Training Spotlight: Introduction to Stack-based Exploitation
Learn the essentials of memory corruption and binary exploitation in this hands-on course! A must-have for those getting started with hacking, bug bounties, software development, software QA, and penetration testing! Instructor proceeds for this training go directly to Hackers for Charity!
This course is intended for bug bounty hunters, software developers, software QA testers, penetration testers, security analysts, security administrators, network administrators with a security focus, and anyone else interested in learning about . This course focuses on the fundamentals of binary exploitation and is appropriate for beginner to intermediate skill levels.
Seating is limited for training events. Don’t wait, register now!
View the training description to learn more about this training! Head to the Training page for more information about this year’s training lineup!
Sincerely,
The LayerOne Staff