineup!

Sincerely,
The LayerOne Staff

Comments are closed.