Vulnerability Discovery and Exploitation
top of page
pexels-luis-gomes-546819_edited.jpg
Previous

Course length (in hours):

40

Next

Vulnerability Discovery and Exploitation

Course Description

After completing this course, students will have the practical skills required to assess embedded programs for vulnerabilities, recommend mitigations, and create proof-of-concept exploits to demonstrate those vulnerabilities to commanders.

bottom of page